Essential Checkpoint Firewall-1: An Installation, Configuration, and Troubleshooting Guide
Book Details
Description
Welch-Abernathy's presentation style is characterized by conciseness; practically every word and illustration he's included advances his goal of explaining how to administer the software. Once in a while, he'll go so far as to declare something self-explanatory and therefore not document it. This is risky--it's hard to predict what a given reader will find intuitive--but he's done this sparingly. The author's coverage of virtual private networks (VPNs) is particularly praiseworthy. By following his lead, you'll be able to bring up secure links among sites, and understand why the system works. Whether you're reading cover-to-cover in order to learn as much as possible, or using the index to locate the problem-solving trick you need, this book ranks among the best. --David Wall
Topics covered: Check Point FireWall-1 for administrators, including those administrators with responsibility for designing and installing a firewall system. Rule design and implementation, logging, and authentication get attention, and coverage of network address translation (NAT) and virtual private networks (VPNs) is outstanding. There's coverage of SecuRemote and Secure Client, too.
