Junos Security: A Guide to Junos for the SRX Services Gateways and Security Certification

Front Cover
"O'Reilly Media, Inc.", Aug 16, 2010 - Computers - 848 pages

Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks.

Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat management, and WAN acceleration. Junos Security is a clear and detailed roadmap to the SRX platform. The author's newer book, Juniper SRX Series, covers the SRX devices themselves.

  • Get up to speed on Juniper’s multi-function SRX platforms and SRX Junos software
  • Explore case studies and troubleshooting tips from engineers with extensive SRX experience
  • Become familiar with SRX security policy, Network Address Translation, and IPSec VPN configuration
  • Learn about routing fundamentals and high availability with SRX platforms
  • Discover what sets SRX apart from typical firewalls
  • Understand the operating system that spans the entire Juniper Networks networking hardware portfolio
  • Learn about the more commonly deployed branch series SRX as well as the large Data Center SRX firewalls

"I know these authors well. They are out there in the field applying the SRX's industry-leading network security to real world customers everyday. You could not learn from a more talented team of security engineers."
--Mark Bauhaus, EVP and General Manager, Juniper Networks

 

Contents

Chapter 1 Introduction to the SRX
1
Chapter 2 What Makes Junos So Special?
71
Chapter 3 HandsOn Junos
87
Chapter 4 Security Policy
125
Chapter 5 Network Address Translation
193
Chapter 6 IPsec VPN
247
Chapter 7 HighPerformance Attack Mitigation
341
Chapter 8 Intrusion Prevention
389
Chapter 9 Unified Threat Management
487
Chapter 10 High Availability
539
Chapter 11 Routing
621
Chapter 12 Transparent Mode
709
Chapter 13 SRX Management
755
Index
803
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information