Essential Check Point Firewall-1™
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Business applications > Essential Check Point Firewall-1™: An Installation, Configuration, and Troubleshooting Guide
Essential Check Point Firewall-1™: An Installation, Configuration, and Troubleshooting Guide

Essential Check Point Firewall-1™: An Installation, Configuration, and Troubleshooting Guide


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

"Dameon?s knowledge of FireWall-1, which in many cases has surpassed the knowledge of Check Point?s own engineers, hasalways impressed me. This book is yet another proof of Dameon?sdeep understanding of FireWall-1?s internals as well as itsimplementation methodologies. I strongly recommend this book to anyFireWall-1 user who wishes to master the product." Nir Zuk,CTO, OneSecure, Inc. Formerly, Principal Engineer at Check PointSoftware"This book is a fabulous resource for running FireWall-1reliably and securely. It?s the single best source ofinformation I?ve ever seen on how to map security and businessrequirements into FW-1 rules and configurations. The hordes of sampleconfigurations are the best way to demonstrate the advice andexplanations in practice. If you?re using FireWall-1, you needthis book." Tina Bird, Security Architect at CounterpaneInternetSecurity and moderator of the Virtual Private Networks mailinglist"FireWall-1 is a critical security application, more widelyused than any other by far, that relies on proper configuration andusage to be effective. Dameon?s book can be counted as thedefinitive reference required reading for anyone using CheckPoint?s FireWall-1 security software." Kelly Robertson,Senior Sales Engineering Manager for Nokia InternetCommunicationsPacked with practical, hands-on techniques, thisinsider?s guide explains how to build, implement, and maintainthe world?s best-selling firewall product, Check PointFireWall-1. Featuring tools, tips, and checklists not found in othersources, the book brings manageability, reliability, and efficiency totoday?s standalone or distributed networks.Essential Check Point FireWall-1 coversevery major feature of the product providing working solutions toreal-world situations. Filled with screen shots and sampleconfigurations, the book features step-by-step instructions that canbe replicated on standard equipment easily. Developed through years ofactual product support, this guidebook is an invaluable resource fornetwork professionals working on UNIX or Windows NT platforms.Key coverage includes:Firewall overview; planning,installation, and deployment of firewall security Building arulebase and using the Policy Editor applicationLogging andalertingManaging multiple firewall modules from a singlemanagement consoleAuthentication and security issuesAddressingtranslation (NAT) why it? s important and how it?sconfigured within FireWall-1Encryption (site-to-site andclient-to-site Virtual Private Networks)INSPECT an overviewof the language at the heart of FireWall-1Authoritative andpractical, this comprehensive guidebook provides real-world solutionsand techniques necessary for planning, installing, and deploying theworld?s leading firewall product. 0201699508B10172001

