+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Cisco Security Specialists Guide to PIX Firewall

  • ID: 1758476
  • Book
  • December 2002
  • 608 Pages
  • Elsevier Science and Technology
1 of 3

Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will instruct the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting and more.

Cisco Security Specialist's Guide to PIX Firewall introduces the basic concepts of attack, explains the networking principals necessary to effectively implement and deploy a PIX firewall, covers the hardware and software components of the device, provides multiple configurations and administration examples, and fully describes the unique line syntax native to PIX firewall configuration and administration.

  • Coverage of the Latest Versions of PIX Firewalls. This book includes coverage of the latest additions to the PIX Firewall family including the CiscoSecure PIX Firewall (PIX) Software Release 6.0
  • Must-have desk reference for the serious security professional. In addition to the foundation information and dedicated text focused on the exam objectives for the CSPFA, this book offers real-world administration and configuration support. This book will not only help readers pass the exam; it will continue to assist them with their duties on a daily basis
  • Firewall administration guides? Syngress wrote the book. Syngress has demonstrated a proficiency to answer the market need for quality information pertaining to firewall administration guides. Configuring ISA Server 2000: Building Firewalls for Windows 2000 (ISBN: 1-928994-29-6) and Checkpoint Next Generation Security Administration (ISBN: 1-928994-74-1) are currently best sellers in the security market

Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.

Note: Product cover images may vary from those shown
2 of 3
The Adaptive Security Algorithm (ASA)
Advanced Protocol Handling
Basic PIX Commands
NAT, PAT, Static, Conduit, Failover and Stateful Failover
AAA Protocols and Configurations
Access Control List Definitions and Configurations Including Context Based Access Control
WebSENSE Configuration
Protocols and Configuration of FTP, RSH, and SQL *Net Traffic
Cisco Secure Integrated Software
Cisco PIX Device Manager
Certificate Authorities
Authentication and Cut-through Proxy Technologies
Support for IPSec and IPSec Configuration
Secure VPN Configuration
Cisco Secure ACS for Windows
Active Code Filtering Configuration
Cisco Secure Integrated Software
Cisco IOS Firewalls
Primary, Secondary, Active, and Standby levels for PIX
Note: Product cover images may vary from those shown
3 of 3


4 of 3
Note: Product cover images may vary from those shown