Check Point Next Generation Security Administration
Cherie Amon, Allen V. Keele, Daniel Kligerman, Drew Simonis, Corey Pincock
- 出版商: Syngress
- 售價: $399
- 語言: 英文
- 頁數: 800
- 裝訂: Paperback
- ISBN: 1928994741
- ISBN-13: 9781928994749
The Complete Guide to Check Point NG
The Check Point Next Generation suite of products provides the tools necessary for easy development and deployment of Enterprise Security Solutions. Check Point VPN-1/FireWall-1 has been beating out its competitors for years, and the Next Generation software continues to improve the look, feel, and ease of use of this software. Check Point NG Security Administration will show you the ins and outs of the NG product line.
- Install and
Configure VPN-1/FireWall-1 Next Generation
Find step-by-step coverage of installing NG on Windows, Solaris, and Nokia platforms.
Learn how to use Network Objects Manager and manage a network range, a group of users, or a single workstation.
- Write and
Implement a Security Policy
Review the steps to write a security policy: introduction, guidelines, standards, procedures, deployment, enforcement, and modification.
FireWall-1 Authentication Schemes
Find complete coverage of S/Key, SecurID, OS Password, VPN-1, and FireWall authentication.
- Master Check
See how the Open Platform for Security model enables you to implement third-party vendor applications into your firewall environment.
Review the log views available to you and learn when to use the three logs: log mode, active mode, and audit mode.
- Use Check
Point Malicious Activity Detection (CPMAD)
Learn how the CPMAD log analyzer can help detect unusual or dangerous activities across a range of firewall modules.
Install and use SecuRemote Client Software to manage your VPNs.
- Install a
See how Check Point's SecureClient and Policy Server help reduce the risk of a remote user's desktop being compromised.
- Register for
Your 1 Year Upgrade
The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!
Chapter 1Introduction to Check Point Next Generation
Chapter 2 Installing and Configuring VPN-1/FireWall-1 Next Generation
Chapter 3Using the Graphical Interface
Chapter 4Creating a Security Policy
Chapter 5Applying Network Address Translation
Chapter 6Authenticating Users
Chapter 7Open Security (OPSEC) and Content Filtering
Chapter 8Managing Policies and Logs
Chapter 9Tracking and Alerts
Chapter 10Configuring Virtual Private Networks
Chapter 11Securing Remote Clients
Chapter 12Advanced Configurations