Juniper SRX Series : A Comprehensive Guide to Security Services on the SRX Series
Juniper SRX Series : A Comprehensive Guide to Security Services on the SRX Series
Click to enlarge
Author(s): Woodberg, Brad
ISBN No.: 9781449338961
Pages: 1,020
Year: 201306
Format: Trade Paper
Price: $ 119.19
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Foreword;Preface; How to Use This Book; What's in This Book?; Conventions Used in This Book; Using Code Examples; SafariĀ® Books Online; How to Contact Us; Acknowledgments;Chapter 1: Welcome to the SRX; 1.1 Evolving into the SRX; 1.2 The SRX Series Platform; 1.3 Deployment Solutions; 1.4 Summary; 1.5 Study Questions;Chapter 2: SRX Series Product Lines; 2.1 Branch SRX Series; 2.2 Data Center SRX Series; 2.


3 Summary; 2.4 Study Questions;Chapter 3: SRX GUI Management; 3.1 J-Web: Your On-Box Assistant; 3.2 Centralized Management; 3.3 Summary; 3.4 Study Questions;Chapter 4: SRX Networking Basics; 4.1 Interfaces; 4.2 Zones; 4.


3 Basic Protocols; 4.4 Routing Instances; 4.5 Flow Mode and Packet Mode; 4.6 Sample Deployment; 4.7 Summary; 4.8 Study Questions;Chapter 5: System Services; 5.1 System Services Operation on the SRX; 5.2 Management Services; 5.


3 SNMP Management; 5.4 Networking Services; 5.5 SRX Logging and Flow Records; 5.6 Best Practices; 5.7 Troubleshooting and Operation; 5.8 Summary; 5.9 Study Questions;Chapter 6: Transparent Mode; 6.1 Transparent Mode Overview; 6.


2 Configuring Transparent Mode; 6.3 Troubleshooting and Operation; 6.4 Sample Deployments; 6.5 Summary; 6.6 Study Questions;Chapter 7: High Availability; 7.1 Understanding High Availability in the SRX; 7.2 Getting Started with High Availability; 7.3 Deployment Concepts; 7.


4 Preparing Devices for Deployment; 7.5 Integrating the Cluster into Your Network; 7.6 Fault Monitoring; 7.7 Troubleshooting and Operation; 7.8 Sample Deployments; 7.9 Summary; 7.10 Study Questions;Chapter 8: Security Policies; 8.1 Packet Flow; 8.


2 Security Policy Criteria and Precedence; 8.3 Security Policy Precedence; 8.4 Security Policy Components in Depth; 8.5 Best Practices; 8.6 Troubleshooting and Operation; 8.7 Sample Deployment; 8.8 Summary; 8.9 Study Questions;Chapter 9: Network Address Translation; 9.


1 The Need for NAT; 9.2 Junos NAT Fundamentals; 9.3 Junos NAT Components; 9.4 Junos NAT in Practice; 9.5 Best Practices; 9.6 Troubleshooting and Operation; 9.7 Sample Deployment; 9.8 Summary; 9.


9 Study Questions;Chapter 10: IPsec VPN; 10.1 VPN Architecture Overview; 10.2 IPsec VPN Concepts Overview; 10.3 IKE Negotiations; 10.4 Flow Processing and IPsec VPNs; 10.5 SRX VPN Types; 10.6 Other SRX VPN Components; 10.7 Selecting the Appropriate VPN Configuration; 10.


8 IPsec VPN Configuration; 10.9 Best Practices; 10.10 Troubleshooting and Operation; 10.11 Sample Deployments; 10.12 Summary; 10.13 Study Questions;Chapter 11: Screens and Flow Options; 11.1 A Brief Review of Denial-of-Service Attacks; 11.2 Screen Theory and Examples; 11.


3 Best Practices; 11.4 Troubleshooting and Operation; 11.5 Sample Deployment; 11.6 Summary; 11.7 Study Questions;Chapter 12: AppSecure Basics; 12.1 AppSecure Component Overview; 12.2 Deploying AppSecure; 12.3 Best Practices; 12.


4 Troubleshooting and Operation; 12.5 Sample Deployments; 12.6 Summary; 12.7 Study Questions;Chapter 13: Intrusion Prevention; 13.1 The Need for IPS; 13.2 How Does IPS Work?; 13.3 Configuring IPS Features on the SRX; 13.4 Deploying and Tuning IPS; 13.


5 Best Practices; 13.6 Troubleshooting and Operation; 13.7 Sample Deployments; 13.8 Summary; 13.9 Study Questions;Chapter 14: Unified Threat Management; 14.1 Shifting Threats; 14.2 UTM, IPS, or Both?; 14.3 UTM Licensing; 14.


4 UTM Components; 14.5 Best Practices; 14.6 Troubleshooting and Operation; 14.7 Sample Deployments; 14.8 Summary; 14.9 Study Questions;Colophon;.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...