The Resource Firewall policies and VPN configurations, Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell, (electronic resource)

Firewall policies and VPN configurations, Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell, (electronic resource)

Label
Firewall policies and VPN configurations
Title
Firewall policies and VPN configurations
Statement of responsibility
Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell
Contributor
Subject
Genre
Language
  • eng
  • eng
Summary
A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security. This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of
Cataloging source
MiAaPQ
Dewey number
005.8
Illustrations
illustrations
Index
index present
Language note
English
LC call number
TK5105.59
LC item number
.F57 2006
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Cantrell, Chris
  • Henmi, Anne
  • Lucas, Mark
  • Singh, Abhishek
http://library.link/vocab/subjectName
  • Computer networks
  • Firewalls (Computer security)
Label
Firewall policies and VPN configurations, Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell, (electronic resource)
Instantiates
Publication
Note
Includes index
Carrier category
online resource
Carrier category code
cr
Content category
text
Content type code
txt
Contents
  • Front Cover; Firewall Policies and VPN Configurations; Copyright Page; Contents; Part I: Security Policy; Chapter 1. Network Security Policy; Introduction; Defining Your Organization; Different Access for Different Organizations; Untrusted Networks; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Using Your Policies to Create Firewall and VPN Configurations; Introduction; What Is a Logical Security Configuration?; Planning Your Logical Security Configuration; Writing Logical Security Configurations; Summary; Solutions Fast Track; Frequently Asked Questions
  • Part II: Firewall ConceptsChapter 3. Defining a Firewall; Introduction; Why Have Different Types of Firewalls?; Back to Basics-Transmission Control Protocol/Internet Protocol; Firewall Types; Application Proxy; Gateway; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Deciding on a Firewall; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part III: VPN Concepts; Chapter 5. Defining a VPN; Introduction; What Is a VPN?; Public Key Cryptography; IPSec; SSL VPNs; Layer 2 Solutions; SSH Tunnels; Others
  • SummarySolutions Fast Track; Frequently Asked Questions; Chapter 6. Deciding on a VPN; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part IV: Implementing Firewalls and VPNs (Case Studies); Chapter 7. IT Infrastructure Security Plan; Introduction; Infrastructure Security Assessment; Project Parameters; Project Team; Project Organization; Project Work Breakdown Structure; Project Risks and Mitigation Strategies; Project Constraints and Assumptions; Project Schedule and Budget; IT Infrastructure Security Project Outline
  • SummarySolutions Fast Track; Chapter 8. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Medium Business (<2000 People); Introduction; Mapping Your Systems; Improving Accountability with Identity Management; VPN Connectivity; Summary; Solutions Fast Track; Frequently Asked Questions; Index
Dimensions
unknown
Extent
1 online resource (513 p.)
Form of item
online
Isbn
9786611078348
Media category
computer
Media type code
c
Specific material designation
remote
System control number
  • (EBL)272100
  • (OCoLC)560282086
  • (SSID)ssj0000074936
  • (PQKBManifestationID)11115790
  • (PQKBTitleCode)TC0000074936
  • (PQKBWorkID)10122576
  • (PQKB)11291917
  • (MiAaPQ)EBC272100
  • (EXLCZ)991000000000298109
Label
Firewall policies and VPN configurations, Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell, (electronic resource)
Publication
Note
Includes index
Carrier category
online resource
Carrier category code
cr
Content category
text
Content type code
txt
Contents
  • Front Cover; Firewall Policies and VPN Configurations; Copyright Page; Contents; Part I: Security Policy; Chapter 1. Network Security Policy; Introduction; Defining Your Organization; Different Access for Different Organizations; Untrusted Networks; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Using Your Policies to Create Firewall and VPN Configurations; Introduction; What Is a Logical Security Configuration?; Planning Your Logical Security Configuration; Writing Logical Security Configurations; Summary; Solutions Fast Track; Frequently Asked Questions
  • Part II: Firewall ConceptsChapter 3. Defining a Firewall; Introduction; Why Have Different Types of Firewalls?; Back to Basics-Transmission Control Protocol/Internet Protocol; Firewall Types; Application Proxy; Gateway; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Deciding on a Firewall; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part III: VPN Concepts; Chapter 5. Defining a VPN; Introduction; What Is a VPN?; Public Key Cryptography; IPSec; SSL VPNs; Layer 2 Solutions; SSH Tunnels; Others
  • SummarySolutions Fast Track; Frequently Asked Questions; Chapter 6. Deciding on a VPN; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part IV: Implementing Firewalls and VPNs (Case Studies); Chapter 7. IT Infrastructure Security Plan; Introduction; Infrastructure Security Assessment; Project Parameters; Project Team; Project Organization; Project Work Breakdown Structure; Project Risks and Mitigation Strategies; Project Constraints and Assumptions; Project Schedule and Budget; IT Infrastructure Security Project Outline
  • SummarySolutions Fast Track; Chapter 8. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Medium Business (<2000 People); Introduction; Mapping Your Systems; Improving Accountability with Identity Management; VPN Connectivity; Summary; Solutions Fast Track; Frequently Asked Questions; Index
Dimensions
unknown
Extent
1 online resource (513 p.)
Form of item
online
Isbn
9786611078348
Media category
computer
Media type code
c
Specific material designation
remote
System control number
  • (EBL)272100
  • (OCoLC)560282086
  • (SSID)ssj0000074936
  • (PQKBManifestationID)11115790
  • (PQKBTitleCode)TC0000074936
  • (PQKBWorkID)10122576
  • (PQKB)11291917
  • (MiAaPQ)EBC272100
  • (EXLCZ)991000000000298109

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...