EUR 42,15
  • Tous les prix incluent la TVA.
Il ne reste plus que 1 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Quantité :1
Configuring Juniper Netwo... a été ajouté à votre Panier
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

Configuring Juniper Networks NetScreen & SSG Firewalls (Anglais) Broché – 8 décembre 2006

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 42,15
EUR 36,12 EUR 8,39

Offres spéciales et liens associés

Descriptions du produit

Présentation de l'éditeur

Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform.

• Configure Juniper’s Instant Virtual Extranet (IVE)
Install and set up IVE through either the command line interface (CLI) or Web-based console.
• Master the “3 Rs”: Realms, Roles, and Resources
Realize the potential of the “3Rs” for endpoint security, sign-in policies, and authorization of servers.
• Get Inside both the Windows and Java Versions of Secure Application Manager (SAM)
Learn to implement SAM, manage the end-user experience, and troubleshoot SAM in the field.
• Integrate IVE with Terminal Services and Citrix
Enable terminal services proxy and configure role options, configure Citrix using a custom ICA, configure terminal services resource policies and profiles, and configure terminal services and Citrix using a hosted Java applet.
• Ensure Endpoint Security
Use Host Checker, Cache Cleaner, Secure Virtual Workspace, and IVE/IDP integration to secure your network.
• Manage the Remote Access Needs of Your Organization
Configure Web access, file access and telnet/SSH access for remote users and offices.
• Configure Core Networking Components through the System Menu
Create clusters, manage virtual systems, and monitor logs, reports, and alerts.
• Create Bullet-Proof Sign-in Policies
Create standard and custom sign-in pages for both user and administrator access and Secure Meeting pages.
• Use the IVE for Log-Related Tasks
Perform log filtering, log management, syslog exporting, SNMP management, and system resource monitoring and reporting.

Biographie de l'auteur

Rob Cameron (JNCIS-FWV, JNCIA-M, CCSP, CCSE+) is a Security Solutions Engineer for Juniper Networks. He currently works to design security solutions for Juniper Networks that are considered best practice designs. Rob specializes in network security architecture, firewall deployment, risk management, and high-availability designs. His background includes five years of security consulting for more than 300 customers. This is Rob’s second book; the previous one being Configuring NetScreen Firewalls (ISBN: 1-932266-39-9) published by Syngress Publishing in 2004.

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Détails sur le produit

En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre

(En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur (beta) HASH(0x9ed3de7c) étoiles sur 5 9 commentaires
20 internautes sur 21 ont trouvé ce commentaire utile 
HASH(0x9e06b168) étoiles sur 5 Broad coverage, but limited by production nits 1 janvier 2007
Par jose_monkey_org - Publié sur
Format: Broché
Juniper NetScreen firewalls have become a market leader for performance and features, and it's no wonder: they really are that good. As such, more people need to learn how to use them and configure them to do a wide range of activities. With this in mind, "Configuring Juniper Networks NetScreen & SSG Firewalls" attempts to fill that gap.

This book is similar to the well known and respected books from Cisco Press, and is basically a large scale product manual. As such, it's important to compare it both to the Cisco Press books in terms of production quality and clarity, and also to the docs that Juniper provides for free on their website. When you make this comparison, you find that "Configuring Juniper Networks NetScreen & SSG Firewalls" comes up short in both areas. That's not to say it isn't trying, but there are enough problems to make it just an average book.

Chapter 1 is the common basic firewall and Internet threat overview. Nothing too groundbreaking, and probably included for completeness. Chapter 2 is a nice overview of the Juniper Netscreen product line, and some of the basic concepts and technologies within them. Again, useful and probably included for completeness.

Chapter 3 covers "Deploying Juniper firewalls", focusing on basic options and introducing you to the web-based UI. Most of the material here is available in the online help or the free Juniper docs. Most of the instructions in this chapter are clear. Chapter 4 focuses on policy configuration and uses both the UI and the CLI to do so. Again, stuff that you can pick up with the free docs (granted the CLI help isn't as rich as docs, but the help is there nonetheless, especially for the UI), and again the presentation and examples are pretty clear.

Chapter 5 covers advanced policy configuration ideas, but focuses on bandwidth management. Some decent material here, but some of the CLI stuff gets a bit long and you can start to drown in it if you're not careful. Chapter 6 covers user authentication, and by this point the book (which, admittedly, is a reference book at heart) gets to be mind numbing. I started noticing some production errors here, usually in the typeface and presentation of the material. Some of the "settings" stuff gets to be a bit unclear to me at times, perhaps I need to study it more closely.

Chapter 7 covers routing (ie RIP, OSPF, BGP) and virtual routers. The size of this chapter and its examples is huge (100 pages), and if you're not careful you'll go blind. Again, this doesn't have much over the free Juniper docs, which are a bit better organized. Chapter 8 is a bit more managable (50 pages or so) and covers address translation (NAT, PAT, etc). at times it just becomes a series of examples, but the presentation is similar to the previous chapters. Not much over the free Juniper docs. Chapter 9 is another similar chapter and covers transparent mode. Decent presentation and examples, a few nits here and there that I find in this set of chapters.

Chapter 10 covers attack detection and defense, and I think the material is better organized than the more traditional networking materials. The examples are fewer and more focused.

Chapter 11 covers VPNs and was surprisingly short. The configuration stuff is either surprisingly simple and foolproof to set up or this chapter was very hit and run. The screenshots in this chapter are probably the weakest in the whole book, but in general they suffice. I'd probably say hit the Juniper docs, instead. Chapter 12, covering high availability (failover, redundancy, etc) is better, and has more examples and material. I think this is one of the better chapters balancing presentation and examples.

Chapter 13 covers troubleshooting, but I would have expected a bit more material. Perhaps if you pair it with the previous chapters on specific matters and features it would help. Chapter 14 ends the book with a tidy, concise and pretty clear unit on virtual systems (ie sub-interfaces).

Before you buy this book, you should look at the free documentation for ScreenOS and many Juniper products. I suspect that you'll find that their quality meets what you want, and they're clear and concise. That said, review this book (see if you can look inside and flip through it), seeing if it's worth the price for you. "Configuring Juniper Networks NetScreen & SSG Firewalls" attempts to be the authoritative source of information on NetScreen devices and does OK, but there are enough nits in the presentation and production to warrant any potential buyers to really compare it to the existing docs.
3 internautes sur 4 ont trouvé ce commentaire utile 
HASH(0x9e06b888) étoiles sur 5 Broad coverage - poor in the details 11 juin 2007
Par PBrontvain - Publié sur
Format: Broché
Definitively one of the worst technical publications I've ever bought.

This book will be useful only if you want to gain a general understanding on how netscreen firewalls work, but under no circumstance this should be considered a technical reference, or configuration guide.

HUGE lack of examples, and those present are extremely simplistic. Just driving through clicking on the NetscreenOS interface is not an example. The book is also plagued of grammatical inconsistencies.

After having read each one of its 743 pages I'm still on the same place I was before starting.

If you need a little more detail on what's behind the NetScreen & SSG architecture, use the Reference Guide from Juniper (more than 2,000 pages of rich examples, scenarios, and explanations... and the best... FREE!!!). That's exactly what I'm doing now.

To the publishers: thank you for making me post my first review ever.
HASH(0x9e06b828) étoiles sur 5 Not bad 10 avril 2008
Par Brian Saloum - Publié sur
Format: Broché
I was fortunate enough to work with one of the contributing authors on an implementation and while the book is an excellent resource for the web UI and CLI, I was rather disappointed that the NSM was completely ignored. Yes, I know, not in the scope of the book, but if one is managing a large juniper firewall infrastructure centralized management pretty important.
While it's not all encompassing, I recommend it to round off any juniper firewall reference library.
HASH(0x9e06abd0) étoiles sur 5 Great for Beginners! 3 mars 2015
Par Edward - Publié sur
Format: Broché Achat vérifié
I have inherited a network full of these and need to set up redundancy, backups and document the settings. This is a great book - helped me with my immediate needs and I will read most of it in entirety eventually.
1 internautes sur 2 ont trouvé ce commentaire utile 
HASH(0x9e06bc9c) étoiles sur 5 OK book based on the lack of alternatives 4 novembre 2007
Par A. Charles - Publié sur
Format: Broché
This book broadly covers the Juniper NetScreen and SSG firewalls. However, where it falls down is the small amount of examples given, and the technical errors in the book.

Having worked with the Juniper devices over the past few months and through reading this book it is obvious that there should have been a bit more attention paid to the editing as there are sentances and examples with the wrong words used.

Ie. using the word zone instead of interface
Ces commentaires ont-ils été utiles ? Dites-le-nous


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?