Configuring Juniper Networks NetScreen & SSG firewalls /
Saved in:
Imprint: | Rockland, Mass. : Syngress Pub., ©2007. |
---|---|
Description: | 1 online resource (xiii, 743 pages) : illustrations |
Language: | English |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11157564 |
Table of Contents:
- Foreword
- Chapter 1. Networking, Security, and the Firewall
- Introduction
- Understanding Networking
- The OSI Model
- Moving Data along with TCP/IP
- Understanding Security Basics
- Understanding Firewall Basics
- Types of Firewalls
- Firewall Ideologies
- DMZ Concepts
- Traffic Flow Concepts
- Networks with and without DMZs
- DMZ Design Fundamentals
- Designing End-to-End Security for Data Transmission between Hosts on the Network
- Traffic Flow and Protocol Fundamentals
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 2. Dissecting the Juniper Firewall
- Introduction
- The Juniper Security Product Offerings
- Juniper Firewalls
- SSL VPN
- Intrusion Detection and Prevention
- Unified Access Control (UAC)
- The Juniper Firewall Core Technologies
- Zones
- Virtual Routers
- Interface Modes
- Policies
- VPN
- Intrusion Prevention
- Device Architecture
- The NetScreen and SSG Firewall Product Line
- Product Line
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 3. Deploying Juniper Firewalls
- Introduction
- Managing Your Juniper Firewall
- Juniper Management Options
- Administrative Users
- The Local File System and the Configuration File
- Using the Command Line Interface
- Using the Web User Interface
- Securing the Management Interface
- Updating ScreenOS
- System Recovery
- Configuring Your Firewall for the First Time
- Types of Zones
- Virtual Routers
- Types of Interfaces
- Configuring Security Zones
- Configuring Your Firewall for the Network
- Binding an Interface to a Zone
- Setting Up IP Addressing
- Configuring the DHCP Client
- Using PPPoE
- Interface Speed Modes
- Port Mode Configuration
- Bridge Groups
- Configuring Basic Network Routing
- Configuring System Services
- Setting the Time
- DHCP Server
- DNS
- SNMP
- Syslog
- Web Trends
- Resources
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 4. Policy Configuration
- Introduction
- Firewall Policies
- Theory of Access Control
- Types of Juniper Policies
- Policy Checking
- Getting Ready to Make a Policy
- Policy Components
- Zones
- Address Book Entries
- Services
- Creating Policies
- Creating a Policy
- Summary
- Solutions Fast Track
- Frequendy Asked Questions
- Chapter 5. Advanced Policy Configuration
- Introduction
- Traffic-Shaping Fundamentals
- The Need for Traffic Shaping
- How Traffic Shaping Works
- Choosing the Traffic-Shaping Type
- Deploying Traffic Shaping on Juniper Firewalls
- Methods to Enforce Traffic Shaping
- Traffic-Shaping Mechanics
- Traffic-Shaping Examples
- Advanced Policy Options
- Counting
- Scheduling
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 6. User Authentication
- Introduction
- User Account Types
- Authentication Users
- Internal Authentication Server
- Configuring the Local Authentication Server
- External Authentication Servers
- Policy-Based User Authentication
- Explanation of Policy-Based Authentication
- Configuring Policies with User Auth
- 802.1x Authentication
- Components of 802.1x
- Enhancing Authentication
- Firewall Banner Messages
- Group Expressions
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 7. Routing
- Introduction
- Virtual Routers
- Virtual Routers on Juniper Firewalls
- Routing Selection Process
- Equal Cost Multiple Path
- Virtual Router Properties
- Route Maps and Access Lists
- Route Redistribution
- Importing and Exporting Routes
- Static Routing
- Using Static Routes on Juniper Firewalls
- Routing Information Protocol
- RIP Overview
- RIP Informational Commands
- Open Shortest Path First
- Concepts and Terminology
- Configuring OSPF
- OSPF Informational Commands
- Border Gateway Protocol
- Overview of BGP
- Configuring BGP
- BGP Informational Commands
- Route Redistribution
- Redistributing Routes in the Juniper Firewall
- Redistributing Routes between Routing Protocols
- Redistributing Routes into BGP
- Policy-Based Routing
- Components of PBR
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 8. Address Translation
- Introduction
- Overview of Address Translation
- Port Address Translation
- Advantages of Address Translation
- Disadvantages of Address Translation
- Juniper NAT Overview
- Juniper Packet Flow
