ScreenOs Cookbook

( 1 )

Overview

Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep ScreenOS systems on track.

ScreenOS Cookbook gives you real-world fixes, techniques, and configurations that save time ? not ...

See more details below
Other sellers (Paperback)
  • All (17) from $1.99   
  • New (8) from $36.68   
  • Used (9) from $1.99   
ScreenOS Cookbook

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$25.49
BN.com price
(Save 42%)$43.99 List Price

Overview

Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep ScreenOS systems on track.

ScreenOS Cookbook gives you real-world fixes, techniques, and configurations that save time — not hypothetical situations out of a textbook. The book comes directly from the experience of engineers who have seen and fixed every conceivable ScreenOS network topology, from small branch office firewalls to appliances for large core enterprise and government, to the heavy duty protocol driven service provider network. Its easy-to-follow format enables you to find the topic and specific recipe you need right away and match it to your network and security issue.

Topics include:

  • Configuring and managing ScreenOS firewalls
  • NTP (Network Time Protocol)
  • Interfaces, Zones, and Virtual Routers
  • Mitigating Denial of Service Attacks
  • DDNS, DNS, and DHCP
  • IP Routing
  • Policy-Based Routing
  • Elements of Policies
  • Authentication
  • Application Layer Gateway (SIP, H323, RPC, RTSP, etc.,)
  • Content Security
  • Managing Firewall Policies
  • IPSEC VPN
  • RIP, OSPF, BGP, and NSRP
  • Multicast — IGPM, PIM, Static Mroutes
  • Wireless
Along with the usage and troubleshooting recipes, you will also find plenty of tricks, special considerations, ramifications, and general discussions of interesting tangents and network extrapolation. For the accurate, hard-nosed information you require to get your ScreenOS firewall network secure and operating smoothly , no book matches ScreenOS Cookbook.
Read More Show Less

Product Details

  • ISBN-13: 9780596510039
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 2/1/2008
  • Series: Cookbooks (O'Reilly) Series
  • Edition number: 1
  • Pages: 842
  • Sales rank: 554,142
  • Product dimensions: 7.00 (w) x 9.20 (h) x 1.50 (d)

Meet the Author

Stefan Brunner has been a technology consultant for more than 15years, helping enterprises to leverage technology for their businessmodel and deploy technology solutions. Stefan is the lead architectin Juniper Networks' Service Layer Technology Professional Servicesgroup. Prior to Juniper, Stefan worked with NetScreen Technologies asa network security consultant. Stefan holds an MBA in innovationsresearch and technology management from Ludwig-Maximilians-Universityof Munich, and a certificate degree in telecommunications engineeringfrom the University of California at Berkeley. He lives with his wifeand daughter in the Hill Country of Austin, Texas.

Vik Davar has been working in the IT field for more than 15 years,holding positions in financial services firms and technologycompanies including Juniper Networks and Goldman Sachs. Vik is thepresident of 9 Networks, an IT services company. He has a master'sdegree in electrical engineering from Columbia University and abachelor's degree in electrical engineering from The Cooper Union inNew York City. He is also a CISSP and CCIE# 8377. He lives in NewJersey with his wife and two children.

David Delcourt has worked in the data communications industry for thepast 13 years for enterprise equipment vendors including CabletronSystems and NetScreen Technologies. He has held a variety ofpositions, including advanced TAC engineer, technical trainer, andproduct manager at Cabletron Systems, and senior security consultantat NetScreen Technologies. He is currently the security practicemanager in Professional Services for Juniper Networks, supporting theAmericas. He lives in New Hampshire with his wife and daughter, andtheir two dogs and two cats.

Ken Draper has spent the past 20 years in the networking industry,and has focused on security solutions for the past 11 years. He isCISSP certification #22627 and holds numerous other certifications.Ken has worked at such networking equipment manufacturers asInfotron, Gandalf, Synoptics, Bay Networks, Nortel, NetScreen, andnow Juniper Networks. He has more than six years of experience withScreenOS and large-scale security solutions, he has held a variety oftechnical engineering positions including systems engineer andsolutions architect, and he is currently a Juniper Networksconsulting engineer specializing in the large-scale virtual privatenetwork (VPN), firewall, intrusion prevention, and centralizedmanagement markets. Ken lives outside Dallas with his wife and twodogs.

Joe Kelly has been involved in data networking for more than 12years, focusing on the realms of network security and routing. Hestarted his career in the service provider space at IDT Corporation,where he held roles in network operations and engineering. After IDT,he spent time with various network service providers in engineeringand architectural capacities. In 2001, Joe joined NetScreenTechnologies as a senior systems engineer in the Financial andService Provider verticals, where he specialized in high-availability, high-performance networks. Joe joined Juniper Networksin 2004 with the acquisition of NetScreen, and he is currently thetechnical lead on the Global Banking and Finance team. He lives inNew Jersey with his beautiful wife, Jacqueline, and his threechildren, Hannah, Ben, and Tristan.

Sunil Wadhwa has been in the data networking industry for more than13 years, focusing on systems, network routing, and security inenterprise and service provider organizations. He started his careerin India at GTL Limited and SAP India, and then held a variety ofroles in technical support, network operations, and engineering. Hemoved to the United States and worked with E4E as a networkconsultant for routing and security, and then joined Juniper Networksas an advanced technical support engineer for firewall/VPN products.He currently leads the Advance Technical Support team for JuniperNetworks, supporting enhanced services products. He lives inCalifornia with his beautiful wife, Lavanya, and little angeldaughter, Sneha.

Read More Show Less

Table of Contents

Credits

Glossary

Preface

Chapter 1: ScreenOS CLI, Architecture, and Troubleshooting

Chapter 2: Firewall Configuration and Management

Chapter 3: Wireless

Chapter 4: Route Mode and Static Routing

Chapter 5: Transparent Mode

Chapter 6: Leveraging IP Services in ScreenOS

Chapter 7: Policies

Chapter 8: Network Address Translation

Chapter 9: Mitigating Attacks with Screens and Flow Settings

Chapter 10: IPSec VPN

Chapter 11: Application Layer Gateways

Chapter 12: Content Security

Chapter 13: User Authentication

Chapter 14: Traffic Shaping

Chapter 15: RIP

Chapter 16: OSPF

Chapter 17: BGP

Chapter 18: High Availability with NSRP

Chapter 19: Policy-Based Routing

Chapter 20: Multicast

Chapter 21: Virtual Systems

Colophon

Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star

(1)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted March 9, 2012

    Azarias

    Hi

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)