Cisco Secure PIX Firewalls

  • Published: Dec 18, 2001
  • Copyright 2002
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 368
  • Edition: 1st
  • Book
  • ISBN-10: 1-58705-035-8
  • ISBN-13: 978-1-58705-035-0

Register your product to gain access to bonus material or receive a coupon.

Exam preparation for CSPFA exam #9E0-571

More Information

DescriptionExtrasReviewsSample Content

Product Description

Reduce the threat of network attacks with an authorized self-study guide

One of the primary components of any organization's security policy is the implementation and maintenance of firewalls. Firewalls are network devices residing at the perimeter of corporate networks that protect internal networks from intrusion by the outside world. The integrated hardware/software PIX Firewall series delivers high security without impacting network performance while scaling to meet the entire range of customer requirements.

Based on the official instructor-led training course (Cisco Secure PIX Firewall Advanced-CSPFA), Cisco Secure PIX Firewalls teaches you the skills needed to describe, configure, verify, and manage the PIX Firewall product family and the Cisco IOS(r) Firewall feature set. Starting with a discussion of hacking methodologies and internal and external threats, this book opens by describing the Cisco Security Wheel, emphasizing network security as a continuous process. The authors then familiarize you with the characteristics of the various PIX models and examine upgrade tasks. This book covers basic installation details, as well as how to enable more advanced features and access control. In addition, this book details management and monitoring with PIX Syslog services and the PIX AAA subsystem. You also learn to configure the PIX Failover mechanism, IPSec on the PIX, and the Cisco IOS Firewall feature set. The appendixes provide helpful references, including configuring PIX intrusion detection features, SNMP management support, DHCP client and server, Secure Shell Protocol (SSH) connection, and dozens of security-related resources.

Whether you are preparing for the Cisco Security Specialist 1 certification or simply want to understand and make the most efficient use of PIX Firewalls, Cisco Secure PIX Firewalls provides you with a complete solution for planning, deploying, and managing PIX Firewall protected networks.

  • Prepare for the Cisco Security Specialist 1 PIX exam with the official CSPFA self-study guide
  • Understand the physical characteristics of PIX models 506, 515, 520, 525, and 535, including LED information and port and slot numbering
  • Upgrade PIX OS code, perform password recovery, and install feature licenses
  • Configure IPSec Phase I and Phase II Security Associations
  • Configure Cisco routers to perform Context Based Access Control (CBAC)
  • Examine the many operating features of the PIX, such as Cut-Through Proxy, Advanced Protocol Handling, Attack Guards, and the Adaptive Security Algorithm (ASA)
  • Learn the ins and outs of address translation and access control
  • Install the Cisco Secure ACS server and configure corresponding services on the PIX to authenticate and authorize users and services
  • Understand attack guards such as Syn Flood, Fragmentation, AAA, DNS, and Mail
  • Examine the workings of the PIX failover mechanism and learn the difference between failover, stateful failover, interface testing, and the failover poll

David W. Chapman Jr., CCNP(r), CCDP(r), CSS-1, is a Cisco Security Instructor with Global Knowledge. As Course Director for the Cisco Secure PIX Firewall course, David is charged with maintaining the integrity and quality of the course offering and mentoring instructors new to the course.

Andy Fox, CCSI(tm), CCNA(r), CCDA(r), CSS-1 is a Certified Cisco Systems Instructor with Global Knowledge. Andy has been teaching Cisco Certified Classes for more than five years and is the Course Director for the Managing Cisco Network Security course.

Links

Read an interview with David Chapman, courtesy of Help Net Security. Help Net Security's site receives more than 430,000 page views per month.

Customer Reviews

22 of 23 people found the following review helpful
1.0 out of 5 stars Confusing, misguided -- online docs better, January 31, 2002
This review is from: Cisco Secure PIX Firewalls (Hardcover)
I'd worked with a variety of Cisco equipment, both WAN routers and LAN switches and L3 switch/routers over the past six years and I found the PIX security model and command set somewhat confusing, so I bought this book because it was the only book about the PIX that I could find.

