|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910451065903321 |
|
|
Titolo |
Firewall policies and VPN configurations [[electronic resource] /] / Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Rockland, MA, : Syngress, c2006 |
|
|
|
|
|
|
|
ISBN |
|
1-281-07834-4 |
9786611078348 |
0-08-050651-8 |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (513 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
CantrellChris |
HenmiAnne |
LucasMark |
SinghAbhishek |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures |
Firewalls (Computer security) |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Firewall Policies and VPN Configurations; Copyright Page; Contents; Part I: Security Policy; Chapter 1. Network Security Policy; Introduction; Defining Your Organization; Different Access for Different Organizations; Untrusted Networks; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Using Your Policies to Create Firewall and VPN Configurations; Introduction; What Is a Logical Security Configuration?; Planning Your Logical Security Configuration; Writing Logical Security Configurations; Summary; Solutions Fast Track; Frequently Asked Questions |
Part II: Firewall ConceptsChapter 3. Defining a Firewall; Introduction; Why Have Different Types of Firewalls?; Back to Basics-Transmission Control Protocol/Internet Protocol; Firewall Types; Application Proxy; Gateway; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Deciding on a Firewall; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part III: VPN Concepts; Chapter 5. Defining a VPN; |
|
|
|
|
|
|
|
|
|
|
|
Introduction; What Is a VPN?; Public Key Cryptography; IPSec; SSL VPNs; Layer 2 Solutions; SSH Tunnels; Others |
SummarySolutions Fast Track; Frequently Asked Questions; Chapter 6. Deciding on a VPN; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part IV: Implementing Firewalls and VPNs (Case Studies); Chapter 7. IT Infrastructure Security Plan; Introduction; Infrastructure Security Assessment; Project Parameters; Project Team; Project Organization; Project Work Breakdown Structure; Project Risks and Mitigation Strategies; Project Constraints and Assumptions; Project Schedule and Budget; IT Infrastructure Security Project Outline |
SummarySolutions Fast Track; Chapter 8. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Medium Business (<2000 People); Introduction; Mapping Your Systems; Improving Accountability with Identity Management; VPN Connectivity; Summary; Solutions Fast Track; Frequently Asked Questions; Index |
|
|
|
|
|
|
Sommario/riassunto |
|
A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security. This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of |
|
|
|
|
|
|
|
| |