O’Reilly’s book Junos security continues as Juniper SRX Series Alan Gravett

The long time awaited book is finally here, released just this June. The book is complete field guide, authorized by Juniper Networks. For everyone interested in or working with Junos SRX devices is a must to have in library. Perfect hands-on reference for deploying, configuring, and operating Juniper’s SRX Series networking device. Authors Brad Woodberg and Rob Cameron provide field-tested best practices for getting the most out of SRX deployments, based on their extensive field experience.

While their earlier book, Junos Security, covered the SRX platform, this book focuses on the SRX Series devices themselves. You’ll learn how to use SRX gateways to address an array of network requirements—including IP routing, intrusion detection, attack mitigation, unified threat management, and WAN acceleration. Along with case studies and troubleshooting tips, each chapter provides study questions and lots of useful illustrations.

Title: Juniper SRX Series
By: Brad Woodberg, Rob Cameron
Publisher: O’Reilly Media
Formats:
Print
Ebook
Safari Books Online
Print: June 2013
Ebook: June 2013
Pages: 1020
Print ISBN: 978-1-4493-3896-1| ISBN 10: 1-4493-3896-8
Ebook ISBN: 978-1-4493-3895-4| ISBN 10: 1-4493-3895-X

Chapter 1 Welcome to the SRX
Evolving into the SRX
The SRX Series Platform
Deployment Solutions
Summary
Study Questions

Chapter 2 SRX Series Product Lines
Branch SRX Series
Data Center SRX Series
Summary
Study Questions

Chapter 3 SRX GUI Management
J-Web: Your On-Box Assistant
Centralized Management
Summary
Study Questions

Chapter 4 SRX Networking Basics
Interfaces
Zones
Basic Protocols
Routing Instances
Flow Mode and Packet Mode
Sample Deployment
Summary
Study Questions

Chapter 5 System Services
System Services Operation on the SRX
Management Services
SNMP Management
Networking Services
SRX Logging and Flow Records
Best Practices
Troubleshooting and Operation
Summary
Study Questions

Chapter 6 Transparent Mode
Transparent Mode Overview
Configuring Transparent Mode
Troubleshooting and Operation
Sample Deployments
Summary
Study Questions

Chapter 7 High Availability
Understanding High Availability in the SRX
Getting Started with High Availability
Deployment Concepts
Preparing Devices for Deployment
Integrating the Cluster into Your Network
Fault Monitoring
Troubleshooting and Operation
Sample Deployments
Summary
Study Questions

Chapter 8 Security Policies
Packet Flow
Security Policy Criteria and Precedence
Security Policy Precedence
Security Policy Components in Depth
Best Practices
Troubleshooting and Operation
Sample Deployment
Summary
Study Questions

Chapter 9 Network Address Translation
The Need for NAT
Junos NAT Fundamentals
Junos NAT Components
Junos NAT in Practice
Best Practices
Troubleshooting and Operation
Sample Deployment
Summary
Study Questions

Chapter 10 IPsec VPN
VPN Architecture Overview
IPsec VPN Concepts Overview
IKE Negotiations
Flow Processing and IPsec VPNs
SRX VPN Types
Other SRX VPN Components
Selecting the Appropriate VPN Configuration
IPsec VPN Configuration
Best Practices
Troubleshooting and Operation
Sample Deployments
Summary
Study Questions

Chapter 11 Screens and Flow Options
A Brief Review of Denial-of-Service Attacks
Screen Theory and Examples
Best Practices
Troubleshooting and Operation
Sample Deployment
Summary
Study Questions

Chapter 12 AppSecure Basics
AppSecure Component Overview
Deploying AppSecure
Best Practices
Troubleshooting and Operation
Sample Deployments
Summary
Study Questions

Chapter 13 Intrusion Prevention
The Need for IPS
How Does IPS Work?
Configuring IPS Features on the SRX
Deploying and Tuning IPS
Best Practices
Troubleshooting and Operation
Sample Deployments
Summary
Study Questions

Chapter 14 Unified Threat Management
Shifting Threats
UTM, IPS, or Both?
UTM Licensing
UTM Components
Best Practices
Troubleshooting and Operation
Sample Deployments
Summary
Study Questions
Colophon

Resource: http://shop.oreilly.com/product/0636920026785.do

Written by Alan Gravett on
deep wrote:

hi.

Posted on

Leave a comment