5 options
Designing and building enterprise DMZs / Hal Flynn.
- Format:
- Book
- Author/Creator:
- Flynn, Hal.
- Language:
- English
- Subjects (All):
- Computer networks--Security measures.
- Computer networks.
- Internet--Security measures.
- Internet.
- Physical Description:
- 1 online resource (737 p.)
- Edition:
- 1st ed.
- Place of Publication:
- Rockland, MA : Syngress Publishing, c2006.
- Language Note:
- English
- Summary:
- This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point.One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. This book is divided into four logical parts. First the reader will learn the concepts and major design principles of all DMZs. Next the reader will learn how to configure the actual hardware that makes up DMZs for both newly const
- Contents:
- Front Cover; Designing and Building Enterprise DMZs; Copyright Page; Contents; Chapter 1. DMZ Concepts, Layout, and Conceptual Design; Introduction; Planning Network Security; DMZ Definitions and History; Traffic and Security Risks; Advaced Risks; Web and FTP Sites; E-Mail Services; Advanced Design Stratgies; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Windows DMZ Design; Introduction; Introducing Windows DMZ Security; Building a Windows DMZ; Windows DMZ Design Planning List; A Look Forward to Longhorn; Summary; Solutions Fast Track; Frequently Asked Questions
- Chapter 3. Sun Solaris DMZ DesignIntroduction; New Features of Sun Solaris 10; Placement of Servers; The Firewall Ruleset; System Design; Implementation: The Quick and Dirty Details; Hardening Checklists for DMZ Servers and Solaris; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Wireless DMZs; Introduction; The Need for Wireless DMZs; Designing the Wireless DMZ; Wireless DMZ Components; Wireless DMZ Examples; Wireless LAN Security Best-Practices Checklist; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Implementing Wireless DMZs; Introduction
- Implementing RADIUS With Cisco EAPInstalling and Configuring Juniper Steel-Belted RADIUS; Windows Active Directory Domain Authentication With LEAP and RADIUS; Implementing PEAP; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Firewall Design: Cisco PIX and ASA; Introduction; PIX and ASA Basics; Securing Your Network Perimeters; Cisco PIX/ASA Versions and Features; Making a DMZ and Controlling Traffic; PIX/ASA Configuration Basics; Configuring Advanced PIX/ASA Features; PIX/ASA Firewall Design and Configuration Checklist; Summary; Solutions Fast Track
- Frequently Asked QuestionsChapter 7. Firewall and DMZ Design: Check Point; Introduction; Basics of Check Point Firewalls; Securing Your Network Perimeters; Configuring Your DMZ; Configuring the Firewall; Configuring the Security Rulebase; Configuring the Address Translation Rulebase; Configuring Networkand Application Protections; Check Point NG Secure DMZ Checklist; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Firewall and DMZ Design: SecurePlatform and Nokia Firewalls; Introduction; Basics of SecurePlatform Firewalls; Basics of Nokia Firewalls; Using cpconfig
- Nokia Firewall and DMZ Design ChecklistSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Firewall and DMZ Design: Juniper NetScreen; Introduction; NetScreen Basics; Securely Managing Juniper NetScreen Firewalls; NetScreen Configuration Basics; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Firewall and DMZ Design: ISA Server 2005; Introduction; Network Services Segment Configuration Options; Scenario 1 : A LAN Router between the ISA Firewall and Corporate Network; ISA Firewall Stateful Packet Inspection and Request/Response Paths
- Multiple Departmental Networks/Security Zones Connected to a Backbone Network
- Notes:
- Description based upon print version of record.
- ISBN:
- 1-281-07184-6
- 9786611071844
- 0-08-050400-0
- 1-59749-142-X
- OCLC:
- 181421143
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.