|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn297574688 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
090109s2009 inua ob 001 0 eng d |
010 |
|
|
|z 2008030575
|
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d CEF
|d OCLCQ
|d CDX
|d IDEBK
|d DEBSZ
|d B24X7
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCQ
|d LIV
|d OCLCQ
|d YDX
|d OCLCQ
|d OCLCO
|d OCLCA
|d COO
|d WYU
|d OCLCQ
|d OCLCO
|d UAB
|d UKAHL
|d VT2
|d OCLCO
|d OCLCQ
|d INARC
|
019 |
|
|
|a 428740752
|a 670483630
|a 741349141
|a 792986442
|a 1044314999
|a 1056375626
|a 1062884063
|a 1073057746
|a 1097157466
|a 1202537686
|a 1240525904
|a 1391283642
|
020 |
|
|
|a 9781587056093
|
020 |
|
|
|a 1587056097
|
020 |
|
|
|a 9781587053535
|q (paper)
|
020 |
|
|
|a 1587053535
|q (paper)
|
024 |
8 |
|
|a 9786612654831
|
029 |
1 |
|
|a AU@
|b 000053278939
|
029 |
1 |
|
|a CHBIS
|b 006149224
|
029 |
1 |
|
|a CHVBK
|b 171197399
|
029 |
1 |
|
|a DEBSZ
|b 355440326
|
029 |
1 |
|
|a HEBIS
|b 291510779
|
035 |
|
|
|a (OCoLC)297574688
|z (OCoLC)428740752
|z (OCoLC)670483630
|z (OCoLC)741349141
|z (OCoLC)792986442
|z (OCoLC)1044314999
|z (OCoLC)1056375626
|z (OCoLC)1062884063
|z (OCoLC)1073057746
|z (OCoLC)1097157466
|z (OCoLC)1202537686
|z (OCoLC)1240525904
|z (OCoLC)1391283642
|
037 |
|
|
|a CL0500000030
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .B563 2009
|
072 |
|
7 |
|a UTN
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Blair, Ray,
|d 1965-
|
245 |
1 |
0 |
|a Cisco secure firewall services module (FWSM) /
|c Ray Blair, Arvind Durai.
|
260 |
|
|
|a Indianapolis, Ind. :
|b Cisco Press,
|c ©2009.
|
300 |
|
|
|a 1 online resource (xxii, 496 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Cisco Press networking technology series
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover -- Contents -- Introduction -- Part I: Introduction -- Chapter 1 Types of Firewalls -- Understanding Packet-Filtering Firewalls -- Understanding Application/Proxy Firewalls -- Understanding Reverse-Proxy Firewalls -- Utilizing Packet Inspection -- Reusing IP Addresses -- Summary -- Chapter 2 Overview of the Firewall Services Module -- Specifications -- Installation -- Performance -- Virtualization -- Comparing the FWSM to Other Security Devices -- Hardware Architecture -- Software Architecture -- Summary -- Chapter 3 Examining Modes of Operation -- Working with Transparent Mode -- Working with Routed Mode -- Summary -- References -- Chapter 4 Understanding Security Levels -- Traffic Flow Between Interfaces -- Network Address Translation/Port Address Translation -- Summary -- References -- Chapter 5 Understanding Contexts -- Benefits of Multiple Contexts -- Disadvantages of Multiple Contexts -- Adding and Removing Contexts -- Changing Between Contexts -- Understanding Resource Management -- Summary -- Part II: Initial Configuration -- Chapter 6 Configuring and Securing the 6500/7600 Chassis -- Understanding the Interaction Between the Host-Chassis and the FWSM -- Assigning Interfaces -- Securing the 6500/7600 (Host-Chassis) -- Summary -- References -- Chapter 7 Configuring the FWSM -- Configuring FWSM in the Switch -- Exploring Routed Mode -- Exploring Transparent Mode -- Using Multiple Context Mode for FWSM -- Configuration Steps for Firewall Services Module -- Summary -- Chapter 8 Access Control Lists -- Introducing Types of Access Lists -- Understanding Object Groups -- Monitoring Access List Resources -- Configuring Object Groups and Access Lists -- Summary -- Chapter 9 Configuring Routing Protocols -- Supporting Routing Methods -- Summary -- Chapter 10 AAA Overview -- Understanding AAA Components -- Comparing Security Protocols -- Understanding Two-Step Authentication -- Understanding Fallback Support -- Understanding Cut-Through Proxy in FWSM -- Summary -- Chapter 11 Modular Policy -- Using Modular Policy in FWSM -- Understanding Classification of Traffic -- Defining Policy Maps -- Configuring Service Policy -- Understanding Default Policy Map -- Sample Configuration of Modular Policy in FWSM -- Summary -- Part III: Advanced Configuration -- Chapter 12 Understanding Failover in FWSM -- Creating Redundancy in the FWSM -- Understanding Failover Link and State Link -- Requirements for Failover -- Synchronizing the Primary and Secondary Firewalls -- Monitoring Interfaces -- Configuring Poll Intervals -- Design Principle for Monitoring Interfaces -- Configuring Single Context FWSM Failover -- Configuring Multiple Context FWSM Failover -- Summary -- Chapter 13 Understanding Application Protocol Inspection -- Inspecting Hypertext Transfer Protocol -- Inspecting File Transfer Protocol -- Working with Supported Applications -- Configuring ARP -- Summary -- References -- Chapter 14 Filtering -- Working with URLs and FTP -- Configuring ActiveX and Java -- Summary -- References -- Chapter 15 Managing and Monitoring the FWSM -- Using Telnet -- Using Secure Shell -- Using Adaptive Security Device Manager -- T$2654.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
610 |
2 |
0 |
|a Cisco Systems, Inc.
|
610 |
2 |
7 |
|a Cisco Systems, Inc.
|2 blmlsh
|
610 |
2 |
7 |
|a Cisco Systems, Inc.
|2 fast
|0 (OCoLC)fst00738967
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Firewalls (Computer security)
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Coupe-feu (Sécurité informatique)
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Firewalls (Computer security)
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Firewalls (Computer security)
|2 fast
|0 (OCoLC)fst00925719
|
700 |
1 |
|
|a Durai, Arvind.
|
776 |
0 |
|
|z 1587053535
|
776 |
0 |
|
|z 9781587053535
|
830 |
|
0 |
|a Cisco Press networking technology series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781587056093/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH29809135
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00045389
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 14245061
|c 65.00 USD
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 265483
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14851778
|
938 |
|
|
|a Internet Archive
|b INAR
|n ciscosecurefirew0000blai
|
994 |
|
|
|a 92
|b IZTAP
|