Designing and Building Enterprise DMZsThis is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point. One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. This book is divided into four logical parts. First the reader will learn the concepts and major design principles of all DMZs. Next the reader will learn how to configure the actual hardware that makes up DMZs for both newly constructed and existing networks. Next, the reader will learn how to securely populate the DMZs with systems and services. The last part of the book deals with troubleshooting, maintaining, testing, and implementing security on the DMZ.
|
What people are saying - Write a review
We haven't found any reviews in the usual places.
Contents
1 | |
45 | |
Chapter 3 Sun Solaris DMZ Design | 93 |
Chapter 4 Wireless DMZs | 145 |
Chapter 5 Implementing Wireless DMZs | 171 |
Cisco PIX and ASA | 207 |
Check Point | 315 |
SecurePlatform and Nokia Firewalls | 355 |
Common terms and phrases
Active additional administrator allow apply attack authentication bastion host chapter Check Point Cisco client command communications configuration connection create default defined device disable discuss domain enable encryption enter Ethernet example external failover Figure filtering functionality gateway hardware host implementation important installed interface internal internal network Internet IP address ISA firewall license method Microsoft mode network services NOTE operating option packet password performance PIX/ASA port possible protection protocol Publishing RADIUS range remote router routing Rule running segment server shown shows solution specify steps switch Table traffic tunnel updates virtual VLAN Windows wireless zone