Configuring NetScreen Firewalls [[electronic resource] /] / Rob Cameron, Christopher Cantrell, Dave Killion, Kevin Russell, Kenneth Tam |
Autore | Cameron Rob |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2005 |
Descrizione fisica | 1 online resource (737 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
CantrellChristopher
KillionDave RussellKevin TamKenneth |
Soggetto topico |
Firewalls (Computer security)
Computer networks - Security measures |
ISBN |
1-281-05622-7
9781597490148 9786611056223 0-08-047678-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | ""Cover""; ""Contents""; ""Foreword""; ""Networking, Security, and the Firewall""; ""Dissecting the NetScreen Firewall""; ""Deploying NetScreen Firewalls""; ""Policy Configuration""; ""Advanced Policy Configuration""; ""User Authentication""; ""Routing""; ""Address Translation""; ""Transparent Mode""; ""Attack Detection and Defense""; ""VPN Theory and Usage""; ""Virtual Systems""; ""High Availability""; ""Troubleshooting the NetScreen Firewall""; ""Enterprise NetScreen Management""; ""ScreenOS 5.1.0 Enhancements and New Features""; ""Index""; ""Related Titles"" |
Record Nr. | UNINA-9910783398103321 |
Cameron Rob
![]() |
||
Rockland, MA, : Syngress Publishing, c2005 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Configuring NetScreen Firewalls [[electronic resource] /] / Rob Cameron, Christopher Cantrell, Dave Killion, Kevin Russell, Kenneth Tam |
Autore | Cameron Rob |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2005 |
Descrizione fisica | 1 online resource (737 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
CantrellChristopher
KillionDave RussellKevin TamKenneth |
Soggetto topico |
Firewalls (Computer security)
Computer networks - Security measures |
ISBN |
1-281-05622-7
9781597490148 9786611056223 0-08-047678-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | ""Cover""; ""Contents""; ""Foreword""; ""Networking, Security, and the Firewall""; ""Dissecting the NetScreen Firewall""; ""Deploying NetScreen Firewalls""; ""Policy Configuration""; ""Advanced Policy Configuration""; ""User Authentication""; ""Routing""; ""Address Translation""; ""Transparent Mode""; ""Attack Detection and Defense""; ""VPN Theory and Usage""; ""Virtual Systems""; ""High Availability""; ""Troubleshooting the NetScreen Firewall""; ""Enterprise NetScreen Management""; ""ScreenOS 5.1.0 Enhancements and New Features""; ""Index""; ""Related Titles"" |
Record Nr. | UNINA-9910814814703321 |
Cameron Rob
![]() |
||
Rockland, MA, : Syngress Publishing, c2005 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Configuring NetScreen firewalls [electronic resource] / Rob Cameron ... [et al.]. |
Pubbl/distr/stampa | Rockland, Mass. : Syngress, c2005 |
Descrizione fisica | xxxii, 702 p. : ill. ; 24 cm. |
Disciplina | 005.8 |
Altri autori (Persone) | Cameron, Rob.author |
Soggetto topico | Firewalls (Computer security) |
Soggetto genere / forma | Electronic books. |
ISBN |
9781932266399
1932266399 |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction to firewalls and the World of NetScreen: Dissecting the NetScreen Firewall: Deploying NetScreen firewalls: Policy configuration: Routing: User authentication chapter: Advanced policy Configuration: NAT: Transparent Mode: Attack Detection and Defense: VPN Theory: VPN Usage: Virtual Systems: High availability: Troubleshooting the NetScreen firewall: Enterprise NetScreen management. |
Record Nr. | UNISALENTO-991003259379707536 |
Rockland, Mass. : Syngress, c2005 | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
Configuring SonicWALL firewalls [[electronic resource] /] / Chris Lathem et al |
Autore | Lathem Chris |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2006 |
Descrizione fisica | 1 online resource (530 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
BendellDaniel H
FortenberryBenjamin W LynnKevin ReedJoshua |
Soggetto topico |
Computer networks - Security measures
Firewalls (Computer security) |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-03575-0
9786611035754 0-08-048966-4 1-59749-107-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Chapter 1: Networking, Security, and the Firewall; Introduction; Understanding Networking; Understanding Security Basics; Understanding Firewall Basics; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2: Dissecting the SonicWALL; Introduction; The SonicWALL Security Product Offerings; The SonicWALL Firewall Core Technologies; The SonicWALL Product Line; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3: Deploying SonicWALL Firewalls; Introduction; Managing the SonicWALL Firewall; Zones, Interfaces, and VLANs
