Cisco secure firewall services module (FWSM): [best practices for securing networks with FWSM]
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Indianapolis, Ind.
Cisco Press
2009
|
Schriftenreihe: | Security
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Inhaltsverzeichnis Klappentext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XXII, 496 S. Ill., graph. Darst. |
ISBN: | 1587053535 9781587053535 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV036590191 | ||
003 | DE-604 | ||
005 | 20100817 | ||
007 | t | ||
008 | 100729s2009 ad|| |||| 00||| eng d | ||
010 | |a 2008030575 | ||
020 | |a 1587053535 |c pbk. : 65,00 |9 1-58705-353-5 | ||
020 | |a 9781587053535 |c pbk. : 65,00 |9 978-1-58705-353-5 | ||
035 | |a (OCoLC)698845084 | ||
035 | |a (DE-599)GBV572335768 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Blair, Ray |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cisco secure firewall services module (FWSM) |b [best practices for securing networks with FWSM] |c Ray Blair ; Arvind Durai |
264 | 1 | |a Indianapolis, Ind. |b Cisco Press |c 2009 | |
300 | |a XXII, 496 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Security | |
500 | |a Literaturangaben | ||
650 | 0 | |a Cisco Systems, Inc | |
650 | 0 | 7 | |a Firewall |0 (DE-588)4386332-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cisco |0 (DE-588)4483705-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cisco |0 (DE-588)4483705-7 |D s |
689 | 0 | 1 | |a Firewall |0 (DE-588)4386332-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Durai, Arvind |e Verfasser |4 aut | |
856 | 4 | |u http://www.loc.gov/catdir/toc/ecip0823/2008030575.html |3 Inhaltsverzeichnis | |
856 | 4 | |m DE-601 |q pdf/application |u http://www.gbv.de/dms/bowker/toc/9781587053535.pdf |3 Inhaltsverzeichnis | |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020510918&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020510918&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-020510918 |
Datensatz im Suchindex
_version_ | 1804143189057077248 |
---|---|
adam_text | Cisco
Secure
Firewall
Services Module (FWSM)
■
Understand modes of operation, security
levels, and contexts for the FWSM
■
Configure routing protocols and the
host-chassis to support the FWSM
■
Deploy ACLs and Authentication,
Authorization, and Accounting (AAA)
■
Apply class and policy maps
■
Configure multiple FWSMs for failover
support
•
Configure application and protocol
inspection
■
Filter traffic using filter servers, ActiveX,
and Java filtering functions
■
Learn how IP multicast and the FWSM
interact
■
Increase performance with firewall load
balancing
■
Configure
IPv6
and asymmetric routing
■
Mitigate network attacks using shunning,
anti-spoofing, connection limits, and
timeouts
•
Examine network design, management,
and troubleshooting best practices
The Firewall Services Module (FWSM) is a high-performance stateful-inspection
firewall that integrates into the Cisco
6500
switch and
7600
router chassis. The
FWSM monitors traffic flows using application inspection engines to provide
a strong level of network security. The FWSM defines the security parameter
and enables the enforcement of security policies through authentication, access
control lists, and protocol inspection. The FWSM is a key component to anyone
deploying network security.
Cisco Secure Firewall Services Module (FWSM) covers all aspects of the FWSM.
The book provides a detailed look at how the FWSM processes information, as
well as installation advice, configuration details, recommendations for network
integration, and reviews of operation and management. This book provides you
with a single source that comprehensively answers how and why the FWSM
functions as it does. This information enables you to successfully deploy the
FWSM and gain the greatest functional benefit from your deployment. Practical
examples throughout show you how other customers have successfully deployed
the FWSM.
By reading this book, you will learn how the FWSM functions, the differences
between the FWSM and the ASA Security Appliance, how to implement and
maintain the FWSM, the latest features of the FWSM, and how to configure
common installations.
Ray Blair, CCIE No.
7050,
is a consulting systems architect who has
been with Cisco for more than
8
years, working primarily on security
and large network designs. He has
20
years of experience in designing,
implementing, and maintaining networks that have included nearly all networking
technologies. Mr. Blair maintains three CCIE certifications in Routing and
Switching, Security, and Service Provider. He is also a CNE and a CISSP.
Arvind
Durai, CCIE
No.
7016,
is an advanced services technical leader
for Cisco. His primary responsibility has been in supporting major
Cisco customers in the enterprise sector. One of his focuses has been on
security, and he has authored several white papers and design guides in various
technologies.
Mr. Durai
maintains two CCIE certifications, in Routing and
Switching and Security.
This security book is parr of the Cisco Press
Networking Technology series. Security titles
from Cisco Press help networking professionals
secure critical data and resources, prevent and
mitigate network attacks, and build end-to-end
self-defending networks.
Category: Networking: Security
Covers: Firewall security
ciscopress.com
FREE Online Edition
with purchase of this book.
Details on Las! Page
ISBN-13:
978-1-58705-353-5
ISBN-10:
1-58705-353-5
6 5 0 0
$65.00
USA
/ $72.00
CAN
IMAGE 1
INTRODUCTION
INTRODUCTION TYPES OF FIREWALLS UNDERSTANDING PACKET-FILTERING FIREWALLS
P. 5 ADVANTAGES P. 5 CAVEATS P. 6 UNDERSTANDING APPLICATION/PROXY
FIREWALLS P. 7 ADVANTAGES P. 8 CAVEATS P. 8 UNDERSTANDING REVERSE-PROXY
FIREWALLS ADVANTAGES CAVEATSUTILIZING PACKET INSPECTION REUSING IP
ADDRESSES NATPAT SUMMARY OVERVIEW OF THE FIREWALL SERVICES MODULE
SPECIFICATIONS INSTALLATION PERFORMANCE VIRTUALIZATION COMPARING THE
FWSM TO OTHER SECURITY DEVICESIOS FWPIXASA HARDWARE ARCHITECTURE
SOFTWARE ARCHITECTURE SUMMARY EXAMINING MODES OF OPERATION WORKING WITH
TRANSPARENT MODE ADVANTAGES DISADVANTAGES TRAFFIC FLOW MULTIPLE BRIDGE
GROUPS WORKING WITH ROUTED MODE ADVANTAGES DISADVANTAGES TRAFFIC FLOW
SUMMARY REFERENCES UNDERSTANDING SECURITY LEVELS TRAFFIC FLOW BETWEEN
INTERFACES NETWORK ADDRESS TRANSLATION/PORT ADDRESS TRANSLATION STATIC
NAT NUMBER OF SIMULTANEOUS TCP CONNECTIONS
IMAGE 2
NUMBER OF EMBRYONIC CONNECTIONS
DNS NORANDOMSEQ TCPUDP STATIC PAT DYNAMIC NAT DYNAMIC PATNAT CONTROL NAT
BYPASS NAT 0 OR IDENTITY NAT STATIC IDENTITY NAT SUMMARY REFERENCES
UNDERSTANDING CONTEXTS BENEFITS OF MULTIPLE CONTEXTS SEPARATING SECURITY
POLICIES LEVERAGING THE HARDWARE INVESTMENT DISADVANTAGES OF MULTIPLE
CONTEXTS ADDING AND REMOVING CONTEXTS ADDING A CONTEXT REMOVING A
CONTEXT STORING CONFIGURATION FILES CHANGING BETWEEN CONTEXTS
UNDERSTANDING RESOURCE MANAGEMENT MEMORY PARTITIONS SUMMARY INITIAL
CONFIGURATION CONFIGURING AND SECURING THE 6500/7600 CHASSIS
UNDERSTANDING THE INTERACTION BETWEEN THE HOST-CHASSIS AND THE FWSM
ASSIGNING INTERFACES SECURING THE 6500/7600 (HOST-CHASSIS)CONTROLLING
PHYSICAL ACCESS BEING MINDFUL OF ENVIRONMENTAL CONSIDERATIONS
CONTROLLING MANAGEMENT ACCESS DISABLING UNNECESSARY SERVICES CONTROLLING
ACCESS USING PORT-BASED SECURITY CONTROLLING SPANNING TREE LEVERAGING
ACCESS CONTROL LISTS SECURING LAYER 3 LEVERAGING CONTROL PLANE POLICING
PROTECTING A NETWORK USING QUALITY OF SERVICE EMPLOYING ADDITIONAL
SECURITY FEATURES SUMMARY
IMAGE 3
REFERENCES
CONFIGURING THE FWSM CONFIGURING FWSM IN THE SWITCH EXPLORING ROUTED
MODE EXPLORING TRANSPARENT MODE USING MULTIPLE CONTEXT MODE FOR FWSM
CONTEXT CONFIGURATIONS SYSTEM CONTEXT CONFIGURATIONS ADMIN CONTEXT
CONFIGURATIONS PACKET CLASSIFIER IN FWSM CONTEXT MODE UNDERSTANDING
RESOURCE MANAGEMENT IN CONTEXTS CONFIGURATION STEPS FOR FIREWALL
SERVICES MODULE TYPE 1: CONFIGURING SINGLE CONTEXT ROUTED MODE TYPE 2:
CONFIGURING SINGLE CONTEXT TRANSPARENT MODE TYPE 3: CONFIGURING MULTIPLE
CONTEXT MIXED MODE SUMMARY ACCESS CONTROL LISTS INTRODUCING TYPES OF
ACCESS LISTS UNDERSTANDING ACCESS CONTROL ENTRY UNDERSTANDING ACCESS
LIST COMMIT UNDERSTANDING OBJECT GROUPS MONITORING ACCESS LIST RESOURCES
CONFIGURING OBJECT GROUPS AND ACCESS LISTS WORKING WITH PROTOCOL TYPE
WORKING WITH NETWORK TYPE WORKING WITH SERVICE TYPE WORKING WITH NESTING
TYPE WORKING WITH ETHER TYPE SUMMARY CONFIGURING ROUTING PROTOCOLS
SUPPORTING ROUTING METHODS STATIC ROUTES TABLE OF CONTENTS PROVIDED BY
BLACKWELL S BOOK SERVICES AND R.R. BOWKER. USED WITH PERMISSION.
|
any_adam_object | 1 |
author | Blair, Ray Durai, Arvind |
author_facet | Blair, Ray Durai, Arvind |
author_role | aut aut |
author_sort | Blair, Ray |
author_variant | r b rb a d ad |
building | Verbundindex |
bvnumber | BV036590191 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)698845084 (DE-599)GBV572335768 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01971nam a2200433 c 4500</leader><controlfield tag="001">BV036590191</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100817 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100729s2009 ad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2008030575</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1587053535</subfield><subfield code="c">pbk. : 65,00</subfield><subfield code="9">1-58705-353-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781587053535</subfield><subfield code="c">pbk. : 65,00</subfield><subfield code="9">978-1-58705-353-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)698845084</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV572335768</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Blair, Ray</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cisco secure firewall services module (FWSM)</subfield><subfield code="b">[best practices for securing networks with FWSM]</subfield><subfield code="c">Ray Blair ; Arvind Durai</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Cisco Press</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXII, 496 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cisco Systems, Inc</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Firewall</subfield><subfield code="0">(DE-588)4386332-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cisco</subfield><subfield code="0">(DE-588)4483705-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cisco</subfield><subfield code="0">(DE-588)4483705-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Firewall</subfield><subfield code="0">(DE-588)4386332-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Durai, Arvind</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/ecip0823/2008030575.html</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="m">DE-601</subfield><subfield code="q">pdf/application</subfield><subfield code="u">http://www.gbv.de/dms/bowker/toc/9781587053535.pdf</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020510918&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020510918&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020510918</subfield></datafield></record></collection> |
id | DE-604.BV036590191 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:43:36Z |
institution | BVB |
isbn | 1587053535 9781587053535 |
language | English |
lccn | 2008030575 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020510918 |
oclc_num | 698845084 |
open_access_boolean | |
physical | XXII, 496 S. Ill., graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Cisco Press |
record_format | marc |
series2 | Security |
spelling | Blair, Ray Verfasser aut Cisco secure firewall services module (FWSM) [best practices for securing networks with FWSM] Ray Blair ; Arvind Durai Indianapolis, Ind. Cisco Press 2009 XXII, 496 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Security Literaturangaben Cisco Systems, Inc Firewall (DE-588)4386332-2 gnd rswk-swf Cisco (DE-588)4483705-7 gnd rswk-swf Cisco (DE-588)4483705-7 s Firewall (DE-588)4386332-2 s DE-604 Durai, Arvind Verfasser aut http://www.loc.gov/catdir/toc/ecip0823/2008030575.html Inhaltsverzeichnis DE-601 pdf/application http://www.gbv.de/dms/bowker/toc/9781587053535.pdf Inhaltsverzeichnis Digitalisierung UB Bayreuth application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020510918&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Klappentext GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020510918&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Blair, Ray Durai, Arvind Cisco secure firewall services module (FWSM) [best practices for securing networks with FWSM] Cisco Systems, Inc Firewall (DE-588)4386332-2 gnd Cisco (DE-588)4483705-7 gnd |
subject_GND | (DE-588)4386332-2 (DE-588)4483705-7 |
title | Cisco secure firewall services module (FWSM) [best practices for securing networks with FWSM] |
title_auth | Cisco secure firewall services module (FWSM) [best practices for securing networks with FWSM] |
title_exact_search | Cisco secure firewall services module (FWSM) [best practices for securing networks with FWSM] |
title_full | Cisco secure firewall services module (FWSM) [best practices for securing networks with FWSM] Ray Blair ; Arvind Durai |
title_fullStr | Cisco secure firewall services module (FWSM) [best practices for securing networks with FWSM] Ray Blair ; Arvind Durai |
title_full_unstemmed | Cisco secure firewall services module (FWSM) [best practices for securing networks with FWSM] Ray Blair ; Arvind Durai |
title_short | Cisco secure firewall services module (FWSM) |
title_sort | cisco secure firewall services module fwsm best practices for securing networks with fwsm |
title_sub | [best practices for securing networks with FWSM] |
topic | Cisco Systems, Inc Firewall (DE-588)4386332-2 gnd Cisco (DE-588)4483705-7 gnd |
topic_facet | Cisco Systems, Inc Firewall Cisco |
url | http://www.loc.gov/catdir/toc/ecip0823/2008030575.html http://www.gbv.de/dms/bowker/toc/9781587053535.pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020510918&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020510918&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT blairray ciscosecurefirewallservicesmodulefwsmbestpracticesforsecuringnetworkswithfwsm AT duraiarvind ciscosecurefirewallservicesmodulefwsmbestpracticesforsecuringnetworkswithfwsm |
Es ist kein Print-Exemplar vorhanden.
Inhaltsverzeichnis
Inhaltsverzeichnis