Cisco ASA, PIX, and FWSM Firewall Handbook / Edition 2

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $7.37
Usually ships in 1-2 business days
(Save 89%)
Other sellers (Paperback)
  • All (13) from $7.37   
  • New (7) from $45.38   
  • Used (6) from $7.35   

Overview

Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including ASA, PIX®, and the Catalyst® Firewall Services Module (FWSM).

Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation.

Sections are marked by shaded tabs for quick reference, and information on each feature is presented in a concise format, with background, configuration, and example components.

Whether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, helps you achieve maximum protection of your network resources.

“Many books on network security and firewalls settle for a discussion focused primarily on concepts and theory. This book, however, goes well beyond these topics. It covers in tremendous detail the information every network and security administrator needs to know when configuring and managing market-leading firewall products from Cisco.”

—Jason Nolet, Vice President of Engineering, Security Technology Group, Cisco

David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.

  • Learn about the various firewall models, user interfaces, feature sets, and configuration methods
  • Understand how a Cisco firewall inspects traffic
  • Configure firewall interfaces, routing, IP addressing services, and IP multicast support
  • Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP
  • Authenticate, authorize, and maintain accounting records for firewall users
  • Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning
  • Define security policies that identify and act on various types of traffic with the Modular Policy Framework
  • Increase firewall availability with firewall failover operation
  • Understand how firewall load balancing works
  • Generate firewall activity logs and learn how to analyze the contents of the log
  • Verify firewall operation and connectivity and observe data passing through a firewall
  • Configure Security Services Modules, such as the Content Security Control (CSC) module and the Advanced Inspection Processor (AIP) module

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Category: Networking: Security

Covers: Cisco ASA 8.0, PIX 6.3, and FWSM 3.2 version firewalls

Read More Show Less

Product Details

  • ISBN-13: 9781587054570
  • Publisher: Cisco Press
  • Publication date: 8/23/2007
  • Series: Networking Technology: Security Series
  • Edition description: New Edition
  • Edition number: 2
  • Pages: 869
  • Sales rank: 960,281
  • Product dimensions: 7.40 (w) x 9.08 (h) x 1.79 (d)

Meet the Author

David Hucaby, CCIE No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software. He has a B.S. and M.S. in electrical engineering from the University of Kentucky. He is the author of three other books from Cisco Press: CCNP BCMSN Official Exam Certification Guide, Cisco Field Manual: Router Configuration, and Cisco Field Manual: Catalyst Switch Configuration.

He lives in Kentucky with his wife, Marci, and two daughters.

Read More Show Less

Read an Excerpt

Cisco ASA, PIX, and FWSM Firewall HandbookCisco ASA, PIX, and FWSM Firewall HandbookIntroduction

This book focuses on the complete product line of Cisco firewall hardware: the PIX and ASA Security Appliance families and the Catalyst Firewall Services Module (FWSM). Of the many sources of information and documentation about Cisco firewalls, very few provide a quick and portable solution for networking professionals.

This book is designed to provide a quick and easy reference guide for all the features that can be configured on any Cisco firewall. In essence, an entire bookshelf of firewall documentation, along with other networking reference material, has been "squashed" into one handy volume.

This book covers only the features that can be used for stateful traffic inspection and overall network security. Although Cisco firewalls can also support VPN functions, those subjects are not covered here.

This book is based on the most current Cisco firewall software releases available at press time—ASA release 8.0(1) and FWSM release 3.2(1).

In the book, you will find ASA, PIX, and FWSM commands presented side-by-side for any specific task. The command syntax is shown with a label indicating the type of software that is running, according to the following convention:

  • ASA—Refers to any platform that can run ASA release 7.0(1) or later. This can include the ASA 5500 family, as well as the PIX 500 family. For example, even though a PIX 535 can run a specific build of the ASA 8.0(1) code, the commands are still labeled "ASA" to follow the operating system being used.
  • PIX—Refers to a PIX release 6.3.
  • FWSM—Refers to FWSM release 3.1(1) or later.

If you are using an earlier version of software, you might find that the configuration commands differ slightly.

