Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Check Point Firewall-1 Administration Guide

Check Point Firewall-1 Administration Guide

List Price: $55.00
Your Price: $55.00
Product Info Reviews

Description:

Check Point FireWall-1 is big and highly capable but hard for the uninitiated to figure out. Check Point FireWall-1 Administration Guide does a competent job of scratching the surface of this popular piece of security software. It leaves a lot of questions unanswered--any single volume would have to--but what's here is enough to help you get the software installed and initially configured in all standard situations.

Authors Marcus Goncalves and Steven Brown--Goncalves has a particularly strong reputation as a firewall guru--describe sound practices for formulating security policies, then implementing those policies as FireWall-1 rules. Coverage focuses on Windows NT installations of FireWall-1. Unix gets some attention, but practically all the screen shots show a Microsoft operating system.

The most interesting parts of this book have to do with how FireWall-1 identifies and reacts to specific kinds of attacks. For example, the authors explain how the FireWall-1 INSPECT engine, faced with attempts to overwhelm a protected machine with unresolved connection attempts (a SYN flood), can use SYNDefender Relay or SYNDefender Gateway to intercept or monitor requests and acknowledgments. They typically map packet exchanges with simple but effective transmission diagrams consisting of ASCII characters. The coverage of VPNs involving mobile users and their implementation with SecuRemote also is strong. --David Wall

Topics covered: Firewall rationales, FireWall-1 installation, rule sets, virtual private networks (VPNs), and how FireWall-1 behaves under specific kinds of attacks.

© 2004, ReviewFocus or its affiliates