ScreenOS Cookbook: Time-Saving Techniques for ScreenOS Administrators

Front Cover
"O'Reilly Media, Inc.", Feb 26, 2008 - Computers - 842 pages

Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep ScreenOS systems on track.

ScreenOS Cookbook gives you real-world fixes, techniques, and configurations that save time -- not hypothetical situations out of a textbook. The book comes directly from the experience of engineers who have seen and fixed every conceivable ScreenOS network topology, from small branch office firewalls to appliances for large core enterprise and government, to the heavy duty protocol driven service provider network. Its easy-to-follow format enables you to find the topic and specific recipe you need right away and match it to your network and security issue.

Topics include:

  • Configuring and managing ScreenOS firewalls
  • NTP (Network Time Protocol)
  • Interfaces, Zones, and Virtual Routers
  • Mitigating Denial of Service Attacks
  • DDNS, DNS, and DHCP
  • IP Routing
  • Policy-Based Routing
  • Elements of Policies
  • Authentication
  • Application Layer Gateway (SIP, H323, RPC, RTSP, etc.,)
  • Content Security
  • Managing Firewall Policies
  • IPSEC VPN
  • RIP, OSPF, BGP, and NSRP
  • Multicast -- IGPM, PIM, Static Mroutes
  • Wireless
Along with the usage and troubleshooting recipes, you will also find plenty of tricks, special considerations, ramifications, and general discussions of interesting tangents and network extrapolation. For the accurate, hard-nosed information you require to get your ScreenOS firewall network secure and operating smoothly , no book matches ScreenOS Cookbook.

From inside the book

Contents

User Authentication
439
Traffic Shaping
469
RIP
492
OSPF
523
BGP
575
High Availability with NSRP
620
PolicyBased Routing
677
Multicast
697

Mitigating Attacks with Screens and Flow Settings
294
IPSec VPN
315
Application Layer Gateways
379
Content Security
415
Virtual Systems
748
Glossary
781
Index
801
Copyright

Other editions - View all

Common terms and phrases

Popular passages

Page 82 - By using a certificate, you can verify your identity to people you communicate with over the Web, sign and encrypt messages, and, depending upon the type of certificate you request, perform other security tasks.
Page 82 - Welcome You use this web site to request a certificate for your web browser, e-mail client, or other secure program Once you acquire a certificate, you will be able to securely identify yourself to other people over the web, sign your email messages, encrypt your e-mail messages, and more depending upon the type of certificate you request. Select a task...
Page 83 - Server 1.3.27 on your computer, To continue, click Next, WARNING: This program is protected by copyright law and international treaties.
Page 55 - Shared key authentication supports authentication of stations as either a member of those who know a shared secret key or a member of those who do not. IEEE 802.11...

Bibliographic information