did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781587054570

Cisco Asa, Pix, and Fwsm Firewall Handbook

by
  • ISBN13:

    9781587054570

  • ISBN10:

    1587054574

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2007-08-09
  • Publisher: Cisco Press
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $68.00 Save up to $15.42
  • Digital
    $52.58
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

The complete guide to the most popular Cisco ASA, PIX, and FWSM firewall security features.

Author Biography

David Hucaby, CCIE No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software. He has a B.S. and M.S. in electrical engineering from the University of Kentucky. He is the author of three other books from Cisco Press: CCNP BCMSN Official Exam Certification Guide, Cisco Field Manual: Router Configuration, and Cisco Field Manual: Catalyst Switch Configuration.

 

He lives in Kentucky with his wife, Marci, and two daughters.

 

Table of Contents

Forewordp. xxii
Introduction xxiii
Firewall Overview 31p. 1
Overview of Firewall Operationp. 4
Initial Checkingp. 5
Xlate Lookupp. 6
Conn Lookupp. 7
ACL Lookupp. 8
Uauth Lookupp. 8
Inspection Enginep. 9
Inspection Engines for ICMP, UDP, and TCP 9ICMP Inspectionp. 10
A Case Study in ICMP Inspectionp. 12
UDP Inspection 13TCP Inspectionp. 15
Additional TCP Connection Controlsp. 17
TCP Normalizationp. 18
Other Firewall Operationsp. 19
Hardware and Performancep. 19
Basic Security Policy Guidelinesp. 21
Further Readingp. 24
Configuration Fundamentalsp. 27
User Interfacep. 27
User Interface Modesp. 28
User Interface Featuresp. 29
Entering Commandsp. 29
Command Helpp. 31
Command Historyp. 32
Searching and Filtering Command Outputp. 32
Terminal Screen Formatp. 34
Firewall Features and Licensesp. 34
Upgrading a License Activation Keyp. 40
Initial Firewall Configurationp. 41
Building Connectivityp. 45
Configuring Interfacesp. 45
Surveying Firewall Interfacesp. 46
Configuring Interface Redundancyp. 48
Basic Interface Configurationp. 50
Interface Configuration Examplesp. 58
Configuring IPv6 on an Interfacep. 60
Testing IPv6 Connectivityp. 67
Configuring the ARP Cachep. 68
Configuring Interface MTU and Fragmentationp. 70
Configuring an Interface Priority Queuep. 73
Displaying Information About the Priority Queuep. 77
Firewall Topology Considerationsp. 77
Securing Trunk Links Connected to Firewallsp. 79
Bypass Linksp. 81
Configuring Routingp. 83
Using Routing Information to Prevent IP Address Spoofingp. 84
Configuring Static Routesp. 86
Static Route Examplep. 89
Favoring Static Routes Based on Reachabilityp. 89
Reachable Static Route Examplep. 92
Configuring RIP to Exchange Routing Informationp. 95
RIP Examplep. 97
Configuring EIGRP to Exchange Routing Informationp. 97
An EIGRP Configuration Examplep. 101
Configuring OSPF to Exchange Routing Informationp. 101
OSPF Routing Scenarios with a Firewallp. 102
OSPF Used Only on the Insidep. 102
OSPF Used Only on the Outsidep. 102
OSPF Used on Both Sides of the Firewall (Same Autonomous System)p. 103
OSPF Used on Both Sides of the Firewall (Different Autonomous Systems)p. 104
Configuring OSPFp. 105
Redistributing Routes from Another Source into OSPFp. 112
OSPF Examplep. 115
DHCP Server Functionsp. 116
Using the Firewall as a DHCP Serverp. 117
DHCP Server Examplep. 120
Updating Dynamic DNS from a DHCP Serverp. 120
Verifying DDNS Operationp. 123
Relaying DHCP Requests to a DHCP Serverp. 124
DHCP Relay Examplep. 125
Multicast Supportp. 126
Multicast Overviewp. 126
Multicast Addressingp. 127
Forwarding Multicast Trafficp. 128
Multicast Treesp. 128
Reverse Path Forwardingp. 128
IGMP: Finding Multicast Group Recipientsp. 129
IGMPv1p. 129
IGMPv2p. 130
PIM: Building a Multicast Distribution Treep. 130
PIM Sparse Modep. 131
PIM RP Designationp. 136
Configuring PIMp. 137
Using a Multicast Boundary to Segregate Domainsp. 142
Filtering PIM Neighborsp. 143
Filtering Bidirectional PIM Neighborsp. 144
Configuring Stub Multicast Routing (SMR)p. 145
Configuring IGMP Operationp. 147
Stub Multicast Routing Examplep. 150
PIM Multicast Routing Examplep. 151
Verifying IGMP Multicast Operationp. 151
Verifying PIM Multicast Routing Operationp. 152
Firewall Managementp. 157
Using Security Contexts to Make Virtual Firewallsp. 157
Security Context Organizationp. 158
Sharing Context Interfacesp. 158
Issues
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Excerpts

= 0) {slash = '\\';} else {slash = '/';}openLoc = figLoc.substring(0, figLoc.lastIndexOf(slash) + 1);while (pPage.substring(0,3) == '../') {openLoc = openLoc.substring(0, openLoc.lastIndexOf(slash, openLoc.length - 2)+ 1);pPage = pPage.substring(3, pPage.length + 1);}popUpWin =window.open('','popWin','resizable=1,scrollbars=1,location=0,toolbar=0,width=525,height=394');figDoc = popUpWin.document;zhtm= ' ' + pPage + ' ';zhtm += ' ';zhtm += ' ';zhtm += ' ';zhtm += '' + pPage.substring(pPage.lastIndexOf('/') + 1, pPage.length) + '';zhtm += ' ';figDoc.write(zhtm);figDoc.close();}// modified 3.1.99 RWE v4.1 --> Cisco ASA, PIX, and FWSM Firewall Handbook Cisco ASA, PIX, and FWSM Firewall Handbook IntroductionThis book focuses on the complete product line of Cisco firewall hardware: the PIX and ASA Security Appliance families and the Catalyst Firewall Services Module (FWSM). Of the many sources of information and documentation about Cisco firewalls, very few provide a quick and portable solution for networking professionals.This book is designed to provide a quick and easy reference guide for all the features that can be configured on any Cisco firewall. In essence, an entire bookshelf of firewall documentation, along with other networking reference material, has been "squashed" into one handy volume.This book covers only the features that can be used for stateful traffic inspection and overall network security. Although Cisco firewalls can also support VPN functions, those subjects are not covered here.This book is based on the most current Cisco firewall software releases available at press time--ASA release 8.0(1) and FWSM release 3.2(1).In the book, you will find ASA, PIX, and FWSM commands presented side-by-side for any specific task. The command syntax is shown with a label indicating the type of software that is running, according to the following convention:ASA--Refers to any platform that can run ASA release 7.0(1) or later. This can include the ASA 5500 family, as well as the PIX 500 family. For example, even though a PIX 535 can run a specific build of the ASA 8.0(1) code, the commands are still labeled "ASA" to follow the operating system being used.PIX--Refers to a PIX release 6.3.FWSM--Refers to FWSM release 3.1(1) or later.If you are using an earlier version of software, you might find that the configuration commands differ slightly.With the advent of the ASA platform, Cisco began using different terminology: firewalls became known assecurity appliancesbecause of the rich security features within the software and because of the mo

Rewards Program