My Cart
Bookstore Sign In
Books
Advertising
Art
Biographies & Memoirs
Business & Economics
Business & Investing
Cards, Greeting Cards, Card Decks
Children's
Constitution
Education
Entertainment
Family
Film Production
Fitness & Nutrition Journals
Food & Wine
Grief & Bereavement
Health, Mind & Body
History
Literature & Fiction
Mathematics
Music
Reference
Religion & Spirituality
Self Help
Self-Improvement
Sports
CDs & DVDs
Constitution
Education
Food & Wine
Health, Mind & Body
Literature & Fiction
Music
Parenting & Families
Self-Improvement
Publishing Samples
Technical Manuals
Altova
IBM Redbooks
Juniper Networks
Lucky Moon
Menu
This Week: Hardening Junos Devices
John Weidley
ADD TO CART
Juniper Networks takes the security of its products very seriously and has created proven processes and procedures following industry best practices. This Week: Hardening Junos Devices divides Juniper’s hardening procedures into four topic areas – Non-Technical, Physical Security, Operating System Security, and Configuration Hardening – and delves into sample strategies, example configurations, and dozens of suggestions and useful tips for each.
Encyclopedic in its coverage, This Week: Hardening Junos Devices is simply a book you cannot afford not to read. The author’s 15 years of experience supporting U.S. Government agencies makes this book applicable to high security environments such as service providers, financial institutions, government, and enterprise networks. But it’s also pertinent to the devices in your wiring closet, or your branch office. That’s because with Junos you get one operating system for your core or your edge or your branch. And once you take care of the physical security, you can harden your Junos device to resist attacks and diversions, as well as the careless mishaps that haunt even the most experienced network engineer. If you operate a Junos device, you need to read this book.
"The best network design will not help you if you forget to thoroughly secure and harden your network devices. This book is particularly welcomed by those taking their first steps into the Junos world - it helps map concepts from Cisco IOS into various Junos dialects as well as covers all the bits and pieces you might never even consider, like securing the LCD menu."
- Ivan Pepelnjak, Chief Technology Advisor, NIL Data Communications CCIE 1354 Emeritus, Independent Blogger (ipSpace.net)
LEARN HOW TO HARDEN YOUR SECURITY POSTURE THIS WEEK:
Review the non-technical aspects of device management that are so critical to the overall security posture of your organization.
Understand how physical security is an important aspect of device deployment.
Understand and deploy the Junos operating system’s inherent security features.
Identify important management, access services, and user account restrictions to provide least privileged access.
Configure route authentication for popular routing and signaling protocols.
Create and apply a firewall filter to protect the routing engine.
About the Author
John Weidley is a Resident Engineer with Juniper Networks. He is certified in Juniper Networks as JNCIS-SEC, JNCIS-SSL, JNCIA-FWV, and JNCIA-EX, and has worked closely supporting U.S. Government agencies for the last 15 years.
Price:
$20.00
Pages:
128
Date Published:
December 1, 2011
Author:
John Weidley
Product Number:
7100145
Part Number:
V4081601734
Ships in 3-5 days
ADD TO CART
X Close
Why Vervante?
© 2024 Vervante Corporation. All rights reserved.