Toggle navigation
See also
Home
Networking
CCSP Cisco Certified Security Professional Certification
Part IV: PIX Firewalls
Part IV:
PIX Firewalls
Chapter List
Chapter 17: Cisco PIX Firewall Technology and Features
Chapter 18: Getting Started with the Cisco PIX Firewall
Chapter 19: Access Through the PIX Firewall
Chapter 20: Advanced PIX Firewall Features
Chapter 21: Firewalls and VPN Features
Chapter 22: Managing and Maintaining the PIX Firewall
BackCover
CCSP - Cisco Certified Security Professional Certification All-in-One Exam Guide
Introduction
CCSP Certification Program
How to Protect Yourself Against Exam Changes
Things to Do to Prepare
CCSP Exam Insights
Cisco Certification Program
Part I: Introduction to Network Security
Chapter 1: Understanding Network Security Threats
Identify the Need for Network Security
Identify the Causes of Network Security Problems
The Four Primary Types of Network Threats
The Four Primary Types of Network Attack
Cisco AVVID and SAFE Strategies
Cisco Security Wheel
Network Security Policy
Improving Network Security
Chapter Review
Chapter 2: Securing the Network
Secure Network Design Example
Securing Network Devices
Using Access Control Lists to Secure the Network
Chapter Review
Part II: Securing the Network Perimeter
Chapter 3: Cisco AAA Security Technology
The Cisco AAA Model
AAA System Components
Testing AAA Configuration
Chapter Review
Chapter 4: Cisco Secure ACS and TACACS+/RADIUS Technologies
Describe Cisco Secure ACS
Features and Architecture of Cisco Secure ACS for Windows
Features of CiscoSecure ACS for UNIX
Installing Cisco Secure ACS 3.0 for Windows
Administering and Troubleshooting Cisco Secure ACS for Windows
TACACS+ Overview
Configuring Cisco Secure ACS and TACACS+
Verifying TACACS+
Chapter Review
Chapter 5: Securing Cisco Perimeter Routers
Perimeter Router Terms and Concepts
Eavesdropping
Limit Unneeded TCP/IP and Other Services
Denial of Service Attacks
Unauthorized Access
Lack of Legal IP Addresses
Rerouting Attacks
Event Logging on Perimeter Routers
Chapter Review
Chapter 6: IOS Firewall Feature Set - CBAC
Introduction to Cisco IOS Firewall
Context-Based Access Control (CBAC)
IOS Firewall Management
Chapter Review
Chapter 7: IOS Firewall - Intrusion Detection System
Intrusion Detection System (IDS)
Cisco IOS Firewall IDS Configuration Task List
Initializing the IOS Firewall IDS
Initializing the Post Office
Creating and Applying Audit Rules
Verifying the IDS Configuration
Chapter Review
Chapter 8: IOS Firewall - Authentication Proxy
Cisco IOS Firewall Authentication Proxy
AAA Server Configuration
AAA Router Configuration
Configuring the HTTP Server
Authentication Proxy Configuration on the Router
Verify Authentication Proxy Configuration
Chapter Review
Part III: Virtual Private Networks (VPNs)
Chapter 9: Cisco IOS IPSec Introduction
Virtual Private Networks
Tunneling Protocols
How IPSec Works
Cisco IOS IPSec Technologies
Cisco IOS Cryptosystem Components
Security Association (SA)
Five Steps of IPSec Revisited
IPSec Support in Cisco Systems Products
Chapter Review
Chapter 10: Cisco IOS IPSec for Preshared Keys
Configure IPSec Encryption Tasks
Configuring IPSec Manually
Chapter Review
Chapter 11: Cisco IOS IPSec Certificate Authority Support
CA Support Overview
Configure CA Support Tasks
RSA Encrypted Nonces Overview
Chapter Review
Chapter 12: Cisco IOS Remote Access Using Cisco Easy VPN
Introduction to Cisco Easy VPN
Cisco Easy VPN Server
Cisco Easy VPN Remote
Cisco VPN 3.6 Client
Easy VPN Server Configuration Tasks
Preconfiguring the Cisco VPN 3.6 Client
Management Center for VPN Routers
