Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform.
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform.
Artikelnr. des Verlages: B978-1-59749-118-1.X5000-X
Seitenzahl: 768
Erscheinungstermin: 25. Januar 2007
Englisch
Abmessung: 236mm x 186mm x 45mm
Gewicht: 1523g
ISBN-13: 9781597491181
ISBN-10: 1597491187
Artikelnr.: 20927997
Herstellerkennzeichnung
Libri GmbH
Europaallee 1
36244 Bad Hersfeld
gpsr@libri.de
Autorenporträt
Rob Cameron (JNCIS-FWV, JNCIA-M, CCSP, CCSE+) is a Security Solutions Engineer for Juniper Networks. He currently works to design security solutions for Juniper Networks that are considered best practice designs. Rob specializes in network security architecture, firewall deployment, risk management, and high-availability designs. His background includes five years of security consulting for more than 300 customers. This is Rob's second book; the previous one being Configuring NetScreen Firewalls (ISBN: 1-932266-39-9) published by Syngress Publishing in 2004.
Inhaltsangabe
1: Networking and Security 2: Dissecting the NetScreen Firewall 3: Deploying NetScreen Firewalls 4: Policy Configuration 5: Advanced Policy Configuration 6: User Authentication 7: Routing 8: Address Translation 9: Transparent Mode 10: Attack Detection and Defense 11: VPN Usage and Theory 12: Virtual Systems 13: HA 14: Troubleshooting