Forwarded from: "Rob, grandpa of Ryan, Trevor, Devon & Hannah" <rMslade@private> BKCNSWFW.RVW 20060602 "Configuring SonicWALL Firewalls", Chris Lathem et al, 2006, 1-59749-250-7, U$49.95/C$69.95 %A Chris Lathem %C 800 Hingham Street, Rockland, MA 02370 %D 2006 %G 1-59749-250-7 %I Syngress Media, Inc. %O U$49.95/C$69.95 781-681-5151 fax: 781-681-3585 amy@private %O http://www.amazon.com/exec/obidos/ASIN/1597492507/robsladesinterne http://www.amazon.co.uk/exec/obidos/ASIN/1597492507/robsladesinte-21 %O http://www.amazon.ca/exec/obidos/ASIN/1597492507/robsladesin03-20 %O Audience i- Tech 2 Writing 1 (see revfaq.htm for explanation) %P 500 p. %T "Configuring SonicWALL Firewalls" Chapter one provides an overview of the basics of networking, information security (at a rather simplistic level), and firewalls. The features of SonicWALL devices are described in chapter two. The material is mostly at sales brochure level. While some negative points are raised the text is not particularly careful: at one point we are told that the SonicWALL can terminate any type of VPN (Virtual Private Network), while later it is admitted that it can terminate any IPSec VPN. Management and configuration is covered in chapter three, although the command line interface gets pretty short shrift. Access control and policy management is dealt with in chapter four. Chapter five reviews user accounts and authentication. The two routing protocols possible with SonicWALL, RIP (Routing Information Protocol) and OSPF (Open Shortest Path First), are described in chapter six. Chapter seven explains network address translation (NAT) and lists the SonicWALL dialogue boxes for it. Transparent (layer two) mode screenshots are contained in chapter eight. Chapter nine throws around terms like "attack detection and defence" and "intrusion prevention" but is really a list of the application proxy setting screens. IPSec adjustments are shown in chapter ten. Availability and redundancy functions are described in eleven. "Troubleshooting," in chapter twelve, enumerates various utilities and diagnostics. Chapter thirteen shows shots of the multi-device management system. This is a decent enough replacement for vendor documentation, but not much more. copyright Robert M. Slade, 2006 BKCNSWFW.RVW 20060602 ====================== (quote inserted randomly by Pegasus Mailer) rslade@private slade@private rslade@private It is bad to suppress laughter; it goes back down and spreads to your hips. Dictionary Information Security www.syngress.com/catalog/?pid=4150 http://victoria.tc.ca/techrev/rms.htm _________________________________ Attend the Black Hat Briefings and Training, Las Vegas July 29 - August 3 2,500+ international security experts from 40 nations, 10 tracks, no vendor pitches. www.blackhat.com
This archive was generated by hypermail 2.1.3 : Fri Jun 30 2006 - 10:22:30 PDT