Table of Contents:
  • Includes bibliographical references and index
  • Chapter 14 Filtering
  • Working with URLs and FTP
  • Configuring ActiveX and Java
  • Summary
  • References
  • Chapter 15 Managing and Monitoring the FWSM
  • Using Telnet
  • Using Secure Shell
  • Using Adaptive Security Device Manager
  • T$2654
  • Cover
  • Contents
  • Introduction
  • Part I: Introduction
  • Chapter 1 Types of Firewalls
  • Understanding Packet-Filtering Firewalls
  • Understanding Application/Proxy Firewalls
  • Understanding Reverse-Proxy Firewalls
  • Utilizing Packet Inspection
  • Reusing IP Addresses
  • Summary
  • Chapter 2 Overview of the Firewall Services Module
  • Specifications
  • Installation
  • Performance
  • Virtualization
  • Comparing the FWSM to Other Security Devices
  • Hardware Architecture
  • Software Architecture
  • Summary
  • Chapter 3 Examining Modes of Operation
  • Working with Transparent Mode
  • Working with Routed Mode
  • Summary
  • References
  • Chapter 4 Understanding Security Levels
  • Traffic Flow Between Interfaces
  • Network Address Translation/Port Address Translation
  • Summary
  • References
  • Chapter 5 Understanding Contexts
  • Benefits of Multiple Contexts
  • Disadvantages of Multiple Contexts
  • Adding and Removing Contexts
  • Changing Between Contexts
  • Understanding Cut-Through Proxy in FWSM
  • Summary
  • Chapter 11 Modular Policy
  • Using Modular Policy in FWSM
  • Understanding Classification of Traffic
  • Defining Policy Maps
  • Configuring Service Policy
  • Understanding Default Policy Map
  • Sample Configuration of Modular Policy in FWSM
  • Summary
  • Part III: Advanced Configuration
  • Chapter 12 Understanding Failover in FWSM
  • Creating Redundancy in the FWSM
  • Understanding Failover Link and State Link
  • Requirements for Failover
  • Synchronizing the Primary and Secondary Firewalls
  • Monitoring Interfaces
  • Configuring Poll Intervals
  • Design Principle for Monitoring Interfaces
  • Configuring Single Context FWSM Failover
  • Configuring Multiple Context FWSM Failover
  • Summary
  • Chapter 13 Understanding Application Protocol Inspection
  • Inspecting Hypertext Transfer Protocol
  • Inspecting File Transfer Protocol
  • Working with Supported Applications
  • Configuring ARP
  • Summary
  • References
  • Understanding Resource Management
  • Summary
  • Part II: Initial Configuration
  • Chapter 6 Configuring and Securing the 6500/7600 Chassis
  • Understanding the Interaction Between the Host-Chassis and the FWSM
  • Assigning Interfaces
  • Securing the 6500/7600 (Host-Chassis)
  • Summary
  • References
  • Chapter 7 Configuring the FWSM
  • Configuring FWSM in the Switch
  • Exploring Routed Mode
  • Exploring Transparent Mode
  • Using Multiple Context Mode for FWSM
  • Configuration Steps for Firewall Services Module
  • Summary
  • Chapter 8 Access Control Lists
  • Introducing Types of Access Lists
  • Understanding Object Groups
  • Monitoring Access List Resources
  • Configuring Object Groups and Access Lists
  • Summary
  • Chapter 9 Configuring Routing Protocols
  • Supporting Routing Methods
  • Summary
  • Chapter 10 AAA Overview
  • Understanding AAA Components
  • Comparing Security Protocols
  • Understanding Two-Step Authentication
  • Understanding Fallback Support