Configuring the SonicWALL FirewallConfiguring System Services; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4: Policy Configuration; Introduction; Theory of Access Control; BWM; QOS; Advanced Options for Firewalls; SYN Flood Protection Overview; Layer 3 SYN Flood Protection; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5: User Authentication; Introduction; Types of Users; Summary; Chapter 6: Routing; Introduction; Routing Information Protocol (RIP); Open Shortest Path First (OSPF); Summary; Solutions Fast Track; Chapter 7: Address Translation IntroductionThe Purpose of Address Translation; SonicWALL NAT Overview; Policy-Based NAT; NAT Policy Basics; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8: Transparent Mode; Introduction; Interface Settings; Configuring a Device to Use Transparent Mode; Transparent Mode Deployment Options; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9: Attack Detection and Defense; Introduction to the SonicOS Security Features; Understanding the Anatomy of an Attack; SonicWALL IPS; SonicWALL Content Filtering; Antivirus Services; SonicWALL Gateway Antivirus SonicWALL Anti-SpywareSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 10: Creating VPNs with SonicWALL; Introduction; Understanding IPSec; IPSec Tunnel Negotiations; Public Key Cryptography; VPNs in SonicWALL Appliances; Summary; Solutions Fast Track; Links; Frequently Asked Questions; Chapter 11: High Availability; Introduction; The Need for HA; Configuring Hardware Failover in SonicWALL Firewalls; Configuring Monitoring Links; Tips, Tricks, Traps, and Tuning; Cabling an HA Pair; Determining When to Failover; How HF "Fails Over"; Summary; Solutions Fast Track Chapter 12: Troubleshooting the SonicWALLIntroduction; Troubleshooting Methodology; Troubleshooting Tools; Network Troubleshooting; SonicWALL Logs; Advanced Diagnostics; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 13: Enterprise SonicWALL Management; SonicWALL Management and Reporting; SonicWALL Global Management System Installation and Configuration; Summary; Solutions Fast Track; Frequently Asked Questions; Index |
Record Nr. | UNINA-9910451359803321 |
Lathem Chris
![]() |
||
Rockland, MA, : Syngress Publishing, c2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Configuring SonicWALL firewalls [[electronic resource] /] / Chris Lathem et al |
Autore | Lathem Chris |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2006 |
Descrizione fisica | 1 online resource (530 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
BendellDaniel H
FortenberryBenjamin W LynnKevin ReedJoshua |
Soggetto topico |
Computer networks - Security measures
Firewalls (Computer security) |
ISBN |
1-281-03575-0
9786611035754 0-08-048966-4 1-59749-107-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Chapter 1: Networking, Security, and the Firewall; Introduction; Understanding Networking; Understanding Security Basics; Understanding Firewall Basics; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2: Dissecting the SonicWALL; Introduction; The SonicWALL Security Product Offerings; The SonicWALL Firewall Core Technologies; The SonicWALL Product Line; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3: Deploying SonicWALL Firewalls; Introduction; Managing the SonicWALL Firewall; Zones, Interfaces, and VLANs
Configuring the SonicWALL FirewallConfiguring System Services; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4: Policy Configuration; Introduction; Theory of Access Control; BWM; QOS; Advanced Options for Firewalls; SYN Flood Protection Overview; Layer 3 SYN Flood Protection; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5: User Authentication; Introduction; Types of Users; Summary; Chapter 6: Routing; Introduction; Routing Information Protocol (RIP); Open Shortest Path First (OSPF); Summary; Solutions Fast Track; Chapter 7: Address Translation IntroductionThe Purpose of Address Translation; SonicWALL NAT Overview; Policy-Based NAT; NAT Policy Basics; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8: Transparent Mode; Introduction; Interface Settings; Configuring a Device to Use Transparent Mode; Transparent Mode Deployment Options; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9: Attack Detection and Defense; Introduction to the SonicOS Security Features; Understanding the Anatomy of an Attack; SonicWALL IPS; SonicWALL Content Filtering; Antivirus Services; SonicWALL Gateway Antivirus SonicWALL Anti-SpywareSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 10: Creating VPNs with SonicWALL; Introduction; Understanding IPSec; IPSec Tunnel Negotiations; Public Key Cryptography; VPNs in SonicWALL Appliances; Summary; Solutions Fast Track; Links; Frequently Asked Questions; Chapter 11: High Availability; Introduction; The Need for HA; Configuring Hardware Failover in SonicWALL Firewalls; Configuring Monitoring Links; Tips, Tricks, Traps, and Tuning; Cabling an HA Pair; Determining When to Failover; How HF "Fails Over"; Summary; Solutions Fast Track Chapter 12: Troubleshooting the SonicWALLIntroduction; Troubleshooting Methodology; Troubleshooting Tools; Network Troubleshooting; SonicWALL Logs; Advanced Diagnostics; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 13: Enterprise SonicWALL Management; SonicWALL Management and Reporting; SonicWALL Global Management System Installation and Configuration; Summary; Solutions Fast Track; Frequently Asked Questions; Index |
