Description |
1 online resource (xxii, 496 pages) : illustrations |
Series |
Cisco Press networking technology series |
|
Cisco Press networking technology series.
|
Contents |
Cover -- Contents -- Introduction -- Part I: Introduction -- Chapter 1 Types of Firewalls -- Understanding Packet-Filtering Firewalls -- Understanding Application/Proxy Firewalls -- Understanding Reverse-Proxy Firewalls -- Utilizing Packet Inspection -- Reusing IP Addresses -- Summary -- Chapter 2 Overview of the Firewall Services Module -- Specifications -- Installation -- Performance -- Virtualization -- Comparing the FWSM to Other Security Devices -- Hardware Architecture -- Software Architecture -- Summary -- Chapter 3 Examining Modes of Operation -- Working with Transparent Mode -- Working with Routed Mode -- Summary -- References -- Chapter 4 Understanding Security Levels -- Traffic Flow Between Interfaces -- Network Address Translation/Port Address Translation -- Summary -- References -- Chapter 5 Understanding Contexts -- Benefits of Multiple Contexts -- Disadvantages of Multiple Contexts -- Adding and Removing Contexts -- Changing Between Contexts -- Understanding Resource Management -- Summary -- Part II: Initial Configuration -- Chapter 6 Configuring and Securing the 6500/7600 Chassis -- Understanding the Interaction Between the Host-Chassis and the FWSM -- Assigning Interfaces -- Securing the 6500/7600 (Host-Chassis) -- Summary -- References -- Chapter 7 Configuring the FWSM -- Configuring FWSM in the Switch -- Exploring Routed Mode -- Exploring Transparent Mode -- Using Multiple Context Mode for FWSM -- Configuration Steps for Firewall Services Module -- Summary -- Chapter 8 Access Control Lists -- Introducing Types of Access Lists -- Understanding Object Groups -- Monitoring Access List Resources -- Configuring Object Groups and Access Lists -- Summary -- Chapter 9 Configuring Routing Protocols -- Supporting Routing Methods -- Summary -- Chapter 10 AAA Overview -- Understanding AAA Components -- Comparing Security Protocols -- Understanding Two-Step Authentication -- Understanding Fallback Support -- Understanding Cut-Through Proxy in FWSM -- Summary -- Chapter 11 Modular Policy -- Using Modular Policy in FWSM -- Understanding Classification of Traffic -- Defining Policy Maps -- Configuring Service Policy -- Understanding Default Policy Map -- Sample Configuration of Modular Policy in FWSM -- Summary -- Part III: Advanced Configuration -- Chapter 12 Understanding Failover in FWSM -- Creating Redundancy in the FWSM -- Understanding Failover Link and State Link -- Requirements for Failover -- Synchronizing the Primary and Secondary Firewalls -- Monitoring Interfaces -- Configuring Poll Intervals -- Design Principle for Monitoring Interfaces -- Configuring Single Context FWSM Failover -- Configuring Multiple Context FWSM Failover -- Summary -- Chapter 13 Understanding Application Protocol Inspection -- Inspecting Hypertext Transfer Protocol -- Inspecting File Transfer Protocol -- Working with Supported Applications -- Configuring ARP -- Summary -- References -- Chapter 14 Filtering -- Working with URLs and FTP -- Configuring ActiveX and Java -- Summary -- References -- Chapter 15 Managing and Monitoring the FWSM -- Using Telnet -- Using Secure Shell -- Using Adaptive Security Device Manager -- T$2654 |
Bibliography |
Includes bibliographical references and index |
Notes |
Print version record |
Subject |
Cisco Systems, Inc
|
SUBJECT |
Cisco Systems, Inc. blmlsh |
|
Cisco Systems, Inc. fast |
Subject |
Computer networks -- Security measures.
|
|
Firewalls (Computer security)
|
|
Computer networks -- Security measures.
|
|
Firewalls (Computer security)
|
|
Computer networks -- Security measures
|
|
Firewalls (Computer security)
|
Form |
Electronic book
|
Author |
Durai, Arvind
|
LC no. |
2008030575 |
ISBN |
9781587056093 |
|
1587056097 |
|
9781587053535 |
|
1587053535 |
|