Loading ...
Sorry, an error occurred while loading the content.

REVIEW: "Configuring SonicWALL Firewalls", Chris Lathem et al

Expand Messages
  • Rob, grandpa of Ryan, Trevor, Devon & Ha
    BKCNSWFW.RVW 20060602 Configuring SonicWALL Firewalls , Chris Lathem et al, 2006, 1-59749-250-7, U$49.95/C$69.95 %A Chris Lathem %C 800 Hingham Street,
    Message 1 of 1 , Jun 29, 2006
      BKCNSWFW.RVW 20060602

      "Configuring SonicWALL Firewalls", Chris Lathem et al, 2006,
      1-59749-250-7, U$49.95/C$69.95
      %A Chris Lathem
      %C 800 Hingham Street, Rockland, MA 02370
      %D 2006
      %G 1-59749-250-7
      %I Syngress Media, Inc.
      %O U$49.95/C$69.95 781-681-5151 fax: 781-681-3585 amy@...
      %O http://www.amazon.com/exec/obidos/ASIN/1597492507/robsladesinterne
      %O http://www.amazon.ca/exec/obidos/ASIN/1597492507/robsladesin03-20
      %O Audience i- Tech 2 Writing 1 (see revfaq.htm for explanation)
      %P 500 p.
      %T "Configuring SonicWALL Firewalls"

      Chapter one provides an overview of the basics of networking,
      information security (at a rather simplistic level), and firewalls.
      The features of SonicWALL devices are described in chapter two. The
      material is mostly at sales brochure level. While some negative
      points are raised the text is not particularly careful: at one point
      we are told that the SonicWALL can terminate any type of VPN (Virtual
      Private Network), while later it is admitted that it can terminate any
      IPSec VPN. Management and configuration is covered in chapter three,
      although the command line interface gets pretty short shrift. Access
      control and policy management is dealt with in chapter four. Chapter
      five reviews user accounts and authentication. The two routing
      protocols possible with SonicWALL, RIP (Routing Information Protocol)
      and OSPF (Open Shortest Path First), are described in chapter six.
      Chapter seven explains network address translation (NAT) and lists the
      SonicWALL dialogue boxes for it. Transparent (layer two) mode
      screenshots are contained in chapter eight. Chapter nine throws
      around terms like "attack detection and defence" and "intrusion
      prevention" but is really a list of the application proxy setting
      screens. IPSec adjustments are shown in chapter ten. Availability
      and redundancy functions are described in eleven. "Troubleshooting,"
      in chapter twelve, enumerates various utilities and diagnostics.
      Chapter thirteen shows shots of the multi-device management system.

      This is a decent enough replacement for vendor documentation, but not
      much more.

      copyright Robert M. Slade, 2006 BKCNSWFW.RVW 20060602

      ====================== (quote inserted randomly by Pegasus Mailer)
      rslade@... slade@... rslade@...
      What a waste it is to lose one's mind. Or not to have a mind is
      being very wasteful. How true that is. - Dan Quayle
      Dictionary Information Security www.syngress.com/catalog/?pid=4150
    Your message has been successfully submitted and would be delivered to recipients shortly.