Boy, was I disappointed -- confusing examples, outdated information, missing information, non-relevant filler, this book couldn't have gottten much worse.

The book assumes through almost all the examples that you will be NAT translating your addresses, and spends most of its time explaining configurations that use NAT and almost no time with non-NAT configurations. It's left to the reader to guess at whether commands like "static" even apply to non-nat connections.

Cisco themselves in at least PIX 6.1(1) have deprecated the conduit and outbound commands in favor of access-group and access-list commands. For a book with a copyright of 2002 and written by cisco, there is no mention of access-list/group... Read more

Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


10 of 10 people found the following review helpful
5.0 out of 5 stars Well Written for this struggling PIX beginner, March 14, 2002
By A Customer
This review is from: Cisco Secure PIX Firewalls (Hardcover)
I just started working on PIX firewalls two months ago when our senior engineer quit. I thought all along he knew what he was doing. After reading through this book though, it's clear he was bluffing and having Cisco TAC do the configuration for him.

This book has allowed me to understand all the things my predecessor did WRONG and correct them.

Though I am a CCNP & CCDP, I found myself completely unprepared for the bizarre syntax the PIX throws at you.

I recommend this title to anyone like myself who is starting off on the PIX and trying to figure out which way is up.

Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


10 of 10 people found the following review helpful
5.0 out of 5 stars Good Solid Info on PIX, January 22, 2002
By 
Robert M. Yee (Alhambra, CA USA) - See all my reviews
This review is from: Cisco Secure PIX Firewalls (Hardcover)
Sometimes its hard to find all the info that you need to effectively operate and understand what the PIX can do for an enterprise.

A lot of the knowledge that I've gained about the PIX has been from scattered sources, this book is pretty good at getting all that information together.

A close second(in terms of information) to this book is the Configuration Guide that comes with the PIX.

The book is pretty well written, easy to read and it is only about 300 pages. For those of you who are used to reading the 600 page books that Cisco Press puts out, this one can be considered light reading.

I'm currently re-reading it a second time, in preparation for the exam. I've tried the Boson tests along with the book and they seem to be a good combo.

Even if you are not planning on taking the exam, I recommend this book. The examples given may be a bit simplestic, but they drive the point home. As a day-to-day reference, you may also want to supplment the book with info from CCO.

Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


Share your thoughts with other customers:
 See all 29 customer reviews...

Index

Download - 131 KB -- Index

Table of Contents



1. Introduction to Network Security.


2. Cisco PIX Firewall Software and Hardware.


3. Working with and Upgrading the Cisco PIX Firewall Software Image.


4. Configuring the Cisco PIX Firewall.


5. Cisco PIX Firewall Translation.


6. Configuring Access Through the Cisco PIX Firewall.


7. Syslog and General Maintenance.


8. AAA Configuration on the Cisco PIX Firewall.


9. Cisco PIX Firewall Advanced Protocol Handling and Attack Guards.


10. Cisco PIX Firewall Failover.


11. Configuring IPSec for Cisco PIX Firewalls.


12. Cisco IOS Firewall Context-Based Access Control.


13. Cisco IOS Firewall Authentication Proxy Configuration.


Appendix A: Configuring the Cisco PIX Firewall for Intrusion Detection.


Appendix B: Configuring Simple Network Management Protocol (SNMP) on the PIX Firewall.


Appendix C: Configuring Dynamic Host Configuration Protocol (DHCP) on the PIX Firewall.


Appendix D: Configuring Secure Shell (SSH) on the PIX Firewall.


Appendix E: Security Resources.


Appendix F: Answers to Chapter Review Questions.

Purchase Reward: One Month Free Subscription
By completing any purchase on Cisco Press, you become eligible for an unlimited access one-month subscription to Safari Books Online.

Get access to thousands of books and training videos about technology, professional development and digital media from more than 40 leading publishers, including Addison-Wesley, Prentice Hall, Cisco Press, IBM Press, O'Reilly Media, Wrox, Apress, and many more. If you continue your subscription after your 30-day trial, you can receive 30% off a monthly subscription to the Safari Library for up to 12 months. That's a total savings of $199.