This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall products are covered including Microsoft Internet Security and Acceleration Server (ISA), ISS BlackICE, Symantec Firewall, Check Point NG, and PIX Firewall. Firewall configuration strategies and techniques are covered in depth.
The book answers questions about firewalls, from How do I make Web/HTTP work through my firewall? To What is a DMZ, and why do I want one? And What are some common attacks, and how can I protect my system against them?
The Internet's explosive growth over the last decade has forced IT professionals to work even harder to secure the private networks connected to it-from erecting firewalls that keep out malicious intruders to building virtual private networks (VPNs) that permit protected, fully encrypted communications over the Internet's vulnerable public infrastructure.
The Best Damn Firewalls Book Period covers the most popular Firewall products, from Cisco's PIX Firewall to Microsoft's ISA Server to CheckPoint NG, and all the components of an effective firewall set up.
Anything needed to protect the perimeter of a network can be found in this book.
- This book is all encompassing, covering general Firewall issues and protocols, as well as specific products.
- Anyone studying for a security specific certification, such as SANS' GIAC Certified Firewall Analyst (GCFW) will find this book an invaluable resource.
- The only book to cover all major firewall products from A to Z: CheckPoint, ISA Server, Symatec, BlackICE, PIX Firewall and Nokia.
Sprache
Verlagsort
ISBN-13
978-0-08-047606-3 (9780080476063)
Schweitzer Klassifikation
ForewordPart I Introduction to Network Security & Firewalls Chapter 1 Introduction to Information Security Introduction Insecurity and the Internet Threats and Attacks Security Policies Creating a Security Policy Protecting Information Technology Using SSL and Secure Shell Other Hardware Security Devices Summary Chapter 2 Firewall Concepts Introduction Defining a Firewall Networking and Firewalls Popular Firewalls Summary Chapter 3 DMZ Concepts, Layout, and Conceptual Design Introduction DMZ Basics DMZ Design Fundamentals Advanced Risks Advanced Design Strategies Summary Chapter 4 Introduction to Intrusion Detection Systems Introduction What is Intrusion Detection? What is an Intrusion? Why Are Intrusion Detection Systems Important? SummaryPart II Solaris & Linux Firewalls Chapter 5 Implementing a Firewall with Ipchains and Iptables Introduction Understanding the Need for a Firewall Deploying IP Forwarding and Masquerading Configuring Your Firewall to Filter Network Packets Understanding Tables and Chains in a Linux Firewall Logging Packets at the Firewall Configuring a Firewall Counting Bandwidth Usage Using and Obtaining Automated Firewall Scripts and Graphical Firewall Utilities Summary Chapter 6 Maintaining Open Source Firewalls Introduction Testing Firewalls Using Telnet, Ipchains, Netcat, and SendIP to Probe Your Firewall Understanding Firewall Logging, Blocking, and Alert Options Obtaining Additional Firewall Logging Tools Summary Chapter 7 Configuring Solaris as a Secure Router and Firewall Introduction Configuring Solaris as a Secure Router Routing IP Version 6 IP Version 6 Hosts Configuring Solaris as a Secure Gateway Configuring Solaris as a Firewall SummaryPart III PIX Firewalls Chapter 8 Introduction to PIX Firewalls Introduction PIX Firewall Features PIX Hardware Software Licensing and Upgrades The Command-Line Interface Summary Chapter 9 Passing Traffic Introduction Allowing Outbound Traffic Allowing Inbound Traffic TurboACLs Object Grouping Case Study Summary Chapter 10 Advanced PIX Configurations Introduction Handling Advanced Protocols Filtering Web Traffic DHCP Functionality Other Advanced Features Summary Chapter 11 Troubleshooting and Performance Monitoring Introduction Troubleshooting Hardware and Cabling Troubleshooting Connectivity Troubleshooting IPsec Capturing Traffic Monitoring and Troubleshooting Performance SummaryPart IV Check Point NG and Nokia IP Series Appliances Chapter 12 Installing and Configuring VPN-1/FireWall-1 Next Generation Introduction Before You Begin Installing Check Point VPN-1/FireWall-1 NG on Windows Uninstalling Check Point VPN-1/FireWall-1 NG on Windows Installing Check Point VPN-1/FireWall-1 NG on Solaris Uninstalling Check Point VPN-1/FireWall-1 NG on Solaris Installing Check Point VPN-1/FireWall-1 NG on Nokia Summary Chapter 13 Using the Graphical Interface Introduction Managing Objects Adding Rules Global Properties SecureUpdate Log Viewer System Status Summary Chapter 14 Creating a Security Policy Introduction Reasons for a Security Policy How to Write a Security Policy Implementing a