Junos Security : A Guide to Junos for the SRX Services Gateways and Security Certification
Junos Security : A Guide to Junos for the SRX Services Gateways and Security Certification
Click to enlarge
Author(s): Cameron, Rob
Eberhard, Timothy
Quinn, James
Woodberg, Brad
ISBN No.: 9781449381714
Pages: 848
Year: 201009
Format: Trade Paper
Price: $ 103.96
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Foreword;Preface; This Book''s Assumptions About You; What''s In This Book?; Juniper Networks Technical Certification Program (JNTCP); Topology for This Book; Conventions Used in This Book; Using Code Examples; We''d Like to Hear from You/How to Contact Us/Comments and Questions; SafariĀ® Books Online; About the Tech Reviewers; Acknowledgments;Chapter 1: Introduction to the SRX; 1.1 Evolving into the SRX; 1.2 The SRX Series Platform; 1.3 Deployment Solutions; 1.4 SRX Series Product Lines; 1.5 Branch SRX Series; 1.6 Data Center SRX Series; 1.7 Summary; 1.


8 Chapter Review Questions; 1.9 Chapter Review Answers;Chapter 2: What Makes Junos So Special?; 2.1 OS Basics; 2.2 Coming from Other Products; 2.3 Summary; 2.4 Chapter Review Questions; 2.5 Chapter Review Answers;Chapter 3: Hands-On Junos; 3.1 Introduction; 3.


2 Driving the Command Line; 3.3 Operational Mode; 3.4 Configuration Mode; 3.5 Commit Model; 3.6 Restarting Processes; 3.7 Junos Automation; 3.8 Junos Configuration Essentials; 3.9 Summary; 3.


10 Chapter Review Questions; 3.11 Chapter Review Answers;Chapter 4: Security Policy; 4.1 Security Policy Overview; 4.2 SRX Policy Processing; 4.3 Viewing SRX Policy Tables; 4.4 Viewing Policy Statistics; 4.5 Viewing Session Flows; 4.6 Policy Structure; 4.


7 Policy Logging; 4.8 Troubleshooting Security Policy and Traffic Flows; 4.9 Application Layer Gateway Services; 4.10 Policy Schedulers; 4.11 Web and Proxy Authentication; 4.12 Case Study 4-1; 4.13 Case Study 4-2; 4.14 Converters and Scripts; 4.


15 Summary; 4.16 Chapter Review Questions; 4.17 Chapter Review Answers;Chapter 5: Network Address Translation; 5.1 How the SRX Processes NAT; 5.2 Source NAT; 5.3 Destination NAT; 5.4 Static NAT; 5.5 Summary; 5.


6 Chapter Review Questions; 5.7 Chapter Review Answers;Chapter 6: IPsec VPN; 6.1 VPN Architecture Overview; 6.2 IPsec VPN Concepts Overview; 6.3 Phase 1 IKE Negotiations; 6.4 Phase 2 IKE Negotiations; 6.5 Flow Processing and IPsec VPNs; 6.6 SRX VPN Types; 6.


7 Other SRX VPN Components; 6.8 Selecting the Appropriate VPN Configuration; 6.9 IPsec VPN Configuration; 6.10 VPN Verification and Troubleshooting; 6.11 Case Studies; 6.12 Summary; 6.13 Chapter Review Questions; 6.14 Chapter Review Answers;Chapter 7: High-Performance Attack Mitigation; 7.


1 Network Protection Tools Overview; 7.2 Protecting Against Network Reconnaissance; 7.3 Protecting Against Basic IP Attacks; 7.4 Basic Denial-of-Service Screens; 7.5 Advanced Denial-of-Service and Distributed Denial-of-Service Protection; 7.6 ICMP Floods; 7.7 UDP Floods; 7.8 SYN/TCP Floods; 7.


9 SYN Cookies; 7.10 Session Limitation; 7.11 AppDoS; 7.12 Application Protection; 7.13 Protecting the SRX; 7.14 Summary; 7.15 Chapter Review Questions; 7.16 Chapter Review Answers;Chapter 8: Intrusion Prevention; 8.


1 The Need for IPS; 8.2 Configuring IPS Features on the SRX; 8.3 Deploying and Tuning IPS; 8.4 Troubleshooting IPS; 8.5 Case Study 8-1; 8.6 Summary; 8.7 Chapter Review Questions; 8.8 Chapter Review Answers;Chapter 9: Unified Threat Management; 9.


1 What Is UTM?; 9.2 UTM Monitoring; 9.3 Case Study 9-1: Small Branch Office; 9.4 Summary; 9.5 Chapter Review Questions; 9.6 Chapter Review Answers;Chapter 10: High Availability; 10.1 Understanding High Availability in the SRX; 10.2 Configuration; 10.


3 Fault Monitoring; 10.4 Troubleshooting the Cluster; 10.5 Summary; 10.6 Chapter Review Questions; 10.7 Chapter Review Answers;Chapter 11: Routing; 11.1 How the SRX "Routes" IP Packets; 11.2 Static Routing; 11.3 Dynamic Routing; 11.


4 Routing Policy; 11.5 Internet Peering; 11.6 Routing Instances; 11.7 Filter-Based Forwarding; 11.8 Summary; 11.9 Chapter Review Questions; 11.10 Chapter Review Answers;Chapter 12: Transparent Mode; 12.1 Transparent Mode Overview; 12.


2 Configuring Transparent Mode; 12.3 Transparent Mode Commands and Troubleshooting; 12.4 Case Study 12-1; 12.5 Summary; 12.6 Chapter Review Questions; 12.7 Chapter Review Answers;Chapter 13: SRX Management; 13.1 The Management Infrastructure; 13.2 J-Web; 13.


3 NSM and Junos Space; 13.4 NETCONF; 13.5 Scripting and Automation; 13.6 Keeping Your Scripts Up-to-Date; 13.7 Case Studies; 13.8 Summary; 13.9 Chapter Review Questions; 13.10 Chapter Review Answers;Colophon;.



To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...