Write a Review
and post it to your social network
Most Helpful Customer Reviews
See all customer reviews >
CCNP Security Firewall 642-617 Official Cert Guide based on 0 ratings. 1 reviews.
Are you preparing for the Cisco FIREWALL v1.0 certification exam? If you are, then this book is for you! Authors David Hucaby, Dave Garneau and Anthony Sequeira, have done an outstanding job of writing book that introduces the Adaptive Security Appliance (ASA) security products, explains how each product is applied, and how it can be leveraged to increase the security of your network. Hucaby, Garneau and Sequeira, begin by discussing basic network security and traffic filtering strategies. Then, the authors review the basic methods that are used to interact with an ASA, and to control its basic operation. The authors also explain how to configure ASA interfaces with the parameters they need to operate on a network. They continue by covering the ASA features related to providing IP addressing through DHCP and to exchanging IP routing information through several different dynamic routing protocols. Next, the authors review the configuration commands and tools that can be used to manage and control an ASA, both locally and remotely. Then, they describe how to configure an ASA to generate logging information that can be collected and analyzed. The authors also describe how IP addresses can be altered or translated as packets move through an ASA. They continue by reviewing access control lists and host shunning, and how these features can be configured to control traffic movement through an ASA. Next, the authors cover the Modular Policy Framework, a method used to define and implement many types of traffic inspection policies. Then, they discuss the features that can be leveraged to control the authentication, authorization, and accounting of users as they pass through an ASA. The authors also cover the methods and features that can be used to handle fragmented traffic, to prioritize traffic for QoS to police traffic rates, and to shape traffic bandwidth. They continue by reviewing the transparent firewall mode, and how it can be used to make an ASA more stealthy, when introduced into a network. Next, the authors discuss the multiple context mode that can be used to allow a single physical ASA device to provide multiple virtual firewalls or security contexts. Then, they cover two strategies that can be used to implement high availability between a pair of ASAs. The authors also explain the basic steps needed to configure an ASA to work with the AIP and CSC Security Services Modules, which can be used to offload in-depth intrusion protection and content handling. Finally, they list the exam preparation tools useful in the study process and provide a suggested study plan. The goal of this most excellent book is to provide the most comprehensive coverage to ensure that you are well prepared for the exam. Perhaps more importantly, this great book can be used as a static reference, whereas the exam topics are dynamic.