LEADER 05345nam 2200673Ia 450 001 9910819459403321 005 20200520144314.0 010 $a1-281-10010-2 010 $a9786611100100 010 $a0-08-055687-6 035 $a(CKB)1000000000403283 035 $a(EBL)330100 035 $a(OCoLC)476128438 035 $a(SSID)ssj0000073806 035 $a(PQKBManifestationID)11110232 035 $a(PQKBTitleCode)TC0000073806 035 $a(PQKBWorkID)10141137 035 $a(PQKB)11213976 035 $a(Au-PeEL)EBL330100 035 $a(CaPaEBR)ebr10203579 035 $a(CaONFJC)MIL110010 035 $a(CaSebORM)9781597492188 035 $a(MiAaPQ)EBC330100 035 $a(OCoLC)354465277 035 $a(OCoLC)ocm354465277 035 $a(EXLCZ)991000000000403283 100 $a20080208d2007 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aBest damn firewall book period /$fT.W. Shinder ... [et al.] 205 $a2nd ed. 210 $aBurlington, Mass. $cSyngress$dc2007 215 $a1 online resource (1164 p.) 300 $aPrevious ed.: 2003. 300 $aIncludes index. 311 $a1-59749-218-3 327 $aFront Cover; The Best Damn Firewall Book Period, Second Edition; Copyright Page; Contributing Authors; Contents; Chapter 1: Installing Check Point NGX; Introduction; Preparing the Gateway; Installation; Secure Platform; Fire Wall-1/VPN-1 Installation; Smart Center Server Installation; Smart Console Installation; Putting It All Together; Smart Dashboard; Summary; Chapter 2: Smart Dashboard and Smart Portal; Introduction; A Tour of the Dashboard; Logging In; The Rulebase Pane; Security Tab; Address Translation Tab; Smart Defense Tab; Web Intelligence Tab; VPN Manager Tab; QoS Tab; Desktop Security Tab 327 $aWeb Access Tab Consolidation Rules Tab; The Objects Tree Pane; Network Objects; Services; Resources; Servers and OPSEC Applications; Users and Administrators; VPN Communities; The Objects List Pane; The Smart Map Pane; Menus and Toolbars; Working with Policy Packages; Installing the Policy; Global Properties; Fire Wall Page; NAT-Network Address Translation Page; VPN Page; VPN-1 Edge/Embedded Page; Remote Access Page; Smart Directory (LDAP) Page; Stateful Inspection Page; New in Smart Dashboard NGX; Security Policy Rule Names and Unique IDs; Group Object Convention; Group Hierarchy; Clone Object 327 $aSession Description Tooltips; Your First Security Policy; Creating Your Administrator Account; Hooking Up to the Gateway; Reviewing the Gateway Object; Defining Your Security Policy; Policy Design; Creating Rules; Network Address Translation; Installing the Policy; Other Useful Controls on the Dashboard; Working with Security Policy Rules; Section Titles; Hiding Rules; Rule Queries; Searching Rules; Working with Objects; Object References; Who Broke That Object?; Object Queries; Working with Policies; What Would Be Installed?; What's Really Installed?; No Security Please; For the Anoraks 327 $aChange Management Managing Connectra and Interspect Gateways; Configuring Interspect or Connectra Integration; Smart Defense Updates; SmartPortal; SmartPortal Functionality; Installing SmartPortal; Tour of SmartPortal; Summary; Chapter 3: Smart View Tracker; Introduction; Tracker; Log View; Active; Audit; Predefined Queries; Use for Predefined Queries; Adding Custom Queries; Applying Filters; Custom Queries; Matching Rule Filter; Viewing the Matching Rule; Viewing Log Records from Smart Dashboard; Active View; Live Connections; Custom Commands; Following a Source or Destination; Block Intruder 327 $aAudit View Log Maintenance; Daily Maintenance; Log Switch; Summary; Chapter 4: SmartDefense and Web Intelligence; Introduction; Network Security; Threats; Structured Threats; Denial of Service; External Threats; Welchia Internet Control Message Protocol; Network Quota; Internal Threats; Reconnaissance (Port Scans and Sweeps); The OSI Model; Layer 3: The Network Layer; Layer 4: The Transport Layer; Layer 7: The Application Layer; The Need for Granular Inspection; Application Intelligence; Configuring Hosts and Nodes for AI; SmartDefense Technology 327 $aCentral Configuration and the SmartDefense Web Site 330 $aThe Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an indispensable addition to a serious networking professionals toolkit. Coverage includes migrating to ISA Server 2006, integrating Windows Firewall and Vista security into your enterprise, successfully integrating Voice over IP application 606 $aFirewalls (Computer security) 606 $aComputer security 615 0$aFirewalls (Computer security) 615 0$aComputer security. 676 $a005.8 701 $aShinder$b Thomas W$0627558 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910819459403321 996 $aBest damn firewall book period$94102732 997 $aUNINA