Cisco Security Specialist's Guide to PIX Firewall
Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver
- 出版商: Syngress Media
- 售價: $2,580
- 貴賓價: 9.5 折 $2,451
- 語言: 英文
- 頁數: 608
- 裝訂: Paperback
- ISBN: 1931836639
- ISBN-13: 9781931836630
-
相關分類:
Cisco、資訊安全
已過版
買這商品的人也買了...
-
$2,350$2,233 -
$600$540 -
$2,980$2,831 -
$1,880$1,786 -
$680$537 -
$980$774 -
$630$536 -
$1,510$1,435 -
$920$727 -
$490$417 -
$1,280$1,216 -
$699$594 -
$750$638 -
$560$442 -
$420$328 -
$280$218 -
$650$507 -
$169$144 -
$750$638 -
$620$558 -
$420$378 -
$650$553 -
$580$493 -
$600$510 -
$390$304
相關主題
商品描述
Decriptions:
The firewall has come to exemplify network security. While an overall security strategy requires a harmonious integration of people, process, and technologies to reduce risk, thereâ??s no doubt that firewalls can be a very valuable security tool. Cisco Systems' PIX firewalls have gained market leadership by demonstrating a mix of functionality, performance, and flexibility. The objective of this book is to help you gain a deeper knowledge of Cisco PIX Firewalls. Whether you have administrative responsibilities or are studying to pass an exam such as the Cisco Secure PIX Firewall Advanced (CSPFA), this comprehensive guide will be of value to you.
This is the only book in the market that focuses on covering (and going well beyond) all of the objectives of the latest CSPFA 3.0 exam (9E0-111). Through the use of detailed examples, this book provides step-by-side instructions on how to configure, maintain, and troubleshoot PIX firewalls running software version 6.2 and PIX Device Manager (PDM) version 2.1. All the latest and greatest features of PIX firewall software version 6.2 are covered, including TurboACLs, object grouping, NTP, HTTP failover replication, command level authorization, downloadable ACLs, LAN-based failover, and PPPoE.
- Review PIX
Hardware
Find coverage of the five supported models: the 501, the 506E, the 515E, the 525, and the 535. - Learn About
TurboACLs
TurboACLs are a new feature in PIX Firewall software version 6.2. that enable faster processing of traffic through the access list. - Review Advanced
Configurations
Get complete coverage of handling advanced protocols, filtering Web traffic, configuring intrusion detection, and DHCP functionality. - Configure
Authentication, Authorization, and Accounting
Develop and enforce policies on a per user basis with the use of user-level security. - Configure Remote
Access
Use Telnet, SSH, SNMP, or Cisco PDM to remotely manage the PIX. - Configure
Virtual Private Networking
See how the PIX Firewall supports both site-to-site and remote access VPNs using various protocols: IPsec, L2TP, and PPTP. - Connect Primary
and Secondary PIX Firewalls
To support high availability, the Cisco PIX Firewall provides the ability to deal with firewall failures. See how failover operation works on the PIX Firewall. - Use PIX Device
Manager
Use PIX Device Manager (PDM) to install, configure, and maintain the PIX Firewall. - Troubleshoot PIX
Firewalls
Troubleshoot hardware, cabling, connectivity, and IPsec, as well as capture traffic and monitor performance.