Cisco Security Specialists Guide to PIX Firewall

Book description

Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will instruct the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting and more.

Cisco Security Specialist's Guide to PIX Firewall introduces the basic concepts of attack, explains the networking principals necessary to effectively implement and deploy a PIX firewall, covers the hardware and software components of the device, provides multiple configurations and administration examples, and fully describes the unique line syntax native to PIX firewall configuration and administration.

  • Coverage of the Latest Versions of PIX Firewalls. This book includes coverage of the latest additions to the PIX Firewall family including the CiscoSecure PIX Firewall (PIX) Software Release 6.0
  • Must-have desk reference for the serious security professional. In addition to the foundation information and dedicated text focused on the exam objectives for the CSPFA, this book offers real-world administration and configuration support. This book will not only help readers pass the exam; it will continue to assist them with their duties on a daily basis
  • Firewall administration guides? Syngress wrote the book. Syngress has demonstrated a proficiency to answer the market need for quality information pertaining to firewall administration guides. Configuring ISA Server 2000: Building Firewalls for Windows 2000 (ISBN: 1-928994-29-6) and Checkpoint Next Generation Security Administration (ISBN: 1-928994-74-1) are currently best sellers in the security market

Table of contents

  1. Cover (1/3)
  2. Cover (2/3)
  3. Cover (3/3)
  4. Table of Contents (1/3)
  5. Table of Contents (2/3)
  6. Table of Contents (3/3)
  7. Foreword
  8. Introduction
  9. Chapter 1 Introduction to Security and Firewalls (1/9)
  10. Chapter 1 Introduction to Security and Firewalls (2/9)
  11. Chapter 1 Introduction to Security and Firewalls (3/9)
  12. Chapter 1 Introduction to Security and Firewalls (4/9)
  13. Chapter 1 Introduction to Security and Firewalls (5/9)
  14. Chapter 1 Introduction to Security and Firewalls (6/9)
  15. Chapter 1 Introduction to Security and Firewalls (7/9)
  16. Chapter 1 Introduction to Security and Firewalls (8/9)
  17. Chapter 1 Introduction to Security and Firewalls (9/9)
  18. Chapter 2 Introduction to PIX Firewalls (1/10)
  19. Chapter 2 Introduction to PIX Firewalls (2/10)
  20. Chapter 2 Introduction to PIX Firewalls (3/10)
  21. Chapter 2 Introduction to PIX Firewalls (4/10)
  22. Chapter 2 Introduction to PIX Firewalls (5/10)
  23. Chapter 2 Introduction to PIX Firewalls (6/10)
  24. Chapter 2 Introduction to PIX Firewalls (7/10)
  25. Chapter 2 Introduction to PIX Firewalls (8/10)
  26. Chapter 2 Introduction to PIX Firewalls (9/10)
  27. Chapter 2 Introduction to PIX Firewalls (10/10)
  28. Chapter 3 Passing Traffic (1/9)
  29. Chapter 3 Passing Traffic (2/9)
  30. Chapter 3 Passing Traffic (3/9)
  31. Chapter 3 Passing Traffic (4/9)
  32. Chapter 3 Passing Traffic (5/9)
  33. Chapter 3 Passing Traffic (6/9)
  34. Chapter 3 Passing Traffic (7/9)
  35. Chapter 3 Passing Traffic (8/9)
  36. Chapter 3 Passing Traffic (9/9)
  37. Chapter 4 Advanced PIX Configurations (1/17)
  38. Chapter 4 Advanced PIX Configurations (2/17)
  39. Chapter 4 Advanced PIX Configurations (3/17)
  40. Chapter 4 Advanced PIX Configurations (4/17)
  41. Chapter 4 Advanced PIX Configurations (5/17)
  42. Chapter 4 Advanced PIX Configurations (6/17)
  43. Chapter 4 Advanced PIX Configurations (7/17)
  44. Chapter 4 Advanced PIX Configurations (8/17)
  45. Chapter 4 Advanced PIX Configurations (9/17)
  46. Chapter 4 Advanced PIX Configurations (10/17)
  47. Chapter 4 Advanced PIX Configurations (11/17)
  48. Chapter 4 Advanced PIX Configurations (12/17)
  49. Chapter 4 Advanced PIX Configurations (13/17)
  50. Chapter 4 Advanced PIX Configurations (14/17)
  51. Chapter 4 Advanced PIX Configurations (15/17)
  52. Chapter 4 Advanced PIX Configurations (16/17)
  53. Chapter 4 Advanced PIX Configurations (17/17)
  54. Chapter 5 Configuring Authentication, Authorization, and Accounting (1/15)
  55. Chapter 5 Configuring Authentication, Authorization, and Accounting (2/15)
  56. Chapter 5 Configuring Authentication, Authorization, and Accounting (3/15)
  57. Chapter 5 Configuring Authentication, Authorization, and Accounting (4/15)
  58. Chapter 5 Configuring Authentication, Authorization, and Accounting (5/15)
  59. Chapter 5 Configuring Authentication, Authorization, and Accounting (6/15)
  60. Chapter 5 Configuring Authentication, Authorization, and Accounting (7/15)
