55814
Author: Umer Khan
File Type: pdf
Cisco Security Specialists Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will instruct the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting and more. Cisco Security Specialists Guide to PIX Firewall introduces the basic concepts of attack, explains the networking principals necessary to effectively implement and deploy a PIX firewall, covers the hardware and software components of the device, provides multiple configurations and administration examples, and fully describes the unique line syntax native to PIX firewall configuration and administration. Coverage of the Latest Versions of PIX Firewalls. This book includes coverage of the latest additions to the PIX Firewall family including the CiscoSecure PIX Firewall (PIX) Software Release 6.0. Must-have desk reference for the serious security professional. In addition to the foundation information and dedicated text focused on the exam objectives for the CSPFA, this book offers real-world administration and configuration support. This book will not only help readers pass the exam it will continue to assist them with their duties on a daily basis. Firewall administration guides? Syngress wrote the book. Syngress has demonstrated a proficiency to answer the market need for quality information pertaining to firewall administration guides. Configuring ISA Server 2000 Building Firewalls for Windows 2000 (ISBN 1-928994-29-6) and Checkpoint Next Generation Security Administration (ISBN 1-928994-74-1) are currently best sellers in the security market.About the AuthorUmer Khan [technical sponsor, technical editor, and primary author] is the Senior Director of IT Infrastructure at Broadcom Corporation, the worlds largest fabless semiconductor company. Umer and his team have responsibility for the research, design, implementation, and support of Broadcoms global IT infrastructure, including the compute farm, network, telecommunications, Windows and UNIX serversservices, engineering toolslicensing, storage, messaging, desktoplaptop, thin client, and mobile technologies. Umer has served as an author, editor, and reviewer for several technical publications related to networking, security, and UNIX, and his Cisco Security Specialists Guide to PIX Firewalls book became a best-seller in the industry. Umer has a strong passion for technology and its applications. He holds numerous IT certifications (including the CCIE) and has three US patents pending related to networking technologies. Umer received his Bachelors degree in Computer Engineering from the Illinois Institute of Technology, and his MBA from the Wharton School of the University of Pennsylvania.Co-author Charles Riley (CCNP, CSS1, CISSP, CCSA, MCSE, CNE-3) is a Network Engineer with a long tenure in the networking security field. Charles has co-authored several books including Syngress Publishings Configuring Cisco Voice Over IP, Second Edition (ISBN 1-931836-64-7). He has designed and implemented robust networking solutions for large Fortune 500 and privately held companies. He started with the U.S. Army at Fort Huachuca, AZ, eventually finishing his Army stretch as the Network Manager of the Seventh Army Training Command in Grafenwoehr, Germany. Currently Charles is employed as a Network Security Engineer for Hypervine in Kansas, where he audits and hardens the existing security of customers, as well as deploying new security architectures and solutions. Charles holds a bachelors degree from the University of Central Florida. Excerpt. Reprinted by permission. As one of the first technologies employed to protect networks from unauthorized access, the firewall has come to exemplify network security. While an overall security strategy requires the harmonious integration of people, process, and technology to reduce risk, there is no doubt that firewalls can be a very valuable security tool when properly implemented. Today, the use of firewalls has become such an accepted practice that their deployment in one fashion or another is virtually a foregone conclusion when designing and building networks. Recognizing this need, Cisco Systems has developed and continues to improve upon its line of PIX firewalls. These systems have steadily gained market leadership by demonstrating an excellent mix of functionality, performance, and flexibility. Firewalls have become increasingly sophisticated devices as the technology has matured. At its most basic level, a firewall is intended to enforce a security policy governing the network traffic that passes through it. To this basic functionality, Cisco has added many features such as network address translation (NAT), virtual private networks (VPN), and redundant architectures for high availability. Management systems are typically installed along with the firewall to assist with monitoring and administrating the device. A maxim of IT security is that technology is only as effective as the people responsible for its operation. Therefore, it is extremely important for the technical staff managing PIX firewalls to understand the technical functionality of these devices, as this will result in better security and more efficient operation of the equipment. About This Book The objective of this book is to provide you with a thorough understanding of the Cisco PIX firewalls. Whether you have administrative responsibilities or you are studying to pass an exam such as the Cisco Secure PIX Firewall Advanced (CPSFA), this comprehensive guide will be of value to you. The initial chapters cover the basics, and subsequent chapters delve into advanced topics. Callismas contributing authors are industry experts with a wealth of real world implementation experience on the PIX and IOS firewalls, and this book includes many real-world examples of dos and donts. We hope you enjoy reading this book as much as weve enjoyed writing it! -Ralph Troupe,President and CEO, Callisma About Callisma Through Callismas skilled team of technology, operations, and project management professionals, we enable todays major corporations to design and deploy networks that deliver business value. We help our clients compete effectively in the new e-business marketplace through strategic business planning, network design, and implementation services. By providing its clients with a broad base of technical services, a flexible, results-oriented engagement style, and the highest quality documentation and communication, Callisma delivers superior solutionson time and on budget. Callismas expertise includes IP Telephony, Internetworking, Storage, Optical Networking, Operations Management, Security, and Project Management. Callisma is headquartered in Silicon Valley, with offices located throughout the United States.
Transaction
Created
1 month ago
Content Type
Language
application/pdf
English