This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall products are covered including Microsoft Internet Security and Acceleration Server (ISA), ISS BlackICE, Symantec Firewall, Check Point NG, and PIX Firewall. Firewall configuration strategies and techniques are covered in depth.
The book answers questions about firewalls, from How do I make Web/HTTP work through my firewall? To What is a DMZ, and why do I want one? And What are some common attacks, and how can I protect my system against them?
The Internet's explosive growth over the last decade has forced IT professionals to work even harder to secure the private networks connected to it—from erecting firewalls that keep out malicious intruders to building virtual private networks (VPNs) that permit protected, fully encrypted communications over the Internet's vulnerable public infrastructure.
The Best Damn Firewalls Book Period covers the most popular Firewall products, from Cisco's PIX Firewall to Microsoft's ISA Server to CheckPoint NG, and all the components of an effective firewall set up.
Anything needed to protect the perimeter of a network can be found in this book.
- This book is all encompassing, covering general Firewall issues and protocols, as well as specific products.
- Anyone studying for a security specific certification, such as SANS' GIAC Certified Firewall Analyst (GCFW) will find this book an invaluable resource.
- The only book to cover all major firewall products from A to Z: CheckPoint, ISA Server, Symatec, BlackICE, PIX Firewall and Nokia.
Engineers and administrators, who: 1) Protect their network and storage data from theft and/or corruption. 2.) Ensure both Web-based and internal application and data availability to customers, business partners, and employees. 3.) Optimize network hardware, software, storage, and bandwidth resources
Foreword Part I Introduction to Network Security & Firewalls Chapter 1 Introduction to Information Security Introduction Insecurity and the Internet Threats and Attacks Security Policies Creating a Security Policy Protecting Information Technology Using SSL and Secure Shell Other Hardware Security Devices Summary Chapter 2 Firewall Concepts Introduction Defining a Firewall Networking and Firewalls Popular Firewalls Summary Chapter 3 DMZ Concepts, Layout, and Conceptual Design Introduction DMZ Basics DMZ Design Fundamentals Advanced Risks Advanced Design Strategies Summary Chapter 4 Introduction to Intrusion Detection Systems Introduction What is Intrusion Detection? What is an Intrusion? Why Are Intrusion Detection Systems Important? Summary Part II Solaris & Linux Firewalls Chapter 5 Implementing a Firewall with Ipchains and Iptables Introduction Understanding the Need for a Firewall Deploying IP Forwarding and Masquerading Configuring Your Firewall to Filter Network Packets Understanding Tables and Chains in a Linux Firewall Logging Packets at the Firewall Configuring a Firewall Counting Bandwidth Usage Using and Obtaining Automated Firewall Scripts and Graphical Firewall Utilities Summary Chapter 6 Maintaining Open Source Firewalls Introduction Testing Firewalls Using Telnet, Ipchains, Netcat, and SendIP to Probe Your Firewall Understanding Firewall Logging, Blocking, and Alert Options Obtaining Additional Firewall Logging Tools Summary Chapter 7 Configuring Solaris as a Secur
- No. of pages:
- © Syngress 2003
- 16th October 2003
- eBook ISBN:
- Paperback ISBN: