Cisco ASA, PIX, and FWSM Firewall Handbook

By: enj

Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including ASA, PIX®, and the Catalyst® Firewall Services Module (FWSM).
Organized by families of features, this book helps you get up to speed quickly
and efficiently on topics such as file management, building connectivity,
controlling access, firewall management, increasing availability with failover,
load balancing, logging, and verifying operation.
Sections are marked by shaded tabs for quick reference, and information on each feature is presented in a concise format, with background, configuration, and example components.
Whether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, helps you achieve maximum protection of your network resources.
-Learn about the various firewall models, user interfaces, feature sets, and
configuration methods
-Understand how a Cisco firewall inspects traffic
-Configure firewall interfaces, routing, IP addressing services, and IP
multicast support
-Maintain security contexts and flash and configuration files, manage users, and
monitor firewalls with SNMP
-Authenticate, authorize, and maintain accounting records for firewall users
-Control access through the firewall by implementing transparent and routed
firewall modes, address translation, and traffic shunning
-Define security policies that identify and act on various types of traffic with
the Modular Policy Framework
-Increase firewall availability with firewall failover operation
-Understand how firewall load balancing works
-Generate firewall activity logs and learn how to analyze the contents of the
log
-Verify firewall operation and connectivity and observe data passing through a
firewall
-Configure Security Services Modules, such as the Content Security Control (CSC)
module and the Advanced Inspection Processor (AIP) module
Table Of Contents
Chapter 1, “Firewall Overview”
Chapter 2, “Configuration Fundamentals”
Chapter 3, “Building Connectivity”
Chapter 4, “Firewall Management”
Chapter 5, “Managing Firewall Users”
Chapter 6, “Controlling Access Through the Firewall”
Chapter 7, “Inspecting Traffic”
Chapter 8, “Increasing Firewall Availability with Failover”
Chapter 9, “Firewall Load Balancing”
Chapter 10, “Firewall Logging”
Chapter 11, “Verifying Firewall Operation”
Chapter 12, “ASA Modules”
Appendix A, “Well-Known Protocol and Port Numbers”
Product Details
* ISBN: 1587054574
* ISBN-13: 9781587054570
* Format: Paperback, 869pp
* Publisher: Cisco Press
* Pub. Date: August 2007

DOWNLOAD TORRENT

Share!

1 Comment

  • vonie11:

    Artikel ini sangat menarik. Terimakasih atas informasinya

Leave a Reply

Your email address will not be published. Required fields are marked *

User Online

Back to Top
Get Adobe Flash player