Day One: Deploying Junos WebApp Secure

There are some very clever people out there trying to pick the virtual pockets of you and your network. Fortunately there are also very clever people coming up with strategies and technologies to combat these attacks, and this book shows you how to deploy one of the most ingenious tools at your disposal: Junos WebApp Secure.

Sample Pages

Download Book

Day One books are a free download for our J-Net members*. If you’re not a J-Net member, create a user account now. It’s fast and there’s no commitment or spam. Once you’re a member you can come back and download any of the Day One books.

Download: J-Net Member
Download: Not a J-Net Member

* If you have an existing Juniper user account, you can use it to login to J-Net

About the Author(s)

Glen Kemp is an Enterprise Security Architect and Juniper Ambassador working for SecureData in the UK. He has accumulated numerous Juniper JNCIS and JNCIA qualifications while working in Network security for the past 15 years. Glen is also a prolific blogger and writer and works with many leading and bleeding-edge technologies.

Author Q & A

What got you started on this book?

When I first deployed JWAS (at the time it was still called Mykonos Web Security) I was really impressed by the functionality, but it is one of those products which is never deployed in isolation; infrastructure components such as firewalls and load balancers must be considered. JWAS is a unique technology and requires a bit of up-front planning for optimum deployment; when I did this for my own network it occurred that I should probably write up my notes; so I did. :-)

Who is this book for?

Anyone who wants to understand current security landscape and how JWAS and other counter-security tools fit into it. The book covers both the theory and practice of deploying JWAS. Web application Developers, Firewall admins, and Load Balancer Ops should all be comfortable with the fundamentals of the product once they have finished with the book.

After reading this book, what’s the take away?

That JWAS is a pioneering product in which seeks to make the business of attacking your web site uneconomic. To make this possible, it must interact with the application flows in a unique way. The book walks you through that process, step by step.

What are you hoping that people will learn from this book?

What an exciting product JWAS is within emerging Juniper’s counter-security portfolio, and that to protect yourself from network attacks, you must start to think like a hacker.

What do you recommend as the next item to read after this book?

As this is such a new area, there is relatively little material out there, however the “JWAS Intrusion Deception Evaluation guide” (part of the distribution documentation pack) contains some cool tips on how to show off some of the advanced features.

What’s your inspiration?

Erm...Copious amounts of caffeine?

What’s your favorite bit/part in the book?

The chapter on design; I love the fiddly parts of designing fast, scalable and secure networks.