Book description
The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security features
Learn about the various firewall models, user interfaces, feature sets, and configuration methods
Understand how a Cisco firewall inspects traffic
Configure firewall interfaces, routing, IP addressing services, and IP multicast support
Maintain security contexts and Flash and configuration files, manage users, and monitor firewalls with SNMP
Authenticate, authorize, and maintain accounting records for firewall users
Control access through the firewall by implementing transparent and routed firewall modes, address translation, traffic filtering, user authentication, content filtering, application inspection, and traffic shunning
Increase firewall availability with firewall failover operation
Understand how firewall load balancing works
Generate firewall activity logs and learn how to analyze the contents of the log
Verify firewall operation and connectivity and observe data passing through a firewall
Control access and manage activity on the Cisco IOS firewall
Configure a Cisco firewall to act as an IDS sensor
Every organization has data, facilities, and workflow processes that are critical to their success. As more organizations make greater use of the Internet, defending against network attacks becomes crucial for businesses. Productivity gains and returns on company investments are at risk if the network is not properly defended. Firewalls have emerged as the essential foundation component in any network security architecture.
Cisco ASA and PIX Firewall Handbook is a guide for the most commonly implemented features of the popular Cisco Systems® firewall security solutions. This is the first book to cover the revolutionary Cisco ASA and PIX® version 7 security appliances. This book will help you quickly and easily configure, integrate, and manage the entire suite of Cisco® firewall products, including Cisco ASA, PIX version 7 and 6.3, the Cisco IOS router firewall, and the Catalyst Firewall Services Module (FWSM). Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation. Shaded thumbtabs mark each section for quick reference and each section provides information in a concise format, with background, configuration, and example components. Each section also has a quick reference table of commands that you can use to troubleshoot or display information about the features presented. Appendixes present lists of well-known IP protocol numbers, ICMP message types, and IP port numbers that are supported in firewall configuration commands and provide a quick reference to the many logging messages that can be generated from a Cisco PIX, ASA, FWSM, or IOS firewall.
Whether you are looking for an introduction to the firewall features of the new ASA security appliance, a guide to configuring firewalls with the new Cisco PIX version 7 operating system, or a complete reference for making the most out of your Cisco ASA, PIX, IOS, and FWSM firewall deployments, Cisco ASA and PIX Firewall Handbook helps you achieve maximum protection of your network resources.
“Many books on network security and firewalls settle for a discussion focused primarily on concepts and theory. This book, however, goes well beyond these topics. It covers in tremendous detail the information every network and security administrator needs to know when configuring and managing market-leading firewall products from Cisco.”
—Jason Nolet, Sr. Director of Engineering, Security Technology Group, Cisco Systems
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.
Table of contents
- Copyright
- About the Author
- About the Technical Reviewers
- Acknowledgments
- Icons Used in This Book
- Command Syntax Conventions
- Foreword
- Introduction
- Firewall Overview
- Configuration Fundamentals
- Building Connectivity
- Firewall Management
- Managing Firewall Users
- Controlling Access Through the Firewall
- Increasing Firewall Availability with Failover
- Firewall Load Balancing
- Firewall Logging
- Verifying Firewall Operation
- Cisco IOS Firewall: Controlling Access
- Cisco IOS Firewall: Managing Activity
- Intrusion Detection System (IDS) Sensors
- Well-Known Protocol and Port Numbers
-
Security Appliance Logging Messages
- Alerts—Syslog Severity Level 1 Messages
- Critical—Syslog Severity Level 2 Messages
- Errors—Syslog Severity Level 3 Messages
- Warnings—Syslog Severity Level 4 Messages
- Notifications—Syslog Severity Level 5 Messages
- Informational—Syslog Severity Level 6 Messages
- B-7: Debugging—Syslog Severity Level 7 Messages
- Index
Product information
- Title: Cisco ASA and PIX Firewall Handbook
- Author(s):
- Release date: June 2005
- Publisher(s): Cisco Press
- ISBN: 9781587051586
You might also like
book
Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition
Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, is a guide for the most commonly …
book
Cisco Router Configuration, Second Edition
A Practical Introduction to Cisco IOS 12.0 Configuration Written by senior managers of Digital Island, the …
book
CCNA Security (210-260) Portable Command Guide, Second Edition
Preparing for the latest CCNA Security exam? Here are all the CCNA Security (210-260) commands you …
book
Cisco Secure Firewall Services Module (FWSM)
Cisco Secure Firewall Services Module (FWSM) Best practices for securing networks with FWSM Ray Blair, CCIE® …