LEADER 03330cam a2200409Ii 4500 001 991003250219707536 006 m d 007 cr cn||||||||| 008 070806s2005 maua s 001 0 eng d 020 $a9781597490313 020 $a1597490318 035 $ab13655486-39ule_inst 037 $a115844:115942$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS$dOPELS 049 $aTEFA 082 04$a005.8$222 100 1 $aStephens, Robert.$0627553 245 10$aConfiguring Check Point NGX VPN-1/fire wall-$h[electronic resource]1/$cRobert Stephens, Barry J. Stiefel, Stephen Watkins. 260 $aRockland, MA :$bSyngress Publishing, Inc.,$cc2005. 300 $axxx, 625 :$bill. ;$c23 cm. 500 $aIncludes index. 505 0 $a1: FW-1 NGX Operational changes 2: SmartClients and SmartManagement 3. Management Portal 4: Advanced Authentication 5: Advanced VPN Concepts and Tunnel Monitoring 6: Advanced VPN Client Installations 7: Multicast Security 8: Advanced DoS Protection 9: High Availability and Clustering 10: SecurePlatform 11: Management High Availability & Failover 12: Integration and configuration of CVP / UFP 13: SecureClient Packaging Tool 14: SmartDefense 15: SmartUpdate 16: Performance Pack 17: User Authority 18: Thin Client Support 19: Firewall Troubleshooting. 520 $aCheck Point NGX VPN-1/Firewall-1 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection & Tunnel Management, Multiple Entry Points, Route Injection Mechanism, Wire Mode, and SecurePlatform Pro. Many of the new features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available *and* secure. Demand for this book will be strong because Check Point is requiring all of its 3rd party developers to certify their products for this release. * Packed full with extensive coverage of features new to the product, allowing 3rd party partners to certify NGX add-on products quickly * Protect your network from both internal and external threats and learn to recognize future threats * All yuou need to securly and efficiently deploy, troubleshoot, and maintain Check Point NXG. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aComputer networks$xSecurity measures. 650 0$aFirewalls (Computer security) 655 7$aElectronic books.$2local 700 1 $aStiefel, Barry J. 700 1 $aWatkins, Stephen. 776 1 $cOriginal$z1597490318$z9781597490313$w(OCoLC)62615252 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781597490313$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b13655486$b24-02-22$c24-01-08 912 $a991003250219707536 994 $aC0$bTEF 996 $aConfiguring Check Point NGX VPN-1$91213076 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gmau$h0$i0