Firewall Policies and VPN Configurations

Paperback (Print)
Buy New
Buy New from BN.com
$41.98
Used and New from Other Sellers
Used and New from Other Sellers
from $9.20
Usually ships in 1-2 business days
(Save 83%)
Other sellers (Paperback)
  • All (9) from $9.20   
  • New (5) from $19.73   
  • Used (4) from $9.20   

Overview

A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security.

This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper’s NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of their vulnerability and their complexity, VPN policies are covered in more depth with numerous tips for troubleshooting remote connections.

· The only book that focuses on creating policies that apply to multiple products.
· Included is a bonus chapter on using Ethereal, the most popular protocol analyzer, to monitor and analyze network traffic.
· Shows what features can be controlled by a policy, and walks you through the steps for writing the policy to fit the objective at hand

The security provided by firewalls and VPNs is only as strong as the protocol rules and policies that administrators create. This book covers the leading firewall products, describing in plain English what features can be controlled by a policy and taking the reader through the steps for writing the policy to fit the objective.

Read More Show Less

Product Details

  • ISBN-13: 9781597490887
  • Publisher: Elsevier Science
  • Publication date: 9/1/2006
  • Edition description: New Edition
  • Pages: 514
  • Product dimensions: 1.03 (w) x 7.50 (h) x 9.25 (d)

Meet the Author

Dale Liu, (MCSE Security, CISSP, MCT, IAM/IEM, CCNA) has been working in the computer and networking field for over 20 years. Dale's experience ranges from programming to networking to information security and project management. He currently teaches networking, routing and security classes, while working in the field performing security audits and infrastructure design for medium to large companies.

Abhishek Singh is a Security Researcher on the Microsoft Malware Protection Center (MMPC) team, where he performs analysis of vulnerabilities to develop signatures. He was previously employed with Symantec as a Senior Software Engineer. He was also one of the initial technical members of the Third Brigade Security Center, now part of Trend Micro. He has also worked for SafeNet.

Abhishek was a leading inventor of various patent pending technologies in IDS/IPS and an algorithm for faster analysis of binaries and two-factor authentication. He served as Technical Editor for "Vulnerability Analysis and Defense for the Internet" and "Identifying Malicious Code Through Reverse Engineering." He has published Internet Drafts and security-related papers in primer journals and for various conferences.

Abhishek holds a Master of Science in Information Security and a Master of Science in Computer Science, both from the College of Computing, Georgia Institute of Technology and a B.Tech. in Electrical Engineering from Institute of Technology, BHU, India.

Read More Show Less

Customer Reviews

Average Rating 4
( 1 )
Rating Distribution

5 Star

(0)

4 Star

(1)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted May 24, 2008

    A reviewer

    I have read many books and tutorials to understand SSH tunnels. The book has done justice in explaning the topic. The chapter on VPN has been explained in great depth providing pros and cons of each VPN.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)