Book description
Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will instruct the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting and more.
Cisco Security Specialist's Guide to PIX Firewall introduces the basic concepts of attack, explains the networking principals necessary to effectively implement and deploy a PIX firewall, covers the hardware and software components of the device, provides multiple configurations and administration examples, and fully describes the unique line syntax native to PIX firewall configuration and administration.
- Coverage of the Latest Versions of PIX Firewalls. This book includes coverage of the latest additions to the PIX Firewall family including the CiscoSecure PIX Firewall (PIX) Software Release 6.0
- Must-have desk reference for the serious security professional. In addition to the foundation information and dedicated text focused on the exam objectives for the CSPFA, this book offers real-world administration and configuration support. This book will not only help readers pass the exam; it will continue to assist them with their duties on a daily basis
- Firewall administration guides? Syngress wrote the book. Syngress has demonstrated a proficiency to answer the market need for quality information pertaining to firewall administration guides. Configuring ISA Server 2000: Building Firewalls for Windows 2000 (ISBN: 1-928994-29-6) and Checkpoint Next Generation Security Administration (ISBN: 1-928994-74-1) are currently best sellers in the security market
Table of contents
- Cover (1/3)
- Cover (2/3)
- Cover (3/3)
- Table of Contents (1/3)
- Table of Contents (2/3)
- Table of Contents (3/3)
- Foreword
- Introduction
- Chapter 1 Introduction to Security and Firewalls (1/9)
- Chapter 1 Introduction to Security and Firewalls (2/9)
- Chapter 1 Introduction to Security and Firewalls (3/9)
- Chapter 1 Introduction to Security and Firewalls (4/9)
- Chapter 1 Introduction to Security and Firewalls (5/9)
- Chapter 1 Introduction to Security and Firewalls (6/9)
- Chapter 1 Introduction to Security and Firewalls (7/9)
- Chapter 1 Introduction to Security and Firewalls (8/9)
- Chapter 1 Introduction to Security and Firewalls (9/9)
- Chapter 2 Introduction to PIX Firewalls (1/10)
- Chapter 2 Introduction to PIX Firewalls (2/10)
- Chapter 2 Introduction to PIX Firewalls (3/10)
- Chapter 2 Introduction to PIX Firewalls (4/10)
- Chapter 2 Introduction to PIX Firewalls (5/10)
- Chapter 2 Introduction to PIX Firewalls (6/10)
- Chapter 2 Introduction to PIX Firewalls (7/10)
- Chapter 2 Introduction to PIX Firewalls (8/10)
- Chapter 2 Introduction to PIX Firewalls (9/10)
- Chapter 2 Introduction to PIX Firewalls (10/10)
- Chapter 3 Passing Traffic (1/9)
- Chapter 3 Passing Traffic (2/9)
- Chapter 3 Passing Traffic (3/9)
- Chapter 3 Passing Traffic (4/9)
- Chapter 3 Passing Traffic (5/9)
- Chapter 3 Passing Traffic (6/9)
- Chapter 3 Passing Traffic (7/9)
- Chapter 3 Passing Traffic (8/9)
- Chapter 3 Passing Traffic (9/9)
- Chapter 4 Advanced PIX Configurations (1/17)
- Chapter 4 Advanced PIX Configurations (2/17)
- Chapter 4 Advanced PIX Configurations (3/17)
- Chapter 4 Advanced PIX Configurations (4/17)
- Chapter 4 Advanced PIX Configurations (5/17)
- Chapter 4 Advanced PIX Configurations (6/17)
- Chapter 4 Advanced PIX Configurations (7/17)
- Chapter 4 Advanced PIX Configurations (8/17)
- Chapter 4 Advanced PIX Configurations (9/17)
- Chapter 4 Advanced PIX Configurations (10/17)
- Chapter 4 Advanced PIX Configurations (11/17)
- Chapter 4 Advanced PIX Configurations (12/17)
- Chapter 4 Advanced PIX Configurations (13/17)
- Chapter 4 Advanced PIX Configurations (14/17)
- Chapter 4 Advanced PIX Configurations (15/17)
- Chapter 4 Advanced PIX Configurations (16/17)
- Chapter 4 Advanced PIX Configurations (17/17)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (1/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (2/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (3/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (4/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (5/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (6/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (7/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (8/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (9/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (10/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (11/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (12/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (13/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (14/15)
