Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Firewalls


1. 

Firewalls

Firewalls

By: John R. Vacca; Scott Ellis

Publisher: Digital Press

Publication Date: 06-DEC-2004

Insert Date: 10-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in...

2. 

Cisco Firewalls

Cisco Firewalls

By: Alexandre M.S.P Moraes

Publisher: Cisco Press

Publication Date: 06-JUN-2011

Insert Date: 02-APR-2011

Slots: 1.0

Table of Contents • Start Reading

Cisco Firewalls Concepts, design and deployment for Cisco Stateful Firewall solutions   “  In this book, Alexandre proposes a totally different approach to the important subject of firewalls: Instead of just presenting configuration models, he uses a set of carefully crafted examples to illustrate the theory in action. A must read! ”  —Luc Billot, Security Consulting Engineer at Cisco   Cisco Firewalls  thoroughly explains each of the leading Cisco firewall products, features, and solutions, and shows how they can add value to any network security design or operation. The...

3. 

Configuring IPCop Firewalls

Configuring IPCop Firewalls

By: Barrie Dempster; James Eaton-Lee

Publisher: Packt Publishing

Publication Date: 10-JAN-2006

Insert Date: 31-AUG-2010

Slots: 1.0

Table of Contents • Start Reading

How to setup, configure and manage your Linux firewall, web proxy, DHCP, DNS, time server, and VPN with this powerful Open Source solution Learn how to install, configure, and set up IPCop on your Linux servers Use IPCop as a web proxy, DHCP, DNS, time server, and VPN Advanced add-on management In Detail IPCop is a powerful, open source, Linux based firewall distribution for primarily Small Office Or Home (SOHO) networks, although it can be used in larger networks. It provides most of the features that you would expect a modern firewall to have, and what is most...

4. 

Configuring Check Point NGX VPN-1/Firewall-1

Configuring Check Point NGX VPN-1/Firewall-1

By: Barry J Stiefel; Simon Desmeules

Publisher: Syngress

Publication Date: 01-NOV-2005

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Check Point NGX VPN-1/Firewall-1 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection & Tunnel Management, Multiple Entry Points, Route Injection Mechanism, Wire Mode, and SecurePlatform Pro. Many of the new features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available *and* secure. Demand for this book will be strong because Check Point...

5. 

Configuring Juniper Networks NetScreen & SSG Firewalls

Configuring Juniper Networks NetScreen & SSG Firewalls

By: Rob Cameron; Chris Cantrell; Anne Hemni; Lisa Lorenzin

Publisher: Syngress

Publication Date: 08-DEC-2006

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform. • Configure Juniper’s Instant Virtual Extranet (IVE) Install and set up IVE...

6. 

Cisco PIX Firewalls

Cisco PIX Firewalls

By: Umer Khan

Publisher: Syngress

Publication Date: 21-JUN-2005

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Umer Khan's first book, "Cisco Security Specialist's Guide to PIX Firewalls," ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers with a clear, comprehensive, and independent introduction to PIX Firewall configuration. With the market for PIX Firewalls maintaining double digit growth and several major enhancements to both the PIX Firewall and VPN Client product lines, this book will have enormous appeal with the audience already familiar with his first book. * The Cisco Pix firewall is the #1 market leading firewall,...

7. 

The Best Damn Firewall Book Period, 2nd Edition

The Best Damn Firewall Book Period, 2nd Edition

By: Thomas W Shinder

Publisher: Syngress

Publication Date: 18-APR-2011

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, and Check Point. Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an indispensable addition to a serious networking professionals toolkit. Coverage includes migrating to ISA Server 2006, integrating Windows Firewall and Vista security into your enterprise, successfully integrating Voice over IP applications around...

8. 

