Book description
Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will instruct the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting and more.
Cisco Security Specialist's Guide to PIX Firewall introduces the basic concepts of attack, explains the networking principals necessary to effectively implement and deploy a PIX firewall, covers the hardware and software components of the device, provides multiple configurations and administration examples, and fully describes the unique line syntax native to PIX firewall configuration and administration.
- Coverage of the Latest Versions of PIX Firewalls. This book includes coverage of the latest additions to the PIX Firewall family including the CiscoSecure PIX Firewall (PIX) Software Release 6.0
- Must-have desk reference for the serious security professional. In addition to the foundation information and dedicated text focused on the exam objectives for the CSPFA, this book offers real-world administration and configuration support. This book will not only help readers pass the exam; it will continue to assist them with their duties on a daily basis
- Firewall administration guides? Syngress wrote the book. Syngress has demonstrated a proficiency to answer the market need for quality information pertaining to firewall administration guides. Configuring ISA Server 2000: Building Firewalls for Windows 2000 (ISBN: 1-928994-29-6) and Checkpoint Next Generation Security Administration (ISBN: 1-928994-74-1) are currently best sellers in the security market
Table of contents
- Cover (1/3)
- Cover (2/3)
- Cover (3/3)
- Table of Contents (1/3)
- Table of Contents (2/3)
- Table of Contents (3/3)
- Foreword
- Introduction
- Chapter 1 Introduction to Security and Firewalls (1/9)
- Chapter 1 Introduction to Security and Firewalls (2/9)
- Chapter 1 Introduction to Security and Firewalls (3/9)
- Chapter 1 Introduction to Security and Firewalls (4/9)
- Chapter 1 Introduction to Security and Firewalls (5/9)
- Chapter 1 Introduction to Security and Firewalls (6/9)
- Chapter 1 Introduction to Security and Firewalls (7/9)
- Chapter 1 Introduction to Security and Firewalls (8/9)
- Chapter 1 Introduction to Security and Firewalls (9/9)
- Chapter 2 Introduction to PIX Firewalls (1/10)
- Chapter 2 Introduction to PIX Firewalls (2/10)
- Chapter 2 Introduction to PIX Firewalls (3/10)
- Chapter 2 Introduction to PIX Firewalls (4/10)
- Chapter 2 Introduction to PIX Firewalls (5/10)
- Chapter 2 Introduction to PIX Firewalls (6/10)
- Chapter 2 Introduction to PIX Firewalls (7/10)
- Chapter 2 Introduction to PIX Firewalls (8/10)
- Chapter 2 Introduction to PIX Firewalls (9/10)
- Chapter 2 Introduction to PIX Firewalls (10/10)
- Chapter 3 Passing Traffic (1/9)
- Chapter 3 Passing Traffic (2/9)
- Chapter 3 Passing Traffic (3/9)
- Chapter 3 Passing Traffic (4/9)
- Chapter 3 Passing Traffic (5/9)
- Chapter 3 Passing Traffic (6/9)
- Chapter 3 Passing Traffic (7/9)
- Chapter 3 Passing Traffic (8/9)
- Chapter 3 Passing Traffic (9/9)
- Chapter 4 Advanced PIX Configurations (1/17)
- Chapter 4 Advanced PIX Configurations (2/17)
- Chapter 4 Advanced PIX Configurations (3/17)
- Chapter 4 Advanced PIX Configurations (4/17)
- Chapter 4 Advanced PIX Configurations (5/17)
- Chapter 4 Advanced PIX Configurations (6/17)
- Chapter 4 Advanced PIX Configurations (7/17)
- Chapter 4 Advanced PIX Configurations (8/17)
- Chapter 4 Advanced PIX Configurations (9/17)
- Chapter 4 Advanced PIX Configurations (10/17)
- Chapter 4 Advanced PIX Configurations (11/17)
- Chapter 4 Advanced PIX Configurations (12/17)
- Chapter 4 Advanced PIX Configurations (13/17)
- Chapter 4 Advanced PIX Configurations (14/17)
- Chapter 4 Advanced PIX Configurations (15/17)
- Chapter 4 Advanced PIX Configurations (16/17)
- Chapter 4 Advanced PIX Configurations (17/17)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (1/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (2/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (3/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (4/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (5/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (6/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (7/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (8/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (9/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (10/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (11/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (12/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (13/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (14/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (15/15)
