- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
New Trade Paper
Ships in 1 to 3 days
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
More copies of this ISBN
Juniper Srx Seriesby Brad Woodberg
Synopses & Reviews
This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Junipers SRX Series networking device. Authors Brad Woodberg and Rob Cameron provide field-tested best practices for getting the most out of SRX deployments, based on their extensive field experience.
While their earlier book, Junos Security, covered the SRX platform, this book focuses on the SRX Series devices themselves. You'll learn how to use SRX gateways to address an array of network requirements—including IP routing, intrusion detection, attack mitigation, unified threat management, and WAN acceleration. Along with case studies and troubleshooting tips, each chapter provides study questions and lots of useful illustrations.
Book News Annotation:
In a field guide authorized by the manufacturer, Woodberg and Cameron explains how to deploy, configure, and operate Juniper Network's SRX networking device. They cover SRX series product lines, SRX GUI management, SRX networking basics, system services, transparent mode, high availability, security policies, network address translation, Ipsec VPN, screens and flow options, AppSecure basics, intrusion prevention, and unified threat management. They assume readers have some background in networking, but review the fundamentals just in case. Annotation ©2014 Ringgold, Inc., Portland, OR (protoview.com)
This complete and authorized introduction to Juniper Networks SRX hardware series has been thoroughly revised and updated to cover the impressive changes SRX has undergone from its initial deployments—including more advanced level firewalling, deep packet inspection, and flow routing.
Juniper SRX Series provides a practical, hands-on field guide to deploying, configuring, and operating SRX, and serves as a reference to help you prepare for JUNOS Security Certification examinations offered by Juniper Networks.
Youll learn how to use SRX JUNOS services gateways to address an array of enterprise data network requirements—including IP routing, intrusion detection, attack mitigation, unified threat management, and WAN acceleration. The only book on the market addressing SRX platforms and software, Juniper SRX Series provides a clear and detailed roadmap to these product lines.
About the Author
Brad Woodberg is a Product Line Engineer at Juniper Networks. He is JNCIE-M, JNCIE-SEC, JNCIS-FWV, JNCIS-SSL, JNCIA-IDP, JNCIA-EX, JNCIA-UAC, CCNP R&S and holds a bachelors degree in computer engineering from Michigan State University. Before joining Juniper Networks, he spent four and a half years working at a Juniper reseller where he designed, deployed, supported, and managed computer networks worldwide with equipment from a variety of vendors. In addition to being a co-author of Junos Security, he is a coauthor of Juniper Net- works NetScreen and SSG Firewalls and Juniper Networks Secure SSL VPN, both published by Syngress.
Rob Cameron is a Principal Engineer at a stealth startup in Silicon Valley. In his 12-plus-year career, he has held positions as a security reseller, service provider engineer, and security consultant. For the past eight years, he has worked for Juniper Networks as a systems engineer, a data center architect, and a technical marketing engineer. He is the primary author of the books Junos Security, Configuring NetScreen Firewalls and Configuring NetScreen and SSG Firewalls, both published by Syngress. He is also a contributing author of Security Interviews Exposed and the Best Damn Firewall Book Period, Second Edition (also published by Syngress), and has been a technical reviewer for any number of professional publications.
Table of Contents
ForewordPrefaceChapter 1: Welcome to the SRXChapter 2: SRX Series Product LinesChapter 3: SRX GUI ManagementChapter 4: SRX Networking BasicsChapter 5: System ServicesChapter 6: Transparent ModeChapter 7: High AvailabilityChapter 8: Security PoliciesChapter 9: Network Address TranslationChapter 10: IPsec VPNChapter 11: Screens and Flow OptionsChapter 12: AppSecure BasicsChapter 13: Intrusion PreventionChapter 14: Unified Threat ManagementColophon
What Our Readers Are Saying