Designing and Building Enterprise DMZs
Ido Dubrawsky, C. Tate Baumrucker, James Caesar, Mohan Krishnamurthy, Thomas W. Shinder, Becky Pinkard, Eric Seagren, Laura E. Hunter - Collection 4 Free Booklets Your Solutions Membership
Résumé
Some of the most complicated areas of network technology are designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. In this book, readers will learn the concepts and major design principles of all DMZs. Next, readers will learn how to configure the actual hardware that makes up DMZs for both newly constructed and existing networks. Then they will learn how to securely populate the DMZs with systems and services. The final section of the book deals with troubleshooting, maintaining, testing, and implementing security on the DMZ.
- Plan Your Network Security
Understand DMZ concepts, layout, and conceptual design. - Build a Windows DMZ
Use the check list to start your Windows DMZ implementation by covering network engineering, systems engineering, and security analysis. - Learn Sun Solaris DMZ Design
Determine what software is required to provide DMZ services with a Solaris system, including Check Point FireWall-1 and SunScreen Secure Net. - Build a Wireless DMZ
Understand how, with a bit of creativity, you can implement a WLAN DMZ using RADIUS, Cisco LEAP, or PEAP. - Review Cisco PIX and ASA Versions and Features
Secure network perimeters using PIX/ASA. - Use Check Point to Secure Your Network Perimeter
Use SmartDefense to protect your network from multiple types of attacks, including DoS attacks. - Review the Features of Juniper NetScreen
NetScreen has a variety of options to implement: deep inspection (DI) technology, SecureOS, and features such as Web filtering and antivirus scanning. - Configure ISA 2004 as an Enterprise Network Services Segment Perimeter Firewall
See how the ISA firewall can act in a number of roles: a front-end edge firewall that sits in front of a whole company or as a back-end firewall located behind another edge firewall. - Secure the Router and Switch
Don't overlook hardening the routers or switches supporting the DMZ. - Review DMZ-Based VPN Services
See how VPN services in the DMZ can be designed to provide connectivity to two primary groups of users: business partners and remote users. - Configure Bastion Hosts
See how to configure your bastion host as a Web server.
L'auteur - Ido Dubrawsky
Ido Dubrawsky is a Network Security Architect at Cisco Systems, working on the SAFE Architecture team.
L'auteur - Thomas W. Shinder
Thomas W. Shinder et Debra Littlejohn Shinder (MCSE, MCP
+ I, MCT) sont specialistes des technologies Microsoft.
Tous deux formateurs, ils interviennent en tant que
consultants aupres des plus grandes entreprises de Dallas
(dont Xerox, Lucent Technologies, Fina Oil).
Thomas W. Shinder (MCSE, MCP+I, MCT) est spécialiste des
technologies Microsoft.
Formateur, il intervient en tant que consultant auprès des
plus grandes entreprises de Dallas (dont Xerox, Lucent
Technologies, Fina Oil).
Sommaire
- DMZ Concepts, Layout, and Conceptual Design
- Windows DMZ Design.
- Sun Solaris DMZ Design
- Wireless DMZs
- Implementing Wireless DMZs
- Firewall Design: Cisco PIX and ASA
- Firewall and DMZ Design: Check Point
- Firewall and DMZ Design: SecurePlatform and Nokia Firewalls
- Firewall and DMZ Design: Juniper NetScreen.
- Firewall and DMZ Design: ISA Server 2005
- DMZ Router and Switch Security
- DMZ-Based VPN Services
- Windows Bastion Hosts
- Linux Bastion Hosts
- Appendix A Intrusion Detection in the DMZ
- Appendix B Testing the DMZ
- Appendix C IIS Web Server Hardening
- Appendix D Apache Web Server Hardening.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Syngress |
Auteur(s) | Ido Dubrawsky, C. Tate Baumrucker, James Caesar, Mohan Krishnamurthy, Thomas W. Shinder, Becky Pinkard, Eric Seagren, Laura E. Hunter |
Collection | 4 Free Booklets Your Solutions Membership |
Parution | 15/09/2006 |
Nb. de pages | 714 |
Format | 18 x 23 |
Couverture | Broché |
Poids | 1035g |
Intérieur | Noir et Blanc |
EAN13 | 9781597491006 |
ISBN13 | 978-1-59749-100-6 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Conception et architectures réseau
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau