Untangle network security :: secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW /
Annotation
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing,
2014.
|
Schriftenreihe: | Community experience distilled.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Annotation |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (351 pages) : illustrations (some color) |
ISBN: | 9781849517737 1849517738 184951772X 9781849517720 1322242631 9781322242637 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn896854761 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 141113s2014 enka o 001 0 eng d | ||
040 | |a E7B |b eng |e rda |e pn |c E7B |d OCLCO |d OCLCQ |d COCUF |d K6U |d CNNOR |d CCO |d PIFAG |d FVL |d N$T |d UMI |d DEBBG |d YDXCP |d DEBSZ |d OCLCF |d IDEBK |d EBLCP |d S4S |d COO |d REB |d FEM |d OCLCQ |d ZCU |d AGLDB |d MERUC |d OCLCQ |d U3W |d OCLCA |d D6H |d OCL |d STF |d VTS |d ICG |d INT |d VT2 |d OCLCQ |d G3B |d TKN |d OCLCQ |d DKC |d OCLCQ |d HS0 |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ | ||
019 | |a 894628929 |a 896723266 |a 907296568 |a 968113865 |a 969002160 | ||
020 | |a 9781849517737 |q (e-book) | ||
020 | |a 1849517738 |q (e-book) | ||
020 | |a 184951772X | ||
020 | |a 9781849517720 | ||
020 | |a 1322242631 | ||
020 | |a 9781322242637 | ||
020 | |z 9781849517720 | ||
035 | |a (OCoLC)896854761 |z (OCoLC)894628929 |z (OCoLC)896723266 |z (OCoLC)907296568 |z (OCoLC)968113865 |z (OCoLC)969002160 | ||
037 | |a CL0500000504 |b Safari Books Online | ||
050 | 4 | |a TK5105.59 |b .E43 2014eb | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a El-Bawab, Abd El-Monem A., |e author. | |
245 | 1 | 0 | |a Untangle network security : |b secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW / |c Abd El-Monem A. El-Bawab. |
264 | 1 | |a Birmingham : |b Packt Publishing, |c 2014. | |
300 | |a 1 online resource (351 pages) : |b illustrations (some color) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
490 | 1 | |a Community experience distilled | |
588 | 0 | |a Online resource; title from PDF title page (ebrary, viewed November 13, 2014). | |
500 | |a Includes index. | ||
520 | 8 | |a Annotation |b If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW. | |
505 | 0 | |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Untangle; Introducing Untangle, Inc.; An overview on information security; The CIA triad; Types of attacks; Types of controls; Defense in depth; Introducing Untangle NGFW; Untangle NGFW modules; Untangle packages; Licensing Untangle; Reviewing the change log; Summary; Chapter 2: Installing Untangle; Understanding the hardware requirements of Untangle NGFW; Untangle NGFW appliances; Building your Untangle NGFW box; Virtualizing your Untangle NGFW | |
505 | 8 | |a Tweaking your Untangle NGFWSetting up your lab; Getting Untangle; Writing your image; Untangle NGFW installation guide; Step 1 -- booting and selecting the installation mode; Step 2 -- selecting the installation wizard language; Step 3 -- configuring the system locale; Step 4 -- configuring the keymaps; Step 5 -- configuring the server time zone; Step 6 -- reviewing the hardware rating summary; Step 7 -- preparing the hard disk; Step 8 -- completing the installation; Summary; Chapter 3: The Initial Configuration of Untangle ; Understanding the boot options; The initial configuration wizard | |
505 | 8 | |a Step 1 -- selecting the wizard languageStep 2 -- setting the admin password and server time zone; Step 3 -- mapping the network cards; Step 4 -- configuring the Internet connection; Acquiring automatic configurations from DHCP; Manually configuring the interface settings; Step 5 -- configuring the Untangle NGFW operation mode; Understanding the router operation mode; Understanding the transparent bridge operation mode; Step 6 -- configuring the automatic upgrade settings; Step 7 -- finishing the initial configuration wizard; Registering your server; Reviewing the GUI | |
505 | 8 | |a Untangle NGFW administration optionsSummary; Chapter 4: Untangle Advanced Configuration; Untangle placement options; Understanding the architecture of Untangle NGFW; Managing Untangle NGFW interfaces; Common uses of additional interfaces; Configuring Untangle NGFW interfaces; Addressed interfaces; Bridged interfaces; VLANS; Configuring Untangle NGFW high availability; Configuring the Untangle NGFW hostname; Configuring Untangle NGFW Services ports; Untangle NGFW network services; Untangle NGFW as a router; Untangle NGFW DNS service; Untangle NGFW DHCP service; DNS and DHCP advanced options | |
505 | 8 | |a Configuring advanced network optionsUnderstanding Untangle NGFW rules; Port forward rules; NAT rules; Bypass rules; QoS rules; The seven priorities; Configuring the QoS settings; Configuring the QoS rules; Reviewing the QoS status; Filter rules; Troubleshooting; Summary; Chapter 5: Advanced Administration Settings; Configuring the administration settings; Managing the administrator accounts; Configuring the remote administration settings; Configuring the public address of Untangle NGFW; Configuring the regional settings; Configuring Untangle NGFW processing of protocols | |
650 | 0 | |a Computer security |x Security measures. | |
650 | 0 | |a Firewalls (Computer security) |0 http://id.loc.gov/authorities/subjects/sh00006011 | |
650 | 6 | |a Sécurité informatique |x Sécurité |x Mesures. | |
650 | 6 | |a Coupe-feu (Sécurité informatique) | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x Online Safety & Privacy. |2 bisacsh | |
650 | 7 | |a Firewalls (Computer security) |2 fast | |
758 | |i has work: |a Untangle network security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYTtxDq8dx7j3dqQMcw3PP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |n Druck-Ausgabe |t El-Bawab, Abd El-Monem A. Untangle Network Security |
830 | 0 | |a Community experience distilled. |0 http://id.loc.gov/authorities/names/no2011030603 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=883033 |3 Volltext |
938 | |a EBL - Ebook Library |b EBLB |n EBL1831903 | ||
938 | |a ebrary |b EBRY |n ebr10967762 | ||
938 | |a EBSCOhost |b EBSC |n 883033 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis30035918 | ||
938 | |a YBP Library Services |b YANK |n 12147652 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn896854761 |
---|---|
_version_ | 1816882295246684161 |
adam_text | |
any_adam_object | |
author | El-Bawab, Abd El-Monem A. |
author_facet | El-Bawab, Abd El-Monem A. |
author_role | aut |
author_sort | El-Bawab, Abd El-Monem A. |
author_variant | a e m a e b aemae aemaeb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .E43 2014eb |
callnumber-search | TK5105.59 .E43 2014eb |
callnumber-sort | TK 45105.59 E43 42014EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Untangle; Introducing Untangle, Inc.; An overview on information security; The CIA triad; Types of attacks; Types of controls; Defense in depth; Introducing Untangle NGFW; Untangle NGFW modules; Untangle packages; Licensing Untangle; Reviewing the change log; Summary; Chapter 2: Installing Untangle; Understanding the hardware requirements of Untangle NGFW; Untangle NGFW appliances; Building your Untangle NGFW box; Virtualizing your Untangle NGFW Tweaking your Untangle NGFWSetting up your lab; Getting Untangle; Writing your image; Untangle NGFW installation guide; Step 1 -- booting and selecting the installation mode; Step 2 -- selecting the installation wizard language; Step 3 -- configuring the system locale; Step 4 -- configuring the keymaps; Step 5 -- configuring the server time zone; Step 6 -- reviewing the hardware rating summary; Step 7 -- preparing the hard disk; Step 8 -- completing the installation; Summary; Chapter 3: The Initial Configuration of Untangle ; Understanding the boot options; The initial configuration wizard Step 1 -- selecting the wizard languageStep 2 -- setting the admin password and server time zone; Step 3 -- mapping the network cards; Step 4 -- configuring the Internet connection; Acquiring automatic configurations from DHCP; Manually configuring the interface settings; Step 5 -- configuring the Untangle NGFW operation mode; Understanding the router operation mode; Understanding the transparent bridge operation mode; Step 6 -- configuring the automatic upgrade settings; Step 7 -- finishing the initial configuration wizard; Registering your server; Reviewing the GUI Untangle NGFW administration optionsSummary; Chapter 4: Untangle Advanced Configuration; Untangle placement options; Understanding the architecture of Untangle NGFW; Managing Untangle NGFW interfaces; Common uses of additional interfaces; Configuring Untangle NGFW interfaces; Addressed interfaces; Bridged interfaces; VLANS; Configuring Untangle NGFW high availability; Configuring the Untangle NGFW hostname; Configuring Untangle NGFW Services ports; Untangle NGFW network services; Untangle NGFW as a router; Untangle NGFW DNS service; Untangle NGFW DHCP service; DNS and DHCP advanced options Configuring advanced network optionsUnderstanding Untangle NGFW rules; Port forward rules; NAT rules; Bypass rules; QoS rules; The seven priorities; Configuring the QoS settings; Configuring the QoS rules; Reviewing the QoS status; Filter rules; Troubleshooting; Summary; Chapter 5: Advanced Administration Settings; Configuring the administration settings; Managing the administrator accounts; Configuring the remote administration settings; Configuring the public address of Untangle NGFW; Configuring the regional settings; Configuring Untangle NGFW processing of protocols |
ctrlnum | (OCoLC)896854761 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06548cam a2200721 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn896854761</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">141113s2014 enka o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">E7B</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">E7B</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COCUF</subfield><subfield code="d">K6U</subfield><subfield code="d">CNNOR</subfield><subfield code="d">CCO</subfield><subfield code="d">PIFAG</subfield><subfield code="d">FVL</subfield><subfield code="d">N$T</subfield><subfield code="d">UMI</subfield><subfield code="d">DEBBG</subfield><subfield code="d">YDXCP</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">IDEBK</subfield><subfield code="d">EBLCP</subfield><subfield code="d">S4S</subfield><subfield code="d">COO</subfield><subfield code="d">REB</subfield><subfield code="d">FEM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ZCU</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">D6H</subfield><subfield code="d">OCL</subfield><subfield code="d">STF</subfield><subfield code="d">VTS</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">G3B</subfield><subfield code="d">TKN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">HS0</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">894628929</subfield><subfield code="a">896723266</subfield><subfield code="a">907296568</subfield><subfield code="a">968113865</subfield><subfield code="a">969002160</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849517737</subfield><subfield code="q">(e-book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849517738</subfield><subfield code="q">(e-book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">184951772X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849517720</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1322242631</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781322242637</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781849517720</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)896854761</subfield><subfield code="z">(OCoLC)894628929</subfield><subfield code="z">(OCoLC)896723266</subfield><subfield code="z">(OCoLC)907296568</subfield><subfield code="z">(OCoLC)968113865</subfield><subfield code="z">(OCoLC)969002160</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000504</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.E43 2014eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">El-Bawab, Abd El-Monem A.,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Untangle network security :</subfield><subfield code="b">secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW /</subfield><subfield code="c">Abd El-Monem A. El-Bawab.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (351 pages) :</subfield><subfield code="b">illustrations (some color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from PDF title page (ebrary, viewed November 13, 2014).</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Annotation</subfield><subfield code="b">If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Untangle; Introducing Untangle, Inc.; An overview on information security; The CIA triad; Types of attacks; Types of controls; Defense in depth; Introducing Untangle NGFW; Untangle NGFW modules; Untangle packages; Licensing Untangle; Reviewing the change log; Summary; Chapter 2: Installing Untangle; Understanding the hardware requirements of Untangle NGFW; Untangle NGFW appliances; Building your Untangle NGFW box; Virtualizing your Untangle NGFW</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Tweaking your Untangle NGFWSetting up your lab; Getting Untangle; Writing your image; Untangle NGFW installation guide; Step 1 -- booting and selecting the installation mode; Step 2 -- selecting the installation wizard language; Step 3 -- configuring the system locale; Step 4 -- configuring the keymaps; Step 5 -- configuring the server time zone; Step 6 -- reviewing the hardware rating summary; Step 7 -- preparing the hard disk; Step 8 -- completing the installation; Summary; Chapter 3: The Initial Configuration of Untangle ; Understanding the boot options; The initial configuration wizard</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Step 1 -- selecting the wizard languageStep 2 -- setting the admin password and server time zone; Step 3 -- mapping the network cards; Step 4 -- configuring the Internet connection; Acquiring automatic configurations from DHCP; Manually configuring the interface settings; Step 5 -- configuring the Untangle NGFW operation mode; Understanding the router operation mode; Understanding the transparent bridge operation mode; Step 6 -- configuring the automatic upgrade settings; Step 7 -- finishing the initial configuration wizard; Registering your server; Reviewing the GUI</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Untangle NGFW administration optionsSummary; Chapter 4: Untangle Advanced Configuration; Untangle placement options; Understanding the architecture of Untangle NGFW; Managing Untangle NGFW interfaces; Common uses of additional interfaces; Configuring Untangle NGFW interfaces; Addressed interfaces; Bridged interfaces; VLANS; Configuring Untangle NGFW high availability; Configuring the Untangle NGFW hostname; Configuring Untangle NGFW Services ports; Untangle NGFW network services; Untangle NGFW as a router; Untangle NGFW DNS service; Untangle NGFW DHCP service; DNS and DHCP advanced options</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Configuring advanced network optionsUnderstanding Untangle NGFW rules; Port forward rules; NAT rules; Bypass rules; QoS rules; The seven priorities; Configuring the QoS settings; Configuring the QoS rules; Reviewing the QoS status; Filter rules; Troubleshooting; Summary; Chapter 5: Advanced Administration Settings; Configuring the administration settings; Managing the administrator accounts; Configuring the remote administration settings; Configuring the public address of Untangle NGFW; Configuring the regional settings; Configuring Untangle NGFW processing of protocols</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh00006011</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Coupe-feu (Sécurité informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">Online Safety & Privacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Untangle network security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYTtxDq8dx7j3dqQMcw3PP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">El-Bawab, Abd El-Monem A. Untangle Network Security</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Community experience distilled.