  61. Chapter 5 Configuring Authentication, Authorization, and Accounting (8/15)
  62. Chapter 5 Configuring Authentication, Authorization, and Accounting (9/15)
  63. Chapter 5 Configuring Authentication, Authorization, and Accounting (10/15)
  64. Chapter 5 Configuring Authentication, Authorization, and Accounting (11/15)
  65. Chapter 5 Configuring Authentication, Authorization, and Accounting (12/15)
  66. Chapter 5 Configuring Authentication, Authorization, and Accounting (13/15)
  67. Chapter 5 Configuring Authentication, Authorization, and Accounting (14/15)
  68. Chapter 5 Configuring Authentication, Authorization, and Accounting (15/15)
  69. Chapter 6 Configuring System Management (1/9)
  70. Chapter 6 Configuring System Management (2/9)
  71. Chapter 6 Configuring System Management (3/9)
  72. Chapter 6 Configuring System Management (4/9)
  73. Chapter 6 Configuring System Management (5/9)
  74. Chapter 6 Configuring System Management (6/9)
  75. Chapter 6 Configuring System Management (7/9)
  76. Chapter 6 Configuring System Management (8/9)
  77. Chapter 6 Configuring System Management (9/9)
  78. Chapter 7 Configuring Virtual Private Networking (1/16)
  79. Chapter 7 Configuring Virtual Private Networking (2/16)
  80. Chapter 7 Configuring Virtual Private Networking (3/16)
  81. Chapter 7 Configuring Virtual Private Networking (4/16)
  82. Chapter 7 Configuring Virtual Private Networking (5/16)
  83. Chapter 7 Configuring Virtual Private Networking (6/16)
  84. Chapter 7 Configuring Virtual Private Networking (7/16)
  85. Chapter 7 Configuring Virtual Private Networking (8/16)
  86. Chapter 7 Configuring Virtual Private Networking (9/16)
  87. Chapter 7 Configuring Virtual Private Networking (10/16)
  88. Chapter 7 Configuring Virtual Private Networking (11/16)
  89. Chapter 7 Configuring Virtual Private Networking (12/16)
  90. Chapter 7 Configuring Virtual Private Networking (13/16)
  91. Chapter 7 Configuring Virtual Private Networking (14/16)
  92. Chapter 7 Configuring Virtual Private Networking (15/16)
  93. Chapter 7 Configuring Virtual Private Networking (16/16)
  94. Chapter 8 Configuring Failover (1/8)
  95. Chapter 8 Configuring Failover (2/8)
  96. Chapter 8 Configuring Failover (3/8)
  97. Chapter 8 Configuring Failover (4/8)
  98. Chapter 8 Configuring Failover (5/8)
  99. Chapter 8 Configuring Failover (6/8)
  100. Chapter 8 Configuring Failover (7/8)
  101. Chapter 8 Configuring Failover (8/8)
  102. Chapter 9 PIX Device Manager (1/21)
  103. Chapter 9 PIX Device Manager (2/21)
  104. Chapter 9 PIX Device Manager (3/21)
  105. Chapter 9 PIX Device Manager (4/21)
  106. Chapter 9 PIX Device Manager (5/21)
  107. Chapter 9 PIX Device Manager (6/21)
  108. Chapter 9 PIX Device Manager (7/21)
  109. Chapter 9 PIX Device Manager (8/21)
  110. Chapter 9 PIX Device Manager (9/21)
  111. Chapter 9 PIX Device Manager (10/21)
  112. Chapter 9 PIX Device Manager (11/21)
  113. Chapter 9 PIX Device Manager (12/21)
  114. Chapter 9 PIX Device Manager (13/21)
  115. Chapter 9 PIX Device Manager (14/21)
  116. Chapter 9 PIX Device Manager (15/21)
  117. Chapter 9 PIX Device Manager (16/21)
  118. Chapter 9 PIX Device Manager (17/21)
  119. Chapter 9 PIX Device Manager (18/21)
  120. Chapter 9 PIX Device Manager (19/21)
  121. Chapter 9 PIX Device Manager (20/21)
  122. Chapter 9 PIX Device Manager (21/21)
  123. Chapter 10 Troubleshooting and Performance Monitoring (1/14)
  124. Chapter 10 Troubleshooting and Performance Monitoring (2/14)
  125. Chapter 10 Troubleshooting and Performance Monitoring (3/14)
  126. Chapter 10 Troubleshooting and Performance Monitoring (4/14)
  127. Chapter 10 Troubleshooting and Performance Monitoring (5/14)
  128. Chapter 10 Troubleshooting and Performance Monitoring (6/14)
  129. Chapter 10 Troubleshooting and Performance Monitoring (7/14)
  130. Chapter 10 Troubleshooting and Performance Monitoring (8/14)
  131. Chapter 10 Troubleshooting and Performance Monitoring (9/14)
  132. Chapter 10 Troubleshooting and Performance Monitoring (10/14)
  133. Chapter 10 Troubleshooting and Performance Monitoring (11/14)
  134. Chapter 10 Troubleshooting and Performance Monitoring (12/14)
  135. Chapter 10 Troubleshooting and Performance Monitoring (13/14)
  136. Chapter 10 Troubleshooting and Performance Monitoring (14/14)
  137. Index (1/2)
  138. Index (2/2)
  139. Related Titles

Product information

  • Title: Cisco Security Specialists Guide to PIX Firewall
  • Author(s): Syngress
  • Release date: December 2002
  • Publisher(s): Syngress
  • ISBN: 9780080476551