Foreword;Preface; How to Use This Book; What's in This Book?; Conventions Used in This Book; Using Code Examples; SafariĀ® Books Online; How to Contact Us; Acknowledgments;Chapter 1: Welcome to the SRX; 1.1 Evolving into the SRX; 1.2 The SRX Series Platform; 1.3 Deployment Solutions; 1.4 Summary; 1.5 Study Questions;Chapter 2: SRX Series Product Lines; 2.1 Branch SRX Series; 2.2 Data Center SRX Series; 2.
3 Summary; 2.4 Study Questions;Chapter 3: SRX GUI Management; 3.1 J-Web: Your On-Box Assistant; 3.2 Centralized Management; 3.3 Summary; 3.4 Study Questions;Chapter 4: SRX Networking Basics; 4.1 Interfaces; 4.2 Zones; 4.
3 Basic Protocols; 4.4 Routing Instances; 4.5 Flow Mode and Packet Mode; 4.6 Sample Deployment; 4.7 Summary; 4.8 Study Questions;Chapter 5: System Services; 5.1 System Services Operation on the SRX; 5.2 Management Services; 5.
3 SNMP Management; 5.4 Networking Services; 5.5 SRX Logging and Flow Records; 5.6 Best Practices; 5.7 Troubleshooting and Operation; 5.8 Summary; 5.9 Study Questions;Chapter 6: Transparent Mode; 6.1 Transparent Mode Overview; 6.
2 Configuring Transparent Mode; 6.3 Troubleshooting and Operation; 6.4 Sample Deployments; 6.5 Summary; 6.6 Study Questions;Chapter 7: High Availability; 7.1 Understanding High Availability in the SRX; 7.2 Getting Started with High Availability; 7.3 Deployment Concepts; 7.
4 Preparing Devices for Deployment; 7.5 Integrating the Cluster into Your Network; 7.6 Fault Monitoring; 7.7 Troubleshooting and Operation; 7.8 Sample Deployments; 7.9 Summary; 7.10 Study Questions;Chapter 8: Security Policies; 8.1 Packet Flow; 8.
2 Security Policy Criteria and Precedence; 8.3 Security Policy Precedence; 8.4 Security Policy Components in Depth; 8.5 Best Practices; 8.6 Troubleshooting and Operation; 8.7 Sample Deployment; 8.8 Summary; 8.9 Study Questions;Chapter 9: Network Address Translation; 9.
1 The Need for NAT; 9.2 Junos NAT Fundamentals; 9.3 Junos NAT Components; 9.4 Junos NAT in Practice; 9.5 Best Practices; 9.6 Troubleshooting and Operation; 9.7 Sample Deployment; 9.8 Summary; 9.
9 Study Questions;Chapter 10: IPsec VPN; 10.1 VPN Architecture Overview; 10.2 IPsec VPN Concepts Overview; 10.3 IKE Negotiations; 10.4 Flow Processing and IPsec VPNs; 10.5 SRX VPN Types; 10.6 Other SRX VPN Components; 10.7 Selecting the Appropriate VPN Configuration; 10.
8 IPsec VPN Configuration; 10.9 Best Practices; 10.10 Troubleshooting and Operation; 10.11 Sample Deployments; 10.12 Summary; 10.13 Study Questions;Chapter 11: Screens and Flow Options; 11.1 A Brief Review of Denial-of-Service Attacks; 11.2 Screen Theory and Examples; 11.
3 Best Practices; 11.4 Troubleshooting and Operation; 11.5 Sample Deployment; 11.6 Summary; 11.7 Study Questions;Chapter 12: AppSecure Basics; 12.1 AppSecure Component Overview; 12.2 Deploying AppSecure; 12.3 Best Practices; 12.
4 Troubleshooting and Operation; 12.5 Sample Deployments; 12.6 Summary; 12.7 Study Questions;Chapter 13: Intrusion Prevention; 13.1 The Need for IPS; 13.2 How Does IPS Work?; 13.3 Configuring IPS Features on the SRX; 13.4 Deploying and Tuning IPS; 13.
5 Best Practices; 13.6 Troubleshooting and Operation; 13.7 Sample Deployments; 13.8 Summary; 13.9 Study Questions;Chapter 14: Unified Threat Management; 14.1 Shifting Threats; 14.2 UTM, IPS, or Both?; 14.3 UTM Licensing; 14.
4 UTM Components; 14.5 Best Practices; 14.6 Troubleshooting and Operation; 14.7 Sample Deployments; 14.8 Summary; 14.9 Study Questions;Colophon;.