Designing and Building Enterprise DMZs

Front Cover
Elsevier, Oct 9, 2006 - Computers - 737 pages
This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point.

One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. This book is divided into four logical parts. First the reader will learn the concepts and major design principles of all DMZs. Next the reader will learn how to configure the actual hardware that makes up DMZs for both newly constructed and existing networks. Next, the reader will learn how to securely populate the DMZs with systems and services. The last part of the book deals with troubleshooting, maintaining, testing, and implementing security on the DMZ.
  • The only book published on Network DMZs on the components of securing enterprise networks
  • This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point
  • Provides detailed examples for building Enterprise DMZs from the ground up and retro-fitting existing infrastructures
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Chapter 1 DMZ Concepts Layout and Conceptual Design
1
Chapter 2 Windows DMZ Design
45
Chapter 3 Sun Solaris DMZ Design
93
Chapter 4 Wireless DMZs
145
Chapter 5 Implementing Wireless DMZs
171
Cisco PIX and ASA
207
Check Point
315
SecurePlatform and Nokia Firewalls
355
Juniper NetScreen
387
ISA Server 2005
435
Chapter 11 DMZ Router and Switch Security
503
Chapter 12 DMZBased VPN Services
577
Chapter 13 Windows Bastion Hosts
615
Chapter 14 Linux Bastion Hosts
663
Index
703
Copyright

Common terms and phrases

Bibliographic information