- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
New Trade Paper
Ships in 1 to 3 days
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Screenos Cookbookby Stefan Brunner
Synopses & Reviews
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep ScreenOS systems on track.
Book News Annotation:
Written by key members of Juniper Network's principal ScreenOS support and field engineering teams, this book offers a guide to managing secure networks that run ScreenOS firewall appliances. The recipes collected address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work. The real- world fixes, techniques, and configurations provided here come directly from the experiences of engineers who have worked with every ScreenOS network topology, from small branch office firewalls to appliances for large enterprise, government, and protocol-driven service provider networks. The audience for the book includes those charged with managing, operating, and configuring Juniper Networks' ScreenOS security devices, including skilled network administrators and engineers with medium-level knowledge of ScreenOS, and medium- to advanced-level network security administrators and engineers who are coming from another vendor's product line. Readers are assumed to be familiar with the ScreenOS CLI, and with firewalls, VPNs, network security issues, TCP/IP, routing basics, and routing protocols. Brunner is a technology consultant. Annotation ©2008 Book News, Inc., Portland, OR (booknews.com)
About the Author
Stefan Brunner has been a technology consultant for more than 15years, helping enterprises to leverage technology for their businessmodel and deploy technology solutions. Stefan is the lead architectin Juniper Networks' Service Layer Technology Professional Servicesgroup. Prior to Juniper, Stefan worked with NetScreen Technologies asa network security consultant. Stefan holds an MBA in innovationsresearch and technology management from Ludwig-Maximilians-Universityof Munich, and a certificate degree in telecommunications engineeringfrom the University of California at Berkeley. He lives with his wifeand daughter in the Hill Country of Austin, Texas.
Vik Davar has been working in the IT field for more than 15 years,holding positions in financial services firms and technologycompanies including Juniper Networks and Goldman Sachs. Vik is thepresident of 9 Networks, an IT services company. He has a master'sdegree in electrical engineering from Columbia University and abachelor's degree in electrical engineering from The Cooper Union inNew York City. He is also a CISSP and CCIE# 8377. He lives in NewJersey with his wife and two children.
David Delcourt has worked in the data communications industry for thepast 13 years for enterprise equipment vendors including CabletronSystems and NetScreen Technologies. He has held a variety ofpositions, including advanced TAC engineer, technical trainer, andproduct manager at Cabletron Systems, and senior security consultantat NetScreen Technologies. He is currently the security practicemanager in Professional Services for Juniper Networks, supporting theAmericas. He lives in New Hampshire with his wife and daughter, andtheir two dogs and two cats.
Ken Draper has spent the past 20 years in the networking industry,and has focused on security solutions for the past 11 years. He isCISSP certification #22627 and holds numerous other certifications.Ken has worked at such networking equipment manufacturers asInfotron, Gandalf, Synoptics, Bay Networks, Nortel, NetScreen, andnow Juniper Networks. He has more than six years of experience withScreenOS and large-scale security solutions, he has held a variety oftechnical engineering positions including systems engineer andsolutions architect, and he is currently a Juniper Networksconsulting engineer specializing in the large-scale virtual privatenetwork (VPN), firewall, intrusion prevention, and centralizedmanagement markets. Ken lives outside Dallas with his wife and twodogs.
Joe Kelly has been involved in data networking for more than 12years, focusing on the realms of network security and routing. Hestarted his career in the service provider space at IDT Corporation,where he held roles in network operations and engineering. After IDT,he spent time with various network service providers in engineeringand architectural capacities. In 2001, Joe joined NetScreenTechnologies as a senior systems engineer in the Financial andService Provider verticals, where he specialized in high-availability, high-performance networks. Joe joined Juniper Networksin 2004 with the acquisition of NetScreen, and he is currently thetechnical lead on the Global Banking and Finance team. He lives inNew Jersey with his beautiful wife, Jacqueline, and his threechildren, Hannah, Ben, and Tristan.
Sunil Wadhwa has been in the data networking industry for more than13 years, focusing on systems, network routing, and security inenterprise and service provider organizations. He started his careerin India at GTL Limited and SAP India, and then held a variety ofroles in technical support, network operations, and engineering. Hemoved to the United States and worked with E4E as a networkconsultant for routing and security, and then joined Juniper Networksas an advanced technical support engineer for firewall/VPN products.He currently leads the Advance Technical Support team for JuniperNetworks, supporting enhanced services products. He lives inCalifornia with his beautiful wife, Lavanya, and little angeldaughter, Sneha.
Table of Contents
CreditsGlossaryPrefaceChapter 1: ScreenOS CLI, Architecture, and TroubleshootingChapter 2: Firewall Configuration and ManagementChapter 3: WirelessChapter 4: Route Mode and Static RoutingChapter 5: Transparent ModeChapter 6: Leveraging IP Services in ScreenOSChapter 7: PoliciesChapter 8: Network Address TranslationChapter 9: Mitigating Attacks with Screens and Flow SettingsChapter 10: IPSec VPNChapter 11: Application Layer GatewaysChapter 12: Content SecurityChapter 13: User AuthenticationChapter 14: Traffic ShapingChapter 15: RIPChapter 16: OSPFChapter 17: BGPChapter 18: High Availability with NSRPChapter 19: Policy-Based RoutingChapter 20: MulticastChapter 21: Virtual SystemsColophon
What Our Readers Are Saying
Children's » General