Cisco Secure Firewall Services Module (FWSM)
Home > Computing and Information Technology > Computer networking and communications > Networking packages > Cisco Secure Firewall Services Module (FWSM)
Cisco Secure Firewall Services Module (FWSM)

Cisco Secure Firewall Services Module (FWSM)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Best practices for securing networks with FWSM Understand the differences between PIX/ASA firewall and FWSM deployments Review practical design and configuration advice for FWSM deployments Maximize FWSM security features and reduce deployment time Learn from coverage of the latest features and common installation best practices The Firewall Services Module (FWSM) is a high-performance stateful-inspection firewall that integrates into the Cisco 6500 switch and 7600 router chassis. It monitors traffic flows using application inspection engines to provide a strong level of network security. The FWSM defines the security parameter and enables the enforcement of security policies through authentication, access-control lists, and protocol inspection. This is a key component to anyone deploying network security. Many customers have been deploying the firewall services module without specific knowledge on how it functions. They have taken their experience with the PIX firewall and applied it to the FWSM, but there are significant differences between the two products. Cisco Secure Firewall Services Module (FWSM) is designed to help  understand how the FWSM functions and the differences between it and the PIX. It also helps you through the design, configuration, implementation, and administration of the FWSM by providing practical examples using best security practices.

Table of Contents:
Introduction Part I Introduction Chapter 1 Types of Firewalls Understanding Packet-Filtering Firewalls 5     Advantages 5     Caveats 6 Understanding Application/Proxy Firewalls 7     Advantages 8     Caveats 8 Understanding Reverse-Proxy Firewalls     Advantages     Caveats Utilizing Packet Inspection Reusing IP Addresses     NAT     PAT Summary Chapter 2 Overview of the Firewall Services Module Specifications Installation Performance Virtualization Comparing the FWSM to Other Security Devices     IOS FW     PIX     ASA Hardware Architecture Software Architecture Summary Chapter 3 Examining Modes of Operation Working with Transparent Mode     Advantages     Disadvantages     Traffic Flow     Multiple Bridge Groups Working with Routed Mode     Advantages     Disadvantages     Traffic Flow Summary References Chapter 4 Understanding Security Levels Traffic Flow Between Interfaces Network Address Translation/Port Address Translation     Static NAT         Number of Simultaneous TCP Connections         Number of Embryonic Connections     DNS     Norandomseq     TCP     UDP     Static PAT     Dynamic NAT     Dynamic PAT     NAT Control     NAT Bypass         NAT 0 or Identity NAT         Static Identity NAT Summary References Chapter 5 Understanding Contexts Benefits of Multiple Contexts     Separating Security Policies     Leveraging the Hardware Investment Disadvantages of Multiple Contexts Adding and Removing Contexts     Adding a Context     Removing a Context         Storing Configuration Files     Changing Between Contexts Understanding Resource Management     Memory Partitions Summary Part II Initial Configuration Chapter 6 Configuring and Securing the 6500/7600 Chassis Understanding the Interaction Between the Host-Chassis and the FWSM Assigning Interfaces Securing the 6500/7600 (Host-Chassis)     Controlling Physical Access     Being Mindful of Environmental Considerations     Controlling Management Access     Disabling Unnecessary Services     Controlling Access Using Port-Based Security     Controlling Spanning Tree     Leveraging Access Control Lists     Securing Layer 3     Leveraging Control Plane Policing     Protecting a Network Using Quality of Service     Employing Additional Security Features Summary References Chapter 7 Configuring the FWSM Configuring FWSM in the Switch Exploring Routed Mode Exploring Transparent Mode Using Multiple Context Mode for FWSM     Context Configurations     System Context Configurations     Admin Context Configurations     Packet Classifier in FWSM Context Mode     Understanding Resource Management in Contexts Configuration Steps for Firewall Services Module     Type 1: Configuring Single Context Routed Mode     Type 2: Configuring Single Context Transparent Mode     Type 3: Configuring Multiple Context Mixed Mode Summary Chapter 8 Access Control Lists Introducing Types of Access Lists     Understanding Access Control Entry     Understanding Access List Commit Understanding Object Groups Monitoring Access List Resources Configuring Object Groups and Access Lists     Working with Protocol Type     Working with Network Type     Working with Service Type     Working with Nesting Type     Working with EtherType Summary Chapter 9 Configuring Routing Protocols Supporting Routing Methods     Static Routes     Default Routes     Open Shortest Path First         SPF Algorithm         OSPF Network Types         Concept of Areas         OSPF Link State Advertisement         Types of Stub Area in OSPF     OSPF in FWSM     OSPF Configuration in FWSM         Interface-Based Configuration for OSPF Parameters         Summarization         Stub Configuration         NSSA Configuration         Default Route Information         Timers     OSPF Design Example 1     OSPF Design Example 2     Routing Information Protocol     RIP in FWSM         Configuration Example of RIP on FWSM     Border Gateway Protocol     BGP in FWSM     BGP Topology with FWSM Summary Chapter 10 AAA Overview Understanding AAA Components     Authentication in FWSM     Authorization in FWSM     Accounting in FWSM Comparing Security Protocols Understanding Two-Step Authentication Understanding Fallback Support     Configuring Fallback Authentication     Configuring Local Authorization Understanding Cut-Through Proxy in FWSM     Configuring Custom Login Prompts     Using MAC Addresses to Exempt Traffic from Authentication and Authorization Summary Chapter 11 Modular Policy Using Modular Policy in FWSM Understanding Classification of Traffic     Understanding Application Engines Defining Policy Maps     Configuring Global Policy Configuring Service Policy Understanding