O'Reilly logo

Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition by David Hucaby - CCIE No. 4594

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Verifying Firewall Operation

Refer to the following sections for information about these topics:

11-1: Checking Firewall Vital Signs—Discusses methods you can use to diagnose a firewall’s health. System resources, logging output, throughput, failover, interface operation, and packet queuing are all covered.

11-2: Watching Data Pass Through a Firewall—Covers ways that packets can be logged or captured as they pass through a firewall or through its interfaces.

11-3: Verifying Firewall Connectivity—Provides a set of basic approaches to verify working communication through a firewall.

In the course of configuring and using a firewall, it is important to follow the appropriate security policies and offer the proper connectivity to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required