With the advent of the ASA platform, Cisco began using different terminology: firewalls became known as security appliances because of the rich security features within the software and because of the modular nature of the ASA chassis. This new terminology has been incorporated in this book where appropriate. However, the term firewall is still most applicable here because this book deals with both security appliances and firewalls embedded within Catalyst switch chassis. As you read this book, keep in mind that the terms firewall and security appliance are used interchangeably.

How This Book Is Organized

This book is meant to be used as a tool in your day-to-day tasks as a network or security administrator, engineer, consultant, or student. I have attempted to provide a thorough explanation of many of the more complex firewall features. When you better understand how a firewall works, you will find it much easier to configure and troubleshoot.

This book is divided into chapters that present quick facts, configuration steps, and explanations of configuration options for each Cisco firewall feature. The chapters and appendixes are as follows:

  • Chapter 1, "Firewall Overview"—Describes how a Cisco firewall inspects traffic. It also offers concise information about the various firewall models and their performance.
  • Chapter 2, "Configuration Fundamentals"—Discusses the Cisco firewall user interfaces, feature sets, and configuration methods.
  • Chapter 3, "Building Connectivity"—Explains how to configure firewall interfaces, routing, IP addressing services, and IP multicast support.
  • Chapter 4, "Firewall Management"—Explains how to configure and maintain security contexts, flash files, and configuration files; how to manage users; and how to monitor firewalls with SNMP.
  • Chapter 5, "Managing Firewall Users"—Covers the methods you can use to authenticate, authorize, and maintain accounting records for a firewall's administrative and end users.
  • Chapter 6, "Controlling Access Through the Firewall"—Describes the operation and configuration of the transparent and routed firewall modes, as well as address translation. Other topics include traffic shunning and threat detection.
  • Chapter 7, "Inspecting Traffic"—Covers the Modular Policy Framework, which is used to define security policies that identify and act on various types of traffic. The chapter also discusses the application layer inspection engines that are used within security policies, as well as content filtering.
  • Chapter 8, "Increasing Firewall Availability with Failover"—Explains firewall failover operation and configuration, offering high availability with a pair of firewalls operating in tandem.
  • Chapter 9, "Firewall Load Balancing"—Discusses how firewall load balancing works and how it can be implemented in a production network to distribute traffic across many firewalls in a firewall farm.
  • Chapter 10, "Firewall Logging"—Explains how to configure a firewall to generate an activity log, as well as how to analyze the log's contents.
  • Chapter 11, "Verifying Firewall Operation"—Covers how to check a firewall's vital signs to determine its health, how to verify its connectivity, and how to observe data that is passing through it.
  • Chapter 12, "ASA Modules"—Discusses the Security Services Modules (SSMs) that can be added into an ASA chassis, along with their basic configuration and use.
  • Appendix A, "Well-Known Protocol and Port Numbers"—Presents lists of well-known IP protocol numbers, ICMP message types, and IP port numbers that are supported in firewall configuration commands.
  • Appendix B, "Security Appliance Logging Messages"—Provides a quick reference to the many logging messages that can be generated from an ASA, PIX, or FWSM firewall.
How to Use This Book

The information in this book follows a quick-reference format. If you know what firewall feature or technology you want to use, you can turn right to the section that deals with it. The main sections are numbered with a quick-reference index that shows both the chapter and the section (for example, 3-3 is Chapter 3, section 3). You'll also find shaded index tabs on each page, listing the section number.

Feature Description

Each major section begins with a detailed explanation of or a bulleted list of quick facts about the feature. Refer to this information to quickly learn or review how the feature works.

Configuration Steps

Each feature that is covered in a section includes the required and optional commands used for common configuration. The difference is that the configuration steps are presented in an outline format. If you follow the outline, you can configure a complex feature or technology. If you find that you do not need a certain feature option, skip over that level in the outline.

In some sections, you will also find that each step in a configuration outline presents the commands from multiple firewall platforms side-by-side in a concise manner. You can stay in the same configuration section no matter what type or model of firewall you are dealing with.