Default Policy Map Sample Configuration of Modular Policy in FWSM Summary Part III Advanced Configuration Chapter 12 Understanding Failover in FWSM Creating Redundancy in the FWSM     Understanding Active/Standby Mode     Understanding Active/Active Mode Understanding Failover Link and State Link Requirements for Failover Synchronizing the Primary and Secondary Firewalls Monitoring Interfaces Configuring Poll Intervals Design Principle for Monitoring Interfaces Configuring Single Context FWSM Failover Configuring Multiple Context FWSM Failover Summary Chapter 13 Understanding Application Protocol Inspection Inspecting Hypertext Transfer Protocol Inspecting File Transfer Protocol Working with Supported Applications Configuring ARP     Inspecting ARP     Configuring Parameters for ARP         Configuring MAC Entries         Adding Static Entries Summary References Chapter 14 Filtering Working with URLs and FTP Configuring ActiveX and Java Summary References Chapter 15 Managing and Monitoring the FWSM Using Telnet Using Secure Shell Using Adaptive Security Device Manager     Configuring the FWSM Using ASDM     Managing the FWSM from the Client Securing Access     Configuring the FWSM for VPN Termination     Configuring the VPN Client Working with Simple Network Management Protocol Examining Syslog Working with Cisco Security Manager Monitoring Analysis and Response System Summary References Chapter 16 Multicast Protocol Independent Multicast Understanding Rendezvous Point PIM Interface Modes IGMP Protocol Multicast Stub Configuration Multicast Traffic Across Firewalls     FWSM 1.x and 2.x Code Releases     FWSM 3.x Code Release Configuration Methods     Method 1: Configuration Example for Multicast Through Firewall in Single Context Routed Mode     Method 2: Configuration Example for Multicast Through Firewall via GRE     Method 3: Configuration Example for Multicast Through Transparent Firewall in Multiple Context Mode Summary Chapter 17 Asymmetric Routing Asymmetric Routing Without a Firewall Asymmetric Traffic Flow in a Firewall Environment Avoiding Asymmetric Routing Through Firewalls     Option 1: Symmetric Routing Through Firewalls     Option 2: Firewall Redundancy and Routing Redundancy Symmetry Supporting Asymmetric Routing in FWSM     Asymmetric Routing Support in Active/Standby Mode     Asymmetric Routing Support in Active/Active Mode Configuring ASR in FWSM Summary Chapter 18 Firewall Load Balancing Reasons for Load Balancing Firewalls Design Requirements for Firewall Load Balancing Firewall Load-Balancing Solutions     Firewall Load Balancing with Policy-Based Routing     Firewall Load Balancing with Content Switch Module         Configuring the CSM         Snapshot Configuration for CSM Supporting Firewall Load Balancing     Firewall Load Balancing Using the Application Control Engine         ACE Design for Firewall Load Balancing Firewall Load Balancing Configuration Example     OUT2IN Policy Configuration     Firewall Configuration     IN2OUT Policy Configuration Summary Chapter 19 IP Version 6 Understanding IPv6 Packet Header Examining IPv6 Address Types     Neighbor Discovery Protocol IPv6 in FWSM     Configuring Multiple Features of IPv6 in FWSM         Interface Configuration         Router Advertisement         Duplicate Address Detection         Timer for Duplicate Address Detection         Configuring Access Lists         Configuring Static Routes         Configuring IPv6 Timers in FWSM     Configuring IPv6 in FWSM         Configuring PFC (Layer 3 Device) on the Outside Security Domain         Configuring FWSM         Configuring a Layer 3 Device on the Inside Security Domain         Verify the Functionality of FWSM         Working with the showCommand for IPv6 in FWSM Summary Chapter 20 Preventing Network Attacks Protecting Networks Shunning Attackers Spoofing Understanding Connection Limits and Timeouts     Configuring Connection Limits     Configuring Timeouts Summary References Chapter 21 Troubleshooting the FWSM Understanding Troubleshooting Logic Assessing Issues Logically Connectivity Test of a Flow at the FWSM     Troubleshooting Flow Issues FAQs for Troubleshooting     How Do You Verify Whether the Traffic Is Forwarded to a Particular Interface in the FWSM?     How Do I Verify ACL Resource Limits?     How Do I Verify the Connectivity and Packet Flow Through the Firewall?     What Is Network Analysis Module?     What Are Some Useful Management and Monitoring Tools?     How Do I Recover Passwords? Summary Part IV Design Guidelines and Configuration Examples Chapter 22 Designing a Network Infrastructure Determining Design Considerations     Documenting the Process Determining Deployment Options     Determining Placement     Working with FWSM and the Enterprise Perimeter     FWSM in the Datacenter         Throughput         Flexibility         Availability     Supporting Virtualized Networks Summary Reference Chapter 23 Design Scenarios Layer 3 VPN (VRF) Terminations at FWSM     Configuring the PFC     Configuring the FWSM Failover Configuration in Mixed Mode Interdomain Communication of Different Security Zones Through a Single FWSM     Configuring the PFC     FWSM Configuration Dynamic Learning of Routes with FWSM     Single Box Solution with OSPF Data Center Environment with the FWSM     Method 1: Layer 3 VPN Segregation with Layer 3 FWSM (Multiple Context Mode)     Method 2: Layer 3 VPN Segregation with Layer 2 FWSM (Multiple Context Mode) PVLAN and FWSM     PVLAN Configuration in FWSM     Design Scenario 1 for PVLAN in FWSM     Design Scenario 2 for PVLAN in FWSM     Configuring PVLAN Summary Part V FWSM 4.x Chapter 24 FWSM 4.x Performance and Scalability Improvements Increasing Performance by Leveraging the Supervisor Using the PISA for Enhanced Traffic Detection Improving Memory     Partitioning Memory     Reallocating Rules     Optimizing ACL Summary Chapter 25 Understanding FWSM 4.x Routing and Feature Enhancements Configuring EIGRP Configuring Route Health Injection Understanding Application Support     Configuring Regular Expressions     Understanding Application Inspection Improvements Additional Support for Simple Network Management Protocol Management Information Base Miscellaneous Security Features     Dynamic Host Configuration Protocol Option 82     Smartfilter HTTPS Support Summary References     1587053535   TOC   8/12/2008

