Cisco Secure Firewall Services Module (FWSM) - Softcover

Blair, Ray; Durai, Arvind

  • 4.17 out of 5 stars
    6 ratings by Goodreads
 
9781587053535: Cisco Secure Firewall Services Module (FWSM)

Synopsis

Reviewing design and configuration concepts for FWSM deployments, a thorough manual explains how to maximize FWSM security features and reduce deployment time, discusses the differences between PIX/ASA firewall and FWSM deployments, covers the latest features and common installation practices, and more. Original. (Intermediate)

"synopsis" may belong to another edition of this title.

About the Author

Ray Blair is a consulting systems architect and has been with Cisco Systems for more than eight years, working primarily on security and large network designs. He has 20 years of experience with designing, implementing, and maintaining networks that have included nearly all networking technologies. His first four years in the high-technology industry started with designing industrial computer systems for process monitoring. Mr. Blair maintains three Cisco Certified Internetwork Expert (CCIE) certifications in Routing and Switching, Security, and Service Provider. He also is a Certified Novell Engineer (CNE) and a Certified Information Systems Security Professional (CISSP).

 

Arvind Durai is an advanced services technical leader for Cisco Systems. His primary responsibility has been in supporting major Cisco customers in the Enterprise sector, some of which includes Financial, Manufacturing, E-commerce, State Government, and Health Care sectors. One of his focuses has been on security, and he has authored several white papers and design guides in various technologies. Mr. Durai maintains two Cisco Certified Internetwork Expert (CCIE) certifications in Routing and Switching and Security. Mr. Durai holds a Bachelor of Science degree in Electronics and Communication, a Master&;s degree in Electrical Engineering (MS), and Master&;s degree in Business Administration (MBA).

 

Excerpt. © Reprinted by permission. All rights reserved.

Cisco Secure Firewall Services Module (FWSM)

Cisco Secure Firewall Services Module (FWSM)

Introduction

Firewalls are one of the main components used in securing a network infrastructure, and having an in-depth understanding of how these devices function is paramount to maintaining a secure network.

This book was written to provide an understanding of the functionality of the Firewall Services Module (FWSM), from both a hardware and software perspective and to be a practical design guide with configuration examples for the design, implementation, operation, and management of FWSM in various deployment scenarios.

Who Should Read This Book?

This book is targeted at individuals who would like an in-depth understanding of the FWSM. It is focused primarily for those who design, implement, or maintain the FWSM, such as security/network administrators. To get the most value from the material, the reader should have at least an intermediate knowledge of networking and security.

How This Book Is Organized

This book is organized into five sections that cover the basic introduction of firewalls, initial and advanced configurations, design guides and configuration examples, and features and functionality introduced in FWSM version 4.x code:

  • Chapter 1, "Types of Firewalls": This chapter explains the functionality of the different types of firewalls.

  • Chapter 2, "Overview of the Firewall Services Module": This chapter covers specifications, installation information, performance, and virtualization; shows a comparison of IOS FW, ASA, and FWSM; and also explains the hardware and software architecture.

  • Chapter 3, "Examining Modes of Operation": This chapter examines the modes of operation (transparent/routed) and explains the advantages of each.

  • Chapter 4, "Understanding Security Levels": This chapter explains how traffic flows between interfaces, using both NAT and PAT and routed and transparent modes.

  • Chapter 5, "Understanding Contexts": This chapter provides an overview of the benefits of contexts and how to manage them.

  • Chapter 6, "Configuring and Securing the 6500/7600 Chassis": This chapter explains how to configure the host chassis to support the FWSM.

  • Chapter 7, "Configuring the FWSM": This chapter covers the initial configuration of the FWSM.

  • Chapter 8, "Access Control Lists": This chapter examines the use of ACLs.

  • Chapter 9, "Configuring Routing Protocols": This chapter explains the use of routing protocols on the FWSM.

  • Chapter 10, "AAA Overview": This chapter covers the principles of using authentication, authorization, and accounting.

  • Chapter 11, "Modular Policy": This chapter covers the use of class and policy maps.

  • Chapter 12, "Understanding Failover in FWSM": This chapter explains the use and configuration of using multiple FWSMs for high availability.

  • Chapter 13, "Understanding Application Protocol Inspection": This chapter covers the use and configuration of application and protocol inspection.

  • Chapter 14, "Filtering": This chapter examines how traffic can be filtered using filter servers and how Active X and Java filtering function.

  • Chapter 15, "Managing and Monitoring the FWSM": This chapter covers the different options of managing and monitoring the FWSM.

  • Chapter 16, "Multicast": This chapter explains the interaction of multicast with the FWSM and provides some practical examples.

  • Chapter 17, "Asymmetric Routing": This chapter provides an explanation of asymmetric routing and how it can be configured.

  • Chapter 18, "Firewall Load Balancing": This chapter covers the options of how to increase performance using multiple FWSMs.

  • Chapter 19, "IP Version 6": This chapter explains IPv6 and how it is configured on the FWSM.

  • Chapter 20, "Preventing Network Attacks": This chapter examines how to mitigate network attacks, using shunning, antispoofing, connection limits, and timeouts.

  • Chapter 21, "Troubleshooting the FWSM": This chapter explains how to leverage the appropriate tools to solve problems.

  • Chapter 22, "Designing a Network Infrastructure": This chapter covers an overview on placement of the FWSM in the network.

  • Chapter 23, "Design Scenarios": This chapter provides many practical examples of how the FWSM can be configured.

  • Chapter 24, "FWSM 4.x Performance and Scalability Improvements": This chapter covers the performance improvements in 4.x code.

  • Chapter 25, "Understanding FWSM 4.x Routing and Feature Enhancements": This chapter explains the use of commands introduced in 4.x code.


© Copyright Pearson Education. All rights reserved.

"About this title" may belong to another edition of this title.

Other Popular Editions of the Same Title

9788131725276: Cisco Secure Firewall Services Module

Featured Edition

ISBN 10:  8131725278 ISBN 13:  9788131725276
Softcover