|
|
|||
|
||||
OverviewSonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years. This is the first book on the market covering the #3 best-selling firewall appliances in the world from SonicWALL. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals. Configuring SonicWALL Firewalls is the first book to deliver an in-depth look at the SonicWALL firewall product line. It covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls. Also covered are advanced troubleshooting techniques and the SonicWALL Security Manager. This book offers novice users a complete opportunity to learn the SonicWALL firewall appliance. Advanced users will find it a rich technical resource. Full Product DetailsAuthor: Dan Bendell (President of Assurance Technology Managment, USA)Publisher: Syngress Media,U.S. Imprint: Syngress Media,U.S. Dimensions: Width: 15.20cm , Height: 2.70cm , Length: 22.90cm Weight: 0.710kg ISBN: 9781597492508ISBN 10: 1597492507 Pages: 528 Publication Date: 25 May 2006 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsChapter 1: Introduction to firewalls and the World of SonicWALL Chapter 2: Dissecting the SonicWALL Firewall Chapter 3: Deploying SonicWALL Firewalls Chapter 4: Policy Configuration Chapter 5: Routing Chapter 6: User Authentication Chapter 7: Advanced Policy Configuration Chapter 8: NAT Chapter 9: Transparent Mode Chapter 10: Attack Detection and Defense Chapter 11: VPN Theory Chapter 12: VPN Usage Chapter 13: Virtual Systems Chapter 14: High Availability Chapter 15: Troubleshooting the SonicWALL Firewall Chapter 16: Enterprise SonicWALL ManagementReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |