Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 658 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
658
Dung lượng
10,77 MB
Nội dung
[...]... Chapter 2 Introduction toPIX Firewalls Introduction PIX Firewall Features Embedded Operating System The Adaptive Security Algorithm State Security Levels How ASA Works Technical Details for ASA User Datagram Protocol Advanced Protocol Handling VPN Support URL Filtering NAT and PAT High Availability PIX Hardware Models PIX 501 PIX 506 PIX 506E PIX 515 PIX 515E PIX 520 PIX 525 PIX 535 29 31 31 32 32... www.syngress.com 235 _pix_ pd_01.qxd 11/7/02 11:05 AM Page 1 Chapter 1 Introduction to Security and Firewalls Solutions in this chapter: I The Importance of Security I Creating a Security Policy I Cisco s Security Wheel I Firewall Concepts I CiscoSecurity Certifications Summary Solutions Fast Track Frequently Asked Questions 1 235 _pix_ pd_01.qxd 2 11/7/02 11:05 AM Page 2 Chapter 1 • Introduction to Security and Firewalls... Chapter 1, “Introduction to Security and Firewalls,” introduces general security and firewall concepts For readers new to the area of information security, this chapter will guide them through fundamental security and firewall concepts that are necessary to understand the following chapters.The first and most important step towards starting to control network security is to establish a security policy for... Importance of Security What Is Information Security? The Early Days of Information Security Insecurity and the Internet The Threats Grow Attacks Creating a Security Policy Cisco s Security Wheel Securing the Environment Monitoring Activity Testing Security Improving SecurityFirewall Concepts What Is a Firewall? Types of Firewalls Packet Filters Stateful Inspection Packet Filters Application Proxies Firewall. .. traffic captures Firewall performance and health need to be monitored proactively, and this chapter discusses the practices that will ensure that the PIX firewall is operating as it should Our hope is that the readers of CiscoSecurity Specialist’s GuidetoPIX Firewalls will become masters of installing, configuring, maintaining, and troubleshooting PIX firewalls, in addition to being ready to take the CSPFA... discussion of Cisco s security certifications and the objectives for the CSS-1 and CCIE Security written exams Chapter 2, “Introduction toPIX Firewalls,” goes through the fundamentals of PIX firewalls.The main features of the PIX firewall are described, as well as the paradigm of PIX firewall configuration.The concepts of security levels and the Adaptive Security Algorithms (ASA), which are integral toPIX firewall... CiscoSecurity Specialist’s GuidetoPIX Firewalls is a comprehensive guide for network and security engineers, covering the entire line of the PIX firewall product series.This book was written by highly experienced authors who provide high security solutions to their clients using CiscoPIX firewalls on a daily basis.This book covers all the latest and greatest features of PIX firewall software version 6.2,... perspectives on security, ones often in opposition to those of academia Commercial information had value, and access to it needed to be limited to specifically authorized people UNIX,TCP/IP, and connections to the Internet became avenues of attack and did not have much www.syngress.com 5 235 _pix_ pd_01.qxd 6 11/7/02 11:05 AM Page 6 Chapter 1 • Introduction to Security and Firewalls capability to implement... certifications Cisco offers: the CiscoSecurity Specialist 1 (CSS-1) and the Cisco Certified Internet Expert (CCIE) Security The Importance of Security Over the last couple of decades, many companies began to realize that their most valuable assets were not only their buildings or factories but also the intellectual property and other information that flowed internally as well as outwardly to suppliers and customers... content contained within these pages is useful to anyone who has a desire to fully comprehend CiscoPIX firewalls.This book serves as both a tool for learning and a reference guide It is assumed xxv 235 _PIX_ intro.qxd xxvi 11/8/02 2:58 PM Page xxvi Introduction that the reader has a basic understanding of networking concepts and TCP/IP equivalent to that of a Cisco Certified Network Associated (CCNA) Here . Hardware 59
Models 59
PIX 501 61
PIX 506 61
PIX 506E 61
PIX 515 61
PIX 515E 62
PIX 520 62
PIX 525 63
PIX 535 63
235 _PIX_ TOC.qxd 11/8/02 5:26 PM Page xii
Contents. 7
Creating a Security Policy 8
Cisco s Security Wheel 11
Securing the Environment 12
Monitoring Activity 14
Testing Security 15
Improving Security 17
Firewall