- Source NAT
- Interface-Based Source Translation
- MIP
- Policy-Based Source NAT
- Destination NAT
- Policy-Based Destination NAT
- Summary
- Links to Sites
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 9. Transparent Mode
- Introduction
- Interface Modes
- Understanding How Transport Mode Works
- Configuring a Device to Use Transport Mode
- Transparent Mode Deployment Options
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 10. Attack Detection and Defense
- Introduction
- Understanding Attacks
- Old Root Causes, New Attacks
- Unified Threat Management
- Vulnerability Databases
- Bug Databases
- Common Name Dictionary
- The Juniper Security Research Team
- Understanding the Anatomy of an Attack
- The Three Phases of a Hack
- Script Kiddies
- Black Hat Hackers
- Worms, Viruses, and Other Automated Malware
- Configuring Screen Settings
- UDP Data Rate Limiting
- TCP/IP Protocol Anomaly Detection
- Applying Deep Inspection
- Deep Inspection Concepts
- Deep Inspection Planning
- Getting the Database
- Using Attack Objects
- Setting Up Content Filtering
- Web Filtering
- Antivirus
- Antivirus Rules
- Understanding Application Layer Gateways
- Applying Best Practices
- Defense-in-Depth
- Zone Isolation
- Egress Filtering
- Explicit Permits, Implicit Denies
- Retain Monitoring Data
- Keeping Systems Updated
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 11. VPN Theory and Usage
- Introduction
- Understanding IPSec
- IPSec Modes
- Protocols
- Key Management
- Security Associations
- IPSec Tunnel Negotiations
- Phase 1.
- Phase 2.
- Public Key Cryptography
- PKI
- Certificates
- CRLs
- How to Use VPNs in NetScreen Appliances
- Site-to-Site VPNs
- Policy-Based VPNs
- Route-Based VPNs
- Dial-Up VPNs
- L2TP VPNs
- Advanced VPN Configurations
- VPN Monitoring
- Gateway Redundancy
- Back-to-Back VPNs
- Hub and Spoke VPNs
- Multitunnel Interfaces
- Summary
- Solutions Fast Track
- Links to Sites
- Mailing Lists
- Frequently Asked Questions
- Chapter 12. High Availability
- Introduction
- The Need for High Availability
- High-Availability Options
- Improving Availability Using NetScreen SOHO Appliances
- Failing Over between Interfaces
- Using Dual Untrust Interfaces to Provide Redundancy
- Falling Back to Dial-Up
- Restricting Policies to a Subset When Using the Serial Interface
- Using IP Tracking to Determine Failover
- Monitoring VPNs to Determine Failover
- Introducing the NetScreen Redundancy Protocol
- Virtualizing the Firewall
- Understanding NSRP States
- The Value of Dual HA Links
- Building an NSRP Cluster
- Connecting the Firewalls Directly to the Routers
- Connecting the Firewalls to Routers via Switches
- Cabling for a Full-Mesh Configuration
- Using Directly Connected HA Links
- Connecting HA Links via Switches
- Adding a NetScreen to an NSRP Cluster
- Synchronizing the Configuration
- Determining When to Fail Oven: The NSRP Ways
- Using NSRP Heartbeats
- Using Optional NSRP Monitoring
- Using NSRP Interface Monitoring
- Using NSRP Zone Monitoring
- Using NSRP IP Tracking
- Reading the Output from get nsrp
- Looking into an NSRP Cluster
- Using NSRP-Lite on Midrange Appliances
- Basic NSRP-Lite Usage
- Working with Local Interfaces in an NSRP-Lite Setup
- Creating Redundant Interfaces
- Taking Advantage of the Full NSRP
- Synchronizing State Using RTO Mirroring
- Setting Up an Active/Active Cluster
- Implementing a Full-Mesh Active/Active Setup
- Failing Over
- Failing Over Virtual Systems
- Avoiding the Split-Brain Problem
- Avoiding the No-Brain Problem
- Configuring HA through NSM
- Creating a Cluster
- Adding Members to the Cluster
- Configuring NSRP Parameters
- Configuring VSD
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 13. Troubleshooting the Juniper Firewall
- Introduction
- Troubleshooting Methodology
- Troubleshooting Tools
- Network Troubleshooting
- Debugging the Juniper Firewall
- Debugging NAT
- Debugging VPNs
- Policy-Based VPNs
- Route-Based VPNs
- Debugging NSRP
- Debugging Traffic Shaping
- NetScreen Logging
- Traffic
- Self
- Event
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 14. Virtual Systems
- Introduction
- What Is a Virtual System?
- Virtual System Components
- How Virtual Systems Work
- Classifying Traffic
- Virtual System Administration
- Configuring Virtual Systems
- Creating a Virtual System
- Network Interfaces
- Virtual System Profiles
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Index