| | Copyright |
| | About the Authors |
| | About the Technical Reviewers |
| | Acknowledgments |
| | Icons Used in This Book |
| | Command Syntax Conventions |
| | Introduction |
| | Part I: Introduction to Firewalls |
| | | Chapter 1. Introduction to Firewalls |
| | | What Is a Firewall? |
| | | What Can Firewalls Do? |
| | | What Are the Threats? |
| | | What Are the Motives? |
| | | Security Policies |
| | | Determining If You Need a Firewall |
| | | Summary |
| | | Chapter 2. Firewall Basics |
| | | Firewall Taxonomy |
| | | Firewall Products |
| | | Firewall Technologies |
| | | Open and Closed Source Firewalls |
| | | Summary |
| | | Chapter 3. TCP/IP for Firewalls |
| | | Protocols, Services, and Applications |
| | | Internet Protocol (IP) |
| | | Transmission Control Protocol (TCP) |
| | | User Datagram Protocol (UDP) |
| | | Internet Control Message Protocol (ICMP) |
| | | Addressing in IP Networks |
| | | Network Address Translation (NAT) |
| | | Broadcast and Multicast |
| | | IP Services |
| | | IP Routing |
| | | Applications Using IP |
| | | Summary |
| | Part II: How Firewalls Work |
| | | Chapter 4. Personal Firewalls: Windows Firewall and Trend Micro's PC-cillin |
| | | Windows Firewall and Windows XP |
| | | Trend Micro's PC-cillin Firewall Feature |
| | | Summary |
| | | Chapter 5. Broadband Routers and Firewalls |
| | | How Broadband Routers and Firewalls Work |
| | | Linksys Broadband Routers/Firewalls |
| | | Linksys Requirements |
| | | How the Linksys Router/Firewall Works |
| | | Configuring Linksys |
| | | Linksys Checklist |
| | | Summary |
| | | Chapter 6. Cisco PIX Firewall and ASA Security Appliance |
| | | PIX/ASA Features |
| | | Choosing Between the PIX and the ASA |
| | | Cisco PIX Firewall and ASA Models |
| | | How the PIX/ASA Firewall Works |
| | | Configuring the Cisco PIX/ASA |
| | | PIX/ASA Checklist |
| | | Summary |
| | | Chapter 7. LinuxBased Firewalls |
| | | NetFilter Features |
| | | NetFilter Requirements |
| | | How NetFilter Works |
| | | Configuring NetFilter |
| | | NetFilter Checklist |
| | | Summary |
| | | Chapter 8. Application Proxy Firewalls |
| | | Application Layer Filtering |
| | | Proxy Server Functionality |
| | | Limitations of Application Proxy Firewalls |
| | | Microsoft ISA Server 2004 Firewall |
| | | Summary |
| | | Chapter 9. Where Firewalls Fit in a Network |
| | | Different Types of Office Requirements |
| | | Single-Firewall Architectures |
| | | Dual-Firewall Architecture |
| | | The Firewall System |
| | | Where Personal/Desktop Firewalls Fit in a Network |
| | | Where Application Firewalls Fit in a Network |
| | | Firewalls and VLANs |
| | | Using Firewalls to Segment Internal Resources |
| | | High-Availability Firewall Designs |
| | | Summary |
| | Part III: Managing and Maintaining Firewalls |
| | | Chapter 10. Firewall Security Policies |
| | | Written Security Policies |
| | | Firewall Policies/Rulesets |
| | | Summary |
| | | Chapter 11. Managing Firewalls |
| | | Default Passwords |
| | | Maintaining the Underlying Platform |
| | | Firewall Management Interface |
| | | Management Access |
| | | Common Firewall Management Tasks |
| | | Summary |
| | | Chapter 12. What Is My Firewall Telling Me? |
| | | Firewalls and Logging |
| | | Firewall Log Review and Analysis |
| | | Firewall Forensics |
| | | Summary |
| | | Chapter 13. Troubleshooting Firewalls |
| | | Developing a Troubleshooting Checklist |
| | | Basic Firewall Troubleshooting |
| | | Advanced Firewall Troubleshooting |
| | | Troubleshooting Example |
| | | Summary |
| | | Chapter 14. Going Beyond Basic Firewall Features |
| | | Content Filtering |
| | | Performing Application Filtering |
| | | Intrusion Detection and Prevention |
| | | Virtual Private Networks |
| | | Summary |
| | | Endnotes |
| | Part IV: Appendixes |
| | | Appendix A. Firewall and Security Tools |
| | | Common Troubleshooting Tools |
| | | Logging and Log-Analysis Tools |
| | | Security-Testing Tools |
| | | Appendix B. Firewall and Security Resources |
| | | Firewall-Specific Information |
| | | General Security Information |
| | | Additional Reading |
| | Index |