Book description
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall.· Install and configure proxy-based and stateful-filtering firewalls
· Protect internal IP addresses with NAT and deploy a secure DNS architecture
· Develop an Internet/intranet security policy to protect your organization's systems and data
· Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures
Table of contents
- Front Cover
- Firewalls Jumpstart for Network and Systems Administrators
- Copyright Page
- Contents (1/2)
- Contents (2/2)
- Foreword
- Introduction (1/2)
- Introduction (2/2)
- Acknowledgments
-
Section I: Overview of Firewall Technology
- Chapter 1. Firewalls: What Are They?
-
Chapter 2. Type of Firewall Security Policy
- 2.1 Chapter objectives
- 2.2 Firewall protection
- 2.3 Firewall architectures
- 2.4 Types of firewalls
- 2.5 Issues
- 2.6 Intranet
- 2.7 Network trust relationships
- 2.8 Virtual private networks
- 2.9 Firewall administration
- 2.10 Revision/update of firewall policy
- 2.11 Examples of service-specific policies
- 2.12 Summary
- 2.13 References
- Chapter 3. Firewall Types
- Section II: Firewall Topologies
- Section III: Firewall Installation and Configuration
- Section IV: Supporting Outgoing Services Through Firewall Configuration
- Section V: Secure External Services Provision
-
Section VI: Internal IP Services Protection
- Chapter 14. Internal IP Security Threats: Beyond the Firewall
-
Chapter 15. Network Address Translation Deployment
- 15.1 Chapter objectives
- 15.2 Person-to-person communication
- 15.3 Internet protocol telephony
- 15.4 Routers, firewalls, and NATs
- 15.5 Handling SIP
- 15.6 Firewall traversal/SIP NAT
- 15.7 Employing a Linux-based SOHO firewall solution with NAT technology (1/3)
- 15.7 Employing a Linux-based SOHO firewall solution with NAT technology (2/3)
- 15.7 Employing a Linux-based SOHO firewall solution with NAT technology (3/3)
- 15.8 Summary
- 15.9 References
-
Section VII: Firewall Remote Access Configuration
-
Chapter 16. Privacy and Authentication Technology
- 16.1 Chapter objectives
- 16.2 Selecting cryptographic algorithms through encryption
- 16.3 Key management
- 16.4 Auditing, authentication, and authorization
- 16.5 High availability and load balancing
- 16.6 Transport and network
- 16.7 Encryption of multiple columns: database considerations
- 16.8 Summary
- 16.9 References
-
Chapter 17. Tunneling: Firewall-to-Firewall
- 17.1 Chapter objectives
- 17.2 Increasing risk on extranets and intranets
- 17.3 Openness with protection of firewall tunneling and Internet security solutions
- 17.4 Firewall tunneling and Internet security architecture technologies
- 17.5 Firewall tunneling technologies
- 17.6 Demilitarized zone focus
- 17.7 Keeping the firewall tunneling security rules up-to-date through enterprise intranets
- 17.8 Summary
- 17.9 References
-
Chapter 16. Privacy and Authentication Technology
- Section VIII: Firewall Management
-
Section IX: Appendixes
- A. Contributors of Firewall Software (1/2)
- A. Contributors of Firewall Software (2/2)
- B. Worldwide Survey of Firewall Products
- C. Firewall Companies
- D. Commercial Products or Consultants Who Sell or Service Firewalls (1/2)
- D. Commercial Products or Consultants Who Sell or Service Firewalls (2/2)
- E. Establishing Your Organization’s Security
- F. Network Interconnections: A Major Point of Vulnerability
- G. Deterring Masqueraders and Ensuring Authenticity (1/2)
- G. Deterring Masqueraders and Ensuring Authenticity (2/2)
- H. Preventing Eavesdropping to Protect Your Privacy
- I. Thwarting Counterfeiters and Forgery to Retain Integrity Through a Reverse Firewall (1/2)
- I. Thwarting Counterfeiters and Forgery to Retain Integrity Through a Reverse Firewall (2/2)
- J. Avoiding Disruption of Service to Maintain Availability
- K. Developing Your Firewall Security Policy
- Glossary (1/2)
- Glossary (2/2)
- Index (1/3)
- Index (2/3)
- Index (3/3)
Product information
- Title: Firewalls
- Author(s):
- Release date: December 2004
- Publisher(s): Digital Press
- ISBN: 9780080491325
You might also like
book
Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
The best-selling first edition of became the bible of Internet security by showing a generation of …
book
Web Application Firewalls
Firewalls have traditionally focused on network traffic, but with the advent of cloud computing and DevOps, …
book
Building Internet Firewalls, 2nd Edition
In the five years since the first edition of this classic book was published, Internet use …
book
Network Security, Firewalls, and VPNs
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Network Security, …