Check Point Next Generation Security Administration
Description
Your security requirements are unique, of course, but the authors do a good job of explaining how to satisfy common requirements and implement variations upon them. For example, they show how to configure Network Address Translation (NAT) in a general way, then--in a Q&A section--show how to combine sequentially numbered networks into a single network object for easy administration of rules. This is documentation worth having. --David Wall
Topics covered: Installation of VPN-1/FireWall-1 and setup via the graphical user interface. There's deep coverage of security policies, naturally, and of user authentication, content filtering, Virtual Private Networks (VPNs), and Network Address Translation (NAT). The specifics of configuring for various protocols--including RPC and LDAP--are covered well.
