Flylib.com
Check Point NG[s]AI
Check Point NG[s]AI
ISBN: 735623015
EAN: N/A
Year: 2004
Pages: 149
BUY ON AMAZON
Table of Contents
BackCover
Check Point NGAI - Next Generation with Application Intelligence Security Administration
Foreword
Chapter 1: Introduction to Check Point Next Generation with Application Intelligence
Introducing the Check Point Next Generation with Application Intelligence Suite of Products
Understanding VPN-1FireWall-1 SVN Components
Looking at Firewall Technology
Complete SVN Concept
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 2: Installing and Configuring VPN-1FireWall-1 Next Generation with Application Intelligence
Before You Begin
Installing Check Point VPN-1FireWall-1 NG AI on Windows
Uninstalling Check Point VPN-1FireWall-1 NG on Windows
Installing Check Point VPN-1FireWall-1 NG AI on Solaris
Uninstalling Check Point VPN-1FireWall-1 NG AI on Solaris
Installing Check Point VPN-1FireWall-1 NG AI on Nokia
Installing Check Point VPN-1FireWall-1 NG AI on SecurePlatform
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 3: Using the Graphical Interface
Managing Objects
Adding Rules
Global Properties
SmartUpdate
SmartView Tracker
SmartView Status
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 4: Creating a Security Policy
Reasons for a Security Policy
How to Write a Security Policy
Implementing a Security Policy
Installing a Security Policy
Policy Files
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 5: Applying Network Address Translation
Hiding Network Objects
Configuring Static Address Translation
Automatic NAT Rules
NAT Global Properties
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 6: Authenticating Users
FireWall-1 Authentication Schemes
Defining Users
User Authentication
Client Authentication
Session Authentication
LDAP Authentication
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 7: Open Security (OPSEC) and Content Filtering
OPSEC Applications
Content Vectoring Protocol
URI Filtering Protocol
Application Monitoring
Client Side OPSEC Applications
Other Resource Options
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 8: Managing Policies and Logs
Administering Check Point VPN-1FW-1 NG AI for Performance
Administering Check Point VPN-1FW-1 NG AI for Effectiveness
Administering Check Point VPN-1FW-1 NG for Recoverability
Performing Advanced Administration Tasks
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 9: Tracking and Alerts
Alerts Commands
User-Defined Tracking
Suspicious Activities Monitoring Protocol (SAMP)
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 10: Configuring Virtual Private Networks
Encryption Schemes
Simplified-Mode vs. Traditional-Mode VPNs
Configuring an IKE VPN in Traditional Mode
Configuring an IKE VPN in Simplified Mode
Configuring a SecuRemote VPN
Installing SecuRemote Client Software
Using SecuRemote Client Software
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 11: Securing Remote Clients
Installing and Configuring a Policy Server
Desktop Security Options
Installing SecureClient Software
Logging into the Policy Server
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 12: Advanced VPN Configurations
Check Point High Availability and Check Point Load Sharing
Single Entry Point VPN Configurations
Multiple Entry Point VPN Configurations
Other High Availability Methods
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 13: SmartDefense
Understanding the Theory of SmartDefense
Using SmartDefense
Understanding Network Security
Understanding Application Intelligence
Updating SmartDefense
Summary
Solutions Fast Track
Frequently Asked Questions
Appendix A: Class C Subnet Mask Cheat Sheet
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
List of Illustations
List of Sidebars
Check Point NG[s]AI
ISBN: 735623015
EAN: N/A
Year: 2004
Pages: 149
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Intrusion Detection Systems
Cryptography
How ExamGear Special Edition Works
Installing ExamGear Special Edition
U.S. Government Restricted Rights
Metrics and Models in Software Quality Engineering (2nd Edition)
Relations Diagram
Reliability and Predictive Validity
In-Process Metrics and Reports
Dos and Donts of Software Process Improvement
Concluding Remarks
101 Microsoft Visual Basic .NET Applications
Building Windows Forms User Interfaces
Building Web Applications
Advanced .NET Framework
Building Enterprise Services Applications
COM Interop/PInvoke
Special Edition Using Crystal Reports 10
Introduction
Adding Objects to and from the Repository
Setting Report Options
Ad-Hoc Application and Excel Plug-in for Ad-Hoc and Analytic Reporting
Review of SQL Commands
Microsoft VBScript Professional Projects
Scheduling Disk Maintenance
Developing a Setup Script
Archive Management
Building the Registration and Configuration Settings Page
Report Distribution and Remote Archive Management
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Getting Visio and Diagram Help
Formatting Individual Shapes
Changing the Layout of Connected Shapes
Importing Data to Create Organization Charts
Adding Door, Window, and Furniture Shapes to Office Layouts
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies