Item description for Configuring Netscreen Firewalls by Rob Cameron, Christopher Cantrell, Dave Killion, Kevin Russell & Kenneth Tam...
Your Complete Guide to Juniper's NetScreen Firewall Appliances
Complete Coverage of Advanced Troubleshooting Techniques and the NetScreen Security Manager
Comprehensive Coverage of the NetScreen NCSA 5.0 Exam
Special Appendix from Juniper Networks Covering New Features in ScreenOS 5.1.0
Configuring NetScreen Firewalls covers all of the aspects of Juniper's NetScreen product line, from SOHO devices to Enterprise NetScreen firewalls. Coverage includes basic policy creation and administration, advanced troubleshooting techniques, the NetScreen Security Manager and VPN configuration. In addition, this book covers both the WebUI and the command line interface of NetScreen ScreenOS 5.0. as well as the NetScreen Security Manager (NSM). As a special bonus, Juniper Networks provides detailed coverage of the new features and enhancements included with ScreenOS 5.1.
Select NetScreen Management OptionsDecide whether the WebUI or the Command Line Interface (CMI) is right for your enterprise.
Configure Transparent ModeSwitching from layer 3 to layer 2 means moving the interfaces into the layer 2 zones.
Monitor NetScreen DevicesNetScreen firewalls support Syslog, SNMP, Webtrends, and e-mail in addition to NSM.
Build a Troubleshooting ToolboxMaster the use of commands such as ping, traceroute, get, and debug along with sniffers such as Snoop.
Optimize NetScreen Redundancy Protocol UsageUse redundant hardware to transfer firewall functionality as needed.
Avoid Naming Convention ErrorsDecide upon a naming convention for your organization.
Configure SCREEN SettingsDeploy SCREEN to inspect traffic when the stream is read from the interface off the wire, not as it passes through the NetScreen.
Support External Authentication ServersAllow RADIUS, SecurID, and LDAP to help NetScreen perform authentication and authorization.
Incorporate NAT functionalityUnderstand key NAT features from early ScreenOS to ScreenOS 5.0.
Promise Angels is dedicated to bringing you great books at great prices. Whether you read for entertainment, to learn, or for literacy - you will find what you want at promiseangels.com!
Est. Packaging Dimensions: Length: 1.25" Width: 7" Height: 9" Weight: 2.25 lbs.
Release Date Jan 26, 2005
ISBN 1932266399 ISBN13 9781932266399
Availability 0 units.
More About Rob Cameron, Christopher Cantrell, Dave Killion, Kevin Russell & Kenneth Tam
Rob Cameron, principal engineer at a Silicon Valley startup, worked for eight years at Juniper Networks. He's the co-author of Junos Security (O'Reilly) and Configuring Juniper Networks NetScreen & SSG Firewalls (Syngress).
Rob Cameron currently resides in Atlanta, in the state of Georgia.
Reviews - What do customers think about Configuring Netscreen Firewalls?
not enough concept explanation, too much other minor detail Jan 18, 2007
Important are not explained in depth enough. ex; attack objects, Deep inspection. It spends more time explain how to setup a certain thing than why this needs to be done or under what circumstance this need to be done.
I thought Juniper own documentation sometimes provide more useful concept than the book.
Better off waiting for a Second Edition... Jun 5, 2006
I read a lot of books, and while I don't review all of them, I am often compelled to write a review when a book stands out, either for it's clear leadership and technical distinction in the marketplace, or for it's extreme lack thereof. In this case, I was compelled to write the review based on the latter.
Seeing as this is the only Netscreen book on the market, I had high expectations for it. When one looks at the credentials of the numerous authors, it reads like a veritable list of leaders in the Security industry. As such, I was rather excited when I picked up this book. As I began reading this book, I quickly realized that it was not going to meet my expectations. Clearly this book was rushed to market, another sign that the primary concern of many publishers is not in producing quality, but rather quantity. This book suffers from many of the same problems I see with other books on the market with multiple contributing authors, which is that the voice isn't consistent throughout the book. Some chapters have diagrams, screen shots, or CLI commands outlining various procedural steps, whereas these details are noticeably absent in others.
In addition, this book is littered with many errors throughout, both typographical as well as technical. In some cases, as other reviewers point out, sentences simply stop abruptly mid-sentence. The text often refers to diagrams which don't even exist. There are numerous references to find additional information in other chapters which are non-existent.
With regards to technical content, the authors certainly could have added more detail, especially considering the number of authors who contributed to this text. For example, the chapter on Routing does a good job of telling the reader how to enable BGP, but provides no details on how to actually configure a BGP neighbor. Another example is URL filtering which is discussed in the chapter on Attack Detection and Defense. While the authors do a good job of describing the various modes to support URL filtering (redirect vs. integrated), there is no explanation of how redirection actually takes place and no diagrams to provide for comprehensive understanding of the subject matter.
I can't blame the authors entirely for the many flaws in this book, as any decent technical editor should have been able to spot many of these errors prior to publication. One wonders whether the technical editors even read the book as many of the errors are so blatant that it's inconceivable that so many managed to slip through. I'm disappointed in Syngress for publishing a book with so many errors, and this has definitely led me to believe that Syngress does not want to maintain a leadership position of publishing technical content of the highest magnitude, but rather they are only concerned with being the first to market with a particular product.
I will give this book 2 stars in that it is indeed a noble attempt at covering a wide array of topics, as well as for being the only book in the industry which covers this subject matter. I suggest that the authors should examine the possibility of releasing a second edition which may fix these blatant errors, as well as hiring some decent technical editors.
Fit for Purpose May 19, 2006
If you wish to employ a Juniper/Netscreen Firewall out of the box tyhen this is the book to buy. Together with Junipers own documentation it will form a good basis for studying for certification. I can't quite understand what Mr Uphill Gardener found wrong with this book as it does do what it sets out to do and achieves its aims. His review seems as substantial as the rest of his reviews (?) check them out.
Outstanding Feb 27, 2006
This book provides in-depth explanation of firewall fundamentals, principles, concepts and instruction. Comparable to a $3,000 instruction class. It speaks to the novice and advanced reader. Money well spent.
Falls Short of the Mark... Dec 14, 2005
This book has several serious shortcomings. There are numerous spelling and grammatical errors, and sentences sometimes just end abruptly right in mid-sentence. The typography is uneven with run-together letters and spaces breaking words into pieces. The writing style is often choppy and hard to follow. In short, this book has the appearance of a first draft that has not had the benefit of editing. The editors were really asleep on the job to let this one slip through.
Aside from all of the issues mentioned above, the real problem with this book is that it doesn't have any examples. Sure, it has examples for each configuration command, but so does the vendor documentation, and this just appears to be a rehash of that information. What are completely missing are detailed examples describing how to configure a Netscreen firewall in a real-world environment. I would like to have seen comprehensive examples of configurations for remote office, small office, and enterprise environments that include setting up VPNs, DMZs, and other complex tasks.
Bottom line: this book is riddled with mistakes that should never have gotten past the editors and falls far short of the mark when it comes to providing real-world configuration examples. It's no better than a poorly done rehash of the vendor documentation available free on Juniper's website.