Cisco ASA, PIX, and FWSM Firewall Handbook

Cisco ASA, PIX, and FWSM Firewall Handbook

3.95 (21 ratings by Goodreads)
By (author) 

List price: US$68.00

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, is a guide for the most commonly implemented features of the popular Cisco (R) firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including ASA, PIX (R), and the Catalyst (R) Firewall Services Module (FWSM).



Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation.



Sections are marked by shaded tabs for quick reference, and information on each feature is presented in a concise format, with background, configuration, and example components.



Whether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, helps you achieve maximum protection of your network resources.



"Many books on network security and firewalls settle for a discussion focused primarily on concepts and theory. This book, however, goes well beyond these topics. It covers in tremendous detail the information every network and security administrator needs to know when configuring and managing market-leading firewall products from Cisco."

-Jason Nolet, Vice President of Engineering, Security Technology Group, Cisco



David Hucaby, CCIE (R) No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.





Learn about the various firewall models, user interfaces, feature sets, and configuration methods
Understand how a Cisco firewall inspects traffic
Configure firewall interfaces, routing, IP addressing services, and IP multicast support
Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP
Authenticate, authorize, and maintain accounting records for firewall users
Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning
Define security policies that identify and act on various types of traffic with the Modular Policy Framework
Increase firewall availability with firewall failover operation
Understand how firewall load balancing works
Generate firewall activity logs and learn how to analyze the contents of the log
Verify firewall operation and connectivity and observe data passing through a firewall
Configure Security Services Modules, such as the Content Security Control (CSC) module and the Advanced Inspection Processor (AIP) module



This security book is part of the Cisco Press (R) Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.



Category: Networking: Security

Covers: Cisco ASA 8.0, PIX 6.3, and FWSM 3.2 version firewalls
show more

Product details

  • Paperback | 912 pages
  • 188 x 230 x 46mm | 1,559.98g
  • Cisco Press
  • Indianapolis, United States
  • English
  • 2nd edition
  • 1587054574
  • 9781587054570
  • 922,102

About David Hucaby

David Hucaby, CCIE No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software. He has a B.S. and M.S. in electrical engineering from the University of Kentucky. He is the author of three other books from Cisco Press: CCNP BCMSN Official Exam Certification Guide, Cisco Field Manual: Router Configuration, and Cisco Field Manual: Catalyst Switch Configuration.



He lives in Kentucky with his wife, Marci, and two daughters.
show more

Back cover copy

"Cisco ASA, PIX, and FWSM Firewall Handbook," Second Edition, is a guide for the most commonly implemented features of the popular Cisco(R) firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including ASA, PIX(R), and the Catalyst(R) Firewall Services Module (FWSM). Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation. Sections are marked by shaded tabs for quick reference, and information on each feature is presented in a concise format, with background, configuration, and example components. Whether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, helps you achieve maximum protection of your network resources. "Many books on network security and firewalls settle for a discussion focused primarily on concepts and theory. This book, however, goes well beyond these topics. It covers in tremendous detail the information every network and security administrator needs to know when configuring and managing market-leading firewall products from Cisco." -Jason Nolet, Vice President of Engineering, Security Technology Group, Cisco David Hucaby, CCIE(R) No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software. Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning Define security policies that identify and act on various types of traffic with the Modular Policy Framework Increase firewall availability with firewall failover operation Understand how firewall load balancing works Generate firewall activity logs and learn how to analyze the contents of the log Verify firewall operation and connectivity and observe data passing through a firewall Configure Security Services Modules, such as the Content Security Control (CSC) module and the Advanced Inspection Processor (AIP) module This security book is part of the Cisco Press(R) Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. Category: Networking: Security Covers: Cisco ASA 8.0, PIX 6.3, and FWSM 3.2 version firewalls $60.00 USA / $69.00 CAN
show more

Table of contents

Foreword

Introduction

Chapter 1 Firewall

Chapter 2 Configuration Fundamentals

Chapter 3 Building Connectivity

Chapter 4 Firewall Management

Chapter 5 Managing Firewall Users

Chapter 6 Controlling Access Through the Firewall

Chapter 7 Inspecting Traffic

Chapter 8 Increasing Firewall Availability with Failover

Chapter 9 Firewall Load Balancing

Chapter 10 Firewall

Chapter 11 Verifying Firewall Operation

Chapter 12 ASA Modules

Appendix A Well-Known Protocol and Port Numbers

Appendix B Security Appliance Logging Messages
show more

Rating details

21 ratings
3.95 out of 5 stars
5 19% (4)
4 57% (12)
3 24% (5)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X