Easy VPN Remote Phase Two
Cisco VPN Firewall Feature for VPN Client
Chapter Review
Chapter 13: Cisco VPN Hardware Overview
Cisco Products Enable a Secure VPN
Cisco VPN 3002 Client Devices
Cisco VPN 3000 Concentrator Devices
Chapter Review
Chapter 14: Cisco VPN 3000 Remote Access Networks
VPN Concentrator User Interfaces and Startup
VPN Concentrators in IPSec VPN Implementations
Remote Access VPNs with Preshared Keys
Digital Certificates
Configure Cisco VPN Client Support
VPN Client Autoinitiation Feature
Administer and Monitor Remote Access Networks
Chapter Review
Chapter 15: Configuring Cisco VPN 3002 Remote Clients
The VPN 3002 in the Network
Configuring the 3002 Device
Common Configuration Tasks
Basic Configuration for the VPN 3002
Other VPN 3002 Software Features
Auto-Update Feature
Chapter Review
Chapter 16: Cisco VPN 3000 LAN-to-LAN Networks
The VPN Concentrators in LAN-to-LAN VPNs
LAN-to-LAN Networks with Preshared Keys
LAN-to-LAN Networks with Digital Certificates
NAT Issues
NAT Transparency
LAN-to-LAN VPN with Overlapping Network Addresses
LAN-to-LAN Routing
Chapter Review
Part IV: PIX Firewalls
Chapter 17: CiscoSecure PIX Firewalls
Firewall and Firewall Security Systems
CiscoSecure PIX Firewall Technology
Basic PIX Firewall Configuration
Chapter Review
Chapter 18: Getting Started with the Cisco PIX Firewall
Basic PIX Firewall Configuration
ICMP Traffic to the Firewall
Time Setting and NTP Support
Syslog Configuration
DHCP Server Configuration
Chapter Review
Chapter 19: Access Through the PIX Firewall
Adaptive Security Algorithm
Translations and Connections
Access Control Lists (ACLs)
Content Filtering
Object Grouping
Conduit Statements
PIX Routing Configuration
Chapter Review
Chapter 20: Advanced PIX Firewall Features
Remote Access
AAA on the PIX Firewall
Advanced Protocol Handling
Attack Guards
Intrusion Detection
Shunning
Managing SNMP Services
Chapter Review
Chapter 21: Firewalls and VPN Features
Pix Firewall Enables a Secure VPN
IPSec Configuration Tasks
Cisco VPN Client
Scale PIX Firewall VPNs
PPPoE and the PIX Firewall
Chapter Review
Chapter 22: Managing and Maintaining the PIX Firewall
PDM Overview
PDM Operating Requirements
Prepare for PDM
Using PDM to Configure the PIX Firewall
Using PDM to Create a Site-to-Site VPN
Using PDM to Create a Remote Access VPN
CiscoWorks Management Center for PIX Firewalls (PIX MC)
PIX Failover Feature
Password Recovery
Upgrading the PIX OS
Chapter Review
Part V: Intrusion Detection Systems (IDS)
Chapter 23: Intrusion Detection System Overview
Security Threats
The Attack Types and Phases
Intrusion Detection Systems Overview
Summary
Chapter 24: Cisco Secure Intrusion Detection System
CIDS Operations and Functionality
CIDS Architecture
Chapter Review
Chapter 25: Sensor Installation and Configuration
Sensor Deployment Considerations
Sensor Installation
IDS Device Manager
Chapter Review
Chapter 26: Signature and Alarm Management
CIDS Signatures
Event Viewer
Chapter Review
Part VI: Cisco SAFE Implementation
Chapter 27: Cisco SAFE Implementation
Preparation Documents
Exam Topics
Skills Required for the Exam
Chapter Review
Appendix A: Access Control Lists
Access List Basics
Standard Access Lists
Verifying ACLs
Extended Access Lists
Named Access Lists
Appendix B: About the CD
System Requirements
LearnKey Online Training
Installing and Running MasterExam
Electronic Book
Lab Exercises
Help
Removing Installation(s)
Technical Support
List of Figures
List of Tables
List of Sidebars
Remember the name: eTutorials.org
Copyright eTutorials.org 2008-2024. All rights reserved.