Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Firewalls


1. 

Firewalls

Firewalls

By: John R. Vacca; Scott Ellis

Publisher: Digital Press

Publication Date: 06-DEC-2004

Insert Date: 10-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in...

2. 

Cisco Firewalls

Cisco Firewalls

By: Alexandre M.S.P Moraes

Publisher: Cisco Press

Publication Date: 06-JUN-2011

Insert Date: 02-APR-2011

Slots: 1.0

Table of Contents • Start Reading

Cisco Firewalls Concepts, design and deployment for Cisco Stateful Firewall solutions   “  In this book, Alexandre proposes a totally different approach to the important subject of firewalls: Instead of just presenting configuration models, he uses a set of carefully crafted examples to illustrate the theory in action. A must read! ”  —Luc Billot, Security Consulting Engineer at Cisco   Cisco Firewalls  thoroughly explains each of the leading Cisco firewall products, features, and solutions, and shows how they can add value to any network security design or operation. The...

3. 

Configuring IPCop Firewalls

Configuring IPCop Firewalls

By: Barrie Dempster; James Eaton-Lee

Publisher: Packt Publishing

Publication Date: 10-JAN-2006

Insert Date: 31-AUG-2010

Slots: 1.0

Table of Contents • Start Reading

How to setup, configure and manage your Linux firewall, web proxy, DHCP, DNS, time server, and VPN with this powerful Open Source solution Learn how to install, configure, and set up IPCop on your Linux servers Use IPCop as a web proxy, DHCP, DNS, time server, and VPN Advanced add-on management In Detail IPCop is a powerful, open source, Linux based firewall distribution for primarily Small Office Or Home (SOHO) networks, although it can be used in larger networks. It provides most of the features that you would expect a modern firewall to have, and what is most...

4. 

Configuring Check Point NGX VPN-1/FireWall-1

Configuring Check Point NGX VPN-1/FireWall-1

By: Robert Stephens; Barry Stiefel; Stephen Watkins; Simon Desmeules; Eli Faskha

Publisher: Syngress

Publication Date: 01-OCT-2005

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Configuring Check Point NGX VPN-1/FireWall-1 is the perfect reference for anyone migrating from earlier versions of Check Point's flagship firewall/VPN product as well as those deploying VPN-1/FireWall-1 for the first time. This book covers all of NGX's dramatic changes and new, enhanced features. You'll learn how to secure the integrity of your network's data, communications, and applications from a multitude of blended threats. Protect your network against breaches of its perimeter and Internet access points. Also, learn to recognize and prevent internal threats. Written by an all-star team...

5. 

Configuring Juniper® Networks NetScreen® & SSG Firewalls

Configuring Juniper® Networks NetScreen® & SSG Firewalls

By: Rob Cameron; Chris Cantrell; Anne Hemni; Lisa Lorenzin

Publisher: Syngress

Publication Date: 28-NOV-2006

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Configuring Juniper Networks NetScreen & SSG Firewalls is the only complete reference to this family of products. It covers all of the newly released features of the product line as highlighted by Juniper Networks, including: Complete Coverage of Integrated Intrusion Prevention Step-by-Step Instructions for Protecting Against Worms, Trojans, Spyware, and Malware Advanced Information on Virtualization Technologies And coverage of important new updates: Deep inspection firewall, Centralized- policy-based management, Built-in high availability features, & Rapid deployment features....

6. 

Cisco PIX Firewalls: Configure, Manage, & Troubleshoot

Cisco PIX Firewalls: Configure, Manage, & Troubleshoot

By: Charles Riley (Editor); Umer Khan; Michael Sweeney

Publisher: Syngress

Publication Date: 26-APR-2005

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

#1 Best-Selling PIX Book Completely Updated for Cisco PIX Version 7.0 This completely updated bestseller covers Cisco PIX Security Appliance Software Version 7.0, as well as the entire family of Cisco PIX 500 Series Firewalls. The book clearly explains how to leverage the integrated remote access and site-to-site VPN capabilities found in PIX Firewalls. It also illustrates how to securely extend your network to tele-workers, remote and satellite offices, business partners, suppliers, and customers. The authors thoroughly document all enhancements to PIX 7.0, including virtual LAN...

