It teaches you how to work and play with devices like the Cisco ASA family, and works as a definitive guide to all forms of network security features. The publication is a master class in itself. Not only does it inform us about each Cisco ASA device, but also skilfully explains various types of network security flaws, weaknesses, points of security failures and attacks. Then it goes about explaining how such network security issues can be dealt with by showing a corresponding firewall feature to counter such risks. Features As mentioned, the formative chapters of this publication are spent on explaining various network security flaws, weaknesses, points of security failures and attacks. But, before that, there is an introductory chapter on firewalls.
|Country:||Trinidad & Tobago|
|Published (Last):||12 July 2012|
|PDF File Size:||4.96 Mb|
|ePub File Size:||17.72 Mb|
|Price:||Free* [*Free Regsitration Required]|
It teaches you how to work and play with devices like the Cisco ASA family, and works as a definitive guide to all forms of network security features.
The publication is a master class in itself. Not only does it inform us about each Cisco ASA device, but also skilfully explains various types of network security flaws, weaknesses, points of security failures and attacks. Then it goes about explaining how such network security issues can be dealt with by showing a corresponding firewall feature to counter such risks.
Features As mentioned, the formative chapters of this publication are spent on explaining various network security flaws, weaknesses, points of security failures and attacks. But, before that, there is an introductory chapter on firewalls. Extensive explanations are given based on scenarios as to when, where and why it is imperative to preserve a network resource. Our world is being steadily governed and managed by the use of IT and networks are becoming its backbone, which is why defending the integrity of a network and protecting data becomes so much more important.
Much care and effort goes into running of a home that houses a family. As a home owner you tend to implement every caution and protection possible to ensure that no harm comes to it or its occupants. The same goes for a network. It explains how important your network is and then it shows how it can be attacked and breached. Finally it shows you how to effectively use various features of firewalls to protect against, and in turn prevent, such intrusions.
It mainly bases the concepts on the ASA family of devices, hence readers will get to know how to communicate with such devices. Further on, they will learn how to do basic tasks and, by the end, be able to implement complex and more secure firewall features. Much emphasis is given to the configuration of various types of ASA interfaces. Being a device itself, an ASA will need its own monitoring and management.
Also any work or configuration or access to an ASA device will need its audit trail. All such issues are dealt with in depth. Features like NAT have been addressed in detail. And then finally it starts talking about one of the most important aspects of this title, how to control access by using an ASA device. This forms the core of Cisco ASA. There is an overview of access controls and access rules.
New concepts like Global ACL are introduced in this publication. Pass through analysis of traffic to ensure protocols are meeting criteria set in security policies for a particular network is another key issue that is explained. Another neat feature was the ability to control access and provide proxy services based on the identity of a user on the network.
Traffic handling and management by an ASA device is a very interesting topic, traffic prioritization and bandwidth control were the key issues discussed under this topic. But then the penultimate chapters started throwing in some high value trump cards like virtual firewall based on specific users, high availability, modules and special cards to deploy integrated services for entire organisations, and traffic analysis tools.
Once I had finished going through the chapters, my brain was buzzing at the thought of being able to implement some of these features on the next ASA I get my hands on. But then reality kicked in and it reminded me of the purpose of a certification that goes along with this publication, which cannot be ignored.
At the end of the day, this book empowers you to deliver some killer punches to any network security threats, but only once you have proved to yourself, and of course to the Cisco certification community, that you are worth your CCNP in gold. Conclusion I was not let down by this publication. As mentioned time and time again, networks are important to us and so is their security and integrity.
It is in our best interest to ensure that they work in a safe environment. Intrusions, hacks and breaches are constant threats, we can surely implement features to stop them and prevent them.
One sure way to fulfil that requirement is to put the subject matter of this publication to good use. This review ends with two key phrases — the certification is very much needed, and the publication is highly recommended for that purpose.
CCNP Security FIREWALL 642-618 Official Cert Guide
To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www. In addition, it contains all the chapter-opening assessment questions from the book. This integrated learning package: Allows you to focus on individual topic areas or take complete, timed exams Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions Provides unique sets of exam-realistic practice questions Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most Pearson IT Certification Practice Test minimum system requirements: Windows XP SP3 , Windows Vista SP2 , or Windows 7; Microsoft. NET Framework 4. Senior security consultants and instructors David Hucaby, David Garneau, and Anthony Sequeira share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. Exam topic lists make referencing easy.
Exam Profile: CCNP Security FIREWALL 642-618 (Firewall v2.0)
Book Review: CCNP Security FIREWALL 642-618 Official Cert Guide
- GLOOM BOOM DOOM REPORT 2012 PDF
- LA NOCHE DE TLATELOLCO TESTIMONIOS DE HISTORIA ORAL PDF
- GEORGE FACER A2 CHEMISTRY ANSWERS PDF
- AN INTRODUCTION TO GENETIC ENGINEERING BY DESMOND S.T.NICHOLL PDF
- APOMIXIS EN CITRICOS PDF
- HP COMPAQ TC4400 MANUAL PDF
- 74192 DATASHEET PDF
- SINDROME DE ELLIS VAN CREVELD PDF
- ESPASMO ESOFAGICO DIFUSO TRATAMIENTO PDF