Record Nr. | UNINA-9910784071603321 |
Lathem Chris
![]() |
||
Rockland, MA, : Syngress Publishing, c2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Configuring SonicWALL firewalls [[electronic resource] /] / Chris Lathem et al |
Autore | Lathem Chris |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2006 |
Descrizione fisica | 1 online resource (530 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
BendellDaniel H
FortenberryBenjamin W LynnKevin ReedJoshua |
Soggetto topico |
Computer networks - Security measures
Firewalls (Computer security) |
ISBN |
1-281-03575-0
9786611035754 0-08-048966-4 1-59749-107-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Chapter 1: Networking, Security, and the Firewall; Introduction; Understanding Networking; Understanding Security Basics; Understanding Firewall Basics; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2: Dissecting the SonicWALL; Introduction; The SonicWALL Security Product Offerings; The SonicWALL Firewall Core Technologies; The SonicWALL Product Line; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3: Deploying SonicWALL Firewalls; Introduction; Managing the SonicWALL Firewall; Zones, Interfaces, and VLANs
Configuring the SonicWALL FirewallConfiguring System Services; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4: Policy Configuration; Introduction; Theory of Access Control; BWM; QOS; Advanced Options for Firewalls; SYN Flood Protection Overview; Layer 3 SYN Flood Protection; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5: User Authentication; Introduction; Types of Users; Summary; Chapter 6: Routing; Introduction; Routing Information Protocol (RIP); Open Shortest Path First (OSPF); Summary; Solutions Fast Track; Chapter 7: Address Translation IntroductionThe Purpose of Address Translation; SonicWALL NAT Overview; Policy-Based NAT; NAT Policy Basics; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8: Transparent Mode; Introduction; Interface Settings; Configuring a Device to Use Transparent Mode; Transparent Mode Deployment Options; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9: Attack Detection and Defense; Introduction to the SonicOS Security Features; Understanding the Anatomy of an Attack; SonicWALL IPS; SonicWALL Content Filtering; Antivirus Services; SonicWALL Gateway Antivirus SonicWALL Anti-SpywareSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 10: Creating VPNs with SonicWALL; Introduction; Understanding IPSec; IPSec Tunnel Negotiations; Public Key Cryptography; VPNs in SonicWALL Appliances; Summary; Solutions Fast Track; Links; Frequently Asked Questions; Chapter 11: High Availability; Introduction; The Need for HA; Configuring Hardware Failover in SonicWALL Firewalls; Configuring Monitoring Links; Tips, Tricks, Traps, and Tuning; Cabling an HA Pair; Determining When to Failover; How HF "Fails Over"; Summary; Solutions Fast Track Chapter 12: Troubleshooting the SonicWALLIntroduction; Troubleshooting Methodology; Troubleshooting Tools; Network Troubleshooting; SonicWALL Logs; Advanced Diagnostics; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 13: Enterprise SonicWALL Management; SonicWALL Management and Reporting; SonicWALL Global Management System Installation and Configuration; Summary; Solutions Fast Track; Frequently Asked Questions; Index |
Record Nr. | UNINA-9910812014403321 |
Lathem Chris
![]() |
||
Rockland, MA, : Syngress Publishing, c2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Configuring SonicWALL firewalls [electronic resource] / Chris Lathem ... [et al.] ; Bradley Dinerman, technical editor, Lars Hansen, technical editor |
Pubbl/distr/stampa | Rockland, MA : Syngress Pub., c2006. |
Descrizione fisica | xxv, 500 p. : ill. ; 23 cm. |
Disciplina | 005.8 |
Altri autori (Persone) | Bendell, Dan. |
Soggetto topico |
Firewalls (Computer security)
Computer networks - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
9781597492508
1597492507 |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Introduction to firewalls and the World of SonicWALL -- Chapter 2: Dissecting the SonicWALL Firewall -- Chapter 3: Deploying SonicWALL Firewalls -- Chapter 4: Policy Configuration -- Chapter 5: Routing -- Chapter 6: User Authentication -- Chapter 7: Advanced Policy Configuration -- Chapter 8: NAT -- Chapter 9: Transparent Mode -- Chapter 10: Attack Detection and Defense -- Chapter 11: VPN Theory -- Chapter 12: VPN Usage -- Chapter 13: Virtual Systems -- Chapter 14: High Availability -- Chapter 15: Troubleshooting the SonicWALL Firewall -- Chapter 16: Enterprise SonicWALL Management. |