- Chapter 6 Configuring System Management (1/9)
- Chapter 6 Configuring System Management (2/9)
- Chapter 6 Configuring System Management (3/9)
- Chapter 6 Configuring System Management (4/9)
- Chapter 6 Configuring System Management (5/9)
- Chapter 6 Configuring System Management (6/9)
- Chapter 6 Configuring System Management (7/9)
- Chapter 6 Configuring System Management (8/9)
- Chapter 6 Configuring System Management (9/9)
- Chapter 7 Configuring Virtual Private Networking (1/16)
- Chapter 7 Configuring Virtual Private Networking (2/16)
- Chapter 7 Configuring Virtual Private Networking (3/16)
- Chapter 7 Configuring Virtual Private Networking (4/16)
- Chapter 7 Configuring Virtual Private Networking (5/16)
- Chapter 7 Configuring Virtual Private Networking (6/16)
- Chapter 7 Configuring Virtual Private Networking (7/16)
- Chapter 7 Configuring Virtual Private Networking (8/16)
- Chapter 7 Configuring Virtual Private Networking (9/16)
- Chapter 7 Configuring Virtual Private Networking (10/16)
- Chapter 7 Configuring Virtual Private Networking (11/16)
- Chapter 7 Configuring Virtual Private Networking (12/16)
- Chapter 7 Configuring Virtual Private Networking (13/16)
- Chapter 7 Configuring Virtual Private Networking (14/16)
- Chapter 7 Configuring Virtual Private Networking (15/16)
- Chapter 7 Configuring Virtual Private Networking (16/16)
- Chapter 8 Configuring Failover (1/8)
- Chapter 8 Configuring Failover (2/8)
- Chapter 8 Configuring Failover (3/8)
- Chapter 8 Configuring Failover (4/8)
- Chapter 8 Configuring Failover (5/8)
- Chapter 8 Configuring Failover (6/8)
- Chapter 8 Configuring Failover (7/8)
- Chapter 8 Configuring Failover (8/8)
- Chapter 9 PIX Device Manager (1/21)
- Chapter 9 PIX Device Manager (2/21)
- Chapter 9 PIX Device Manager (3/21)
- Chapter 9 PIX Device Manager (4/21)
- Chapter 9 PIX Device Manager (5/21)
- Chapter 9 PIX Device Manager (6/21)
- Chapter 9 PIX Device Manager (7/21)
- Chapter 9 PIX Device Manager (8/21)
- Chapter 9 PIX Device Manager (9/21)
- Chapter 9 PIX Device Manager (10/21)
- Chapter 9 PIX Device Manager (11/21)
- Chapter 9 PIX Device Manager (12/21)
- Chapter 9 PIX Device Manager (13/21)
- Chapter 9 PIX Device Manager (14/21)
- Chapter 9 PIX Device Manager (15/21)
- Chapter 9 PIX Device Manager (16/21)
- Chapter 9 PIX Device Manager (17/21)
- Chapter 9 PIX Device Manager (18/21)
- Chapter 9 PIX Device Manager (19/21)
- Chapter 9 PIX Device Manager (20/21)
- Chapter 9 PIX Device Manager (21/21)
- Chapter 10 Troubleshooting and Performance Monitoring (1/14)
- Chapter 10 Troubleshooting and Performance Monitoring (2/14)
- Chapter 10 Troubleshooting and Performance Monitoring (3/14)
- Chapter 10 Troubleshooting and Performance Monitoring (4/14)
- Chapter 10 Troubleshooting and Performance Monitoring (5/14)
- Chapter 10 Troubleshooting and Performance Monitoring (6/14)
- Chapter 10 Troubleshooting and Performance Monitoring (7/14)
- Chapter 10 Troubleshooting and Performance Monitoring (8/14)
- Chapter 10 Troubleshooting and Performance Monitoring (9/14)
- Chapter 10 Troubleshooting and Performance Monitoring (10/14)
- Chapter 10 Troubleshooting and Performance Monitoring (11/14)
- Chapter 10 Troubleshooting and Performance Monitoring (12/14)
- Chapter 10 Troubleshooting and Performance Monitoring (13/14)
- Chapter 10 Troubleshooting and Performance Monitoring (14/14)
- Index (1/2)
- Index (2/2)
- Related Titles
Product information
- Title: Cisco Security Specialists Guide to PIX Firewall
- Author(s):
- Release date: December 2002
- Publisher(s): Syngress
- ISBN: 9780080476551
You might also like
book
CCNA Cloud CLDADM 210-455 Official Cert Guide
Learn, prepare, and practice for CCNA Cloud CLDADM 210-455 exam success with this Official Cert Guide …
book
The Best Damn Firewall Book Period, 2nd Edition
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to …
book
Microsoft® SQL Server 2008 R2 Unleashed
This is the industry’s most comprehensive and useful guide to SQL Server 2008 and 2008 R2. …
book
Microsoft System Center Data Protection Manager 2007 with SP1
This guide leads the reader through the process of planning a Microsoft System Center Data Protection …