larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

Cisco Firewalls

eBook (Watermarked)

  • Your Price: $44.79
  • List Price: $55.99
  • Includes EPUB, MOBI, and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Read the author's blog:

Read an article by Alexandre on the Cisco Support Forums: Revisiting Firewall Performance Parameters

  • Description
  • Sample Content
  • Updates
  • Copyright 2011
  • Dimensions: 7-3/8" x 9-1/8"
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-13-273113-4
  • ISBN-13: 978-0-13-273113-3

Cisco Firewalls

Concepts, design and deployment for Cisco Stateful Firewall solutions

" In this book, Alexandre proposes a totally different approach to the important subject of firewalls: Instead of just presenting configuration models, he uses a set of carefully crafted examples to illustrate the theory in action. A must-read!" —Luc Billot, Security Consulting Engineer at Cisco

Cisco Firewalls thoroughly explains each of the leading Cisco firewall products, features, and solutions, and shows how they can add value to any network security design or operation. The author tightly links theory with practice, demonstrating how to integrate Cisco firewalls into highly secure, self-defending networks. Cisco Firewalls shows you how to deploy Cisco firewalls as an essential component of every network infrastructure. The book takes the unique approach of illustrating complex configuration concepts through step-by-step examples that demonstrate the theory in action. This is the first book with detailed coverage of firewalling Unified Communications systems, network virtualization architectures, and environments that include virtual machines. The author also presents indispensable information about integrating firewalls with other security elements such as IPS, VPNs, and load balancers; as well as a complete introduction to firewalling IPv6 networks. Cisco Firewalls will be an indispensable resource for engineers and architects designing and implementing firewalls; security administrators, operators, and support professionals; and anyone preparing for the CCNA Security, CCNP Security, or CCIE Security certification exams.

Alexandre Matos da Silva Pires de Moraes, CCIE No. 6063, has worked as a Systems Engineer for Cisco Brazil since 1998 in projects that involve not only Security and VPN technologies but also Routing Protocol and Campus Design, IP Multicast Routing, and MPLS Networks Design. He coordinated a team of Security engineers in Brazil and holds the CISSP, CCSP, and three CCIE certifications (Routing/Switching, Security, and Service Provider). A frequent speaker at Cisco Live, he holds a degree in electronic engineering from the Instituto Tecnológico de Aeronáutica (ITA – Brazil).

·        Create advanced security designs utilizing the entire Cisco firewall product family

·        Choose the right firewalls based on your performance requirements

·        Learn firewall  configuration fundamentals and master the tools that provide insight about firewall operations

·        Properly insert firewalls in your network’s topology using Layer 3 or Layer 2 connectivity

·        Use Cisco firewalls as part of a robust, secure virtualization architecture

·        Deploy Cisco ASA firewalls with or without NAT

·        Take full advantage of the classic IOS firewall feature set (CBAC)

·        Implement flexible security policies with the Zone Policy Firewall (ZPF)

·        Strengthen stateful inspection with antispoofing, TCP normalization, connection limiting, and IP fragmentation handling

·        Use application-layer inspection capabilities built into Cisco firewalls

·        Inspect IP voice protocols, including SCCP, H.323, SIP, and MGCP

·        Utilize identity to provide user-based stateful functionality

·        Understand how multicast traffic is handled through firewalls

·        Use firewalls to protect your IPv6 deployments

This security book is part of the Cisco Press Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end, self-defending networks.

Table of Contents



Chapter 1: Firewalls and Network Security

Security Is a Must. But, Where to Start?

Firewalls and Domains of Trust

Firewall Insertion in the Network Topology

    Routed Mode Versus Transparent Mode

    Network Address Translation and Port Address Translation

Main Categories of Network Firewalls

    Packet Filters

    Circuit-Level Proxies

    Application-Level Proxies

    Stateful Firewalls

The Evolution of Stateful Firewalls

    Application Awareness

    Identity Awareness

    Leveraging the Routing Table for Protection Tasks

    Virtual Firewalls and Network Segmentation

What Type of Stateful Firewall?

