In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs).
You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security.
Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls.
Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall.
1 Firewalls : what are they?
2 Type of firewall security policy
3 Firewall types
4 Choosing the right firewall
5 Defense in depth : firewall topologies
6 Installation preparation
7 Firewall configuration
8 Simple policy implementation
9 Complex Web services management
10 Content filtering
etc.