Table of Contents:
  • Ch. 1. Networking, security, and the firewall
  • Ch. 2. Dissecting the juniper firewall
  • Ch. 3. Deploying juniper firewalls
  • Ch. 4. Policy configuration
  • Ch. 5. Advanced policy configuration
  • Ch. 6. User authentication
  • Ch. 7. Routing
  • Ch. 8. Address translation
  • Ch. 9. Transparent mode
  • Ch. 10. Attack detection and defense
  • Ch. 11. VPN theory and usage
  • Ch. 12. High availability
  • Ch. 13. Troubleshooting the Juniper firewall
  • Ch. 14. Virtual systems