About the Author :
Ray Blair is a consulting systems architect and has been with Cisco Systems for more than eight years, working primarily on security and large network designs. He has 20 years of experience with designing, implementing, and maintaining networks that have included nearly all networking technologies. His first four years in the high-technology industry started with designing industrial computer systems for process monitoring. Mr. Blair maintains three Cisco Certified Internetwork Expert (CCIE) certifications in Routing and Switching, Security, and Service Provider. He also is a Certified Novell Engineer (CNE) and a Certified Information Systems Security Professional (CISSP).   Arvind Durai is an advanced services technical leader for Cisco Systems. His primary responsibility has been in supporting major Cisco customers in the Enterprise sector, some of which includes Financial, Manufacturing, E-commerce, State Government, and Health Care sectors. One of his focuses has been on security, and he has authored several white papers and design guides in various technologies. Mr. Durai maintains two Cisco Certified Internetwork Expert (CCIE) certifications in Routing and Switching and Security. Mr. Durai holds a Bachelor of Science degree in Electronics and Communication, a Master’s degree in Electrical Engineering (MS), and Master’s degree in Business Administration (MBA).  


Best Sellers


Product Details
  • ISBN-13: 9781587053535
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Height: 230 mm
  • No of Pages: 528
  • Spine Width: 28 mm
  • Width: 186 mm
  • ISBN-10: 1587053535
  • Publisher Date: 18 Sep 2008
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Weight: 880 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cisco Secure Firewall Services Module (FWSM)
Pearson Education (US) -
Cisco Secure Firewall Services Module (FWSM)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cisco Secure Firewall Services Module (FWSM)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!