Juniper SRX Series

( 2 )

Overview

This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Juniper’s SRX Series networking device. Authors Brad Woodberg and Rob Cameron provide field-tested best practices for getting the most out of SRX deployments, based on their extensive field experience.

While their earlier book, Junos Security, covered the SRX platform, this book focuses on the SRX Series devices themselves. You'll learn how to ...

See more details below
Other sellers (Paperback)
  • All (14) from $50.60   
  • New (10) from $50.60   
  • Used (4) from $51.43   
Juniper SRX Series

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$38.99
BN.com price
(Save 42%)$67.99 List Price

Overview

This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Juniper’s SRX Series networking device. Authors Brad Woodberg and Rob Cameron provide field-tested best practices for getting the most out of SRX deployments, based on their extensive field experience.

While their earlier book, Junos Security, covered the SRX platform, this book focuses on the SRX Series devices themselves. You'll learn how to use SRX gateways to address an array of network requirements—including IP routing, intrusion detection, attack mitigation, unified threat management, and WAN acceleration. Along with case studies and troubleshooting tips, each chapter provides study questions and lots of useful illustrations.

  • Explore SRX components, platforms, and various deployment scenarios
  • Learn best practices for configuring SRX’s core networking features
  • Leverage SRX system services to attain the best operational state
  • Deploy SRX in transparent mode to act as a Layer 2 bridge
  • Configure, troubleshoot, and deploy SRX in a highly available manner
  • Design and configure an effective security policy in your network
  • Implement and configure network address translation (NAT) types
  • Provide security against deep threats with AppSecure, intrusion protection services, and unified threat management tools
Read More Show Less

Product Details

  • ISBN-13: 9781449338961
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 6/28/2013
  • Edition number: 1
  • Pages: 987
  • Sales rank: 340,420
  • Product dimensions: 7.10 (w) x 9.20 (h) x 2.20 (d)

Meet the Author

Brad Woodberg, JNCIE-M, JNCIE-SEC, et al, is a product line manager for SRX at Juniper Networks. He is co-author of Junos Security (O’Reilly), Juniper Networks NetScreen(Syngress), and Juniper Networks SSL VPN (Syngress).

Rob Cameron, principal engineer at a Silicon Valley startup, worked for eight years at Juniper Networks. He’s the co-author of Junos Security (O’Reilly) and Configuring Juniper Networks NetScreen & SSG Firewalls (Syngress).

Read More Show Less

Table of Contents

Foreword;
Preface;
How to Use This Book;
What’s in This Book?;
Conventions Used in This Book;
Using Code Examples;
Safari® Books Online;
How to Contact Us;
Acknowledgments;
Chapter 1: Welcome to the SRX;
1.1 Evolving into the SRX;
1.2 The SRX Series Platform;
1.3 Deployment Solutions;
1.4 Summary;
1.5 Study Questions;
Chapter 2: SRX Series Product Lines;
2.1 Branch SRX Series;
2.2 Data Center SRX Series;
2.3 Summary;
2.4 Study Questions;
Chapter 3: SRX GUI Management;
3.1 J-Web: Your On-Box Assistant;
3.2 Centralized Management;
3.3 Summary;
3.4 Study Questions;
Chapter 4: SRX Networking Basics;
4.1 Interfaces;
4.2 Zones;
4.3 Basic Protocols;
4.4 Routing Instances;
4.5 Flow Mode and Packet Mode;
4.6 Sample Deployment;
4.7 Summary;
4.8 Study Questions;
Chapter 5: System Services;
5.1 System Services Operation on the SRX;
5.2 Management Services;
5.3 SNMP Management;
5.4 Networking Services;
5.5 SRX Logging and Flow Records;
5.6 Best Practices;
5.7 Troubleshooting and Operation;
5.8 Summary;
5.9 Study Questions;
Chapter 6: Transparent Mode;
6.1 Transparent Mode Overview;
6.2 Configuring Transparent Mode;
6.3 Troubleshooting and Operation;
6.4 Sample Deployments;
6.5 Summary;
6.6 Study Questions;
Chapter 7: High Availability;
7.1 Understanding High Availability in the SRX;
7.2 Getting Started with High Availability;
7.3 Deployment Concepts;
7.4 Preparing Devices for Deployment;
7.5 Integrating the Cluster into Your Network;
7.6 Fault Monitoring;
7.7 Troubleshooting and Operation;
7.8 Sample Deployments;
7.9 Summary;
7.10 Study Questions;
Chapter 8: Security Policies;
8.1 Packet Flow;
8.2 Security Policy Criteria and Precedence;
8.3 Security Policy Precedence;
8.4 Security Policy Components in Depth;
8.5 Best Practices;
8.6 Troubleshooting and Operation;
8.7 Sample Deployment;
8.8 Summary;
8.9 Study Questions;
Chapter 9: Network Address Translation;
9.1 The Need for NAT;
9.2 Junos NAT Fundamentals;
9.3 Junos NAT Components;
9.4 Junos NAT in Practice;
9.5 Best Practices;
9.6 Troubleshooting and Operation;
9.7 Sample Deployment;
9.8 Summary;
9.9 Study Questions;
Chapter 10: IPsec VPN;
10.1 VPN Architecture Overview;
10.2 IPsec VPN Concepts Overview;
10.3 IKE Negotiations;
10.4 Flow Processing and IPsec VPNs;
10.5 SRX VPN Types;
10.6 Other SRX VPN Components;
10.7 Selecting the Appropriate VPN Configuration;
10.8 IPsec VPN Configuration;
10.9 Best Practices;
10.10 Troubleshooting and Operation;
10.11 Sample Deployments;
10.12 Summary;
10.13 Study Questions;
Chapter 11: Screens and Flow Options;
11.1 A Brief Review of Denial-of-Service Attacks;
11.2 Screen Theory and Examples;
11.3 Best Practices;
11.4 Troubleshooting and Operation;
11.5 Sample Deployment;
11.6 Summary;
11.7 Study Questions;
Chapter 12: AppSecure Basics;
12.1 AppSecure Component Overview;
12.2 Deploying AppSecure;
12.3 Best Practices;
12.4 Troubleshooting and Operation;
12.5 Sample Deployments;
12.6 Summary;
12.7 Study Questions;
Chapter 13: Intrusion Prevention;
13.1 The Need for IPS;
13.2 How Does IPS Work?;
13.3 Configuring IPS Features on the SRX;
13.4 Deploying and Tuning IPS;
13.5 Best Practices;
13.6 Troubleshooting and Operation;
13.7 Sample Deployments;
13.8 Summary;
13.9 Study Questions;
Chapter 14: Unified Threat Management;
14.1 Shifting Threats;
14.2 UTM, IPS, or Both?;
14.3 UTM Licensing;
14.4 UTM Components;
14.5 Best Practices;
14.6 Troubleshooting and Operation;
14.7 Sample Deployments;
14.8 Summary;
14.9 Study Questions;
Colophon;

Read More Show Less

Customer Reviews

Average Rating 2.5
( 2 )
Rating Distribution

5 Star

(0)

4 Star

(1)

3 Star

(0)

2 Star

(0)

1 Star

(1)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted May 15, 2014

    HI you DO NOT LOOK BECAUS YOU WILL DIE

    You agrivate me. Grrrrrrrr.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 17, 2013

    Hnrhvjbrnfuhvufy vy

    Hcieyjenidglololololo

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)