Table of Contents:
Foreword. Preface. 1. Introduction to FireWalls. What is a Firewall? What a Firewall Cannot Do. Overview of Firewall Security Technologies. Packet Filters. Application Proxies. Stateful Inspection. Technology Comparison: Passive FTP. Technology Comparison: Traceroute. What Kind of Firewall is FireWall-1? Do You Really Need FireWall-1? More Information. 2. Planning your FireWall Installation. Network Topology. A Word about Subnetting. Developing a Site-Wide Security Policy. The What, Who, and How. Implementing Firewalls Without a Written Security Policy. An Example Security Policy. Fun with Check Point Licensing. Node-Limited Firewall Licenses. Single Gateway Products. Inspection Module. FireWall-1 Host. Management Console. Motif GUI Licenses. Small Office Products. Getting Licenses. Summary. 3. Installing FireWall-1. Selecting an Operating System. Windows NT. Sparc Solaris. x86 Solaris. AIX and HPUX. Nokia Security Platform (IPSO). Linux. Installing the Operating System. Preparing for the OS Installation. Guidelines for OS Installation. Securing the Operating System. Installing FireWall-1. Unix-Based Systems. Windows NT/2000. Summary. 4. Building Your Rulebase. The Management GUIs. Configuring a Management User. Configuring IPs to run the GUIs from. What Files the GUI Modifies. Security Policy Editor Restrictions. GUI Demonstration Mode. Rulebase Components.@AHEADS = Objects. Anti-Spoofing. Policy Properties. Rules. Order of Operations. Making Your First Rulebase. Knowing Your Network. Defining Your Objects. Determining Your Policy. Rules That Should Be In Every Rulebase. Installing the Policy. Frequently Asked Questions. 5. Logging and  Alerting. The System Status Viewer. The Log Viewer. Viewing Logs from the Command Line. Active Mode and Blocking Connections. Alerts. Messages in the Log. Log Maintenance. 6. Remote Management. The Components. The Management GUIS. Configuring a User. Configuring IPs to run from. What Files the GUIs Modify. Security Policy Editor Restrictions. GUI Demonstration Mode. The Management Console to Firewall Module Connection. control.map file. How Do the Different Authentication Schemes Work? The fw putkey Command. Establishing an Authenticated Control Connection. Special Remote Management Conditions. What Can You DO With Remote Management. Control Policy on Firewall Module. View State Tables of Firewall Modules. Suspicious Activity Monitoring. Updating Licenses. Moving Management Consoles. Moving a Firewall Module off the Management Console. Moving the Management Console off a Firewall Module. Troubleshooting Remote Management Issues. GUI Issues. Firewall/Management Module Issues. Labs. 7. Authentication. Passwords. FireWall-1 Password. OS Password. S/Key. SecurID. Axent Pathways Defender. RADIUS. TACACS / TACACS+. LDAP. How Users Authenticate. User Authentication. Session Authentication. Client Authentication. Which Type Should You Choose? Setting Up Authentication. Creating Users. Setting Supported Authentication Schemes. User Authentication. Session Authentication. Client Authentication. Integrating External Authentication Servers. FAQs. Troubleshooting Authentication Issues. 8. Content Security. The Security Servers.@AHEADS = A Word About Licensing. CVP and UFP. Resources and Wildcards. HTTP Security Server. Filtering HTTP Without a UFP or CVP Server. UFP with the HTTP Security Server. CVP with the HTTP Security Server. FTP Security Server. SMTP Security Server.@AHEADS = $FWDIR/conf/smtp.conf. SMTP Resources. TCP Security Server. Frequently Asked Questions. General Security ServerQuestions. FTP Security Server. SMTP Security Server. HTTP Security Server. Performance Tuning for the Security Servers. Troubleshooting Content Security Issues. 9. Network Address Translation. Introduction. RFC-1918. How NAT Works in FireWall-1. Order of Operations. Implementing NAT: A Step-by-Step Example. Determine which IP addresses will be used. Proxy ARPs. Static Host Routes. Network Objects. Anti-Spoofing. Security Policy Rules. Address Translation Rules. Limitations of NAT. Dual NAT. Binding the NATted IP Address to the Loopback Interface. Troubleshooting. ARPs. SYN Packets with No Response. SYN Followed by RST. Summary. 10. Encryption (Site-to-Site VPNs). Introduction to VPNs. Concepts. Encryption. Encryption Key. Symmetric Encryption. Asymmetric Encryption. Certificate Authority. Diffe-Hellman. Encryption Domain.. A Word About Licensing. Supported Key Management and Encryption Schemes.@AHEADS = FWZ. IPSec. Manual IPSec. SKIP. IKE (ISAKMP/OAKLEY). How to Configure Encryption.@AHEADS = Planning Your Deployment. IKE. Manual IPSEC. SKIP and FWZ. Gateway Clusters and High Availability VPNs. FAQs. Troubleshooting VPN Problems. Summary. Labs. Q and A. 11. SecuRemote and Secure Client (Client to FireWall-1 VPNs). Introduction. A Word About Licensing. Steps to Configure SecuRemote on FireWall-1. Choosing an Encryption Scheme. Configuring Firewall Object for SecuRemote. Creating Users for use with SecuRemote. Client Encryption Rules. Desktop Security Options. Installing Secure Client. High Availability and Multiple-Entry Point Configurations. Hybrid Authentication Mode for IKE. FAQs. Troubleshooting. 12. High Availability. What is High Availability. State Synchronization. HA Solutions. Stonebeat. Rainfinity. Nokia. Check Point's HA Module. Issues with High Availability. Licensing. Managing Multiple Firewalls. Load Balancing. Asymmetric Routing. 13. Inspect. What is INSPECT? Basic INSPECT Syntax. Conditions. Constants. Registers. Manipulating Table Entries. Creating Your Own Tables. How Your Rulebase is Turned into INSPECT. Services of Type Other. Sample INSPECT Code. Allowing Outbound Connections to a SecuRemote Client. PPTP. Allowing a Connection Based on a Previous Connection. HTTP. Ping and Traceroute. Default filter. fw monitor. Appendix A: Securing Your Bastion Host. Appendix B: firewall-1.conf File for Use with OpenLDAP v1. Appendix C: firewall1.schema File for Use with OpenLDAP v2. Appendix D: Complete Program for Stateful Inspection of HTTP. Appendix E: Complete Program for Stateful Inspection of Ping and Traceroute. Appendix F: NSPECT Script for Different Policies on Different Interfaces. Appendix G: Sample defaultfilter.pf file. Appendix H: Sample Internet Usage Policy. Appendix I: Performance Tuning. Appendix J: Other Resources. Appendix K: Further Reading. Index. 0201699508T05222001

About the Author :
Dameon D. Welch-Abernathy, a.k.a. "PhoneBoy," has been supporting, deploying, and teaching Check Point™ FireWall-1® since 1996. He has assisted and instructed thousands of network professionals and currently maintains the largest industry FAQ site on FireWall-1® NG at http://blog.phoneboy.com/. Dameon works for Product Line Support at Nokia. 0201699508AB10212003


Best Sellers


Product Details
  • ISBN-13: 9780201699500
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Addison Wesley
  • Height: 235 mm
  • No of Pages: 544
  • Sub Title: An Installation, Configuration, and Troubleshooting Guide
  • Width: 186 mm
  • ISBN-10: 0201699508
  • Publisher Date: 02 Nov 2001
  • Binding: Paperback
  • Language: English
  • Spine Width: 23 mm
  • Weight: 815 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Essential Check Point Firewall-1™: An Installation, Configuration, and Troubleshooting Guide
Pearson Education (US) -
Essential Check Point Firewall-1™: An Installation, Configuration, and Troubleshooting Guide
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Essential Check Point Firewall-1™: An Installation, Configuration, and Troubleshooting Guide

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!