Check Point Firewall-1 Administration and CCSA Study Guide
This all-in-one resource, an on-the-job reference, and an exam prep guide takes a hands-on installation and configuration approach that offers little documentation for system administrators on how to manage their firewall product. This book offers the CCSA-Check Point Certified Security Administrators certification. The last part of this guide will prepare system administrators to take and pass this exam. Sample questions will be included.
- Hardback | 384 pages
- 185.2 x 243.3 x 32.3mm | 925.34g
- 05 Nov 2001
- Pearson Education (US)
- Prentice Hall
- Upper Saddle River, United States
Table of contents
Preface. 1. Internetwork Security Overview. Summary.2. Security Threats. No User Training. Physical Security. Hacker's Toolbox. Summary.3. Policies and Procedures. Security Balance. Security Policy Development. Typical Security Policies. ABC & Co. Procedures. Nondisclosure Agreement. Physical Security Breach. Demand for Access. Computer/Information Theft. Internetworking Security Breach. Summary.4. Policing the Security Domain. Knowing Your Security Domain. Interesting Packets. Detecting Intrusion. Response. Summary.5. FireWall-1 Overview. Definition. Types of Firewall. FireWall-1 Overview. Summary.6. Architecture. Graphical User Interface. Distributed Enterprise Management. Firewall Module. Third-Party Integration-OPSEC. Virtual Private Network-VPN. Open Security Extension. Intrusion Detection. Load Balancing. High Availability. Reporting Module. Check Point Products. Summary.- 7. Installation and Setup. Windows NT. FireWall-1 Installation. Solaris. Solaris FireWall-1 Installation. Solaris GUI Client Installation. Nokia. Summary.8. Graphical User Interface. The Policy Editor GUI. The Log Viewer GUI. The System Status GUI. Summary.9. Object Creation and Management. Standards. Lab Network. Network Objects Manager. Domain Object. VLANs Tab. Services Objects Manager. Resources Objects Manager. Server Objects Manager. User Manager. Time Objects Manager. Navigating the Time Objects Window. Summary.10. Policy Properties. Security Policy Tab. Services Tab. Log and Alert Tab. Security Servers Tab. Authentication Tab. High Availability Tab. IP Pool NAT Tab. Access List. Desktop Security. Syn Defender. LDAP. Encryption. Connect Control. Summary.11. Rulebase. Rulebase Operation. Rulebase Development. Creating a New Rulebase. Navigating the Rulebase and Creating Rules. Installing and Uninstalling the Security Policy. Summary.12. Authentication. Authentication Schemes. Authentication Types. Authentication Implementation. Summary.13. Network Address Translation. Static Mode NAT. Hide Mode NAT. Issues with Network Address Translation. Summary.14. Practical Lab Exercises. LAB Network Configuration. Security Definitions. Firewall Object Definitions. Rulebase Definitions. Install the Rulebase. Test the Rulebase. Authentication. Solution. Network Address Translation. Summary. 15. Penetration Testing. Technique. Penetration of the Lab Network. Summary.16.Exam Preparation. Certification Plan. Answering Questions. What to Do If You Fail. Summary.17. CCSA Objective Essentials. FireWall-1 Architecture. System Requirements. Installation Process. GUI. Rulebase Construction. Rulebase Efficiency. Authentication. NAT. Policy Properties. Summary.Appendix. Exam 1. Exam 2. Exam 3. Correct Answers-Exam 1. Correct Answers-Exam 2. Correct Answers-Exam 3.
About Steven Dangerfield
STEVEN DANGERFIELD is a consulting internetwork security analyst currently working with a major U.K. telecommunications and Internet Service Provider. He has been working with FireWall-1 since its introduction and holds a number of industry certifications including Check Point's CCSA.