Cisco Secure Firewall Services Module (FWSM)

来源:互联网 发布:java线程池的实现原理 编辑:程序博客网 时间:2024/05/01 22:58
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp

The Firewall Services Module (FWSM) is a high-performance stateful-inspection firewall that integrates into the Cisco® 6500 switch and 7600 router chassis. The FWSM monitors traffic flows using application inspection engines to provide a strong level of network security. The FWSM defines the security parameter and enables the enforcement of security policies through authentication, access control lists, and protocol inspection. The FWSM is a key component to anyone deploying network security.

Cisco Secure Firewall Services Module (FWSM) covers all aspects of the FWSM. The book provides a detailed look at how the FWSM processes information, as well as installation advice, configuration details, recommendations for network integration, and reviews of operation and management. This book provides you with a single source that comprehensively answers how and why the FWSM functions as it does. This information enables you to successfully deploy the FWSM and gain the greatest functional benefit from your deployment. Practical examples throughout show you how other customers have successfully deployed the FWSM.

By reading this book, you will learn how the FWSM functions, the differences between the FWSM and the ASA Security Appliance, how to implement and maintain the FWSM, the latest features of the FWSM, and how to configure common installations.

*Understand modes of operation, security levels, and contexts for the FWSM
*Configure routing protocols and the host-chassis to support the FWSM
*Deploy ACLs and Authentication, Authorization, and Accounting (AAA)
*Apply class and policy maps
*Configure multiple FWSMs for failover support
*Configure application and protocol inspection
*Filter traffic using filter servers, ActiveX, and Java filtering functions
*Learn how IP multicast and the FWSM interact
*Increase performance with firewall load balancing
*Configure IPv6 and asymmetric routing
*Mitigate network attacks using shunning, anti-spoofing, connection limits, and timeouts
*Examine network design, management, and troubleshooting best practices

http://rapidshare.com/files/149034080/1587053535.rar
http://depositfiles.com/files/8291008
原创粉丝点击