1.

Record Nr.

UNINA9910810207903321

Autore

Shinder Thomas W

Titolo

Best damn firewall book period / / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder

Pubbl/distr/stampa

Rockland, Mass., : Syngress, 2003

ISBN

1-281-05615-4

9786611056155

0-08-047606-6

Edizione

[1st ed.]

Descrizione fisica

1 online resource (1329 p.)

Altri autori (Persone)

AmonCheri

ShimonskiRobert

ShinderDebra Littlejohn

Disciplina

005.8

Soggetti

Firewalls (Computer security)

Computer networks - Security measures

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di contenuto

COVER; Contents; Foreword; Chapter 1 Introduction to Information Security; Chapter 2 Firewall Concepts; Chapter 3 DMZ Concepts, Layout, and Conceptual Design; Chapter 4 Introduction to Intrusion Detection Systems; Implementing a Firewall with Ipchains and Iptables; Chapter 6 Maintaining Open Source Firewalls; Chapter 7 Configuring Solaris as a Secure Router and Firewall; Chapter 8 Introduction to PIX Firewalls; Chapter 9 Passing Traffic; Chapter 10 Advanced PIX Configurations; Chapter 11 Troubleshooting and Performance Monitoring

Chapter 12 Installing and Configuring VPN-1/FireWall-1 Next GenerationChapter 13 Using the Graphical Interface; Chapter 14 Creating a Security Policy; Chapter 15 Advanced Configurations; Chapter 16 Configuring Virtual Private Networks; Chapter 17 Overview of the Nokia Security Platform; Chapter 18 Configuring the Check Point Firewall; Chapter 19 Introducing the Voyager Web Interface; Chapter 20 Basic System Administration; Chapter 21 High Availability and Clustering; Chapter 22 ISA Server Deployment Planning and Design; Chapter 23 ISA Server Installation; Chapter 24 Managing ISA Server



Chapter 25 Optimizing, Customizing, Integrating, and Backing Up ISA ServerChapter 26 Troubleshooting ISA Server; Chapter 27 Advanced Server Publishing with ISA Server; Chapter 28 Protecting Mail Services with ISA Server; Chapter 29 Introducing Snort; Chapter 30 Installing Snort; Chapter 31 Combining Firewalls and IDS; Index

Sommario/riassunto

This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall products are covered including Microsoft Internet Security and Acceleration Server (ISA), ISS BlackICE, Symantec Firewall, Check Point NG, and PIX Firewall. Firewall configuration strategies and techniques are covered in depth.The book answers questions about firewalls, from How do I make Web/HTTP work through my firewall? To What is a DMZ,