Sample Configurations

Each section includes an example of how to implement the commands and their options. Examples occur within the configuration steps, as well as at the end of a main section. I have tried to present the examples with the commands listed in the order you would actually enter them to follow the outline.

Many times, it is more difficult to study and understand a configuration example from an actual firewall because the commands are displayed in a predefined order—not in the order you entered them. Where possible, the examples have also been trimmed to show only the commands presented in the section.

Displaying Information About a Feature

Each section includes plenty of information about the commands you can use to show information about that firewall feature. I have tried to provide examples of this output to help you interpret the same results on your firewall.

© Copyright Pearson Education. All rights reserved.

Read More Show Less

Table of Contents

Foreword

Introduction

Chapter 1 Firewall

Chapter 2 Configuration Fundamentals

Chapter 3 Building Connectivity

Chapter 4 Firewall Management

Chapter 5 Managing Firewall Users

Chapter 6 Controlling Access Through the Firewall

Chapter 7 Inspecting Traffic

Chapter 8 Increasing Firewall Availability with Failover

Chapter 9 Firewall Load Balancing

Chapter 10 Firewall

Chapter 11 Verifying Firewall Operation

Chapter 12 ASA Modules

Appendix A Well-Known Protocol and Port Numbers

Appendix B Security Appliance Logging Messages

Read More Show Less

Preface

Cisco ASA, PIX, and FWSM Firewall Handbook

Introduction

This book focuses on the complete product line of Cisco firewall hardware: the PIX and ASA Security Appliance families and the Catalyst Firewall Services Module (FWSM). Of the many sources of information and documentation about Cisco firewalls, very few provide a quick and portable solution for networking professionals.

This book is designed to provide a quick and easy reference guide for all the features that can be configured on any Cisco firewall. In essence, an entire bookshelf of firewall documentation, along with other networking reference material, has been "squashed" into one handy volume.

This book covers only the features that can be used for stateful traffic inspection and overall network security. Although Cisco firewalls can also support VPN functions, those subjects are not covered here.

This book is based on the most current Cisco firewall software releases available at press time—ASA release 8.0(1) and FWSM release 3.2(1).

In the book, you will find ASA, PIX, and FWSM commands presented side-by-side for any specific task. The command syntax is shown with a label indicating the type of software that is running, according to the following convention:

  • ASA—Refers to any platform that can run ASA release 7.0(1) or later. This can include the ASA 5500 family, as well as the PIX 500 family. For example, even though a PIX 535 can run a specific build of the ASA 8.0(1) code, the commands are still labeled "ASA" to follow the operating system being used.
  • PIX—Refers to a PIX release 6.3.
  • FWSM—Refers to FWSM release 3.1(1) or later.

If you are using an earlier version of software, you might find that the configuration commands differ slightly.

With the advent of the ASA platform, Cisco began using different terminology: firewalls became known as security appliances because of the rich security features within the software and because of the modular nature of the ASA chassis. This new terminology has been incorporated in this book where appropriate. However, the term firewall is still most applicable here because this book deals with both security appliances and firewalls embedded within Catalyst switch chassis. As you read this book, keep in mind that the terms firewall and security appliance are used interchangeably.

How This Book Is Organized

This book is meant to be used as a tool in your day-to-day tasks as a network or security administrator, engineer, consultant, or student. I have attempted to provide a thorough explanation of many of the more complex firewall features. When you better understand how a firewall works, you will find it much easier to configure and troubleshoot.

This book is divided into chapters that present quick facts, configuration steps, and explanations of configuration options for each Cisco firewall feature. The chapters and appendixes are as follows:

