05336nam 2200661Ia 450 991045832890332120200520144314.01-281-10010-297866111001000-08-055687-6(CKB)1000000000403283(EBL)330100(OCoLC)476128438(SSID)ssj0000073806(PQKBManifestationID)11110232(PQKBTitleCode)TC0000073806(PQKBWorkID)10141137(PQKB)11213976(MiAaPQ)EBC330100(CaSebORM)9781597492188(Au-PeEL)EBL330100(CaPaEBR)ebr10203579(CaONFJC)MIL110010(EXLCZ)99100000000040328320080208d2007 uy 0engurcn|||||||||txtccrBest damn firewall book period[electronic resource] /T.W. Shinder ... [et al.]2nd ed.Burlington, Mass. Syngressc20071 online resource (1164 p.)Previous ed.: 2003.Includes index.1-59749-218-3 Front Cover; The Best Damn Firewall Book Period, Second Edition; Copyright Page; Contributing Authors; Contents; Chapter 1: Installing Check Point NGX; Introduction; Preparing the Gateway; Installation; Secure Platform; Fire Wall-1/VPN-1 Installation; Smart Center Server Installation; Smart Console Installation; Putting It All Together; Smart Dashboard; Summary; Chapter 2: Smart Dashboard and Smart Portal; Introduction; A Tour of the Dashboard; Logging In; The Rulebase Pane; Security Tab; Address Translation Tab; Smart Defense Tab; Web Intelligence Tab; VPN Manager Tab; QoS Tab; Desktop Security TabWeb Access Tab Consolidation Rules Tab; The Objects Tree Pane; Network Objects; Services; Resources; Servers and OPSEC Applications; Users and Administrators; VPN Communities; The Objects List Pane; The Smart Map Pane; Menus and Toolbars; Working with Policy Packages; Installing the Policy; Global Properties; Fire Wall Page; NAT-Network Address Translation Page; VPN Page; VPN-1 Edge/Embedded Page; Remote Access Page; Smart Directory (LDAP) Page; Stateful Inspection Page; New in Smart Dashboard NGX; Security Policy Rule Names and Unique IDs; Group Object Convention; Group Hierarchy; Clone ObjectSession Description Tooltips; Your First Security Policy; Creating Your Administrator Account; Hooking Up to the Gateway; Reviewing the Gateway Object; Defining Your Security Policy; Policy Design; Creating Rules; Network Address Translation; Installing the Policy; Other Useful Controls on the Dashboard; Working with Security Policy Rules; Section Titles; Hiding Rules; Rule Queries; Searching Rules; Working with Objects; Object References; Who Broke That Object?; Object Queries; Working with Policies; What Would Be Installed?; What's Really Installed?; No Security Please; For the AnoraksChange Management Managing Connectra and Interspect Gateways; Configuring Interspect or Connectra Integration; Smart Defense Updates; SmartPortal; SmartPortal Functionality; Installing SmartPortal; Tour of SmartPortal; Summary; Chapter 3: Smart View Tracker; Introduction; Tracker; Log View; Active; Audit; Predefined Queries; Use for Predefined Queries; Adding Custom Queries; Applying Filters; Custom Queries; Matching Rule Filter; Viewing the Matching Rule; Viewing Log Records from Smart Dashboard; Active View; Live Connections; Custom Commands; Following a Source or Destination; Block IntruderAudit View Log Maintenance; Daily Maintenance; Log Switch; Summary; Chapter 4: SmartDefense and Web Intelligence; Introduction; Network Security; Threats; Structured Threats; Denial of Service; External Threats; Welchia Internet Control Message Protocol; Network Quota; Internal Threats; Reconnaissance (Port Scans and Sweeps); The OSI Model; Layer 3: The Network Layer; Layer 4: The Transport Layer; Layer 7: The Application Layer; The Need for Granular Inspection; Application Intelligence; Configuring Hosts and Nodes for AI; SmartDefense TechnologyCentral Configuration and the SmartDefense Web SiteThe Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an indispensable addition to a serious networking professionals toolkit. Coverage includes migrating to ISA Server 2006, integrating Windows Firewall and Vista security into your enterprise, successfully integrating Voice over IP applicationFirewalls (Computer security)Computer securityElectronic books.Firewalls (Computer security)Computer security.005.8Shinder Thomas W627558MiAaPQMiAaPQMiAaPQBOOK9910458328903321Best damn firewall book period2485571UNINA