Skip to content

Check Point VPN-1/ FireWall-1 NG Administration

Best in textbook rentals since 2012!

ISBN-10: 0072223421

ISBN-13: 9780072223422

Edition: 2003

Authors: Andrew Ratcliffe, Inti Shah, Inti Shah

List price: $49.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

This is a complete guide to administering Check Point's latest releases of Firewall-1/VPN-1. It includes real-world examples on how to deploy this technology.
Customers also bought

Book details

List price: $49.99
Copyright year: 2003
Publisher: McGraw-Hill Osborne
Publication date: 4/2/2003
Binding: Paperback
Pages: 544
Size: 7.20" wide x 9.10" long x 1.17" tall
Weight: 2.090
Language: English

Acknowledgmentsp. xvii
Introductionp. xix
The Internet and the Need for Securityp. 1
History of the Internetp. 2
TCP/IPp. 4
Internet Securityp. 15
Checklist: Key Points in the Internet and the Need for Securityp. 25
What's New in VPN-1/FireWall-1 NGp. 27
What's Changed Since 4.1p. 28
Feature Packsp. 32
Checklist: Key Points in What's New in VPN-1/FireWall-1 NGp. 43
VPN-1/FireWall-1 NG Architecturep. 45
Fundamentals of Extranet Securityp. 46
Using Firewalls for Extranet Protectionp. 47
Securing Networks, Systems, Applications and Usersp. 49
Firewalls: from Packet Filters to Stateful Inspectionp. 52
Selecting a Firewall for Today's Networksp. 57
How VPN-1/FireWall-1 NG Worksp. 61
The Virtual Private Networkp. 67
Checklist: Key Points in VPN-1/FireWall-1 NG Architecturep. 71
Solaris VPN-1/FireWall-1 NG Installation and Setupp. 73
Installing a VPN-1/FireWall-1 NG on Solarisp. 74
Installing VPN-1/FireWall-1 NGp. 86
Locating the Installation Directoriesp. 95
Checklist: Key Points in Solaris VPN-1/FireWall-1 NG Installation and Setupp. 97
Windows NT/2000 VPN-1/FireWall-1 NG Installation and Setupp. 99
Installing VPN-1/FireWall-1 NG on Windowsp. 101
Installing VPN-1/FireWall-1 NGp. 107
Locating the Installation Directoriesp. 115
Checklist: Key Points in Windows NT/2000 VPN-1/FireWall-1 NG Installation and Setupp. 116
Red Hat Linux VPN-1/FireWall-1 NG Installation and Setupp. 117
Backgroundp. 118
Installing VPN-1/FireWall-1 on Linuxp. 120
Installing VPN-1/FireWall-1 NGp. 127
Checklist: Key Points in Red Hat Linux VPN-1/FireWall-1 NG Installation and Setupp. 135
Nokia Appllance VPN-1/FireWall-1 NG Installation and Setupp. 137
Backgroundp. 138
Installing VPN-1/FireWall-1 NG on Nokiap. 139
Locating the Installation Directoriesp. 154
Checklist: Key Points in Nokia Appliance VPN-1/FireWall-1 NG Installation and Setupp. 154
Setting Up Security Policy Rule Base and Propertiesp. 157
Security Policy Definedp. 158
Checklist: Key Points in Setting Up a Security Policy Rule Base and Propertiesp. 185
Working with the Security Policyp. 187
Assessing Fiction Corporation's Securityp. 189
Masking Rulesp. 194
Querying the Rule Basep. 196
Naming Sectionsp. 200
Tracking and Revision Controlp. 200
Disabling Rules and Negating Objectsp. 202
Uninstalling the Security Policyp. 205
Improving Performance with the Security Policyp. 205
A Word about Visual Policy Editorp. 206
Checklist: Key Points in Working with the Security Policyp. 208
Log Viewer and System Status Viewerp. 209
Log Viewerp. 210
Reducing the Noise in Logsp. 219
Activity Logged as Rule 0p. 222
SmartView Tracker (FP3)p. 222
System Status Viewerp. 225
SmartView Statusp. 227
Integration with Enterprise Network Managementp. 229
Checklist: Key Points in Log Viewer and System Status Viewerp. 229
Tracking and Alertsp. 231
Trackingp. 232
Checklist: Key Points in Tracking and Alertsp. 238
VPN-1/FireWall-1 NG Authenticationp. 239
Supported Authentication Schemesp. 240
Creating Users and Groupsp. 240
External Authentication Serversp. 241
Stealth Authenticationp. 242
User Authenticationp. 242
Client Authenticationp. 244
Session Authenticationp. 246
Fiction Corporation Examplep. 246
UserAuthorityp. 248
Checklist: Key Points in VPN-1/FireWall-1 NG Authenticationp. 249
Network Address Translation (NAT)p. 251
