Customer Reviews for

CCNP Security FIREWALL 642-618 Official Cert Guide

Average Rating 4.5
( 3 )
Rating Distribution

5 Star

(2)

4 Star

(1)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 review with 5 star rating   See All Ratings
Page 1 of 1
  • Anonymous

    Posted January 31, 2014

    I started reading this book because my job requires that I revie

    I started reading this book because my job requires that I review firewalls for their secure configuration – about 5 firewalls a year. And my ignorance showed! I have a background in Routers and Switches, but Cisco PIX and ASAs were devices on which I was never trained. This book gave me the understanding that I need when reviewing firewall configurations, i.e., what all the different lines mean and how to determine which interface is configured with which level of security. If you see a firewall configuration, you will know that though some things look similar to router configurations, many things are quite different.

    Another added benefit of reading this book is the HUGE explanation of NAT and PAT configuration. There is an entire chapter (very large and in-depth) devoted to address translation complexity and how to configure it. If you require knowledge in this area, this book is for you!

    Though there are many things covered in this book, I cannot express how well access lists, traffic filtering, traffic shaping, threat detection are explained. If you need a book to give you in-depth explanations, again, this book is for you.

    Though I found a few errors throughout the book, most of them were typographical errors (very few errors in the figures.) A tech-savvy administrator should be able to easily see the errors and overcome any issues. I have reviewed several Cisco Press books and this book is in-depth, well written and worth it for any network administrator responsible for configuring ASA firewalls.

    Was this review helpful? Yes  No   Report this review
  • Posted June 14, 2012

    VERY VERY HIGHLY RECOMMENDED!!

    Are you a network administrator, network security administrator, network architect or an experienced network professional who is interested in applying security principles to your networks? If you are, then this book is for you! Authors David Hucaby, Dave Garneau and Anthony Sequeira, have done an outstanding job of writing book that helps you prepare for the Cisco FIREWALL 642-618 certification exam. Hucaby, Garneau and Sequeira, begin by discussing basic network security and traffic filtering strategies. Then, the authors review the basic methods that are used to interact with an ASA, and to control its basic operation. The authors also explain how to configure ASA interfaces with the parameters they need to operate on a network. They continue by covering the ASA features related to providing IP addressing through DHCP and to exchanging IP routing information through several different dynamic routing protocols. Next, the authors review the configuration commands and tools that can be used to manage and control an ASA, both locally and remotely. Then, they describe how to configure an ASA to generate logging information that can be collected and analyzed. The authors also describe how IP addresses can be altered or translated as packets move through an ASA. They continue by reviewing access control lists and host shunning, and how these features can be configured to control traffic movement through an ASA. Next, the authors cover the Modular Policy Framework, a method used to define and implement many types of traffic inspection policies. Then, they discuss the features that can be leveraged to control the authentication, authorization, and accounting of users as they pass through an ASA. The authors also cover the methods and features that can be used to handle fragmented traffic, to prioritize traffic for QoS to police traffic rates, and to shape traffic bandwidth. They continue by reviewing the transparent firewall mode, and how it can be used to make an ASA more stealthy, when introduced into a network. Next, the authors discuss the multiple context mode that can be used to allow a single physical ASA device to provide multiple virtual firewalls or security contexts. Then, they cover two strategies that can be used to implement high availability between a pair of ASAs. The authors also explain the basic steps needed to configure an ASA to work with the AIP and CSC Security Services Modules, which can be used to offload in-depth intrusion protection and content handling. They continue by discussing two troubleshooting tools that you can use to test and confirm packet movement through ASA. Finally, they list the exam preparation tools that are useful in the study process and provide a suggested study plan. The goal of this most excellent book is to provide the most comprehensive coverage to ensure that you are well prepared for the exam. Perhaps more importantly, this great book can be used as a static reference, whereas the exam topics are dynamic.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 2 review with 5 star rating   See All Ratings
Page 1 of 1