2020ok  Directory of FREE Online Books and FREE eBooks

Free eBooks > Computers & Internet > Digital Business & Culture > Privacy > Cisco Security Specialist Guide to PIX

Cisco Security Specialist Guide to PIX

by Umer Khan, Vitaly Osipov, Mike Sweeney, and Woody Weaver

Download Book
(Respecting the intellectual property of others is utmost important to us, we make every effort to make sure we only link to legitimate sites, such as those sites owned by authors and publishers. If you have any questions about these links, please contact us.)

link 1
link 2

About Book

Book Description
Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will instruct the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting and more.

Cisco Security Specialist's Guide to PIX Firewall introduces the basic concepts of attack, explains the networking principals necessary to effectively implement and deploy a PIX firewall, covers the hardware and software components of the device, provides multiple configurations and administration examples, and fully describes the unique line syntax native to PIX firewall configuration and administration.

Ø Coverage of the Latest Versions of PIX Firewalls. This book includes coverage of the latest additions to the PIX Firewall family including the CiscoSecure PIX Firewall (PIX) Software Release 6.0.
Ø Must-have desk reference for the serious security professional. In addition to the foundation information and dedicated text focused on the exam objectives for the CSPFA, this book offers real-world administration and configuration support. This book will not only help readers pass the exam; it will continue to assist them with their duties on a daily basis.
Ø Firewall administration guides? Syngress wrote the book. Syngress has demonstrated a proficiency to answer the market need for quality information pertaining to firewall administration guides. Configuring ISA Server 2000: Building Firewalls for Windows 2000 (ISBN: 1-928994-29-6) and Checkpoint Next Generation Security Administration (ISBN: 1-928994-74-1) are currently best sellers in the security market.

Download Description
Demystifying the task of implementing, configuring, and administering Cisco’s PIX firewall appliances, Cisco Security Specialist’s Guide to PIX Firewall delivers a total solution both for managing these widely used devices and for passing the challenging Cisco Secure PIX Firewall Advanced Exam (9E0-571), a prerequisite for gaining prestigious Cisco Security Specialist 1 certification. Packed with insider tips and techniques on protocols, hardware and software components, troubleshooting and more, this powerful advisor illustrates attack concepts, explains must-know networking principles for optimizing and integrating PIX firewalls, sets forth real-world configuration and administration examples, and helps users master Cisco’s infamous command line interface.

About the Author
Umer Khan (CCIE #7410, MCSE, SCSA, SCNA, CCA, SCE, CNX) is the Manager of Networking and Security at Broadcom Corporation. Umer's department is responsible for the design and implementation of global LAN/MAN/WAN solutions that are available with 99.9% up time (planned and unplanned), as well as all aspects of information security. Among other technologies, Broadcom's network consists of Cisco switching gear end-to-end, dark fiber, OC-48 SONET, DWDM, 802.11 wireless, multi-vendor virtual private networks (VPNs), and voice over IP (VoIP) technology. The information security group deals with policies, intrusion detection and response, strong authentication, and firewalls. Umer has contributed to several other books, including the Sun Certified System Administrator for Solaris 8 Study Guide (ISBN: 007-212369-9) and Sniffer Pro Network Optimization & Troubleshooting Handbook (Syngress Publishing, ISBN: 1-931836-57-4). Umer received a bachelor’s degree in Computer Engineering from the Illinois Institute of Technology.

Charles Riley (CCNP, CSS1, CISSP, CCSA, MCSE, CNE-3) is a Network Engineer with a long tenure in the networking security field. Charles has co-authored several books including Syngress Publishing’s Configuring Cisco Voice Over IP, Second Edition (ISBN: 1-931836-64-7). He has designed and implemented robust networking solutions for large Fortune 500 and privately held companies. He started with the U.S. Army at Fort Huachuca, AZ, eventually finishing his Army stretch as the Network Manager of the Seventh Army Training Command in Grafenwoehr, Germany. Currently Charles is employed as a Network Security Engineer for Hypervine in Kansas, where he audits and hardens the existing security of customers, as well as deploying new security architectures and solutions. Charles holds a bachelor's degree from the University of Central Florida.

Excerpted from Cisco Security Specialist's Guide to PIX Firewall by Umer Khan, Callisma Inc., Inc. Callisma. Copyright © 2002. Reprinted by permission. All rights reserved.
As one of the first technologies employed to protect networks from unauthorized access, the firewall has come to exemplify network security. While an overall security strategy requires the harmonious integration of people, process, and technology to reduce risk, there is no doubt that firewalls can be a very valuable security tool when properly implemented. Today, the use of firewalls has become such an accepted practice that their deployment in one fashion or another is virtually a foregone conclusion when designing and building networks. Recognizing this need, Cisco Systems has developed and continues to improve upon its line of PIX firewalls. These systems have steadily gained market leadership by demonstrating an excellent mix of functionality, performance, and flexibility.

Firewalls have become increasingly sophisticated devices as the technology has matured. At its most basic level, a firewall is intended to enforce a security policy governing the network traffic that passes through it. To this basic functionality, Cisco has added many features such as network address translation (NAT), virtual private networks (VPN), and redundant architectures for high availability. Management systems are typically installed along with the firewall to assist with monitoring and administrating the device. A maxim of IT security is that technology is only as effective as the people responsible for its operation. Therefore, it is extremely important for the technical staff managing PIX firewalls to understand the technical functionality of these devices, as this will result in better security and more efficient operation of the equipment.

About This Book

The objective of this book is to provide you with a thorough understanding of the Cisco PIX firewalls. Whether you have administrative responsibilities or you are studying to pass an exam such as the Cisco Secure PIX Firewall Advanced (CPSFA), this comprehensive guide will be of value to you. The initial chapters cover the basics, and subsequent chapters delve into advanced topics. Callisma’s contributing authors are industry experts with a wealth of real world implementation experience on the PIX and IOS firewalls, and this book includes many real-world examples of do’s and don’ts. We hope you enjoy reading this book as much as we’ve enjoyed writing it!

-Ralph Troupe,
President and CEO, Callisma

About Callisma

Through Callisma’s skilled team of technology, operations, and project management professionals, we enable today’s major corporations to design and deploy networks that deliver business value. We help our clients compete effectively in the new e-business marketplace through strategic business planning, network design, and implementation services. By providing its clients with a broad base of technical services, a flexible, results-oriented engagement style, and the highest quality documentation and communication, Callisma delivers superior solutions—on time and on budget. Callisma’s expertise includes IP Telephony, Internetworking, Storage, Optical Networking, Operations Management, Security, and Project Management. Callisma is headquartered in Silicon Valley, with offices located throughout the United States.



PLEASE READ: All comments must be approved before appearing in the thread; time and space constraints prevent all comments from appearing. We will only approve comments that are directly related to the article, use appropriate language and are not attacking the comments of others.

Message (please, no HTML tags. Web addresses will be hyperlinked):

Related Free eBooks

Related Tags

DIGG This story   Save To Google   Save To Windows Live   Save To Del.icio.us   diigo it   Save To blinklist
Save To Furl   Save To Yahoo! My Web 2.0   Save To Blogmarks   Save To Shadows   Save To stumbleupon   Save To Reddit