O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Checkpoint Next Generation Security Administration

Book Description

Unparalleled security management that IT professionals have been waiting for.
Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. CheckPoint recently announced a ground-breaking user interface that meets the computer industry's Internet security requirements. The Next Generation User Interface is easy to use and offers unparalleled security management capabilities by creating a visual picture of security operations.
CheckPoint Next Generation Security Administration will be a comprehensive reference to CheckPoint's newest suite of products and will contain coverage of: Next Generation User Interface, Next Generation Management, Next Generation Performance, Next Generation VPN Clients, and Next Generation Systems.
CheckPoint are a company to watch, they have captured over 50% of the VPN market and over 40% of the firewall market according to IDC Research
Over 29,000 IT professionals are CheckPont Certified
This is the first book to covers all components of CheckPoint's new suite of market-leading security products - it will be in demand!

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright page
  5. Acknowledgments
  6. Contributors
  7. Technical Editor
  8. Technical Reviewer
  9. Foreword
  10. Chapter 1: Introduction to Check Point Next Generation
    1. Introduction
    2. Introducing the Check Point Next Generation Suite of Products
    3. Understanding VPN-1/FireWall-1 SVN Components
    4. Looking at Firewall Technology
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  11. Chapter 2: Installing and Configuring VPN-1/FireWall-1 Next Generation
    1. Introduction
    2. Before You Begin
    3. Installing Check Point VPN-1/FireWall-1 NG on Windows
    4. Uninstalling Check Point VPN- 1/FireWall- 1 NG on Windows
    5. Installing Check Point VPN-1/FireWall-1 NG on Solaris
    6. Installing Check Point VPN-1/FireWall-1 NG on Nokia
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  12. Chapter 3: Using the Graphical Interface
    1. Introduction
    2. Managing Objects
    3. Adding Rules
    4. Global Properties
    5. SecureUpdate
    6. Log Viewer
    7. System Status
    8. Summary
    9. Solutions Fast Track
    10. Frequently Asked Questions
  13. Chapter 4: Creating a Security Policy
    1. Introduction
    2. Reasons for a Security Policy
    3. How to Write a Security Policy
    4. Implementing a Security Policy
    5. Installing a Security Policy
    6. Policy Files
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  14. Chapter 5: Applying Network Address Translation
    1. Introduction
    2. Hiding Network Objects
    3. Configuring Static Address Translation
    4. Automatic NAT Rules
    5. NAT Global Properties
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  15. Chapter 6: Authenticating Users
    1. Introduction
    2. FireWall-1 Authentication Schemes
    3. Defining Users
    4. User Authentication
    5. Client Authentication
    6. Session Authentication
    7. LDAP Authentication
    8. Summary
    9. Solutions Fast Track
    10. Frequently Asked Questions
  16. Chapter 7: Open Security (OPSEC) and Content Filtering
    1. Introduction
    2. OPSEC Applications
    3. Content Vectoring Protocol (CVP)
    4. URI Filtering Protocol (UFP)
    5. Application Monitoring (AMON)
    6. Client Side OPSEC Applications
    7. Other Resource Options
    8. Summary
    9. Solutions Fast Track
    10. Frequently Asked Questions
  17. Chapter 8: Managing Policies and Logs
    1. Introduction
    2. Administering Check Point VPN-1/FireWall-1 NG for Performance
    3. Administering Check Point VPN-1/FireWall-1 NG for Effectiveness
    4. Administering Check Point VPN-1/FireWall-1 NG for Recoverability
    5. Performing Advanced Administration Tasks
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  18. Chapter 9: Tracking and Alerts
    1. Introduction
    2. Alerts Commands
    3. User-Defined Tracking
    4. Suspicious Activities Monitoring (SAM)
    5. Check Point Malicious Activity Detection (CPMAD)
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  19. Chapter 10: Configuring Virtual Private Networks
    1. Introduction
    2. Encryption Schemes
    3. Configuring an FWZ VPN
    4. Configuring an IKE VPN
    5. Configuring a SecuRemote VPN
    6. Installing SecuRemote Client Software
    7. Using SecuRemote Client Software
    8. Summary
    9. Solutions Fast Track
    10. Frequently Asked Questions
  20. Chapter 11: Securing Remote Clients
    1. Introduction
    2. Installing and Configuring a Policy Server
    3. Desktop Security Options
    4. Installing SecureClient Software
    5. Logging into the Policy Server
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  21. Chapter 12: Advanced Configurations
    1. Introduction
    2. Check Point High Availability (CPHA)
    3. Single Entry Point VPN Configurations (SEP)
    4. Multiple Entry Point VPN Configurations (MEP)
    5. Other High Availability Methods
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  22. Appendix A: Class C Subnet Mask Cheat Sheet
  23. Appendix B: Spoofing: Attacks on Trusted Identity
    1. Introduction
    2. What It Means to Spoof
    3. Background Theory
    4. The Evolution of Trust
    5. Establishing Identity within Computer Networks
    6. Capability Challenges
    7. Desktop Spoofs
    8. Impacts of Spoofs
    9. Down and Dirty: Engineering Spoofing Systems
    10. Summary
    11. Solution Fast Track
    12. Frequently Asked Questions
  24. Index