Customer Reviews for

Cisco ASA and PIX Firewall Handbook

Average Rating 4.5
( 6 )
Rating Distribution

5 Star

(3)

4 Star

(2)

3 Star

(1)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 review with 4 star rating   See All Ratings
Page 1 of 1
  • Anonymous

    Posted May 7, 2006

    Must have, easy to grab book

    I recently read the book titled ¿Cisco ASA and PIX Firewall Handbook¿ by David Hucaby. ISBN: 1587051583. I¿ve been working with Cisco PIX firewall¿s for several years and while they are fairly straight forward to configure the basic function of the system, some of the more robust features of the product can be complex in concept. This is certainly the case when considering all of the new features of the PIX 7.0 code. This title does an outstanding job at bridging the information gap for the old crusties that have used PIX for years. Each section is laid out to explain and contrast how each feature is configured for the Cisco PIX, the new Adaptive Security Appliance, and the Firewall Switch Module and for the IOS Firewall code. It has everything you should and need to know to administer the equipment effectively. There is little fluff or filler in these pages. Mostly straight to the point configuration examples that allow the readers to maximize their time getting work done. I was really excited when I saw that Cisco Press was coming out with a title that covers the new Cisco ASA (Adaptive Security Appliance). My excitement quickly turned to confusion when I started reading through the title. Aside from the great documentation on the PIX, FWSM and FW IOS, it¿s very difficult to identify what information pertains to the Adaptive Security Appliance. I¿m still not clear why this book claims to include information on the ASA. It¿s either ignorance on my part or there is not enough content in the book to justify the title. This observation in no way takes away from the book rich information regarding the FWSM 2.x, PIX 6.x and PIX 7.x. Since the title was published not long after the PIX 7.0 code was released, I wonder if it was too soon to cover a topic so new in a book. The author however, covers the main features of 7.0 very well and it¿s extremely helpful to have this handbook for those transitioning to the new PIX 7.0 code. I think this title is best suited for any person that administers Cisco security devices like the Cisco PIX, the FWSM or running Cisco Firewall IOS in their environment. The title covers more detail that what the Cisco on-line (CCO) has to offer in most cases. The title picks up where the product command reference and configuration examples leave off. Certainly a must have title for any security administrator to have in order to ensure that the equipment is leveraged to it¿s maximum potential and to minimize mis-configurations that may contribute to increased exposure or unintended security risks. There aren¿t many diagrams in the book however there are diagrams where they serve best. Most of the book in centered on the CLI configuration of the equipment. Administrators that rely or use the web interface to configure these devices won¿t see much supporting information on the web interface. In my opinion, that¿s a good thing, because administrators should know what¿s going on under the covers of any GUI interface for independency and security reasons. Some of the sections that I found the most beneficial where the sections that cover the new features like Transparent Firewall Mode, Active-Active Failover and Using Security Contexts to Make Virtual Firewalls. These are all new features that have a lot a benefit. When learning something new, it¿s always good to get as much information about the subject as possible. It helps to formulate a solid understanding of the new topic. All-in-All this is a great title worthy of the Cisco Press legacy. The author has done a great job covering all the essentials in one easy to grab title.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 6, 2009

    No text was provided for this review.

Sort by: Showing all of 2 review with 4 star rating   See All Ratings
Page 1 of 1