Table of contents : COVER......Page 1 Contents......Page 10 Foreword......Page 34 Introduction to Information Security......Page 38 Firewall Concepts......Page 88 DMZ Concepts, Layout, and Conceptual Design......Page 108 Introduction to Intrusion Detection Systems......Page 146 Implementing a Firewall with Ipchains and Iptables......Page 162 Maintaining Open Source Firewalls......Page 206 Configuring Solaris as a Secure Router and Firewall......Page 246 Introduction to PIX Firewalls......Page 276 Passing Traffic......Page 312 Advanced PIX Configurations......Page 344 Troubleshooting and Performance Monitoring......Page 402 Installing and Configuring VPN- 1/FireWall-1 Next Generation......Page 456 Using the Graphical Interface......Page 526 Creating a Security Policy......Page 564 Advanced Configurations......Page 590 Configuring Virtual Private Networks......Page 612 Overview of the Nokia Security Platform......Page 638 Configuring the Check Point Firewall......Page 650 Introducing the Voyager Web Interface......Page 686 Basic System Administration......Page 716 High Availability and Clustering......Page 748 ISA Server Deployment Planning and Design......Page 848 ISA Server Installation......Page 882 Managing ISA Server......Page 916 Optimizing, Customizing, Integrating, and Backing Up ISA Server......Page 976 Troubleshooting ISA Server......Page 1028 Advanced Server Publishing with ISA Server......Page 1060 Protecting Mail Services with ISA Server......Page 1140 Introducing Snort......Page 1218 Installing Snort......Page 1244 Combining Firewalls and IDS......Page 1264 Index......Page 1304