Firewall policies and VPN configurations

This book provides fundamental information necessary to configure firewalls and build VPNs and DMZs to survive the dangers of today's internet. The book includes a bonus chapter from the companion Web site on using Ethereal to monitor and analyze network traffic. While you may now feel overwhel...

Full description

Bibliographic Details
Main Author: Henmi, Anne
Other Authors: Lucas, Mark, Singh, Abhishek, Cantrell, Chris
Format: eBook
Language:English
Published: Rockland, MA Syngress 2006
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02998nmm a2200553 u 4500
001 EB001921162
003 EBX01000000000000001084064
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9781281078346 
020 |a 1429415908 
020 |a 0080506518 
020 |a 9786611078348 
020 |a 9781429415903 
020 |a 9780080506517 
020 |a 1281078344 
050 4 |a TK5105.59 
100 1 |a Henmi, Anne 
245 0 0 |a Firewall policies and VPN configurations  |c Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell 
260 |a Rockland, MA  |b Syngress  |c 2006 
300 |a xxii, 482 pages  |b illustrations 
505 0 |a Cover; Contents; Chapter 1 Network Security Policy; Chapter 2 Using Your Policies to Create Firewall and VPN Configurations; Chapter 3 Defining a Firewall; Chapter 4 Deciding on a Firewall; Chapter 5 Defining a VPN; Chapter 6 Deciding on a VPN; Chapter 7 IT Infrastructure Security Plan; Chapter 8 Case Study: SOHO (Five Computers, Printer, Servers, etc.); Chapter 9 Medium Business (<2000 People); Index 
653 |a Firewalls (Computer security) / fast 
653 |a COMPUTERS / Internet / Security / bisacsh 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Coupe-feu (Sécurité informatique) 
653 |a COMPUTERS / Networking / Security / bisacsh 
653 |a Computer networks / Security measures / fast 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Firewalls (Computer security) / http://id.loc.gov/authorities/subjects/sh00006011 
653 |a COMPUTERS / Security / General / bisacsh 
700 1 |a Lucas, Mark 
700 1 |a Singh, Abhishek 
700 1 |a Cantrell, Chris 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force 
500 |a Includes index 
015 |a GBB739161 
776 |z 1597490881 
776 |z 1429415908 
776 |z 9781597490887 
776 |z 9780080506517 
776 |z 9781429415903 
856 4 0 |u https://learning.oreilly.com/library/view/~/1597490881/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 005.8 
520 |a This book provides fundamental information necessary to configure firewalls and build VPNs and DMZs to survive the dangers of today's internet. The book includes a bonus chapter from the companion Web site on using Ethereal to monitor and analyze network traffic. While you may now feel overwhelmed by the countless firewalls with a dizzying array of features, you will feel empowered by the knowledge gained from this book. This book covers the leading firewall products. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing t