Cisco secure firewall services module (FWSM) /
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, Ind. :
Cisco Press,
©2009.
|
Colección: | Cisco Press networking technology series.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Contents
- Introduction
- Part I: Introduction
- Chapter 1 Types of Firewalls
- Understanding Packet-Filtering Firewalls
- Understanding Application/Proxy Firewalls
- Understanding Reverse-Proxy Firewalls
- Utilizing Packet Inspection
- Reusing IP Addresses
- Summary
- Chapter 2 Overview of the Firewall Services Module
- Specifications
- Installation
- Performance
- Virtualization
- Comparing the FWSM to Other Security Devices
- Hardware Architecture
- Software Architecture
- Summary
- Chapter 3 Examining Modes of Operation
- Working with Transparent Mode
- Working with Routed Mode
- Summary
- References
- Chapter 4 Understanding Security Levels
- Traffic Flow Between Interfaces
- Network Address Translation/Port Address Translation
- Summary
- References
- Chapter 5 Understanding Contexts
- Benefits of Multiple Contexts
- Disadvantages of Multiple Contexts
- Adding and Removing Contexts
- Changing Between Contexts
- Understanding Resource Management
- Summary
- Part II: Initial Configuration
- Chapter 6 Configuring and Securing the 6500/7600 Chassis
- Understanding the Interaction Between the Host-Chassis and the FWSM
- Assigning Interfaces
- Securing the 6500/7600 (Host-Chassis)
- Summary
- References
- Chapter 7 Configuring the FWSM
- Configuring FWSM in the Switch
- Exploring Routed Mode
- Exploring Transparent Mode
- Using Multiple Context Mode for FWSM
- Configuration Steps for Firewall Services Module
- Summary
- Chapter 8 Access Control Lists
- Introducing Types of Access Lists
- Understanding Object Groups
- Monitoring Access List Resources
- Configuring Object Groups and Access Lists
- Summary
- Chapter 9 Configuring Routing Protocols
- Supporting Routing Methods
- Summary
- Chapter 10 AAA Overview
- Understanding AAA Components
- Comparing Security Protocols
- Understanding Two-Step Authentication
- Understanding Fallback Support
- Understanding Cut-Through Proxy in FWSM
- Summary
- Chapter 11 Modular Policy
- Using Modular Policy in FWSM
- Understanding Classification of Traffic
- Defining Policy Maps
- Configuring Service Policy
- Understanding Default Policy Map
- Sample Configuration of Modular Policy in FWSM
- Summary
- Part III: Advanced Configuration
- Chapter 12 Understanding Failover in FWSM
- Creating Redundancy in the FWSM
- Understanding Failover Link and State Link
- Requirements for Failover
- Synchronizing the Primary and Secondary Firewalls
- Monitoring Interfaces
- Configuring Poll Intervals
- Design Principle for Monitoring Interfaces
- Configuring Single Context FWSM Failover
- Configuring Multiple Context FWSM Failover
- Summary
- Chapter 13 Understanding Application Protocol Inspection
- Inspecting Hypertext Transfer Protocol
- Inspecting File Transfer Protocol
- Working with Supported Applications
- Configuring ARP
- Summary
- References
- Chapter 14 Filtering
- Working with URLs and FTP
- Configuring ActiveX and Java
- Summary
- References
- Chapter 15 Managing and Monitoring the FWSM
- Using Telnet
- Using Secure Shell
- Using Adaptive Security Device Manager
- T$2654.