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2011030603</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=883033</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1831903</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10967762</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">883033</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis30035918</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12147652</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn896854761 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:26:20Z |
institution | BVB |
isbn | 9781849517737 1849517738 184951772X 9781849517720 1322242631 9781322242637 |
language | English |
oclc_num | 896854761 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (351 pages) : illustrations (some color) |
psigel | ZDB-4-EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Packt Publishing, |
record_format | marc |
series | Community experience distilled. |
series2 | Community experience distilled |
spelling | El-Bawab, Abd El-Monem A., author. Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW / Abd El-Monem A. El-Bawab. Birmingham : Packt Publishing, 2014. 1 online resource (351 pages) : illustrations (some color) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Community experience distilled Online resource; title from PDF title page (ebrary, viewed November 13, 2014). Includes index. Annotation If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW. Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Untangle; Introducing Untangle, Inc.; An overview on information security; The CIA triad; Types of attacks; Types of controls; Defense in depth; Introducing Untangle NGFW; Untangle NGFW modules; Untangle packages; Licensing Untangle; Reviewing the change log; Summary; Chapter 2: Installing Untangle; Understanding the hardware requirements of Untangle NGFW; Untangle NGFW appliances; Building your Untangle NGFW box; Virtualizing your Untangle NGFW Tweaking your Untangle NGFWSetting up your lab; Getting Untangle; Writing your image; Untangle NGFW installation guide; Step 1 -- booting and selecting the installation mode; Step 2 -- selecting the installation wizard language; Step 3 -- configuring the system locale; Step 4 -- configuring the keymaps; Step 5 -- configuring the server time zone; Step 6 -- reviewing the hardware rating summary; Step 7 -- preparing the hard disk; Step 8 -- completing the installation; Summary; Chapter 3: The Initial Configuration of Untangle ; Understanding the boot options; The initial configuration wizard Step 1 -- selecting the wizard languageStep 2 -- setting the admin password and server time zone; Step 3 -- mapping the network cards; Step 4 -- configuring the Internet connection; Acquiring automatic configurations from DHCP; Manually configuring the interface settings; Step 5 -- configuring the Untangle NGFW operation mode; Understanding the router operation mode; Understanding the transparent bridge operation mode; Step 6 -- configuring the automatic upgrade settings; Step 7 -- finishing the initial configuration wizard; Registering your server; Reviewing the GUI Untangle NGFW administration optionsSummary; Chapter 4: Untangle Advanced Configuration; Untangle placement options; Understanding the architecture of Untangle NGFW; Managing Untangle NGFW interfaces; Common uses of additional interfaces; Configuring Untangle NGFW interfaces; Addressed interfaces; Bridged interfaces; VLANS; Configuring Untangle NGFW high availability; Configuring the Untangle NGFW hostname; Configuring Untangle NGFW Services ports; Untangle NGFW network services; Untangle NGFW as a router; Untangle NGFW DNS service; Untangle NGFW DHCP service; DNS and DHCP advanced options Configuring advanced network optionsUnderstanding Untangle NGFW rules; Port forward rules; NAT rules; Bypass rules; QoS rules; The seven priorities; Configuring the QoS settings; Configuring the QoS rules; Reviewing the QoS status; Filter rules; Troubleshooting; Summary; Chapter 5: Advanced Administration Settings; Configuring the administration settings; Managing the administrator accounts; Configuring the remote administration settings; Configuring the public address of Untangle NGFW; Configuring the regional settings; Configuring Untangle NGFW processing of protocols Computer security Security measures. Firewalls (Computer security) http://id.loc.gov/authorities/subjects/sh00006011 Sécurité informatique Sécurité Mesures. Coupe-feu (Sécurité informatique) COMPUTERS Security General. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security Online Safety & Privacy. bisacsh Firewalls (Computer security) fast has work: Untangle network security (Text) https://id.oclc.org/worldcat/entity/E39PCYTtxDq8dx7j3dqQMcw3PP https://id.oclc.org/worldcat/ontology/hasWork Print version: Druck-Ausgabe El-Bawab, Abd El-Monem A. Untangle Network Security Community experience distilled. http://id.loc.gov/authorities/names/no2011030603 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=883033 Volltext |
