کتابخانه مرکزی دانشگاه صنعتی شریف
    • [نمايش بزرگتر]
    • [نمايش کوچکتر]
  • صفحه 
     از  0
  • [صفحه قبل]
  • [صفحه بعد]
  • [نمایش تمام صفحه]
  • [بستن]
 
CCSP Cisco Secure PIX firewall advanced exam certification guide : CCSP self-study [electronic resource]
Bastien, Greg.

اطلاعات کتابشناختی

CCSP Cisco Secure PIX firewall advanced exam certification guide : CCSP self-study [electronic resource]
Author :   Bastien, Greg.
Publisher :   Cisco Press,
Pub. Year  :   2003
Subjects :   Firewalls (Computer security) -- Examinations -- Study guides. Telecommunications...
Call Number :   ‭TK 5105 .59 .B37 2003

جستجو در محتوا

ترتيب

فهرست مطالب

  • Icons Used in This Book (20)
  • The Certification Exam and This Preparation Guide (24)
  • Overview of the Cisco Certification Process (28)
  • 1 (33)
    • Network Security (33)
      • Vulnerabilities (33)
      • Threats (34)
      • Types of Attacks (34)
      • Network Security Policy (37)
      • AVVID and SAFE (39)
      • Q&A (41)
  • 2 (43)
    • Firewall Technologies and the Cisco PIX Firewall (43)
      • How to Best Use This Chapter (43)
      • “Do I Know This Already?” Quiz (43)
      • Foundation Topics (45)
      • Firewall Technologies (45)
      • Cisco PIX Firewall (47)
      • Foundation Summary (49)
      • Q&A (50)
  • 3 (53)
    • The Cisco Secure PIX Firewall (53)
      • How to Best Use This Chapter (53)
      • “Do I Know This Already?” Quiz (53)
      • Foundation Topics (55)
      • Overview of the Cisco PIX Firewall (55)
      • Cisco PIX Firewall Models and Features (57)
      • Foundation Summary (72)
      • Q&A (74)
  • 4 (77)
    • System Maintenance (77)
      • How to Best Use This Chapter (77)
      • “Do I Know This Already?” Quiz (77)
      • Foundation Topics (78)
      • Accessing the Cisco PIX Firewall (78)
      • Installing a New Operating System (80)
      • Upgrading the Cisco PIX OS (83)
      • Upgrading the OS Using the copy tftp flash Command (83)
      • Creating a Boothelper Diskette Using a Windows PC (86)
      • Auto Update Support (87)
      • Password Recovery (88)
      • Foundation Summary (90)
      • Q&A (91)
  • 5 (95)
    • Understanding Cisco PIX Firewall Translation and Connections (95)
      • How to Best Use This Chapter (95)
      • “Do I Know This Already?” Quiz (95)
      • Foundation Topics (97)
      • How the PIX Firewall Handles Traffic (97)
      • Address Translation (101)
      • Translation Versus Connection (109)
      • Configuring DNS Support (112)
      • Foundation Summary (113)
      • Q&A (117)
  • 6 (121)
    • Getting Started with the Cisco PIX Firewall (121)
      • “Do I Know This Already?” Quiz (121)
      • Foundation Topics (122)
      • Access Modes (122)
      • Configuring the PIX Firewall (122)
      • Configuring DHCP on the Cisco PIX Firewall (130)
      • Configuring Time Settings on the Cisco PIX Firewall (132)
      • Sample PIX Configuration (135)
      • Foundation Summary (137)
      • Q&A (138)
  • 7 (141)
    • Configuring Access (141)
      • “Do I Know This Already?” Quiz (141)
      • Foundation Topics (142)
      • Configuring Inbound Access Through the PIX Firewall (142)
      • TurboACL (148)
      • Object Grouping (149)
      • Using the fixup Command (152)
      • Advanced Protocol Handling (153)
      • Foundation Summary (155)
      • Q&A (156)
  • 8 (159)
    • Syslog (159)
      • “Do I Know This Already?” Quiz (159)
      • Foundation Topics (160)
      • How Syslog Works (160)
      • Configuring Syslog on the Cisco PIX Firewall (162)
      • Configuring a Syslogd Server (165)
      • Configuring SNMP Traps and SNMP Requests (166)
      • How Log Messages Are Organized (167)
      • How to Read System Log Messages (168)
      • Disabling Syslog Messages (168)
      • Foundation Summary (169)
      • Q&A (170)
  • 9 (173)
    • Cisco PIX Firewall Failover (173)
      • “Do I Know This Already?” Quiz (173)
      • Foundation Topics (175)
      • What Causes a Failover Event (175)
      • What Is Required for a Failover Configuration (175)
      • Failover Monitoring (176)
      • Configuration Replication (177)
      • Stateful Failover (178)
      • LAN-Based Failover (179)
      • Configuring Failover (180)
      • Foundation Summary (185)
      • Q&A (186)
  • 10 (189)
    • Virtual Private Networks (189)
      • How to Best Use This Chapter (189)
      • “Do I Know This Already?” Quiz (189)
      • Foundation Topics (191)
      • Overview of VPN Technologies (191)
      • Configuring the PIX Firewall as a VPN Gateway (198)
      • Cisco VPN Client (214)
      • Configuring PIX Firewalls for Scalable VPNs (217)
      • PPPoE Support (218)
      • Foundation Summary (219)
      • Q&A (221)
      • Scenario (222)
      • VPN Configurations (222)
      • Completed PIX Configurations (231)
      • How the Configuration Lines Interact (236)
  • 11 (239)
    • PIX Device Manager (239)
      • “Do I Know This Already?” Quiz (239)
      • Foundation Topics (240)
      • PDM Overview (240)
      • PIX Firewall Requirements to Run PDM (241)
      • PDM Installation and Configuration (243)
      • Using PDM for VPN Configuration (257)
      • Foundation Summary (270)
      • Q&A (272)
  • 12 (275)
    • Content Filtering with the Cisco PIX Firewall (275)
      • “Do I Know This Already?” Quiz (275)
      • Filtering Java Applets (276)
      • Filtering ActiveX Objects (278)
      • Filtering URLs (278)
      • Foundation Summary (283)
      • Q&A (284)
  • 13 (287)
    • Overview of AAA and the Cisco PIX Firewall (287)
      • How to Best Use This Chapter (287)
      • “Do I Know This Already?” Quiz (287)
      • Foundation Topics (289)
      • Overview of AAA and the Cisco PIX Firewall (289)
      • Cisco Secure Access Control Server (CSACS) (292)
      • Foundation Summary (299)
      • Q&A (300)
  • 14 (303)
    • Configuration of AAA on the Cisco PIX Firewall (303)
      • How to Best Use This Chapter (303)
      • “Do I Know This Already?” Quiz (303)
      • Foundation Topics (305)
      • Specifying Your AAA Servers (305)
      • Configuring AAA on the Cisco PIX Firewall (306)
      • Cisco Secure and Cut-Through Configuration (330)
      • Configuring Downloadable PIX ACLs (330)
      • Troubleshooting Your AAA Setup (333)
      • Foundation Summary (337)
      • Q&A (339)
  • 15 (343)
    • Attack Guards and Multimedia Support (343)
      • “Do I Know This Already?” Quiz (343)
      • Foundation Topics (344)
      • Multimedia Support on the Cisco PIX Firewall (344)
      • Attack Guards (347)
      • PIX Firewall’s Intrusion Detection Feature (351)
      • ip verify reverse-path Command (354)
      • Foundation Summary (356)
      • Q&A (357)
  • A (361)
    • Answers to the “Do I Know This Already?” Quizzes and Q&A Questions (361)
      • Chapter 1 (361)
      • Chapter 2 (361)
      • Chapter 3 (364)
      • Chapter 4 (366)
      • Chapter 5 (369)
      • Chapter 6 (372)
      • Chapter 7 (375)
      • Chapter 8 (378)
      • Chapter 9 (380)
      • Chapter 10 (384)
      • Chapter 11 (386)
      • Chapter 12 (389)
      • Chapter 13 (393)
      • Chapter 14 (395)
      • Chapter 15 (398)
      • Appendix B (401)
  • B (407)
    • Case Study and Sample Configuration (407)
      • Task 1: Basic Configuration for the Cisco PIX Firewall (410)
      • Task 2: Configuring Access Rules on HQ (415)
      • Task 3: Configuring Authentication (415)
      • Task 4: Configuring Logging (416)
      • Task 5: Configuring VPN (416)
      • Task 6: Configuring Failover (425)
      • What’s Wrong with This Picture? (428)
Loading...