Cisco Security Specialist's Guide to PIX Firewall
Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver
貴賓價: $1,277Cisco Secure PIX Firewalls
貴賓價: $1,829SSL and TLS: Designing and Building Secure Systems
The firewall has come to exemplify network security. While an overall security strategy requires a harmonious integration of people, process, and technologies to reduce risk, thereÃ¢??s no doubt that firewalls can be a very valuable security tool. Cisco Systems' PIX firewalls have gained market leadership by demonstrating a mix of functionality, performance, and flexibility. The objective of this book is to help you gain a deeper knowledge of Cisco PIX Firewalls. Whether you have administrative responsibilities or are studying to pass an exam such as the Cisco Secure PIX Firewall Advanced (CSPFA), this comprehensive guide will be of value to you.
This is the only book in the market that focuses on covering (and going well beyond) all of the objectives of the latest CSPFA 3.0 exam (9E0-111). Through the use of detailed examples, this book provides step-by-side instructions on how to configure, maintain, and troubleshoot PIX firewalls running software version 6.2 and PIX Device Manager (PDM) version 2.1. All the latest and greatest features of PIX firewall software version 6.2 are covered, including TurboACLs, object grouping, NTP, HTTP failover replication, command level authorization, downloadable ACLs, LAN-based failover, and PPPoE.
- Review PIX
Find coverage of the five supported models: the 501, the 506E, the 515E, the 525, and the 535.
- Learn About
TurboACLs are a new feature in PIX Firewall software version 6.2. that enable faster processing of traffic through the access list.
- Review Advanced
Get complete coverage of handling advanced protocols, filtering Web traffic, configuring intrusion detection, and DHCP functionality.
Authentication, Authorization, and Accounting
Develop and enforce policies on a per user basis with the use of user-level security.
- Configure Remote
Use Telnet, SSH, SNMP, or Cisco PDM to remotely manage the PIX.
Virtual Private Networking
See how the PIX Firewall supports both site-to-site and remote access VPNs using various protocols: IPsec, L2TP, and PPTP.
- Connect Primary
and Secondary PIX Firewalls
To support high availability, the Cisco PIX Firewall provides the ability to deal with firewall failures. See how failover operation works on the PIX Firewall.
- Use PIX Device
Use PIX Device Manager (PDM) to install, configure, and maintain the PIX Firewall.
- Troubleshoot PIX
Troubleshoot hardware, cabling, connectivity, and IPsec, as well as capture traffic and monitor performance.