Check Point NG[s]AI
Chapter 1: Introduction to Check Point Next Generation with Application Intelligence
- Designing & Planning What is Provider-1?
- Designing & Planning What is OPSEC?
- Designing & Planning Choosing Your OS
- Developing & Deploying Caveat Emptor
Chapter 2: Installing and Configuring VPN-1/FireWall-1 Next Generation with Application Intelligence
- Tools & Traps Solaris 32-bit vs. 64-bit
- Configuring & Implementing FW-1 Environment Variables
- Installing & Configuring Fetching Licenses
- Configuring & Implementing Installing Packages
- Configuring & Implementing Unload InitialPolicy Script
Chapter 3: Using the Graphical Interface
- Configuring & Implementing Whats in a Name ?
Chapter 4: Creating a Security Policy
- Designing & Planning Get Trained
- Designing & Planning Community Involvement
- Configuring & Implementing Editing Files Manually
Chapter 5: Applying Network Address Translation
- Configuring & Implementing Automatic ARP
- Configuring & Implementing Destination Translation
Chapter 6: Authenticating Users
- Designing & Planning OS Password Authentication
Chapter 7: Open Security (OPSEC) and Content Filtering
- Configuring & Implementing Load Balancing Chained Servers
Chapter 8: Managing Policies and Logs
- Configuring & Implementing NT Name Resolution
- Designing & Planning Top Performers
- Designing & Planning Extreme Performance
- Designing & Planning War Games
Chapter 9: Tracking and Alerts
- Designing & Planning Intrusion Detection?
Chapter 10: Configuring Virtual Private Networks
- Designing & Planning VPN Domains
- Configuring & Implementing Making Changes to Objects_5_0.C Stick
- Designing & Planning VPN Management
Chapter 11: Securing Remote Clients
- Configuring & Implementing SecureClient Logging
- Configuring & Implementing SCV and the $FWDIR/conf/local.scv file
Chapter 12: Advanced VPN Configurations
- Configuring & Implementing How does the High Availability Module Select the MAC Address?
- Designing & Planning Why Not Go All Out?
Chapter 13: SmartDefense
- Developing & Deploying Unusual Applications
- Damage & Defense Keeping OS Information Hidden