  • Chapter 1, "Firewall Overview"—Describes how a Cisco firewall inspects traffic. It also offers concise information about the various firewall models and their performance.
  • Chapter 2, "Configuration Fundamentals"—Discusses the Cisco firewall user interfaces, feature sets, and configuration methods.
  • Chapter 3, "Building Connectivity"—Explains how to configure firewall interfaces, routing, IP addressing services, and IP multicast support.
  • Chapter 4, "Firewall Management"—Explains how to configure and maintain security contexts, flash files, and configuration files; how to manage users; and how to monitor firewalls with SNMP.
  • Chapter 5, "Managing Firewall Users"—Covers the methods you can use to authenticate, authorize, and maintain accounting records for a firewall's administrative and end users.
  • Chapter 6, "Controlling Access Through the Firewall"—Describes the operation and configuration of the transparent and routed firewall modes, as well as address translation. Other topics include traffic shunning and threat detection.
  • Chapter 7, "Inspecting Traffic"—Covers the Modular Policy Framework, which is used to define security policies that identify and act on various types of traffic. The chapter also discusses the application layer inspection engines that are used within security policies, as well as content filtering.
  • Chapter 8, "Increasing Firewall Availability with Failover"—Explains firewall failover operation and configuration, offering high availability with a pair of firewalls operating in tandem.
  • Chapter 9, "Firewall Load Balancing"—Discusses how firewall load balancing works and how it can be implemented in a production network to distribute traffic across many firewalls in a firewall farm.
  • Chapter 10, "Firewall Logging"—Explains how to configure a firewall to generate an activity log, as well as how to analyze the log's contents.
  • Chapter 11, "Verifying Firewall Operation"—Covers how to check a firewall's vital signs to determine its health, how to verify its connectivity, and how to observe data that is passing through it.
  • Chapter 12, "ASA Modules"—Discusses the Security Services Modules (SSMs) that can be added into an ASA chassis, along with their basic configuration and use.
  • Appendix A, "Well-Known Protocol and Port Numbers"—Presents lists of well-known IP protocol numbers, ICMP message types, and IP port numbers that are supported in firewall configuration commands.
  • Appendix B, "Security Appliance Logging Messages"—Provides a quick reference to the many logging messages that can be generated from an ASA, PIX, or FWSM firewall.

How to Use This Book

The information in this book follows a quick-reference format. If you know what firewall feature or technology you want to use, you can turn right to the section that deals with it. The main sections are numbered with a quick-reference index that shows both the chapter and the section (for example, 3-3 is Chapter 3, section 3). You'll also find shaded index tabs on each page, listing the section number.

Feature Description

Each major section begins with a detailed explanation of or a bulleted list of quick facts about the feature. Refer to this information to quickly learn or review how the feature works.

Configuration Steps

Each feature that is covered in a section includes the required and optional commands used for common configuration. The difference is that the configuration steps are presented in an outline format. If you follow the outline, you can configure a complex feature or technology. If you find that you do not need a certain feature option, skip over that level in the outline.

In some sections, you will also find that each step in a configuration outline presents the commands from multiple firewall platforms side-by-side in a concise manner. You can stay in the same configuration section no matter what type or model of firewall you are dealing with.

Sample Configurations

Each section includes an example of how to implement the commands and their options. Examples occur within the configuration steps, as well as at the end of a main section. I have tried to present the examples with the commands listed in the order you would actually enter them to follow the outline.

Many times, it is more difficult to study and understand a configuration example from an actual firewall because the commands are displayed in a predefined order—not in the order you entered them. Where possible, the examples have also been trimmed to show only the commands presented in the section.

Displaying Information About a Feature

Each section includes plenty of information about the commands you can use to show information about that firewall feature. I have tried to provide examples of this output to help you interpret the same results on your firewall.

© Copyright Pearson Education. All rights reserved.

Read More Show Less

Customer Reviews

Average Rating 3
( 4 )
Rating Distribution

5 Star

(0)

4 Star

(1)

3 Star

(2)

2 Star

(1)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 4 Customer Reviews
  • Anonymous

    Posted February 12, 2008

    A reviewer

    This book is an intermediate to advanced level book on Cisco firewalls. This book covers detailed information on how to configure and manage the Cisco firewall products. Therefore this book would probably be more appropriate as reference manual. However, the screens and illustrations are helpful to a network and security administrator.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 6, 2009

    No text was provided for this review.

  • Anonymous

    Posted June 12, 2010

    No text was provided for this review.

  • Anonymous

    Posted May 1, 2009

    No text was provided for this review.

Sort by: Showing all of 4 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)