Tags
Language
Tags
January 2025
Su Mo Tu We Th Fr Sa
29 30 31 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1
Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
SpicyMags.xyz

Juniper SRX Series: A Comprehensive Guide to Security Services on the SRX Series

Posted By: interes
Juniper SRX Series: A Comprehensive Guide to Security Services on the SRX Series

Juniper SRX Series: A Comprehensive Guide to Security Services on the SRX Series by Brad Woodberg and Rob Cameron
English | 2013 | ISBN-10: 1449338968 | 1020 pages | EPUB | 19 MB

This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Juniper’s SRX Series networking device. Authors Brad Woodberg and Rob Cameron provide field-tested best practices for getting the most out of SRX deployments, based on their extensive field experience.

While their earlier book, Junos Security, covered the SRX platform, this book focuses on the SRX Series devices themselves. You'll learn how to use SRX gateways to address an array of network requirements—including IP routing, intrusion detection, attack mitigation, unified threat management, and WAN acceleration. Along with case studies and troubleshooting tips, each chapter provides study questions and lots of useful illustrations.
Explore SRX components, platforms, and various deployment scenarios
Learn best practices for configuring SRX’s core networking features
Leverage SRX system services to attain the best operational state
Deploy SRX in transparent mode to act as a Layer 2 bridge
Configure, troubleshoot, and deploy SRX in a highly available manner
Design and configure an effective security policy in your network
Implement and configure network address translation (NAT) types
Provide security against deep threats with AppSecure, intrusion protection services, and unified threat management tools