Cisco Security Specialist's Guide to PIX Firewall

Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver

  • 出版商: Syngress
  • 出版日期: 2002-11-30
  • 定價: USD $66.95
  • 售價: $3,023
  • 貴賓價: 9.5$2,872
  • 語言: 英文
  • 頁數: 608
  • 裝訂: Paperback
  • ISBN: 1931836639
  • ISBN-13: 9781931836630

下單後立即進貨 (1週~2週)

買這商品的人也買了...

商品描述

傳送訂單至便利達康

Decriptions:

The firewall has come to exemplify network security. While an overall security strategy requires a harmonious integration of people, process, and technologies to reduce risk, thereâ??s no doubt that firewalls can be a very valuable security tool. Cisco Systems' PIX firewalls have gained market leadership by demonstrating a mix of functionality, performance, and flexibility. The objective of this book is to help you gain a deeper knowledge of Cisco PIX Firewalls. Whether you have administrative responsibilities or are studying to pass an exam such as the Cisco Secure PIX Firewall Advanced (CSPFA), this comprehensive guide will be of value to you.

This is the only book in the market that focuses on covering (and going well beyond) all of the objectives of the latest CSPFA 3.0 exam (9E0-111). Through the use of detailed examples, this book provides step-by-side instructions on how to configure, maintain, and troubleshoot PIX firewalls running software version 6.2 and PIX Device Manager (PDM) version 2.1. All the latest and greatest features of PIX firewall software version 6.2 are covered, including TurboACLs, object grouping, NTP, HTTP failover replication, command level authorization, downloadable ACLs, LAN-based failover, and PPPoE.

  • Review PIX Hardware
    Find coverage of the five supported models: the 501, the 506E, the 515E, the 525, and the 535.
  • Learn About TurboACLs
    TurboACLs are a new feature in PIX Firewall software version 6.2. that enable faster processing of traffic through the access list.
  • Review Advanced Configurations
    Get complete coverage of handling advanced protocols, filtering Web traffic, configuring intrusion detection, and DHCP functionality.
  • Configure Authentication, Authorization, and Accounting
    Develop and enforce policies on a per user basis with the use of user-level security.
  • Configure Remote Access
    Use Telnet, SSH, SNMP, or Cisco PDM to remotely manage the PIX.
  • Configure Virtual Private Networking
    See how the PIX Firewall supports both site-to-site and remote access VPNs using various protocols: IPsec, L2TP, and PPTP.
  • Connect Primary and Secondary PIX Firewalls
    To support high availability, the Cisco PIX Firewall provides the ability to deal with firewall failures. See how failover operation works on the PIX Firewall.
  • Use PIX Device Manager
    Use PIX Device Manager (PDM) to install, configure, and maintain the PIX Firewall.
  • Troubleshoot PIX Firewalls
    Troubleshoot hardware, cabling, connectivity, and IPsec, as well as capture traffic and monitor performance.