7. 

The Best Damn Firewall Book Period, Second Edition

The Best Damn Firewall Book Period, Second Edition

By: Thomas W Shinder

Publisher: Syngress

Publication Date: 07-NOV-2007

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point. Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an indispensable addition to a serious networking professionals toolkit. Coverage includes migrating to ISA Server 2006, integrating Windows Firewall and Vista security into your enterprise, successfully integrating Voice over IP applications...

8. 

Cisco Secure Firewall Services Module (FWSM)

Cisco Secure Firewall Services Module (FWSM)

By: Ray CCIE No. 7050 Blair; Arvind CCIE No. 7016 Durai

Publisher: Cisco Press

Publication Date: 29-AUG-2008

Insert Date: 19-JUN-2008

Slots: 1.0

Table of Contents • Start Reading

Cisco Secure Firewall Services Module (FWSM) Best practices for securing networks with FWSM Ray Blair, CCIE® No. 7050 Arvind Durai, CCIE No. 7016 The Firewall Services Module (FWSM) is a high-performance stateful-inspection firewall that integrates into the Cisco® 6500 switch and 7600 router chassis. The FWSM monitors traffic flows using application inspection engines to provide a strong level of network security. The FWSM defines the security parameter and enables the enforcement of security policies through authentication, access control lists, and protocol inspection. The FWSM is a...

9. 

The Book of PF

The Book of PF

By: 

Publisher: No Starch Press

Publication Date: 19-DEC-2007

Insert Date: 06-FEB-2008

Slots: 1.0

Table of Contents • Start Reading

OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a good teacher. Peter N.M. Hansteen's PF website and conference tutorials have helped thousands of users build the networks they need using PF. The Book of PF is the product of Hansteen's knowledge and experience, teaching good practices as well as bare facts and software options. Throughout the book, Hansteen emphasizes the importance of staying in control by having a written network specification, using macros...

10. 

Linux Firewalls

Linux Firewalls

By: 

Publisher: No Starch Press

Publication Date: 24-SEP-2007

Insert Date: 20-DEC-2007

Slots: 1.0

Table of Contents • Start Reading

System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack. Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that...

11. 

Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition

Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition

By: 

Publisher: Cisco Press

Publication Date: 09-AUG-2007

Insert Date: 21-JUL-2007

Slots: 1.0

Table of Contents • Start Reading

Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including ASA, PIX®, and the Catalyst® Firewall Services Module (FWSM). Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall...

12. 

Designing and Building Enterprise DMZs

Designing and Building Enterprise DMZs

By: 

Publisher: Syngress

Publication Date: 01-OCT-2006

Insert Date: 29-MAR-2007

Slots: 1.0

Table of Contents • Start Reading

Designing and Building Enterprise DMZs covers a sorely needed area in critical business infrastructure: the Demilitarized Zone. DMZs play a crucial role in any network consisting of a Hosted Internet Web Server, internal servers which need to be segregated, External to Internal DNS Server, and an E-mail SMTP Relay Agent. This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium, and Enterprise networks. The primary role of a DMZ is to mitigate risks associated with offering services to untrusted clients. A DMZ accomplishes this by...

13. 

Firewall Policies and VPN Configurations

Firewall Policies and VPN Configurations

By: Syngress Publishing

Publisher: Syngress

Publication Date: 01-SEP-2006

Insert Date: 27-MAR-2007

Slots: 1.0

Table of Contents • Start Reading

The security provided by firewalls and VPNs is only as strong as the protocol rules and policies that you create. The concepts of "defense-in-depth" and "least privilege" are merely holes in your perimeter waiting to be exploited, unless you can define and maintain protocol rules that allow only the minimum protocols required to provide your requisite services. This book provides fundamental information necessary to configure firewalls and build VPNs and DMZs to survive the dangers of today's internet. The book includes a bonus chapter from the companion Web site on using Ethereal to...

14. 

