[ISN] REVIEW: "Configuring SonicWALL Firewalls", Chris Lathem et al

From: InfoSec News (isn@private)
Date: Fri Jun 30 2006 - 09:37:50 PDT


Forwarded from: "Rob, grandpa of Ryan, Trevor, Devon & Hannah" <rMslade@private>

BKCNSWFW.RVW   20060602

"Configuring SonicWALL Firewalls", Chris Lathem et al, 2006,
1-59749-250-7, U$49.95/C$69.95
%A   Chris Lathem
%C   800 Hingham Street, Rockland, MA   02370
%D   2006
%G   1-59749-250-7
%I   Syngress Media, Inc.
%O   U$49.95/C$69.95 781-681-5151 fax: 781-681-3585 amy@private
%O  http://www.amazon.com/exec/obidos/ASIN/1597492507/robsladesinterne
  http://www.amazon.co.uk/exec/obidos/ASIN/1597492507/robsladesinte-21
%O   http://www.amazon.ca/exec/obidos/ASIN/1597492507/robsladesin03-20
%O   Audience i- Tech 2 Writing 1 (see revfaq.htm for explanation)
%P   500 p.
%T   "Configuring SonicWALL Firewalls"

Chapter one provides an overview of the basics of networking,
information security (at a rather simplistic level), and firewalls. 
The features of SonicWALL devices are described in chapter two.  The
material is mostly at sales brochure level.  While some negative
points are raised the text is not particularly careful: at one point
we are told that the SonicWALL can terminate any type of VPN (Virtual
Private Network), while later it is admitted that it can terminate any
IPSec VPN.  Management and configuration is covered in chapter three,
although the command line interface gets pretty short shrift.  Access
control and policy management is dealt with in chapter four.  Chapter
five reviews user accounts and authentication.  The two routing
protocols possible with SonicWALL, RIP (Routing Information Protocol)
and OSPF (Open Shortest Path First), are described in chapter six. 
Chapter seven explains network address translation (NAT) and lists the
SonicWALL dialogue boxes for it.  Transparent (layer two) mode
screenshots are contained in chapter eight.  Chapter nine throws
around terms like "attack detection and defence" and "intrusion
prevention" but is really a list of the application proxy setting
screens.  IPSec adjustments are shown in chapter ten.  Availability
and redundancy functions are described in eleven.  "Troubleshooting,"
in chapter twelve, enumerates various utilities and diagnostics. 
Chapter thirteen shows shots of the multi-device management system.

This is a decent enough replacement for vendor documentation, but not
much more.

copyright Robert M. Slade, 2006   BKCNSWFW.RVW   20060602


======================  (quote inserted randomly by Pegasus Mailer)
rslade@private     slade@private     rslade@private
     It is bad to suppress laughter;
     it goes back down and spreads to your hips.
Dictionary Information Security     www.syngress.com/catalog/?pid=4150
http://victoria.tc.ca/techrev/rms.htm



_________________________________
Attend the Black Hat Briefings and
Training, Las Vegas July 29 - August 3
2,500+ international security experts from 40 nations,
10 tracks, no vendor pitches.
www.blackhat.com



This archive was generated by hypermail 2.1.3 : Fri Jun 30 2006 - 10:22:30 PDT