eBooks-it.org Logo
eBooks-IT.org Inner Image

Configuring Juniper Networks NetScreen & SSG Firewalls

Configuring Juniper Networks NetScreen & SSG Firewalls Image

Book Details:

Publisher:Syngress
Series: Syngress
Author:Rob Cameron
Edition:1
ISBN-10:1597491187
ISBN-13:9781597491181
Pages:512
Published:Feb 08 2007
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:13.66 MB

Book Description:

Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform.Configure Juniper's Instant Virtual Extranet (IVE). Install and set up IVE through either the command line interface (CLI) or Web-based console. Master the "3 Rs": Realms, Roles, and Resources.Realize the potential of the 3Rs for endpoint security, sign-in policies, and authorization of servers. Get Inside both the Windows and Java Versions of Secure Application Manager (SAM). Learn to implement SAM, manage the end-user experience, and troubleshoot SAM in the field. Integrate IVE with Terminal Services and Citrix. Enable terminal services proxy and configure role options, configure Citrix using a custom ICA, configure terminal services resource policies and profiles, and configure terminal services and Citrix using a hosted Java applet. Ensure Endpoint Security. Use Host Checker, Cache Cleaner, Secure Virtual Workspace, and IVE/IDP integration to secure your network. Manage the Remote Access Needs of Your Organization. Configure Web access, file access and telnet/SSH access for remote users and offices. Configure Core Networking Components through the System Menu.Create clusters, manage virtual systems, and monitor logs, reports, and alerts. Create Bullet-Proof Sign-in Policies. Create standard and custom sign-in pages for both user and administrator access and Secure Meeting pages. Use the IVE for Log-Related Tasks. Perform log filtering, log management, syslog exporting, SNMP management, and system resource monitoring and reporting.


Download Link:

Related Books:

Juniper Networks Warrior

A Guide to the Rise of Juniper Networks Implementations
Juniper Networks Warrior Image
In this practical book, Juniper Networks consulting senior network engineer, Peter Southwick, offers unique first-person field studies on designing, configuring, and troubleshooting new systems that are changing the networking world. Each chapter-long "travelogue" follows a team of Juniper Networks warriors as they solve specific needs with emerging network platform architectures. In these case studies, Southwick and his fellow warriors analyze a clientamp;#8217;s particular situation, arrive at an architectural solution, and work through the deployment details. For anyone who operates, installs, designs, or works in It, this book provides an intimate and entertaining look at whatamp;#8217;s changing and why. Among the case studies, youamp;...

Juniper Networks Field Guide and Reference

Juniper Networks Field Guide and Reference Image
The first in-depth, definitive book from Juniper Networks, the innovator of high-performance routing platforms used by the world's largest service providers. Written and edited by Juniper engineers and editors, this book has been produced to be a portable technical compendium on all things Juniper. This comprehensive reference was culled from an incredible array of technical material including technical manuals (5000 pages), Juniper Technical Assurance Center FAQs and field alerts (2000 pages), Juniper Engineering Labs, www.juniper.net, and the Juniper Customer Service Center. The organization is superb -- its vast number of tables has been distilled into at-a-glance comprehension, and pointer and marginal cross-references aid the reader to easily fi...

Juniper Networks Reference Guide

JUNOS Routing, Configuration, and Architecture
Juniper Networks Reference Guide Image
Juniper Networks is the second largest provider of high-end networking routers, owning 27% of the $466 million market to Cisco's 67%, according to Dell'Oro Group, a firm that tracks networking equipment sales. This implementation guide to Juniper Network routers, teaches readers how to configure, deploy, and maintain Juniper routing solutions. It provides concise explanations of internetworking theory and contains detailed examples that will enable a network engineer to configure products. The case studies are taken from real world router configurations and there are numerous templates that can be easily applied to the reader's own network....



2007 - 2021 © eBooks-IT.org