spellingShingle | El-Bawab, Abd El-Monem A. Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW / Community experience distilled. Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Untangle; Introducing Untangle, Inc.; An overview on information security; The CIA triad; Types of attacks; Types of controls; Defense in depth; Introducing Untangle NGFW; Untangle NGFW modules; Untangle packages; Licensing Untangle; Reviewing the change log; Summary; Chapter 2: Installing Untangle; Understanding the hardware requirements of Untangle NGFW; Untangle NGFW appliances; Building your Untangle NGFW box; Virtualizing your Untangle NGFW Tweaking your Untangle NGFWSetting up your lab; Getting Untangle; Writing your image; Untangle NGFW installation guide; Step 1 -- booting and selecting the installation mode; Step 2 -- selecting the installation wizard language; Step 3 -- configuring the system locale; Step 4 -- configuring the keymaps; Step 5 -- configuring the server time zone; Step 6 -- reviewing the hardware rating summary; Step 7 -- preparing the hard disk; Step 8 -- completing the installation; Summary; Chapter 3: The Initial Configuration of Untangle ; Understanding the boot options; The initial configuration wizard Step 1 -- selecting the wizard languageStep 2 -- setting the admin password and server time zone; Step 3 -- mapping the network cards; Step 4 -- configuring the Internet connection; Acquiring automatic configurations from DHCP; Manually configuring the interface settings; Step 5 -- configuring the Untangle NGFW operation mode; Understanding the router operation mode; Understanding the transparent bridge operation mode; Step 6 -- configuring the automatic upgrade settings; Step 7 -- finishing the initial configuration wizard; Registering your server; Reviewing the GUI Untangle NGFW administration optionsSummary; Chapter 4: Untangle Advanced Configuration; Untangle placement options; Understanding the architecture of Untangle NGFW; Managing Untangle NGFW interfaces; Common uses of additional interfaces; Configuring Untangle NGFW interfaces; Addressed interfaces; Bridged interfaces; VLANS; Configuring Untangle NGFW high availability; Configuring the Untangle NGFW hostname; Configuring Untangle NGFW Services ports; Untangle NGFW network services; Untangle NGFW as a router; Untangle NGFW DNS service; Untangle NGFW DHCP service; DNS and DHCP advanced options Configuring advanced network optionsUnderstanding Untangle NGFW rules; Port forward rules; NAT rules; Bypass rules; QoS rules; The seven priorities; Configuring the QoS settings; Configuring the QoS rules; Reviewing the QoS status; Filter rules; Troubleshooting; Summary; Chapter 5: Advanced Administration Settings; Configuring the administration settings; Managing the administrator accounts; Configuring the remote administration settings; Configuring the public address of Untangle NGFW; Configuring the regional settings; Configuring Untangle NGFW processing of protocols Computer security Security measures. Firewalls (Computer security) http://id.loc.gov/authorities/subjects/sh00006011 Sécurité informatique Sécurité Mesures. Coupe-feu (Sécurité informatique) COMPUTERS Security General. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security Online Safety & Privacy. bisacsh Firewalls (Computer security) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh00006011 |
title | Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW / |
title_auth | Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW / |
title_exact_search | Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW / |
title_full | Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW / Abd El-Monem A. El-Bawab. |
title_fullStr | Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW / Abd El-Monem A. El-Bawab. |
title_full_unstemmed | Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW / Abd El-Monem A. El-Bawab. |
title_short | Untangle network security : |
title_sort | untangle network security secure your network against threats and vulnerabilities using the unparalleled untangle ngfw |
title_sub | secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW / |
topic | Computer security Security measures. Firewalls (Computer security) http://id.loc.gov/authorities/subjects/sh00006011 Sécurité informatique Sécurité Mesures. Coupe-feu (Sécurité informatique) COMPUTERS Security General. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security Online Safety & Privacy. bisacsh Firewalls (Computer security) fast |
topic_facet | Computer security Security measures. Firewalls (Computer security) Sécurité informatique Sécurité Mesures. Coupe-feu (Sécurité informatique) COMPUTERS Security General. COMPUTERS Networking Security. COMPUTERS Security Online Safety & Privacy. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=883033 |
work_keys_str_mv | AT elbawababdelmonema untanglenetworksecuritysecureyournetworkagainstthreatsandvulnerabilitiesusingtheunparalleleduntanglengfw |