Cisco Firewall Technology

ShortCut

Cisco Firewall Technology

By: 

Publisher: Cisco Press

Publication Date: 25-JAN-2007

Insert Date: 01-FEB-2007

Slots: 1.0

Table of Contents • Start Reading

Cisco Firewall Technologies (Digital Short Cut) Andrew Mason ISBN-10: 1-58705-329-2 ISBN-13: 978-1-58705-329-0 Cisco Firewall Technologies provides you with a no-nonsense, easy-to-read guide to different types of firewall technologies along with information on how these technologies are represented in the Cisco® firewall product family. The main Cisco products covered are the IOS® Firewall, the PIX® Firewall, and the ASA. The majority of focus for the Short Cut will be on the ASA and emphasis will be placed upon the latest functionality released in version 7.2. The Short Cut...

15. 

Deploying Zone-Based Firewalls

ShortCut

Deploying Zone-Based Firewalls

By: 

Publisher: Cisco Press

Publication Date: 08-NOV-2006

Insert Date: 12-NOV-2006

Slots: 1.0

Table of Contents • Start Reading

Deploying Zone-Based Firewalls (Digital Short Cut) Ivan Pepelnjak ISBN: 1-58705-310-1 Improved firewall policy configuration means network administrators can more easily understand the effect of firewall policies on network traffic. This functionality allows the grouping of physical and virtual interfaces into zones to simplify logical network topology. The creation of these zones enables the application of firewall policies on a zone-to-zone basis, instead of having to configure policies separately on each interface. With this functionality, configuration is easier to...

16. 

Firewall Fundamentals

Firewall Fundamentals

By: 

Publisher: Cisco Press

Publication Date: 02-JUN-2006

Insert Date: 18-JUL-2006

Slots: 1.0

Table of Contents • Start Reading

The essential guide to understanding and using firewalls to protect personal computers and your network An easy-to-read introduction to the most commonly deployed network security device Understand the threats firewalls are designed to protect against Learn basic firewall architectures, practical deployment scenarios, and common management and troubleshooting tasks Includes configuration, deployment, and management checklists Increasing reliance on the Internet in both work and home environments has radically increased the vulnerability of computing systems to attack from...

17. 

Configuring SonicWALL Firewalls

Configuring SonicWALL Firewalls

By: ;

Publisher: Syngress

Publication Date: 01-APR-2006

Insert Date: 01-JUN-2006

Slots: 1.0

Table of Contents • Start Reading

Configuring SonicWALL Firewal is the first book to deliver an indepth look at the SonicWALL firewall product line. It covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls. Also covered are advanced troubleshooting techniques and the SonicWALL Security Manager. This book offers novice users a complete opportunity to learn the SonicWALL firewall appliance. Advanced users will find it a rich technical resource....

18. 

Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

By: 

Publisher: Cisco Press

Publication Date: 14-OCT-2005

Insert Date: 15-OCT-2005

Slots: 1.0

Table of Contents • Start Reading

Identify, mitigate, and respond to network attacks Understand the evolution of security technologies that make up the unified ASA device and how to install the ASA hardware Examine firewall solutions including network access control, IP routing, AAA, application inspection, virtual firewalls, transparent (Layer 2) firewalls, failover and redundancy, and QoS Evaluate Intrusion Prevention System (IPS) solutions including IPS integration and Adaptive Inspection and Prevention Security Services Module (AIP-SSM) configuration Deploy VPN solutions including site-to-site IPsec VPNs,...

19. 

Linux Firewalls, Third Edition

Linux Firewalls, Third Edition

By: 

Publisher: Novell Press

Publication Date: 14-SEP-2005

Insert Date: 14-OCT-2005

Slots: 1.0

Table of Contents • Start Reading

An Internet-connected Linux machine is in a high-risk situation. Linux Firewalls, Third Edition details security steps that any sized implementation--from home use to enterprise level--might take to protect itself from potential remote attackers. As with the first two editions, this book is especially useful for its explanations of iptables, packet filtering, and firewall optimization along with some advanced concepts including customizing the Linux kernel to enhance security.The third edition, while distribution neutral, has been updated for the current Linux Kernel and provides code...

20. 

Cisco ASA and PIX Firewall Handbook

Cisco ASA and PIX Firewall Handbook

By: 

Publisher: Cisco Press

Publication Date: 07-JUN-2005

Insert Date: 09-JUL-2005

Slots: 1.0

Table of Contents • Start Reading

The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security features Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and Flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing...