Vacca / Ellis | Firewalls | E-Book | sack.de
E-Book

E-Book, Englisch, 448 Seiten, Web PDF

Vacca / Ellis Firewalls

Jumpstart for Network and Systems Administrators
1. Auflage 2004
ISBN: 978-0-08-049132-5
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark

Jumpstart for Network and Systems Administrators

E-Book, Englisch, 448 Seiten, Web PDF

ISBN: 978-0-08-049132-5
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark



"In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network, provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1, scanning to validate configuration using ISS Internet Scanner, configuring the firewall to support simple and complex Web services, setting up a packet filtering router, enhancing firewall configurations to support split-DNS, authenticating remote users, and protecting browsers and servers with a proxy-based firewall.

?Install and configure proxy-based and stateful-filtering firewalls
?Protect internal IP addresses with NAT and deploy a secure DNS architecture
?Develop an Internet/intranet security policy to protect your organization's systems and data
?Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures"

Vacca / Ellis Firewalls jetzt bestellen!

Zielgruppe


Academic/professional/technical: Undergraduate. Academic/professional/technical: Postgraduate. Academic/professional/technical: Research and professional

Weitere Infos & Material


1;Front Cover;1
2;Firewalls Jumpstart for Network and Systems Administrators;4
3;Copyright Page;5
4;Contents;8
5;Foreword;18
6;Introduction;20
7;Acknowledgments;30
8;Section I: Overview of Firewall Technology;32
8.1;Chapter 1. Firewalls: What Are They?;34
8.1.1;1.1 Chapter objectives;34
8.1.2;1.2 Firewall defined;38
8.1.3;1.3 Why firewalls?;39
8.1.4;1.4 Benefits of firewalls;43
8.1.5;1.5 Enhanced privacy;46
8.1.6;1.6 Limitations of firewalls;47
8.1.7;1.7 Summary;50
8.1.8;1.8 References;52
8.2;Chapter 2. Type of Firewall Security Policy;54
8.2.1;2.1 Chapter objectives;54
8.2.2;2.2 Firewall protection;55
8.2.3;2.3 Firewall architectures;56
8.2.4;2.4 Types of firewalls;57
8.2.5;2.5 Issues;60
8.2.6;2.6 Intranet;63
8.2.7;2.7 Network trust relationships;64
8.2.8;2.8 Virtual private networks;65
8.2.9;2.9 Firewall administration;65
8.2.10;2.10 Revision/update of firewall policy;72
8.2.11;2.11 Examples of service-specific policies;74
8.2.12;2.12 Summary;79
8.2.13;2.13 References;79
8.3;Chapter 3. Firewall Types;80
8.3.1;3.1 Chapter objectives;80
8.3.2;3.2 Types of firewalls;81
8.3.3;3.3 Understanding firewall types;86
8.3.4;3.4 Firewall types drawbacks;86
8.3.5;3.5 Summary;87
8.3.6;3.6 References;88
9;Section II: Firewall Topologies;90
9.1;Chapter 4. Choosing the Right Firewall;92
9.1.1;4.1 Chapter objectives;92
9.1.2;4.2 Convergence;94
9.1.3;4.3 About packet inspection;103
9.1.4;4.4 Summary;121
9.2;Chapter 5. Defense in Depth: Firewall Topologies;124
9.2.1;5.1 Chapter objectives;124
9.2.2;5.2 Virtual private network;125
9.2.3;5.3 Firewall policies;128
9.2.4;5.4 Setting up a demilitarized zone:A VPN alternative?;131
9.2.5;5.5 Summary;141
10;Section III: Firewall Installation and Configuration;142
10.1;Chapter 6. Installation Preparation;144
10.1.1;6.1 Chapter objectives;144
10.1.2;6.2 Unbreakable walls;145
10.1.3;6.3 Selecting an operating system;146
10.1.4;6.4 Scanning for vulnerabilities;155
10.1.5;6.5 Summary;160
10.2;Chapter 7. Firewall Configuration;162
10.2.1;7.1 Chapter objectives;162
10.2.2;7.2 Defining firewall security objects;162
10.2.3;7.3 Scanning the firewall and fixing vulnerabilities;166
10.2.4;7.4 Identifying trusted and untrusted networks;173
10.2.5;7.5 Summary;176
11;Section IV: Supporting Outgoing Services Through Firewall Configuration;178
11.1;Chapter 8. Simple Policy Implementation;180
11.1.1;8.1 Chapter objectives;180
11.1.2;8.2 Policy configuration;181
11.1.3;8.3 Supporting HTTP;184
11.1.4;8.4 Dynamic content;187
11.1.5;8.5 Summary;188
11.2;Chapter 9. Complex Web Services Management;190
11.2.1;9.1 Chapter objectives;190
11.2.2;9.2 Telnet;192
11.2.3;9.3 FTP;192
11.2.4;9.4 Handling port numbers;196
11.2.5;9.5 Deploying Real Audio;201
11.2.6;9.6 Summary;203
11.3;Chapter 10. Content Filtering;206
11.3.1;10.1 Chapter objectives;206
11.3.2;10.2 Filtering out dangerous content;206
11.3.3;10.3 Summary;215
12;Section V: Secure External Services Provision;216
12.1;Chapter 11. Publicly Accessible Servers Implementation;218
12.1.1;11.1 Chapter objectives;218
12.1.2;11.2 Securing your organization’s Internet site;218
12.1.3;11.3 Separating your Internet site from your intranet;228
12.1.4;11.4 Supporting SMTP mail architectures;230
12.1.5;11.5 Summary;232
12.2;Chapter 12. Architecture Selection;234
12.2.1;12.1 Chapter objectives;234
12.2.2;12.2 Types of screened subnet architectures;234
12.2.3;12.3 Single-box architecture;244
12.2.4;12.4 Summary;246
12.3;Chapter 13. External Servers Protection;248
12.3.1;13.1 Chapter objectives;248
12.3.2;13.2 Siting external servers on a perimeter net;248
12.3.3;13.3 Deploying packet filtering to control access to your servers;256
12.3.4;13.4 Router packet filtering;257
12.3.5;13.5 Using router access control lists;258
12.3.6;13.6 Summary;258
13;Section VI: Internal IP Services Protection;260
13.1;Chapter 14. Internal IP Security Threats: Beyond the Firewall;262
13.1.1;14.1 Chapter objectives;262
13.1.2;14.2 Network threats;263
13.1.3;14.3 Organization risk assessment;267
13.1.4;14.4 Examining inside attacks;269
13.1.5;14.5 Handling new threats;270
13.1.6;14.6 Antivirus software technology: Beyond the firewall;271
13.1.7;14.7 Summary;278
13.1.8;14.8 References;278
13.2;Chapter 15. Network Address Translation Deployment;280
13.2.1;15.1 Chapter objectives;280
13.2.2;15.2 Person-to-person communication;280
13.2.3;15.3 Internet protocol telephony;281
13.2.4;15.4 Routers, firewalls, and NATs;282
13.2.5;15.5 Handling SIP;282
13.2.6;15.6 Firewall traversal/SIP NAT;283
13.2.7;15.7 Employing a Linux-based SOHO firewall solution with NAT technology;284
13.2.8;15.8 Summary;298
13.2.9;15.9 References;299
14;Section VII: Firewall Remote Access Configuration;300
14.1;Chapter 16. Privacy and Authentication Technology;302
14.1.1;16.1 Chapter objectives;302
14.1.2;16.2 Selecting cryptographic algorithms through encryption;304
14.1.3;16.3 Key management;306
14.1.4;16.4 Auditing, authentication, and authorization;307
14.1.5;16.5 High availability and load balancing;309
14.1.6;16.6 Transport and network;309
14.1.7;16.7 Encryption of multiple columns: database considerations;310
14.1.8;16.8 Summary;313
14.1.9;16.9 References;314
14.2;Chapter 17. Tunneling: Firewall-to-Firewall;316
14.2.1;17.1 Chapter objectives;316
14.2.2;17.2 Increasing risk on extranets and intranets;317
14.2.3;17.3 Openness with protection of firewall tunneling and Internet security solutions;317
14.2.4;17.4 Firewall tunneling and Internet security architecture technologies;318
14.2.5;17.5 Firewall tunneling technologies;320
14.2.6;17.6 Demilitarized zone focus;322
14.2.7;17.7 Keeping the firewall tunneling security rules up-to-date through enterprise intranets;323
14.2.8;17.8 Summary;324
14.2.9;17.9 References;326
15;Section VIII: Firewall Management;328
15.1;Chapter 18. Auditing and Logging;330
15.1.1;18.1 Chapter objectives;330
15.1.2;18.2 Auditing your firewall;330
15.1.3;18.3 Logging;333
15.1.4;18.4 Summary;339
15.1.5;18.5 References;340
15.2;Chapter 19. Firewall Administration;342
15.2.1;19.1 Chapter objectives;342
15.2.2;19.2 System administration;343
15.2.3;19.3 Managing your firewall remotely;343
15.2.4;19.4 Maintenance of a firewall;348
15.2.5;19.5 Managing firewall security;352
15.2.6;19.6 Summary;357
15.2.7;19.7 References;358
15.3;Chapter 20. Summary, Conclusions, and Recommendations;360
15.3.1;20.1 Chapter objectives;360
15.3.2;20.2 Summary;361
15.3.3;20.3 Conclusions;362
15.3.4;20.4 Recommendations;363
15.3.5;20.5 References;370
16;Section IX: Appendixes;372
16.1;A. Contributors of Firewall Software;374
16.2;B. Worldwide Survey of Firewall Products;380
16.3;C. Firewall Companies;384
16.4;D. Commercial Products or Consultants Who Sell or Service Firewalls;388
16.5;E. Establishing Your Organization’s Security;394
16.6;F. Network Interconnections: A Major Point of Vulnerability;398
16.7;G. Deterring Masqueraders and Ensuring Authenticity;402
16.8;H. Preventing Eavesdropping to Protect Your Privacy;412
16.9;I. Thwarting Counterfeiters and Forgery to Retain Integrity Through a Reverse Firewall;416
16.10;J. Avoiding Disruption of Service to Maintain Availability;422
16.11;K. Developing Your Firewall Security Policy;424
17;Glossary;428
18;Index;438



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.