Check Point NG[s]AI

Chapter 1: Introduction to Check Point Next Generation with Application Intelligence

Designing & Planning What is Provider-1?
Designing & Planning What is OPSEC?
Designing & Planning Choosing Your OS
Developing & Deploying Caveat Emptor

Chapter 2: Installing and Configuring VPN-1/FireWall-1 Next Generation with Application Intelligence

Tools & Traps Solaris 32-bit vs. 64-bit
Configuring & Implementing FW-1 Environment Variables
Installing & Configuring Fetching Licenses
Configuring & Implementing Installing Packages
Configuring & Implementing Unload InitialPolicy Script

Chapter 3: Using the Graphical Interface

Configuring & Implementing Whats in a Name ?

Chapter 4: Creating a Security Policy

Designing & Planning Get Trained
Designing & Planning Community Involvement
Configuring & Implementing Editing Files Manually

Chapter 5: Applying Network Address Translation

Configuring & Implementing Automatic ARP
Configuring & Implementing Destination Translation

Chapter 6: Authenticating Users

Designing & Planning OS Password Authentication

Chapter 7: Open Security (OPSEC) and Content Filtering

Configuring & Implementing Load Balancing Chained Servers

Chapter 8: Managing Policies and Logs

Configuring & Implementing NT Name Resolution
Designing & Planning Top Performers
Designing & Planning Extreme Performance
Designing & Planning War Games

Chapter 9: Tracking and Alerts

Designing & Planning Intrusion Detection?

Chapter 10: Configuring Virtual Private Networks

Designing & Planning VPN Domains
Configuring & Implementing Making Changes to Objects_5_0.C Stick
Designing & Planning VPN Management

Chapter 11: Securing Remote Clients

Configuring & Implementing SecureClient Logging
Configuring & Implementing SCV and the $FWDIR/conf/local.scv file

Chapter 12: Advanced VPN Configurations

Configuring & Implementing How does the High Availability Module Select the MAC Address?
Designing & Planning Why Not Go All Out?

Chapter 13: SmartDefense

Developing & Deploying Unusual Applications
Damage & Defense Keeping OS Information Hidden

Категории