Cisco Secure Firewall Services Module (FWSM)

Cisco Secure Firewall Services Module (FWSM)

By: Ray CCIE No. 7050 Blair; Arvind CCIE No. 7016 Durai

Publisher: Cisco Press

Publication Date: 29-AUG-2008

Insert Date: 19-JUN-2008

Slots: 1.0

Table of Contents • Start Reading

Cisco Secure Firewall Services Module (FWSM) Best practices for securing networks with FWSM Ray Blair, CCIE® No. 7050 Arvind Durai, CCIE No. 7016 The Firewall Services Module (FWSM) is a high-performance stateful-inspection firewall that integrates into the Cisco® 6500 switch and 7600 router chassis. The FWSM monitors traffic flows using application inspection engines to provide a strong level of network security. The FWSM defines the security parameter and enables the enforcement of security policies through authentication, access control lists, and protocol inspection. The FWSM is a...

9. 

The Book of PF

The Book of PF

By: 

Publisher: No Starch Press

Publication Date: 19-DEC-2007

Insert Date: 06-FEB-2008

Slots: 1.0

Table of Contents • Start Reading

OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a good teacher. Peter N.M. Hansteen's PF website and conference tutorials have helped thousands of users build the networks they need using PF. The Book of PF is the product of Hansteen's knowledge and experience, teaching good practices as well as bare facts and software options. Throughout the book, Hansteen emphasizes the importance of staying in control by having a written network specification, using macros...

10. 

Linux Firewalls

Linux Firewalls

By: 

Publisher: No Starch Press

Publication Date: 24-SEP-2007

Insert Date: 20-DEC-2007

Slots: 1.0

Table of Contents • Start Reading

System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack. Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that...

11. 

Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition

Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition

By: 

Publisher: Cisco Press

Publication Date: 09-AUG-2007

Insert Date: 21-JUL-2007

Slots: 1.0

Table of Contents • Start Reading

Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including ASA, PIX®, and the Catalyst® Firewall Services Module (FWSM). Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall...

12. 

Designing and Building Enterprise DMZs

Designing and Building Enterprise DMZs

By: 

Publisher: Syngress

Publication Date: 01-OCT-2006

Insert Date: 29-MAR-2007

Slots: 1.0

Table of Contents • Start Reading

Designing and Building Enterprise DMZs covers a sorely needed area in critical business infrastructure: the Demilitarized Zone. DMZs play a crucial role in any network consisting of a Hosted Internet Web Server, internal servers which need to be segregated, External to Internal DNS Server, and an E-mail SMTP Relay Agent. This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium, and Enterprise networks. The primary role of a DMZ is to mitigate risks associated with offering services to untrusted clients. A DMZ accomplishes this by...

13. 

Firewall Policies and VPN Configurations

Firewall Policies and VPN Configurations

By: Syngress Publishing

Publisher: Syngress

Publication Date: 01-SEP-2006

Insert Date: 27-MAR-2007

Slots: 1.0

Table of Contents • Start Reading

The security provided by firewalls and VPNs is only as strong as the protocol rules and policies that you create. The concepts of "defense-in-depth" and "least privilege" are merely holes in your perimeter waiting to be exploited, unless you can define and maintain protocol rules that allow only the minimum protocols required to provide your requisite services. This book provides fundamental information necessary to configure firewalls and build VPNs and DMZs to survive the dangers of today's internet. The book includes a bonus chapter from the companion Web site on using Ethereal to...

14. 

Cisco Firewall Technology

ShortCut

Cisco Firewall Technology

By: 

Publisher: Cisco Press

Publication Date: 25-JAN-2007

Insert Date: 01-FEB-2007

Slots: 1.0

Table of Contents • Start Reading

Cisco Firewall Technologies (Digital Short Cut) Andrew Mason ISBN-10: 1-58705-329-2 ISBN-13: 978-1-58705-329-0 Cisco Firewall Technologies provides you with a no-nonsense, easy-to-read guide to different types of firewall technologies along with information on how these technologies are represented in the Cisco® firewall product family. The main Cisco products covered are the IOS® Firewall, the PIX® Firewall, and the ASA. The majority of focus for the Short Cut will be on the ASA and emphasis will be placed upon the latest functionality released in version 7.2. The Short Cut...

