Sold Out
Book Categories |
Acknowledgments | xvii | |
Preface | xix | |
1 | Internetwork Security Overview | 1 |
Summary | 10 | |
2 | Security Threats | 11 |
No User Training | 11 | |
Physical Security | 12 | |
Hacker's Toolbox | 13 | |
Summary | 22 | |
3 | Policies and Procedures | 23 |
Security Balance | 23 | |
Security Policy Development | 24 | |
Typical Security Policies | 29 | |
Procedures | 32 | |
Summary | 34 | |
4 | Policing the Security Domain | 35 |
Knowing Your Security Domain | 35 | |
Interesting Packets | 37 | |
Detecting Intrusion | 37 | |
Response | 40 | |
Summary | 41 | |
5 | FireWall-1 Overview | 43 |
Definition | 43 | |
Types of Firewall | 44 | |
FireWall-1 Overview | 47 | |
Summary | 51 | |
6 | Architecture | 53 |
Graphical User Interface | 53 | |
Distributed Enterprise Management | 56 | |
Firewall Module | 56 | |
Third-Party Integration--OPSEC | 58 | |
Virtual Private Network--VPN | 59 | |
Open Security Extension | 59 | |
Intrusion Detection | 60 | |
Load Balancing | 60 | |
High Availability | 61 | |
Reporting Module | 62 | |
Check Point Products | 63 | |
Summary | 63 | |
7 | Installation and Setup | 65 |
Windows NT | 65 | |
FireWall-1 Installation | 67 | |
Solaris | 76 | |
Solaris FireWall-1 Installation | 80 | |
Nokia | 84 | |
Summary | 86 | |
8 | Graphical User Interface | 87 |
The Policy Editor GUI | 88 | |
The Log Viewer GUI | 96 | |
The System Status GUI | 107 | |
Summary | 113 | |
9 | Object Creation and Management | 115 |
Standards | 115 | |
Lab Network | 116 | |
Network Objects Manager | 117 | |
Services Objects Manager | 144 | |
Resources Objects Manager | 150 | |
Server Objects Manager | 160 | |
User Manager | 170 | |
Time Objects Manager | 177 | |
Summary | 179 | |
10 | Policy Properties | 181 |
Security Policy Tab | 181 | |
Services Tab | 183 | |
Log and Alert Tab | 184 | |
Security Servers Tab | 186 | |
Authentication Tab | 186 | |
High Availability Tab | 187 | |
IP Pool NAT Tab | 188 | |
Access List | 189 | |
Desktop Security | 189 | |
Syn Defender | 191 | |
LDAP | 192 | |
Encryption | 195 | |
Connect Control | 195 | |
Summary | 196 | |
11 | Rulebase | 199 |
Rulebase Operation | 199 | |
Rulebase Development | 200 | |
Creating a New Rulebase | 202 | |
Navigating the Rulebase and Creating Rules | 212 | |
Installing and Uninstalling the Security Policy | 224 | |
Summary | 227 | |
12 | Authentication | 231 |
Authentication Schemes | 231 | |
Authentication Types | 233 | |
Authentication Implementation | 238 | |
Summary | 244 | |
13 | Network Address Translation | 245 |
Static Mode NAT | 246 | |
Hide Mode NAT | 249 | |
Issues with Network Address Translation | 252 | |
Summary | 253 | |
14 | Practical Lab Exercises | 255 |
LAB Network Configuration | 255 | |
Security Definitions | 257 | |
Firewall Object Definitions | 258 | |
Rulebase Definitions | 266 | |
Install the Rulebase | 270 | |
Test the Rulebase | 270 | |
Authentication | 272 | |
Network Address Translation | 276 | |
Summary | 278 | |
15 | Penetration Testing | 279 |
Technique | 282 | |
Penetration of the Lab Network | 284 | |
Summary | 289 | |
16 | Exam Preparation | 291 |
Certification Plan | 291 | |
Answering Questions | 293 | |
What to Do If You Fail | 294 | |
Summary | 295 | |
17 | CCSA Objective Essentials | 297 |
FireWall-1 Architecture | 298 | |
System Requirements | 300 | |
Installation Process | 301 | |
GUI | 302 | |
Rulebase Construction | 304 | |
Rulebase Efficiency | 305 | |
Authentication | 305 | |
NAT | 306 | |
Policy Properties | 307 | |
Summary | 309 | |
Appendix | Sample Questions | 311 |
Exam 1 | 311 | |
Exam 2 | 320 | |
Exam 3 | 329 | |
Correct Answers--Exam 1 | 338 | |
Correct Answers--Exam 2 | 339 | |
Correct Answers--Exam 3 | 340 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionCheck point firewall-1
X
This Item is in Your InventoryCheck point firewall-1
X
You must be logged in to review the productsX
X
X
Add
Check point firewall-1,
X
X
Add
Check point firewall-1,
|