    Firewall Appliances

    Router-Based Firewalls

    Switch-Based Firewalls

Classic Topologies Using Stateful Firewalls

Stateful Firewalls and Security Design

    Stateful Firewalls and VPNs

    Stateful Firewalls and Intrusion Prevention

    Stateful Firewalls and Specialized Security Appliances


Chapter 2: Cisco Firewall Families Overview

Overview of ASA Appliances

    Positioning of ASA Appliances

    Firewall Performance Parameters

    Overview of ASA Hardware Models

Overview of the Firewall Services Module

Overview of IOS-Based Integrated Firewalls

    Integrated Services Routers

    Aggregation Services Routers


Chapter 3: Configuration Fundamentals

Device Access Using the CLI

Basic ASA Configuration

    Basic Configuration for ASA Appliances Other Than 5505

    Basic Configuration for the ASA 5505 Appliance

Basic FWSM Configuration

Remote Management Access to ASA and FWSM

    Telnet Access

    SSH Access

    HTTPS Access Using ASDM

IOS Baseline Configuration

    Configuring Interfaces on IOS Routers

Remote Management Access to IOS Devices

    Remote Access Using Telnet

    Remote Access Using SSH

    Remote Access Using HTTP and HTTPS

Clock Synchronization Using NTP

Obtaining an IP Address Through the PPPoE Client

DHCP Services


Further Reading

Chapter 4: Learn the Tools. Know the Firewall

Using Access Control Lists Beyond Packet Filtering

Event Logging

Debug Commands

Flow Accounting and Other Usages of Netflow

    Enabling Flow Collection on IOS

    Traditional Netflow

    Netflow v9 and Flexible Netflow

    Enabling NSEL on an ASA Appliance

Performance Monitoring Using ASDM

Correlation Between Graphical Interfaces and CLI

Packet Tracer on ASA

Packet Capture

    Embedded Packet Capture on an ASA Appliance

    Embedded Packet Capture on IOS


Chapter 5: Firewalls in the Network Topology

Introduction to IP Routing and Forwarding

Static Routing Overview

Basic Concepts of Routing Protocols

RIP Overview

    Configuring and Monitoring RIP

EIGRP Overview

    Configuring and Monitoring EIGRP

        EIGRP Configuration Fundamentals

        Understanding EIGRP Metrics

        Redistributing Routes into EIGRP

        Generating a Summary EIGRP Route

        Limiting Incoming Updates with a Distribute-List

        EIGRP QUERY and REPLY Messages

        EIGRP Stub Operation

OSPF Overview

    Configuring and Monitoring OSPF

        OSPF Configuration Fundamentals

        OSPF Scenario with Two Areas

Configuring Authentication for Routing Protocols

Bridged Operation


Chapter 6: Virtualization in the Firewall World

Some Initial Definitions

Starting with the Data Plane: VLANs and VRFs

    Virtual LANs


VRF-Aware Services

Beyond the Data Plane–Virtual Contexts

Management Access to Virtual Contexts

Allocating Resources to Virtual Contexts

Interconnecting Virtual Elements

    Interconnecting VRFs with an External Router

    Interconnecting Two Virtual Contexts That Do Not Share Any Interface

    Interconnecting Two FWSM Contexts That Share an Interface

    Interconnecting Two ASA Contexts That Share an Interface

Issues Associated with Security Contexts

Complete Architecture for Virtualization

    Virtualized FWSM and ACE Modules

    Segmented Transport

    Virtual Machines and the Nexus 1000V


Chapter 7: Through ASA Without NAT

Types of Access Through ASA-Based Firewalls

Additional Thoughts About Security Levels

    Internet Access Firewall Topology

    Extranet Topology

    Isolating Internal Departments

ICMP Connection Examples

    Outbound Ping

    Inbound Ping

    Windows Traceroute Through ASA

UDP Connection Examples

    Outbound IOS Traceroute Through ASA

TCP Connection Examples

    ASA Flags Associated with TCP Connections

    TCP Sequence Number Randomization

Same Security Access

Handling ACLs and Object-Groups


Chapter 8: Through ASA Using NAT

Nat-Control Model

Outbound NAT Analysis

    Dynamic NAT

    Dynamic PAT

    Identity NAT

    Static NAT

    Policy NAT

        Static Policy NAT

        Dynamic Policy NAT

        Dynamic Policy PAT

    NAT Exemption

    NAT Precedence Rules

Address Publishing for Inbound Access

    Publishing with the static Command

    Publishing with Port Redirection

    Publishing with NAT Exemption

Inbound NAT Analysis

    Dynamic PAT for Inbound

    Identity NAT for Inbound

    NAT Exemption for Inbound

    Static NAT for Inbound

Dual NAT

Disabling TCP Sequence Number Randomization

Defining Connection Limits with NAT Rules


Chapter 9: Classic IOS Firewall Overview

Motivations for CBAC

CBAC Basics

ICMP Connection Examples

UDP Connection Examples

TCP Connection Examples

Handling ACLs and Object-Groups

    Using Object-Groups with ACLs

    CBAC and Access Control Lists

IOS NAT Review

    Static NAT

    Dynamic NAT

    Policy NAT

    Dual NAT

    NAT and Flow Accounting



Chapter 10: IOS Zone Policy Firewall Overview

Motivations for the ZFW

Building Blocks for Zone-Based Firewall Policies