15. 

Deploying Zone-Based Firewalls

ShortCut

Deploying Zone-Based Firewalls

By: 

Publisher: Cisco Press

Publication Date: 08-NOV-2006

Insert Date: 12-NOV-2006

Slots: 1.0

Table of Contents • Start Reading

Deploying Zone-Based Firewalls (Digital Short Cut) Ivan Pepelnjak ISBN: 1-58705-310-1 Improved firewall policy configuration means network administrators can more easily understand the effect of firewall policies on network traffic. This functionality allows the grouping of physical and virtual interfaces into zones to simplify logical network topology. The creation of these zones enables the application of firewall policies on a zone-to-zone basis, instead of having to configure policies separately on each interface. With this functionality, configuration is easier to...

16. 

Firewall Fundamentals

Firewall Fundamentals

By: 

Publisher: Cisco Press

Publication Date: 02-JUN-2006

Insert Date: 18-JUL-2006

Slots: 1.0

Table of Contents • Start Reading

The essential guide to understanding and using firewalls to protect personal computers and your network An easy-to-read introduction to the most commonly deployed network security device Understand the threats firewalls are designed to protect against Learn basic firewall architectures, practical deployment scenarios, and common management and troubleshooting tasks Includes configuration, deployment, and management checklists Increasing reliance on the Internet in both work and home environments has radically increased the vulnerability of computing systems to attack from...

17. 

Configuring SonicWALL Firewalls

Configuring SonicWALL Firewalls

By: ;

Publisher: Syngress

Publication Date: 01-APR-2006

Insert Date: 01-JUN-2006

Slots: 1.0

Table of Contents • Start Reading

Configuring SonicWALL Firewal is the first book to deliver an indepth look at the SonicWALL firewall product line. It covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls. Also covered are advanced troubleshooting techniques and the SonicWALL Security Manager. This book offers novice users a complete opportunity to learn the SonicWALL firewall appliance. Advanced users will find it a rich technical resource....

18. 

Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

By: 

Publisher: Cisco Press

Publication Date: 14-OCT-2005

Insert Date: 15-OCT-2005

Slots: 1.0

Table of Contents • Start Reading

Identify, mitigate, and respond to network attacks Understand the evolution of security technologies that make up the unified ASA device and how to install the ASA hardware Examine firewall solutions including network access control, IP routing, AAA, application inspection, virtual firewalls, transparent (Layer 2) firewalls, failover and redundancy, and QoS Evaluate Intrusion Prevention System (IPS) solutions including IPS integration and Adaptive Inspection and Prevention Security Services Module (AIP-SSM) configuration Deploy VPN solutions including site-to-site IPsec VPNs,...

19. 

Linux Firewalls, Third Edition

Linux Firewalls, Third Edition

By: 

Publisher: Novell Press

Publication Date: 14-SEP-2005

Insert Date: 14-OCT-2005

Slots: 1.0

Table of Contents • Start Reading

An Internet-connected Linux machine is in a high-risk situation. Linux Firewalls, Third Edition details security steps that any sized implementation--from home use to enterprise level--might take to protect itself from potential remote attackers. As with the first two editions, this book is especially useful for its explanations of iptables, packet filtering, and firewall optimization along with some advanced concepts including customizing the Linux kernel to enhance security.The third edition, while distribution neutral, has been updated for the current Linux Kernel and provides code...

20. 

Cisco ASA and PIX Firewall Handbook

Cisco ASA and PIX Firewall Handbook

By: 

Publisher: Cisco Press

Publication Date: 07-JUN-2005

Insert Date: 09-JUL-2005

Slots: 1.0

Table of Contents • Start Reading

The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security features Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and Flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing...