Configuring Juniper Networks NetScreen and SSG Firewalls
By Rob Cameron, Chris Cantrell, Anne Hemni and Lisa Lorenzin
()
About this ebook
- Configure Juniper’s Instant Virtual Extranet (IVE)
- Install and set up IVE through either the command line interface (CLI) or Web-based console
- Master the "3 Rs": Realms, Roles, and Resources
- Realize the potential of the "3Rs" for endpoint security, sign-in policies, and authorization of servers
- Get Inside both the Windows and Java Versions of Secure Application Manager (SAM)
- Learn to implement SAM, manage the end-user experience, and troubleshoot SAM in the field
- Integrate IVE with Terminal Services and Citrix
- Enable terminal services proxy and configure role options, configure Citrix using a custom ICA, configure terminal services resource policies and profiles, and configure terminal services and Citrix using a hosted Java applet
- Ensure Endpoint Security
- Use Host Checker, Cache Cleaner, Secure Virtual Workspace, and IVE/IDP integration to secure your network
- Manage the Remote Access Needs of Your Organization
- Configure Web access, file access and telnet/SSH access for remote users and offices
- Configure Core Networking Components through the System Menu
- Create clusters, manage virtual systems, and monitor logs, reports, and alerts
- Create Bullet-Proof Sign-in Policies
- Create standard and custom sign-in pages for both user and administrator access and Secure Meeting pages
- Use the IVE for Log-Related Tasks
- Perform log filtering, log management, syslog exporting, SNMP management, and system resource monitoring and reporting.
Rob Cameron
Rob Cameron (JNCIS-FWV, JNCIA-M, CCSP, CCSE+) is a Security Solutions Engineer for Juniper Networks. He currently works to design security solutions for Juniper Networks that are considered best practice designs. Rob specializes in network security architecture, firewall deployment, risk management, and high-availability designs. His background includes five years of security consulting for more than 300 customers. This is Rob’s second book; the previous one being Configuring NetScreen Firewalls (ISBN: 1-932266-39-9) published by Syngress Publishing in 2004.
Read more from Rob Cameron
Juniper(r) Networks Secure Access SSL VPN Configuration Guide Rating: 5 out of 5 stars5/5Configuring Juniper Networks NetScreen & SSG Firewalls Rating: 0 out of 5 stars0 ratingsConfiguring NetScreen Firewalls Rating: 0 out of 5 stars0 ratings
Related to Configuring Juniper Networks NetScreen and SSG Firewalls
Related ebooks
Configuring NetScreen Firewalls Rating: 0 out of 5 stars0 ratingsPfsense Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsCisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity Rating: 3 out of 5 stars3/5Secure Your Network for Free Rating: 0 out of 5 stars0 ratingsHow to Cheat at Microsoft Vista Administration Rating: 0 out of 5 stars0 ratingsManaging Cisco Network Security Rating: 3 out of 5 stars3/5Microsoft Forefront Security Administration Guide Rating: 0 out of 5 stars0 ratingsHow to Cheat at Securing Linux Rating: 0 out of 5 stars0 ratingsSecurity+ Study Guide Rating: 0 out of 5 stars0 ratingsCheck Point NGX R65 Security Administration Rating: 0 out of 5 stars0 ratingsCisco Security Professional's Guide to Secure Intrusion Detection Systems Rating: 0 out of 5 stars0 ratingsDesigning and Building Enterprise DMZs Rating: 0 out of 5 stars0 ratingsPenetration Testing with Raspberry Pi Rating: 5 out of 5 stars5/5Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network Rating: 0 out of 5 stars0 ratingsHow to Cheat at VoIP Security Rating: 0 out of 5 stars0 ratingsMobile Malware Attacks and Defense Rating: 5 out of 5 stars5/5How to Cheat at Administering Office Communications Server 2007 Rating: 0 out of 5 stars0 ratingsCisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit Rating: 1 out of 5 stars1/5Snort Intrusion Detection and Prevention Toolkit Rating: 5 out of 5 stars5/5Checkpoint Next Generation Security Administration Rating: 0 out of 5 stars0 ratingsMicrosoft Vista for IT Security Professionals Rating: 0 out of 5 stars0 ratingsHow to Cheat at Deploying and Securing RFID Rating: 0 out of 5 stars0 ratingsThe Real MCTS/MCITP Exam 70-620 Prep Kit: Independent and Complete Self-Paced Solutions Rating: 2 out of 5 stars2/5Learning iOS Penetration Testing Rating: 0 out of 5 stars0 ratingsHow to Cheat at Configuring Open Source Security Tools Rating: 0 out of 5 stars0 ratingsNessus Network Auditing Rating: 0 out of 5 stars0 ratingsApplied Network Security Rating: 0 out of 5 stars0 ratingsWeb Application Vulnerabilities: Detect, Exploit, Prevent Rating: 0 out of 5 stars0 ratingsOSSEC Host-Based Intrusion Detection Guide Rating: 5 out of 5 stars5/5
Security For You
Cybersecurity For Dummies Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5How I Rob Banks: And Other Such Places Rating: 0 out of 5 stars0 ratingsThe Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsBlockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5
Reviews for Configuring Juniper Networks NetScreen and SSG Firewalls
0 ratings0 reviews