Flylib.com
Check Point NG[s]AI
Check Point NG[s]AI
ISBN: 735623015
EAN: N/A
Year: 2004
Pages: 149
BUY ON AMAZON
Table of Contents
BackCover
Check Point NGAI - Next Generation with Application Intelligence Security Administration
Foreword
Chapter 1: Introduction to Check Point Next Generation with Application Intelligence
Introducing the Check Point Next Generation with Application Intelligence Suite of Products
Understanding VPN-1FireWall-1 SVN Components
Looking at Firewall Technology
Complete SVN Concept
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 2: Installing and Configuring VPN-1FireWall-1 Next Generation with Application Intelligence
Before You Begin
Installing Check Point VPN-1FireWall-1 NG AI on Windows
Uninstalling Check Point VPN-1FireWall-1 NG on Windows
Installing Check Point VPN-1FireWall-1 NG AI on Solaris
Uninstalling Check Point VPN-1FireWall-1 NG AI on Solaris
Installing Check Point VPN-1FireWall-1 NG AI on Nokia
Installing Check Point VPN-1FireWall-1 NG AI on SecurePlatform
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 3: Using the Graphical Interface
Managing Objects
Adding Rules
Global Properties
SmartUpdate
SmartView Tracker
SmartView Status
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 4: Creating a Security Policy
Reasons for a Security Policy
How to Write a Security Policy
Implementing a Security Policy
Installing a Security Policy
Policy Files
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 5: Applying Network Address Translation
Hiding Network Objects
Configuring Static Address Translation
Automatic NAT Rules
NAT Global Properties
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 6: Authenticating Users
FireWall-1 Authentication Schemes
Defining Users
User Authentication
Client Authentication
Session Authentication
LDAP Authentication
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 7: Open Security (OPSEC) and Content Filtering
OPSEC Applications
Content Vectoring Protocol
URI Filtering Protocol
Application Monitoring
Client Side OPSEC Applications
Other Resource Options
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 8: Managing Policies and Logs
Administering Check Point VPN-1FW-1 NG AI for Performance
Administering Check Point VPN-1FW-1 NG AI for Effectiveness
Administering Check Point VPN-1FW-1 NG for Recoverability
Performing Advanced Administration Tasks
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 9: Tracking and Alerts
Alerts Commands
User-Defined Tracking
Suspicious Activities Monitoring Protocol (SAMP)
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 10: Configuring Virtual Private Networks
Encryption Schemes
Simplified-Mode vs. Traditional-Mode VPNs
Configuring an IKE VPN in Traditional Mode
Configuring an IKE VPN in Simplified Mode
Configuring a SecuRemote VPN
Installing SecuRemote Client Software
Using SecuRemote Client Software
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 11: Securing Remote Clients
Installing and Configuring a Policy Server
Desktop Security Options
Installing SecureClient Software
Logging into the Policy Server
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 12: Advanced VPN Configurations
Check Point High Availability and Check Point Load Sharing
Single Entry Point VPN Configurations
Multiple Entry Point VPN Configurations
Other High Availability Methods
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 13: SmartDefense
Understanding the Theory of SmartDefense
Using SmartDefense
Understanding Network Security
Understanding Application Intelligence
Updating SmartDefense
Summary
Solutions Fast Track
Frequently Asked Questions
Appendix A: Class C Subnet Mask Cheat Sheet
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
List of Illustations
List of Sidebars
Check Point NG[s]AI
ISBN: 735623015
EAN: N/A
Year: 2004
Pages: 149
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Oracle Advanced SELECT Options
Optimizing: The Crystal Reports Side
Optimizing: Reducing Parses
Data Dictionary Report
Appendix B Functions
Network Security Architectures
Confidentiality and Security Are Not the Same
Applied Knowledge Questions
Load Balancing
Expected Threats
Expected Threats
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Column Constraints
Adding Indexes to a Table
Client 1Connecting to the Server
Client 2Adding Error Checking
User Accounts
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity II
Cisco Secure IDS
Snort
NFR Security
Incident Response
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Starting Diagrams by Using Templates
Adding Text to Shapes and the Drawing Page
Inserting Pictures into Diagrams
Laying Out Office Spaces
Glossary
Java All-In-One Desk Reference For Dummies
Making Choices
Handling Exceptions
Using Recursion
Book VI - Swing
Book IX - Fun and Games
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies