2/02/2010

Review of Firewall Policies and VPN Configurations [ILLUSTRATED] (Paperback)

I am sure that, I wouldn't have bought this book if someone had reviewed this book before me.
Briefly, if you are looking for a deep information on several brand firewall's configuration and especially onVPN subject, belive, this book is not for you.
The first half of the book is full of with just generic information which almost avery avarage IT people have. That is, whithin a few minutes you pass the first two part.
Than you decide your point on this book while reading the VPN part. No detail on the issues, no real time application samples and most important one completely wrong several figures.
For example, on page 247 figure 5.20 says "MPLS Packet Structure", but you see screen snapshot of Putty telnet application's configuration window. I honestly couldn't understand if they are joking or have another purpose.

My only advice, always prefer the books you can look inside it.

Product Description
A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security.

This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of their vulnerability and their complexity, VPN policies are covered in more depth with numerous tips for troubleshooting remote connections.

· The only book that focuses on creating policies that apply to multiple products.
· Included is a bonus chapter on using Ethereal, the most popular protocol analyzer, to monitor and analyze network traffic.
· Shows what features can be controlled by a policy, and walks you through the steps for writing the policy to fit the objective at hand

About the Author
Dale Liu, (MCSE Security, CISSP, MCT, IAM/IEM, CCNA) has been working in the computer and networking field for over 20 years. Dale's experience ranges from programming to networking to information security and project management. He currently teaches networking, routing and security classes, while working in the field performing security audits and infrastructure design for medium to large companies.



Click Here to see more reviews about: Firewall Policies and VPN Configurations [ILLUSTRATED] (Paperback)

No comments:

Post a Comment