Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Rockland, MA :Syngress Publishing,
    UID:
    almahu_9948025244802882
    Format: 1 online resource (769 p.)
    Edition: 1st edition
    ISBN: 1-281-07298-2 , 9786611072988 , 0-08-050284-9
    Content: Juniper Networks family of NetScreen and SSG Firewalls are second only to Cisco in worldwide unit sales. These devices are becoming increasingly sophisticated as threats to networks continue to grow exponentially. This is the essential reference for any IT professional responsible for configuring and managing the devices.Configuring Juniper Networks NetScreen & SSG Firewalls is the only complete reference to this family of products. It covers all of the newly released features of the product line as highlighted by Juniper Networks, including: Deep Inspection firewall extends s
    Note: Includes index. , Front Cover; Configuring Juniper® Networks NetScreen® & SSG Firewalls Configuring; Copyright Page; Contents; Foreword; Chapter 1. Networking, Security, and the Firewall; Introduction; Understanding Networking; Understanding Security Basics; Understanding Firewall Basics; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Dissecting the Juniper Firewall; Introduction; The Juniper Security Product Offerings; The Juniper Firewall Core Technologies; The NetScreen and SSG Firewall Product Line; Summary; Solutions Fast Track; Frequently Asked Questions , Chapter 3. Deploying Juniper FirewallsIntroduction; Managing Your Juniper Firewall; Configuring Your Firewall for the Network; Configuring System Services; Resources; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Policy Configuration; Introduction; Firewall Policies; Policy Components; Creating Policies; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Advanced Policy Configuration; Introduction; Traffic-Shaping Fundamentals; Deploying Traffic Shaping on Juniper Firewalls; Advanced Policy Options; Summary; Solutions Fast Track , Frequently Asked QuestionsChapter 6. User Authentication; Introduction; User Account Types; Policy-Based User Authentication; 802.1x Authentication; Enhancing Authentication; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Routing; Introduction; Virtual Routers; Static Routing; Routing Information Protocol; Open Shortest Path First; Border Gateway Protocol; Route Redistribution; Policy-Based Routing; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Address Translation; Introduction; Overview of Address Translation; Juniper NAT Overview , Juniper Packet FlowSource NAT; Destination NAT; Summary; Links to Sites; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Transparent Mode; Introduction; Interface Modes; Understanding How Transport Mode Works; Configuring a Device to Use Transport Mode; Transparent Mode Deployment Options; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Attack Detection and Defense; Introduction; The Juniper Security Research Team; Understanding Attacks; Worms, Viruses, and Other Automated Malware; TCP/IP Protocol Anomaly Detection; Using Attack Objects; Antivirus Rules , Understanding Application Layer GatewaysKeeping Systems Updated; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 11. VPN Theory and Usage; Introduction; IPSec Tunnel Negotiations; Public Key Cryptography; How to Use VPNs in NetScreen Appliances; Advanced VPN Configurations; Summary; Solutions Fast Track; Links to Sites; Mailing Lists; Frequently Asked Questions; Chapter 12. High Availability; Introduction; The Need for High Availability; High-Availability Options; Improving Availability Using NetScreen SOHO Appliances; Introducing the NetScreen Redundancy Protocol , Building an NSRP Cluster , English
    Additional Edition: ISBN 1-59749-118-7
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages