Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW /
Annotation
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing,
2014.
|
Colección: | Community experience distilled.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | EBSCO_ocn896854761 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 141113s2014 enka o 001 0 eng d | ||
040 | |a E7B |b eng |e rda |e pn |c E7B |d OCLCO |d OCLCQ |d COCUF |d K6U |d CNNOR |d CCO |d PIFAG |d FVL |d N$T |d UMI |d DEBBG |d YDXCP |d DEBSZ |d OCLCF |d IDEBK |d EBLCP |d S4S |d COO |d REB |d FEM |d OCLCQ |d ZCU |d AGLDB |d MERUC |d OCLCQ |d U3W |d OCLCA |d D6H |d OCL |d STF |d VTS |d ICG |d INT |d VT2 |d OCLCQ |d G3B |d TKN |d OCLCQ |d DKC |d OCLCQ |d HS0 |d OCLCQ |d OCLCO |d OCLCQ | ||
019 | |a 894628929 |a 896723266 |a 907296568 |a 968113865 |a 969002160 | ||
020 | |a 9781849517737 |q (e-book) | ||
020 | |a 1849517738 |q (e-book) | ||
020 | |a 184951772X | ||
020 | |a 9781849517720 | ||
020 | |a 1322242631 | ||
020 | |a 9781322242637 | ||
020 | |z 9781849517720 | ||
029 | 1 | |a AU@ |b 000059333301 | |
029 | 1 | |a AU@ |b 000067103385 | |
029 | 1 | |a DEBBG |b BV042490243 | |
029 | 1 | |a DEBBG |b BV043613380 | |
029 | 1 | |a DEBSZ |b 422920673 | |
029 | 1 | |a DEBSZ |b 434834238 | |
029 | 1 | |a DEBSZ |b 493154310 | |
029 | 1 | |a DKDLA |b 820120-katalog:999935729805765 | |
029 | 1 | |a GBVCP |b 802479286 | |
035 | |a (OCoLC)896854761 |z (OCoLC)894628929 |z (OCoLC)896723266 |z (OCoLC)907296568 |z (OCoLC)968113865 |z (OCoLC)969002160 | ||
037 | |a CL0500000504 |b Safari Books Online | ||
050 | 4 | |a TK5105.59 |b .E43 2014eb | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a El-Bawab, Abd El-Monem A., |e author. | |
245 | 1 | 0 | |a Untangle network security : |b secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW / |c Abd El-Monem A. El-Bawab. |
264 | 1 | |a Birmingham : |b Packt Publishing, |c 2014. | |
300 | |a 1 online resource (351 pages) : |b illustrations (some color) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
490 | 1 | |a Community experience distilled | |
588 | 0 | |a Online resource; title from PDF title page (ebrary, viewed November 13, 2014). | |
500 | |a Includes index. | ||
520 | 8 | |a Annotation |b If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW. | |
505 | 0 | |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Untangle; Introducing Untangle, Inc.; An overview on information security; The CIA triad; Types of attacks; Types of controls; Defense in depth; Introducing Untangle NGFW; Untangle NGFW modules; Untangle packages; Licensing Untangle; Reviewing the change log; Summary; Chapter 2: Installing Untangle; Understanding the hardware requirements of Untangle NGFW; Untangle NGFW appliances; Building your Untangle NGFW box; Virtualizing your Untangle NGFW | |
505 | 8 | |a Tweaking your Untangle NGFWSetting up your lab; Getting Untangle; Writing your image; Untangle NGFW installation guide; Step 1 -- booting and selecting the installation mode; Step 2 -- selecting the installation wizard language; Step 3 -- configuring the system locale; Step 4 -- configuring the keymaps; Step 5 -- configuring the server time zone; Step 6 -- reviewing the hardware rating summary; Step 7 -- preparing the hard disk; Step 8 -- completing the installation; Summary; Chapter 3: The Initial Configuration of Untangle ; Understanding the boot options; The initial configuration wizard | |
505 | 8 | |a Step 1 -- selecting the wizard languageStep 2 -- setting the admin password and server time zone; Step 3 -- mapping the network cards; Step 4 -- configuring the Internet connection; Acquiring automatic configurations from DHCP; Manually configuring the interface settings; Step 5 -- configuring the Untangle NGFW operation mode; Understanding the router operation mode; Understanding the transparent bridge operation mode; Step 6 -- configuring the automatic upgrade settings; Step 7 -- finishing the initial configuration wizard; Registering your server; Reviewing the GUI | |
505 | 8 | |a Untangle NGFW administration optionsSummary; Chapter 4: Untangle Advanced Configuration; Untangle placement options; Understanding the architecture of Untangle NGFW; Managing Untangle NGFW interfaces; Common uses of additional interfaces; Configuring Untangle NGFW interfaces; Addressed interfaces; Bridged interfaces; VLANS; Configuring Untangle NGFW high availability; Configuring the Untangle NGFW hostname; Configuring Untangle NGFW Services ports; Untangle NGFW network services; Untangle NGFW as a router; Untangle NGFW DNS service; Untangle NGFW DHCP service; DNS and DHCP advanced options | |
505 | 8 | |a Configuring advanced network optionsUnderstanding Untangle NGFW rules; Port forward rules; NAT rules; Bypass rules; QoS rules; The seven priorities; Configuring the QoS settings; Configuring the QoS rules; Reviewing the QoS status; Filter rules; Troubleshooting; Summary; Chapter 5: Advanced Administration Settings; Configuring the administration settings; Managing the administrator accounts; Configuring the remote administration settings; Configuring the public address of Untangle NGFW; Configuring the regional settings; Configuring Untangle NGFW processing of protocols | |
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Computer security |x Security measures. | |
650 | 0 | |a Firewalls (Computer security) | |
650 | 6 | |a Sécurité informatique |x Sécurité |x Mesures. | |
650 | 6 | |a Coupe-feu (Sécurité informatique) | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x Online Safety & Privacy. |2 bisacsh | |
650 | 7 | |a Firewalls (Computer security) |2 fast |0 (OCoLC)fst00925719 | |
776 | 0 | 8 | |i Print version: |n Druck-Ausgabe |t El-Bawab, Abd El-Monem A. Untangle Network Security |
830 | 0 | |a Community experience distilled. | |
856 | 4 | 0 | |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=883033 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781849517720/?ar |z Texto completo |
938 | |a EBL - Ebook Library |b EBLB |n EBL1831903 | ||
938 | |a ebrary |b EBRY |n ebr10967762 | ||
938 | |a EBSCOhost |b EBSC |n 883033 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis30035918 | ||
938 | |a YBP Library Services |b YANK |n 12147652 | ||
994 | |a 92 |b IZTAP |