IP Address Issuesp. 254
Efficient Use of Registered IP Addressesp. 256
Address Translation and Routingp. 258
Network Address Translation (NAT) Rulesp. 259
Address Translation and Anti-Spoofingp. 262
Automatic versus Manual Translationp. 264
Overlapping NATp. 266
Checklist: Key Points in Network Address Translation (NAT)p. 267
Load Balancingp. 269
The Need for Load Balancingp. 270
How Load Balancing Worksp. 271
Load Balancing Algorithmsp. 271
Logical Server Typesp. 272
Setting Up Load Balancing Algorithmsp. 276
Real World Load Balancing Configurationp. 276
Checklist: Key Points in Load Balancingp. 280
Content Security and Content Vectoring Protocolp. 283
Role of the Security Serverp. 284
Extending Data Inspection with Content Securityp. 284
Content Security Changes for Feature Pack 3p. 315
CVP Load Sharing and Chainingp. 316
Upgrading from VPN-1/FireWall-1 4.xp. 316
Checklist: Key Points in Content Security and Content Vectoring Protocolp. 316
SYNDefenderp. 319
TCP Three-Way Handshakep. 320
SYN Flood Attackp. 321
Denial of Service Attacksp. 323
Using SYNDefenderp. 325
Feature Pack 3 Changesp. 331
Checklist: Key Points in SYNDefenderp. 333
Encryption and Virtual Private Networksp. 335
How Encryption Worksp. 336
Privacyp. 337
Symmetric Encryption (Shared Key)p. 338
Asymmetric Encryptionp. 340
Public Keysp. 344
Creating Certificatesp. 345
VPN-1/FireWall-1 NG Encryption Schemesp. 347
Internet Key Exchange (IKE)p. 348
FWZ VPN-1/FireWall-1 NG Encryption Schemep. 351
Encryption Scheme Comparisonp. 351
Certificate Authorities (CA)p. 352
Implementing Two-Gateway IKE Encryption Configurationp. 357
VPN Communityp. 361
Extranet Managerp. 372
VPN Routingp. 374
NAT and VPNp. 375
Checklist: Key Points in Encryption and Virtual Private Networksp. 376
SecuRemote and SecureClientp. 377
SecuRemote/SecureClientp. 378
Secure Connections for Fiction Corporation Finance Gatewayp. 380
IKE or FWZp. 383
Routing Considerationsp. 384
Secure Domain Loginp. 385
Simplified Mode (FP2 and Above)p. 385
Checklist: Key Points in SecuRemote and SecureClientp. 389
Policy Serverp. 391
Policy Server Definedp. 392
Client Encryption Rulesp. 400
Desktop Security Rule Basep. 400
The SecureClient GUIp. 402
Fiction Corporationp. 405
Security Configuration Verificationp. 406
SecureClient for Mobile Devicesp. 407
Checklist: Key Points in Policy Serverp. 407
High Availability Modulep. 409
The Need for High Availabilityp. 410
How High Availability Worksp. 410
Configuring High Availabilityp. 412
Automatic MAC Address Configurationp. 416
Using High Availability in Virtual Private Networksp. 416
Nokia Firewall Appliancep. 417
High Availability Enhancementsp. 417
Checklist: Key Points in High Availability Modulep. 418
Troubleshootingp. 419
VPN-1/FireWall-1 NG Debugging Toolsp. 420
Using the Policy Editor in local Modep. 427
VPN Debuggingp. 427
The Methodology for Troubleshootingp. 428
Make Sure the Server Is Up and Runningp. 429
IP Routingp. 429
Secure Internal Communicationsp. 431
Network Address Translationp. 436
Content Vectoring Protocol Troubleshootingp. 438
Too Many Hostsp. 438
Application Related Issuesp. 440
DBEDITp. 441
Management Console Lockoutp. 443
And Finally ... It's NOT a Firewall Issue!p. 443
Checklist: Key Points in Troubleshootingp. 444
Malicious Activity Detection (MAD) and SmartDefensep. 445
Malicious Activity Detection (MAD)p. 446
Enabling MADp. 453
SmartDefensep. 455
Checklist: Key Points in Malicious Activity Detection (MAD)p. 469
Fiction Corporation's Initial Proposalp. 471
Upgrading VPN-1/FireWall-1 NG from Previous Versionsp. 485
Nokia Upgradesp. 487
Upgrade Verifier Utilityp. 491
Backing Up and Restoring VPN-1/FireWall-1 NGp. 493
Backup and Restore on Nokiap. 494
Backup and Restore VPN-1/ FireWall-1 NG Management Serverp. 495
Using the Check Point Wizard to Create a Security Policyp. 497
Preparing to Use the Wizardp. 498
Using the Rule Base Wizardp. 498
Indexp. 509
Table of Contents provided by Ingram. All Rights Reserved.