Limit search to available items
Book Cover
E-book
Author Blair, Ray, 1965-

Title Cisco secure firewall services module (FWSM) / Ray Blair, Arvind Durai
Published Indianapolis, Ind. : Cisco Press, ©2009

Copies

Description 1 online resource (xxii, 496 pages) : illustrations
Series Cisco Press networking technology series
Cisco Press networking technology series.
Contents Cover -- Contents -- Introduction -- Part I: Introduction -- Chapter 1 Types of Firewalls -- Understanding Packet-Filtering Firewalls -- Understanding Application/Proxy Firewalls -- Understanding Reverse-Proxy Firewalls -- Utilizing Packet Inspection -- Reusing IP Addresses -- Summary -- Chapter 2 Overview of the Firewall Services Module -- Specifications -- Installation -- Performance -- Virtualization -- Comparing the FWSM to Other Security Devices -- Hardware Architecture -- Software Architecture -- Summary -- Chapter 3 Examining Modes of Operation -- Working with Transparent Mode -- Working with Routed Mode -- Summary -- References -- Chapter 4 Understanding Security Levels -- Traffic Flow Between Interfaces -- Network Address Translation/Port Address Translation -- Summary -- References -- Chapter 5 Understanding Contexts -- Benefits of Multiple Contexts -- Disadvantages of Multiple Contexts -- Adding and Removing Contexts -- Changing Between Contexts -- Understanding Resource Management -- Summary -- Part II: Initial Configuration -- Chapter 6 Configuring and Securing the 6500/7600 Chassis -- Understanding the Interaction Between the Host-Chassis and the FWSM -- Assigning Interfaces -- Securing the 6500/7600 (Host-Chassis) -- Summary -- References -- Chapter 7 Configuring the FWSM -- Configuring FWSM in the Switch -- Exploring Routed Mode -- Exploring Transparent Mode -- Using Multiple Context Mode for FWSM -- Configuration Steps for Firewall Services Module -- Summary -- Chapter 8 Access Control Lists -- Introducing Types of Access Lists -- Understanding Object Groups -- Monitoring Access List Resources -- Configuring Object Groups and Access Lists -- Summary -- Chapter 9 Configuring Routing Protocols -- Supporting Routing Methods -- Summary -- Chapter 10 AAA Overview -- Understanding AAA Components -- Comparing Security Protocols -- Understanding Two-Step Authentication -- Understanding Fallback Support -- Understanding Cut-Through Proxy in FWSM -- Summary -- Chapter 11 Modular Policy -- Using Modular Policy in FWSM -- Understanding Classification of Traffic -- Defining Policy Maps -- Configuring Service Policy -- Understanding Default Policy Map -- Sample Configuration of Modular Policy in FWSM -- Summary -- Part III: Advanced Configuration -- Chapter 12 Understanding Failover in FWSM -- Creating Redundancy in the FWSM -- Understanding Failover Link and State Link -- Requirements for Failover -- Synchronizing the Primary and Secondary Firewalls -- Monitoring Interfaces -- Configuring Poll Intervals -- Design Principle for Monitoring Interfaces -- Configuring Single Context FWSM Failover -- Configuring Multiple Context FWSM Failover -- Summary -- Chapter 13 Understanding Application Protocol Inspection -- Inspecting Hypertext Transfer Protocol -- Inspecting File Transfer Protocol -- Working with Supported Applications -- Configuring ARP -- Summary -- References -- Chapter 14 Filtering -- Working with URLs and FTP -- Configuring ActiveX and Java -- Summary -- References -- Chapter 15 Managing and Monitoring the FWSM -- Using Telnet -- Using Secure Shell -- Using Adaptive Security Device Manager -- T$2654
Bibliography Includes bibliographical references and index
Notes Print version record
Subject Cisco Systems, Inc
SUBJECT Cisco Systems, Inc. blmlsh
Cisco Systems, Inc. fast
Subject Computer networks -- Security measures.
Firewalls (Computer security)
Computer networks -- Security measures.
Firewalls (Computer security)
Computer networks -- Security measures
Firewalls (Computer security)
Form Electronic book
Author Durai, Arvind
LC no. 2008030575
ISBN 9781587056093
1587056097
9781587053535
1587053535