This site uses cookies to deliver our services, improve performance, for analytics, and (if not signed in) for advertising. By using LibraryThing you acknowledge that you have read and understand our Terms of Service and Privacy Policy. Your use of the site and services is subject to these policies and terms.
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

Check Point Firewall-1 Administration Guide…

Check Point Firewall-1 Administration Guide

by Marcus Goncalves

MembersReviewsPopularityAverage ratingConversations



Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

No reviews
no reviews | add a review
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Series (with order)
Canonical title
Original title
Alternative titles
Original publication date
Important places
Important events
Related movies
Awards and honors
First words
Last words
Disambiguation notice
Publisher's editors
Publisher series
Original language
Canonical DDC/MDS

References to this work on external resources.

Wikipedia in English


Book description
Haiku summary

Amazon.com Amazon.com Review (ISBN 007134229X, Paperback)

Check Point FireWall-1 is big and highly capable but hard for the uninitiated to figure out. Check Point FireWall-1 Administration Guide does a competent job of scratching the surface of this popular piece of security software. It leaves a lot of questions unanswered--any single volume would have to--but what's here is enough to help you get the software installed and initially configured in all standard situations.

Authors Marcus Goncalves and Steven Brown--Goncalves has a particularly strong reputation as a firewall guru--describe sound practices for formulating security policies, then implementing those policies as FireWall-1 rules. Coverage focuses on Windows NT installations of FireWall-1. Unix gets some attention, but practically all the screen shots show a Microsoft operating system.

The most interesting parts of this book have to do with how FireWall-1 identifies and reacts to specific kinds of attacks. For example, the authors explain how the FireWall-1 INSPECT engine, faced with attempts to overwhelm a protected machine with unresolved connection attempts (a SYN flood), can use SYNDefender Relay or SYNDefender Gateway to intercept or monitor requests and acknowledgments. They typically map packet exchanges with simple but effective transmission diagrams consisting of ASCII characters. The coverage of VPNs involving mobile users and their implementation with SecuRemote also is strong. --David Wall

Topics covered: Firewall rationales, FireWall-1 installation, rule sets, virtual private networks (VPNs), and how FireWall-1 behaves under specific kinds of attacks.

(retrieved from Amazon Thu, 12 Mar 2015 18:13:31 -0400)

No library descriptions found.

Quick Links

Popular covers


Average: No ratings.

Is this you?

Become a LibraryThing Author.


About | Contact | Privacy/Terms | Help/FAQs | Blog | Store | APIs | TinyCat | Legacy Libraries | Early Reviewers | Common Knowledge | 128,063,829 books! | Top bar: Always visible