- Chapter 5 Configuring Authentication, Authorization, and Accounting (15/15)
- Chapter 6 Configuring System Management (1/9)
- Chapter 6 Configuring System Management (2/9)
- Chapter 6 Configuring System Management (3/9)
- Chapter 6 Configuring System Management (4/9)
- Chapter 6 Configuring System Management (5/9)
- Chapter 6 Configuring System Management (6/9)
- Chapter 6 Configuring System Management (7/9)
- Chapter 6 Configuring System Management (8/9)
- Chapter 6 Configuring System Management (9/9)
- Chapter 7 Configuring Virtual Private Networking (1/16)
- Chapter 7 Configuring Virtual Private Networking (2/16)
- Chapter 7 Configuring Virtual Private Networking (3/16)
- Chapter 7 Configuring Virtual Private Networking (4/16)
- Chapter 7 Configuring Virtual Private Networking (5/16)
- Chapter 7 Configuring Virtual Private Networking (6/16)
- Chapter 7 Configuring Virtual Private Networking (7/16)
- Chapter 7 Configuring Virtual Private Networking (8/16)
- Chapter 7 Configuring Virtual Private Networking (9/16)
- Chapter 7 Configuring Virtual Private Networking (10/16)
- Chapter 7 Configuring Virtual Private Networking (11/16)
- Chapter 7 Configuring Virtual Private Networking (12/16)
- Chapter 7 Configuring Virtual Private Networking (13/16)
- Chapter 7 Configuring Virtual Private Networking (14/16)
- Chapter 7 Configuring Virtual Private Networking (15/16)
- Chapter 7 Configuring Virtual Private Networking (16/16)
- Chapter 8 Configuring Failover (1/8)
- Chapter 8 Configuring Failover (2/8)
- Chapter 8 Configuring Failover (3/8)
- Chapter 8 Configuring Failover (4/8)
- Chapter 8 Configuring Failover (5/8)
- Chapter 8 Configuring Failover (6/8)
- Chapter 8 Configuring Failover (7/8)
- Chapter 8 Configuring Failover (8/8)
- Chapter 9 PIX Device Manager (1/21)
- Chapter 9 PIX Device Manager (2/21)
- Chapter 9 PIX Device Manager (3/21)
- Chapter 9 PIX Device Manager (4/21)
- Chapter 9 PIX Device Manager (5/21)
- Chapter 9 PIX Device Manager (6/21)
- Chapter 9 PIX Device Manager (7/21)
- Chapter 9 PIX Device Manager (8/21)
- Chapter 9 PIX Device Manager (9/21)
- Chapter 9 PIX Device Manager (10/21)
- Chapter 9 PIX Device Manager (11/21)
- Chapter 9 PIX Device Manager (12/21)
- Chapter 9 PIX Device Manager (13/21)
- Chapter 9 PIX Device Manager (14/21)
- Chapter 9 PIX Device Manager (15/21)
- Chapter 9 PIX Device Manager (16/21)
- Chapter 9 PIX Device Manager (17/21)
- Chapter 9 PIX Device Manager (18/21)
- Chapter 9 PIX Device Manager (19/21)
- Chapter 9 PIX Device Manager (20/21)
- Chapter 9 PIX Device Manager (21/21)
- Chapter 10 Troubleshooting and Performance Monitoring (1/14)
- Chapter 10 Troubleshooting and Performance Monitoring (2/14)
- Chapter 10 Troubleshooting and Performance Monitoring (3/14)
- Chapter 10 Troubleshooting and Performance Monitoring (4/14)
- Chapter 10 Troubleshooting and Performance Monitoring (5/14)
- Chapter 10 Troubleshooting and Performance Monitoring (6/14)
- Chapter 10 Troubleshooting and Performance Monitoring (7/14)
- Chapter 10 Troubleshooting and Performance Monitoring (8/14)
- Chapter 10 Troubleshooting and Performance Monitoring (9/14)
- Chapter 10 Troubleshooting and Performance Monitoring (10/14)
- Chapter 10 Troubleshooting and Performance Monitoring (11/14)
- Chapter 10 Troubleshooting and Performance Monitoring (12/14)
- Chapter 10 Troubleshooting and Performance Monitoring (13/14)
- Chapter 10 Troubleshooting and Performance Monitoring (14/14)
- Index (1/2)
- Index (2/2)
- Related Titles
Product information
- Title: Cisco Security Specialists Guide to PIX Firewall
- Author(s):
- Release date: December 2002
- Publisher(s): Syngress
- ISBN: 9780080476551
You might also like
book
Computer Architecture, 5th Edition
Computer Architecture: A Quantitative Approach, Fifth Edition, explores the ways that software and technology in the …
book
Core Java for the Impatient, 3rd Edition
Clear, Concise Guide to the Core Language and Libraries--Updated through Java 17 Modern Java introduces major …
book
TypeScript Cookbook
TypeScript is one of the most important tools for JavaScript developers. Still, even experienced developers wonder …