-Offers the latest on security threats and countermeasures-Comprehensive overview of firewalls and their technologies all in one book-Explains the basic design considerations when deciding which firewall to deploy-Each chapter contains tips with useful shortcuts on how to get the job done more efficiently-Includes detailed notes on configuration set-up and commands-Caution notes and pitfalls provide 'warnings' to prevent problems from occurring-Covers the major firewall vendors: Check Point, Cisco Pix Firewall, Line, Raptor, and Microsoft's Internet Security and Acceleration Server-Special troubleshooting techniques cover typical mistakes made when installing firewalls-Written by three seasoned IT professionals with a wide variety of expertise and experience
The Most Comprehensive Firewalls Resource Available
Get in-depth, objective advice on installing and configuring today's most popular firewalls including Check PointTM Firewall-1® 4.1 and NG, Cisco® PIX, Microsoft® ISA Server, NetScreenTM, SonicWall and SymantecTM and learn strategies for successful network design and firewall placement. Gain insight into common methods for attacking firewalls including software bugs, viruses, and misconfigurations. Learn firewall best practices and how to improve the overall security of your firewall installation. This multipurpose guide contains all the implementation and administration information you need to keep your network safe from unauthorized access.
-Restrict access to your network without compromising usability and functionality
-Understand the strengths and limitations of firewall technology
-Get in-depth explanations of network and port address translation, VPNs, authentication, virus protection, content filtering, and more
-Learn about the various architectures available today application and circuit-level gateways, packet filters, and stateful packet inspection engines
-Find out how hackers commonly go about breaking into a network
-Get details on platforms and features for key products from Check PointTM, Cisco®, SymantecTM, Microsoft®, and others
-Manage your firewall installation using built-in tools, objects, and services
-Supplement your firewall system by implementing human controls such as education and log monitoring
-Understand the details of implementing the Cisco Secure Policy Manager
-Learn the latest on Check Point NG Firewall-1, CiscoTM IOS Firewall Feature Set, and Linux IP Tables