Designing and Building Enterprise DMZs
Hal Flynn
- 出版商: Syngress Media
- 出版日期: 2006-12-06
- 售價: $2,410
- 貴賓價: 9.5 折 $2,290
- 語言: 英文
- 頁數: 737
- 裝訂: Paperback
- ISBN: 1597491004
- ISBN-13: 9781597491006
已過版
買這商品的人也買了...
-
$780$616 -
$1,127Computer Architecture: From Microprocessors To Supercomputers (Hardcover)
-
$880$695 -
$760$646 -
$880$581 -
$680$340 -
$490$417 -
$650$514 -
$780$741 -
$450$405 -
$480$408 -
$550$468 -
$270$213 -
$980$774 -
$420$399 -
$450$356 -
$480$379 -
$420$332 -
$590$466 -
$400$360 -
$520$411 -
$550$495 -
$690$587 -
$750$713 -
$780$702
相關主題
商品描述
Some of the most complicated areas of network technology are designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. In this book, readers will learn the concepts and major design principles of all DMZs. Next, readers will learn how to configure the actual hardware that makes up DMZs for both newly constructed and existing networks. Then they will learn how to securely populate the DMZs with systems and services. The final section of the book deals with troubleshooting, maintaining, testing, and implementing security on the DMZ.
· Plan Your Network Security
Understand DMZ concepts, layout, and conceptual design.· Build a Windows DMZ
Use the check list to start your Windows DMZ implementation by covering network engineering, systems engineering, and security analysis.· Learn Sun Solaris DMZ Design
Determine what software is required to provide DMZ services with a Solaris system, including Check Point FireWall-1 and SunScreen Secure Net.· Build a Wireless DMZ
Understand how, with a bit of creativity, you can implement a WLAN DMZ using RADIUS, Cisco LEAP, or PEAP.· Review Cisco PIX and ASA Versions and Features
Secure network perimeters using PIX/ASA.· Use Check Point to Secure Your Network Perimeter
Use SmartDefense to protect your network from multiple types of attacks, including DoS attacks.· Review the Features of Juniper NetScreen
NetScreen has a variety of options to implement: deep inspection (DI) technology, SecureOS, and features such as Web filtering and antivirus scanning.· Configure ISA 2004 as an Enterprise Network Services Segment Perimeter Firewall
See how the ISA firewall can act in a number of roles: a front-end edge firewall that sits in front of a whole company or as a back-end firewall located behind another edge firewall.· Secure the Router and Switch
Don’t overlook hardening the routers or switches supporting the DMZ.· Review DMZ-Based VPN Services
See how VPN services in the DMZ can be designed to provide connectivity to two primary groups of users: business partners and remote users.· Configure Bastion Hosts
See how to configure your bastion host as a Web server.