ICMP Connection Examples

UDP Connection Examples

TCP Connection Examples

ZFW and ACLs


ZFW in Transparent Mode

Defining Connection Limits

Inspection of Router Traffic

Intrazone Firewall Policies in IOS 15.X


Chapter 11: Additional Protection Mechanisms


    Classic Antispoofing Using ACLs

    Antispoofing with uRPF on IOS

    Antispoofing with uRPF on ASA

TCP Flags Filtering

Filtering on the TTL Value

Handling IP Options

    Stateless Filtering of IP Options on IOS

    IP Options Drop on IOS

    IP Options Drop on ASA

Dealing with IP Fragmentation

    Stateless Filtering of IP Fragments in IOS

    Virtual Fragment Reassembly on IOS

    Virtual Fragment Reassembly on ASA

Flexible Packet Matching

Time-Based ACLs

    Time-Based ACLs on ASA

    Time-Based ACLs on IOS

Connection Limits on ASA

TCP Normalization on ASA

Threat Detection on ASA


Further Reading

Chapter 12: Application Inspection

Inspection Capabilities in the Classic IOS Firewall

Application Inspection in the Zone Policy Firewall

DNS Inspection in the Zone Policy Firewall

FTP Inspection in the Zone Policy Firewall

HTTP Inspection in the Zone Policy Firewall

IM Inspection in the Zone Policy Firewall

Overview of ASA Application Inspection

DNS Inspection in ASA

    DNS Guard

    DNS Doctoring

    DNS Inspection Parameters

    Some Additional DNS Inspection Capabilities

FTP Inspection in ASA

HTTP Inspection in ASA

Inspection of IM and Tunneling Traffic in ASA

Botnet Traffic Filtering in ASA


Further Reading

Chapter 13: Inspection of Voice Protocols

Introduction to Voice Terminology

Skinny Protocol

H.323 Framework

    H.323 Direct Calls

    H.323 Calls Through a Gatekeeper

Session Initiation Protocol (SIP)

MGCP Protocol

Cisco IP Phones and Digital Certificates

Advanced Voice Inspection with ASA TLS-Proxy

Advanced Voice Inspection with ASA Phone-Proxy


Further Reading

Chapter 14: Identity on Cisco Firewalls

Selecting the Authentication Protocol

ASA User-Level Control with Cut-Through Proxy

    Cut-Through Proxy Usage Scenarios

        Scenario 1: Simple Cut-Through Proxy (No Authorization)

        Scenario 2: Cut-Through Proxy with Downloadable ACEs

        Scenario 3: Cut-Through Proxy with Locally Defined ACL

        Scenario 4: Cut-Through Proxy with Downloadable ACLs

        Scenario 5: HTTP Listener

IOS User-Level Control with Auth-Proxy

    Scenario 1: IOS Auth-Proxy with Downloadable Access Control Entries

    Scenario 2: IOS Auth-Proxy with Downloadable ACLs

    Scenario 3: Combining Classic IP Inspection (CBAC) and Auth-Proxy

User-Based Zone Policy Firewall

    Establishing user-group Membership Awareness in IOS - Method 1

    Establishing user-group Membership Awareness in IOS - Method 2

    Integrating Auth-Proxy and the ZFW

Administrative Access Control on IOS

Administrative Access Control on ASA


Chapter 15: Firewalls and IP Multicast

Review of Multicast Addressing

Overview of Multicast Routing and Forwarding

    The Concept of Upstream and Downstream Interfaces

    RPF Interfaces and the RPF Check

Multicast Routing with PIM

    Enabling PIM on Cisco Routers

    PIM-DM Basics

    PIM-SM Basics

    Finding the Rendezvous Point on PIM-SM Topologies

Inserting ASA in a Multicast Routing Environment

    Enabling Multicast Routing in ASA

    Stub Multicast Routing in ASA

    ASA Acting as a PIM-SM Router

Summary of Multicast Forwarding Rules on ASA


Further Reading

Chapter 16: Cisco Firewalls and IPv6

Introduction to IPv6

Overview of IPv6 Addressing

IPv6 Header Format

IPv6 Connectivity Basics

Handling IOS IPv6 Access Control Lists

IPv6 Support in the Classic IOS Firewall

IPv6 Support in the Zone Policy Firewall

Handling ASA IPv6 ACLs and Object-Groups

Stateful Inspection of IPv6 in ASA

Establishing Connection Limits

    Setting an Upper Bound for Connections Through ASA

IPv6 and Antispoofing

    Antispoofing with uRPF on ASA

    Antispoofing with uRPF on IOS

IPv6 and Fragmentation

    Virtual Fragment Reassembly on ASA

    Virtual Fragment Reassembly on IOS


Further Reading

Chapter 17: Firewall Interactions

Firewalls and Intrusion Prevention Systems

Firewalls and Quality of Service

Firewalls and Private VLANs

Firewalls and Server Load Balancing

Firewalls and Virtual Machines

    Protecting Virtual Machines with External Firewalls

    Protecting Virtual Machines Using Virtual Firewall Appliances

Firewalls and IPv6 Tunneling Mechanisms

Firewalls and IPsec VPNs

    Classic IPsec Site-to-Site for IOS

    IPsec Site-to-Site Using a Virtual Tunnel Interface (VTI)

    IPsec Site-to-Site Using a GRE Tunnel

    NAT in the Middle of an IPsec Tunnel

    Post-Decryption Filtering in ASA

Firewalls and SSL VPNs

    Clientless Access

    Client-Based Access (AnyConnect)

Firewalls and MPLS Networks

Borderless Networks Vision


Further Reading

Appendix A: NAT and ACL Changes in ASA 8.3


Unlimited one-month access with your purchase
Free Safari Membership