LEADER 04794nam 2200673Ia 450 001 9910784058303321 005 20200520144314.0 010 $a1-281-07834-4 010 $a9786611078348 010 $a0-08-050651-8 035 $a(CKB)1000000000298109 035 $a(EBL)272100 035 $a(OCoLC)560282086 035 $a(SSID)ssj0000074936 035 $a(PQKBManifestationID)11115790 035 $a(PQKBTitleCode)TC0000074936 035 $a(PQKBWorkID)10122576 035 $a(PQKB)11291917 035 $a(Au-PeEL)EBL272100 035 $a(CaPaEBR)ebr10142565 035 $a(CaONFJC)MIL107834 035 $a(OCoLC)842593482 035 $a(CaSebORM)1597490881 035 $a(MiAaPQ)EBC272100 035 $a(PPN)170267482 035 $a(EXLCZ)991000000000298109 100 $a20061005d2006 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aFirewall policies and VPN configurations$b[electronic resource] /$fAnne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell 205 $a1st edition 210 $aRockland, MA $cSyngress$dc2006 215 $a1 online resource (513 p.) 300 $aIncludes index. 311 $a1-59749-088-1 327 $aFront Cover; Firewall Policies and VPN Configurations; Copyright Page; Contents; Part I: Security Policy; Chapter 1. Network Security Policy; Introduction; Defining Your Organization; Different Access for Different Organizations; Untrusted Networks; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Using Your Policies to Create Firewall and VPN Configurations; Introduction; What Is a Logical Security Configuration?; Planning Your Logical Security Configuration; Writing Logical Security Configurations; Summary; Solutions Fast Track; Frequently Asked Questions 327 $aPart II: Firewall ConceptsChapter 3. Defining a Firewall; Introduction; Why Have Different Types of Firewalls?; Back to Basics-Transmission Control Protocol/Internet Protocol; Firewall Types; Application Proxy; Gateway; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Deciding on a Firewall; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part III: VPN Concepts; Chapter 5. Defining a VPN; Introduction; What Is a VPN?; Public Key Cryptography; IPSec; SSL VPNs; Layer 2 Solutions; SSH Tunnels; Others 327 $aSummarySolutions Fast Track; Frequently Asked Questions; Chapter 6. Deciding on a VPN; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part IV: Implementing Firewalls and VPNs (Case Studies); Chapter 7. IT Infrastructure Security Plan; Introduction; Infrastructure Security Assessment; Project Parameters; Project Team; Project Organization; Project Work Breakdown Structure; Project Risks and Mitigation Strategies; Project Constraints and Assumptions; Project Schedule and Budget; IT Infrastructure Security Project Outline 327 $aSummarySolutions Fast Track; Chapter 8. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Medium Business (<2000 People); Introduction; Mapping Your Systems; Improving Accountability with Identity Management; VPN Connectivity; Summary; Solutions Fast Track; Frequently Asked Questions; Index 330 $aA firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security. This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of 606 $aComputer networks$xSecurity measures 606 $aFirewalls (Computer security) 615 0$aComputer networks$xSecurity measures. 615 0$aFirewalls (Computer security) 676 $a005.8 701 $aCantrell$b Chris$01467342 701 $aHenmi$b Anne$0739048 701 $aLucas$b Mark$01467343 701 $aSingh$b Abhishek$0858444 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910784058303321 996 $aFirewall policies and VPN configurations$93677948 997 $aUNINA