Book description
Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW
In Detail
Untangle NG Firewall simplifies network security because of its easy configuration and user-friendly interface. These attributes, in addition to its low price, make Untangle one of the most popular UTM products, and the first choice for many SMBs.
Starting with a detailed description of the capabilities of Untangle as a server security solution, this book will help you to choose the right hardware and successfully deploy Untangle on your network. You will learn how to tackle a multitude of digital threats by using Filters and Blockers, including Virus Blocker, Spam Blocker, and Spyware Blocker. You will learn how to use these tools in a dedicated scenario-based training module. You will then learn about Untangle's Network Policy, how to display network-acceptable use policies, and how to enforce network policies for guests and mobile devices. With this book, you will gain hands-on experience of utilizing Untangle's WAN and VPN services, and you will be tutored on how to effectively secure your network infrastructure in real-world situations, with solutions for every type of business.
What You Will Learn
- Install and configure Untangle NG Firewall
- Protect your network using Untangle NG Firewall
- Explore Untangle's apps
- Customize user policies for your network
- Increase user productivity and enhance WAN performance
- Deploy multi-WAN services available in Untangle
- Configure remote access and site-to-site VPN using SSL or IPsec
- Decipher platform reports
Table of contents
-
Untangle Network Security
- Table of Contents
- Untangle Network Security
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Preface
- 1. Introduction to Untangle
-
2. Installing Untangle
- Understanding the hardware requirements of Untangle NGFW
- Setting up your lab
- Getting Untangle
- Writing your image
-
Untangle NGFW installation guide
- Step 1 – booting and selecting the installation mode
- Step 2 – selecting the installation wizard language
- Step 3 – configuring the system locale
- Step 4 – configuring the keymaps
- Step 5 – configuring the server's time zone
- Step 6 – reviewing the hardware rating summary
- Step 7 – preparing the hard disk
- Step 8 – completing the installation
- Summary
-
3. The Initial Configuration of Untangle
- Understanding the boot options
-
The initial configuration wizard
- Step 1 – selecting the wizard language
- Step 2 – setting the admin password and server's time zone
- Step 3 – mapping the network cards
- Step 4 – configuring the Internet connection
- Step 5 – configuring the Untangle NGFW operation mode
- Step 6 – configuring the automatic upgrade settings
- Step 7 – finishing the initial configuration wizard
- Registering your server
- Reviewing the GUI
- Untangle NGFW administration options
- Summary
-
4. Untangle Advanced Configuration
- Untangle placement options
- Understanding the architecture of Untangle NGFW
- Managing Untangle NGFW interfaces
- Configuring Untangle NGFW high availability
- Configuring the Untangle NGFW hostname
- Configuring Untangle NGFW Services ports
- Untangle NGFW network services
- Configuring advanced network options
- Understanding Untangle NGFW rules
- Troubleshooting
- Summary
- 5. Advanced Administration Settings
-
6. Untangle Blockers
- Dealing with Untangle NGFW modules
- Protect your network from viruses
- Spam!!…It's something from the past
- No more phishing
- Utilizing Untangle Ad Blocker
- Summary
- 7. Preventing External Attacks
- 8. Untangle Filters
- 9. Optimizing Network Traffic
- 10. Untangle Network Policy
- 11. Untangle WAN Services
-
12. Untangle VPN Services
- Understanding VPN
- OpenVPN
- IPsec VPN
- Summary
- 13. Untangle Administrative Services
- 14. Untangle in the Real World
- Index
Product information
- Title: Untangle Network Security
- Author(s):
- Release date: October 2014
- Publisher(s): Packt Publishing
- ISBN: 9781849517720
You might also like
book
Network Security Fundamentals
An introduction to the key tools and technologies used to secure network access Examine common security …
book
Mastering™ Network Security, Second Edition
The Technology You Need is Out There. The Expertise You Need is in Here. Expertise is …
book
Network Attacks and Exploitation
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides …
book
Practical Cisco Unified Communications Security
Master the foundations of modern Cisco Unified Communications (UC) system security This guide helps you build …