Configuring Juniper NetScreen & SSG Firewalls 35
r3lody writes "Configuring Juniper Networks NetScreen & SSG Firewalls (CJNNSF), written and edited by Rob Cameron of Juniper, is an ambitious attempt to provide a comprehensive approach to configuring Juniper’s flagship line of firewall appliances. Unfortunately there are a large number of errors in the presentation that distract and detract from its mission. CJNNSF is Rob Cameron’s second book. Helping him are six contributing writers: Matthew Albers and Mike Swarm of Juniper, and security consultants Ralph Bonnell, Mohan Krishnamurthy Madwacher, Brad Woodberg, and Neil R. Wyler. Collectively they have produced a book with a lot of in-depth information that will prove extremely useful to anyone working with Juniper devices. It suffers from an apparent lack of proper editorial oversight. Numerous examples exist of inconsistent styles, bad grammar, notes to other authors that were inadvertently left in, etc. Nonetheless, the actual content still makes this book worthwhile." Read below for the rest of Ray's review.
Configuring Juniper& Networks NetScreen& & SSG Firewalls | |
author | Rob Cameron (Editor) |
pages | 745 |
publisher | Syngress |
rating | 5/10 |
reviewer | Ray Lodato |
ISBN | 1597491187 |
summary | Provides fairly complete configuration details, but needs a lot of cosmetic improvement. |
The progression through the book is well thought out and builds nicely from previous chapters. Each chapter starts with its own introduction, and ends with a summary, a “fast-track” bulleted list of highlights, and a small FAQs section.
Throughout much of the book, the reader is presented with a set of amateurish figures and tables. While the content is there, the presentation is reminiscent of high-school papers. I found myself wondering why the publisher didn't spend more time cleaning up the book to provide a more finished look. Another item that shows a lack of editorial oversight was the inclusion of a note from one author to another that was apparently left in the text by mistake (see the Solutions Fast Track at the end of chapter 5 to see what I mean). I was amused to see this exchange carried over to the duplication of the book online on the Books24x7 website.
I was upset to see some inaccuracies in the text. One key example is mistaking the TCP sequence number as a packet counter instead of a byte counter. When I read that, I began to mistrust the accuracy of the rest of the book. Thankfully, the Juniper-specific information appears accurate. A more in-depth technical review should have caught such an obvious error.
While Chapter 2 provides valuable information comparing the various models of the NetScreen and SSG/ISG series of security devices, I did have a problem with the formatting of the tables. There are a few cases where I had to look at a table a few times before I realized that information wrapped from the last column back into the first. I also took exception to one statement in particular: ScreenOS is more secure than open source operating systems because the general public cannot inspect the source code for vulnerabilities. Huh? Isn’t one of the reasons why open source is so secure is that many eyes have been able to review it and refine it?
There are three ways to manage Juniper devices: the CLI, the WebUI, and NSM (NetScreen Security Manager). While NSM makes the most sense in an enterprise rollout, the book declared it outside its scope. This does limit the usefulness of the book a little, but much of the WebUI detail is replicated in the NSM, so you may not be missing too much.
Later chapters in the book do dig into most of the capabilities of the Junipers, with examples detailed enough to help you understand how to apply it to your own uses. Policy configuration, attack detection and defense, high availability and virtual systems all have their own detailed chapters. Each chapter provides a wealth of information, once you ignore the amateurish styling.
Overall, you can find most of what you would need to know to choose, configure, and manage Juniper firewalls after reading this book. Unfortunately, you will also find many confusing examples, tables, and formatting inconsistencies. So many times I found myself thinking that my high-schooler would have done a better job laying out this book and making sure the reader wasn’t disturbed by the overall look. Despite that, the actual content does make this worthwhile if you need to understand the Juniper line of devices. I just hope that Syngress and the authors will correct these problems and release a second edition of the book.
You can purchase Configuring Juniper& Networks NetScreen& & SSG Firewalls from amazon.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
Working for a Juniper reseller (Score:3, Insightful)
(posted anon to avoid the wrath of my coworkers!
Re: (Score:1)
Re: (Score:1)
Case in point: Anything from Microsoft Press. *ducks*
Re: (Score:1)
pushing NAS/SAN like it's 2000 again (Score:2)
Re: (Score:3, Funny)
Re: (Score:1)
Published in 2006? (Score:3, Informative)
Juniper Netscreen Book (Score:2, Insightful)
David
Re: (Score:1)
The basic errors in language and presentation, however, detract significantly from the overall experience. I would recommend this
Madwacher? (Score:2)
Picture him playing 'bop-the-gopher' at the next local Fair
Amazing... (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
I found them to be pretty good overall. They are far faster than comparably priced Cisco kit, and the few times that I've needed to use their support, I found them to be able to solve my problem quickly.
Due to a change in management (we decided to go with a telco-provided MPLS network), we have scaled back dramatically on the number of devices, but we are still using
Re: (Score:1)
Crappy?
I've worked with Cisco PIX, Shiva Lanrover VPN devices, and Checkpoint firewalls. Of the bunch Juniper is the most powerfull and easiest to implement.
Granted, I started working with the Juniper firewalls on the SSG-520 platform running version 5.4 of the ScreenOS. So, prior equipment and versions could very well have been poor...
But for my money, today, I'd recommend the Juniper SSG platform.
David
Re: (Score:1)
The Checkpoints (especially the IPSO based Nokia boxes) are rock solid, and packed wit
Re: (Score:2)
Re: (Score:2)
Oh dear (Score:1)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Juniper Lee security? (Score:2)
You should check out the "ScreenOS Cookbook" (Score:1)
Re: (Score:1)
This sucks. (Score:3, Insightful)
At least the SSG VPN's were easy to figure out.