Record Nr. | UNISALENTO-991003251629707536 |
Rockland, MA : Syngress Pub., c2006. | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
Dr. Tom Shinder's configuring ISA Server 2004 [[electronic resource] /] / Thomas W. Shinder, Debra Littlejohn Shinder ; technical editor, Martin Grasdal |
Autore | Shinder Thomas W |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress Publishing, c2005 |
Descrizione fisica | 1 online resource (1057 p.) |
Disciplina | 005.8 |
Soggetto topico |
Firewalls (Computer security)
Computer security Computer networks - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-05591-3
9786611055912 0-08-047740-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Evolution of a Firewall: From Proxy 1.0 to ISA 2004; Examining the ISA Server 2004 Feature Set; Stalking the Competition: How ISA 2004 Stacks Up; ISA 2004 Network Concepts and Preparing the Network Infrastructure; ISA 2004 Client Types and Automating Client Provisioning; Installing and Configuring the ISA Firewall Software; Creating and Using ISA 2004 Firewall Access Policy; Publishing Network Services with ISA 2004 Firewalls; Creating Remote Access and Site-to-Site VPNs with ISA Firewalls; ISA 2004 Stateful Inspection and Application Layer Filtering
Accelerating Web Performance with ISA 2004 Caching CapabilitiesUsing ISA Server 2004's Monitoring, Logging, and Reporting Tools; Index |
Altri titoli varianti |
Configuring ISA Server 2004
ISA Server 2004 |
Record Nr. | UNINA-9910450510503321 |
Shinder Thomas W
![]() |
||
Rockland, Mass., : Syngress Publishing, c2005 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Dr. Tom Shinder's configuring ISA Server 2004 [[electronic resource] /] / Thomas W. Shinder, Debra Littlejohn Shinder ; technical editor, Martin Grasdal |
Autore | Shinder Thomas W |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress Publishing, c2005 |
Descrizione fisica | 1 online resource (1057 p.) |
Disciplina | 005.8 |
Soggetto topico |
Firewalls (Computer security)
Computer security Computer networks - Security measures |
ISBN |
1-281-05591-3
9786611055912 0-08-047740-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Evolution of a Firewall: From Proxy 1.0 to ISA 2004; Examining the ISA Server 2004 Feature Set; Stalking the Competition: How ISA 2004 Stacks Up; ISA 2004 Network Concepts and Preparing the Network Infrastructure; ISA 2004 Client Types and Automating Client Provisioning; Installing and Configuring the ISA Firewall Software; Creating and Using ISA 2004 Firewall Access Policy; Publishing Network Services with ISA 2004 Firewalls; Creating Remote Access and Site-to-Site VPNs with ISA Firewalls; ISA 2004 Stateful Inspection and Application Layer Filtering
Accelerating Web Performance with ISA 2004 Caching CapabilitiesUsing ISA Server 2004's Monitoring, Logging, and Reporting Tools; Index |
Altri titoli varianti |
Configuring ISA Server 2004
ISA Server 2004 |
Record Nr. | UNINA-9910783287503321 |
Shinder Thomas W
![]() |
||
Rockland, Mass., : Syngress Publishing, c2005 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Dr. Tom Shinder's configuring ISA Server 2004 [[electronic resource] /] / Thomas W. Shinder, Debra Littlejohn Shinder ; technical editor, Martin Grasdal |
Autore | Shinder Thomas W |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress Publishing, c2005 |
Descrizione fisica | 1 online resource (1057 p.) |
Disciplina | 005.8 |
Soggetto topico |
Firewalls (Computer security)
Computer security Computer networks - Security measures |
ISBN |
1-281-05591-3
9786611055912 0-08-047740-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Evolution of a Firewall: From Proxy 1.0 to ISA 2004; Examining the ISA Server 2004 Feature Set; Stalking the Competition: How ISA 2004 Stacks Up; ISA 2004 Network Concepts and Preparing the Network Infrastructure; ISA 2004 Client Types and Automating Client Provisioning; Installing and Configuring the ISA Firewall Software; Creating and Using ISA 2004 Firewall Access Policy; Publishing Network Services with ISA 2004 Firewalls; Creating Remote Access and Site-to-Site VPNs with ISA Firewalls; ISA 2004 Stateful Inspection and Application Layer Filtering
Accelerating Web Performance with ISA 2004 Caching CapabilitiesUsing ISA Server 2004's Monitoring, Logging, and Reporting Tools; Index |
Altri titoli varianti |
Configuring ISA Server 2004
ISA Server 2004 |
Record Nr. | UNINA-9910806229803321 |
Shinder Thomas W
![]() |
||
Rockland, Mass., : Syngress Publishing, c2005 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|