This Week: Hardening Junos Devices, 2nd Edition This Week: Hardening Junos Devices, 2nd Edition
Day One

This Week: Hardening Junos Devices, 2nd Edition

    • £1.49
    • £1.49

Publisher Description

Harden your organization’s security posture this week with this newly revised book and companion checklist on network device security!


Juniper Networks takes the security of its products very seriously and has created proven processes and procedures following industry best practices. This Week: Hardening Junos Devices, 2nd Edition divides Juniper’s hardening procedures into four topic areas – Non-Technical, Physical Security, Operating System Security, and Configuration Hardening – and delves into sample strategies, example configurations, and dozens of suggestions and useful tips for implementing each hardening process. All features discussed in this book are available and tested in Junos 12.3 (current recommended code) and for some features the book discusses options available in later code releases.


Encyclopedic in its coverage, This Week: Hardening Junos Devices, 2nd Edition is a book you can- not afford not to read. The author’s 15 years of experience supporting U.S. Government agencies makes it applicable to high security environments such as service providers, financial institutions, government, and enterprise networks. But it’s also pertinent to the devices in your wiring closet and branch office. Once you take care of the physical security, you can harden your Junos device to resist attacks and diversions, as well as the careless mishaps that haunt even the most experienced network engineer. This book also includes a handy checklist you can print or copy for each device you control.


“The best network design will not help you if you forget to thoroughly secure and harden your network devices. This book is particularly welcomed by those taking their first steps into the Junos world - it helps map concepts from Cisco IOS into various Junos dialects as well as covering all the bits and pieces you might never even consider, like securing the LCD menu.” Ivan Pepelnjak, Network architect, ipSpace.net AG, www.ipSpace.net


LEARN HOW TO HARDEN YOUR SECURITY POSTURE THIS WEEK:

• Review the non-technical aspects of device management that are so critical to the overall security posture of your organization.

• Understand how physical security is an important aspect of device deployment.

• Understand and deploy the Junos operating system’s inherent security features.

• Identify important management, access services, and user account restrictions to provide least privileged access.

• Configure route authentication for popular routing and signaling protocols. 

• Create and apply a firewall filter to protect the routing engine.


About the Author

John Weidley is a Resident Engineer with Juniper Networks. He has been certified in Juniper Networks as JNCIS-SEC, JNCIS-SSL, JNCIA-FWV, and JNCIA-EX, and has worked closely supporting U.S. Government agencies for the last 20 years.

GENRE
Computing & Internet
RELEASED
2015
8 August
LANGUAGE
EN
English
LENGTH
160
Pages
PUBLISHER
Juniper Networks Books
SIZE
1.6
MB

More Books Like This

Security Guide for IBM i V6.1 Security Guide for IBM i V6.1
2009
Hardening Cisco Routers Hardening Cisco Routers
2002
Cybersecurity Essentials Cybersecurity Essentials
2018
Security for Linux on System z Security for Linux on System z
2013
Network Security Hacks Network Security Hacks
2006
Microsoft Windows Security Essentials Microsoft Windows Security Essentials
2011

Customers Also Bought

Day One: SRX Series Up and Running with Advanced Security Services Day One: SRX Series Up and Running with Advanced Security Services
2018
Day One: Data Center Fundamentals Day One: Data Center Fundamentals
2016

Other Books in This Series

Day One: ADVPN Design and Implementation Day One: ADVPN Design and Implementation
2015
Day One: Exploring the Junos CLI, Second Edition Day One: Exploring the Junos CLI, Second Edition
2015
Day One: Deploying BGP FlowSpec Day One: Deploying BGP FlowSpec
2015
Day One: Deploying Zero Touch Provisioning Day One: Deploying Zero Touch Provisioning
2015
Day One: vMX Up and Running Day One: vMX Up and Running
2016
Day One: Data Center Fundamentals Day One: Data Center Fundamentals
2016