CheckPoint NG VPN 1/Firewall 1: Advanced Configuration and TroubleshootingCheck Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announced a ground-breaking user interface that meets the industry's next generation Internet security requirements, including simplified security management for increasingly complex environments. Built upon Check Point's Secure Virtual Network (SVN) architecture, the Next Generation User Interface revolutionizes the way security administrators define and manage enterprise security by further integrating management functions into a security dashboard and creating a visual picture of security operations. The Next Generation User Interface delivers unparalleled ease-of-use, improved security and true end-to-end security management. Check Point's revenues have more than doubled in each of the last two years, while capturing over 50% of the VPN market and over 40% of the firewall market according to IDC Research. The explosive growth of the company is further evidenced by over 29,000 IT professionals becoming Check Point Certified so far. This book will be the complimentary to Syngress' best-selling Check Point Next Generation Security Administration, which was a foundation-level guide to installing and configuring Check Point NG. This book will assume that readers have already mastered the basic functions of the product and they now want to master the more advanced security and VPN features of the product. Written by a team of Check Point Certified Instructors (the most prestigious Check Point certification) this book will provide readers with a complete reference book to Check Point NG and advanced case studies that illustrate the most difficult to implement configurations. Although not a Study Guide, this book will cover all of the objectives on Check Point's CCSE Exam. · The reader will learn to design and configure a Virtual Private Network (VPN). · The reader will learn to configure Check Point NG for High Availability (HA), which is the ability of a system to perform its function continuously (without interruption) for a significantly longer period of time than the reliabilities of its individual components would suggest. · The reader will learn to use SeucureUpdate, which allows them to perform simultaneous, secure, enterprise-wide software updates. |
Contents
1 | |
23 | |
Chapter 3 Advanced Authentication | 61 |
Chapter 4 Advanced VPN Concepts | 125 |
Chapter 5 Advanced VPN Client Installations | 157 |
Chapter 6 High Availability and Clustering | 191 |
Chapter 7 SecurePlatform | 305 |
Chapter 8 SmartCenter Management Server High Availability and Failover and SMART Clients | 349 |
Chapter 10 SecureClient Packaging Tool | 401 |
Chapter 11 SmartDefense | 425 |
Chapter 12 SmartUpdate | 467 |
Chapter 13 Performance Pack | 477 |
Chapter 14 UserAuthority | 493 |
Chapter 15 Firewall Troubleshooting | 547 |
577 | |
Related Titles | 608 |
Other editions - View all
Common terms and phrases
Active Directory administrators allows attack authentication Automatic backup button bytes certificate Check Point choose cluster members cluster object ClusterXL command line configuration connections create database default defined domain controller enable encryption enforcement module enforcement point example Expert@cpmodule failover filter firewall FireWall-1 gateway host install interface Internet IP address LDAP license load sharing load-sharing MAC address management server management station manually menu mode multicast Nokia cluster OPSEC option packet password Performance Pack Policy Server port protocol query RADIUS remote route router Rule Base schema screen SecuRemote SecurePlatform security policy security server shown in Figure SMART Clients SmartCenter SmartDashboard SmartDefense SmartUpdate SmartView Monitor SmartView Status SmartView Tracker SMTP solution SYN Attack TACACS topology traffic update upgrade UserAuthority Server VRRP Web server WebAccess window
Popular passages
Page v - Miller, Jane Mackay, and Marie Skelly at Jackie Gross & Associates for all their help and enthusiasm representing our product in Canada. Lois Fraser, Connie McMenemy, Shannon Russell and the rest of the great folks at Jaguar Book Group for their help with distribution of Syngress books in Canada.
Page i - With more than 1,500,000 copies of our MCSE, MCSD, CompTIA, and Cisco study guides in print, we continue to look for ways we can better serve the information needs of our readers. One way we do that is by listening. Readers like yourself have been telling us they want an Internet-based service that would extend and enhance the value of our books. Based on reader feedback and our own strategic plan, we have created a Web site that we hope will exceed your expectations. Solutions@syngress.com is an...
Page v - Rhodes and the team at Callisma for their invaluable insight into the challenges of designing, deploying and supporting worldclass enterprise networks. Karen Cross, Lance Tilford, Meaghan Cunningham, Kim Wylie, Harry Kirchner, Kevin Votel, Kent Anderson...
Page xi - He began his career working as a programmer writing code for Cisco IOS, implementing minor routing protocols, and performing software QA on their routers. Kyle earned a bachelor's of Science in Computer Science from the University of Maryland, College Park. He is a...
References to this book
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks R.R. Brooks Limited preview - 2004 |