In this chapter, you will learn how to:
Work with remote access using Telnet, HTTP, and SSH features
Use authentication, authorization, and accounting
Apply advanced protocol handling
Understand attack guards
Recognize Intrusion detection
Manage SNMP services
Many of the advanced concepts and configurations in this chapter should be somewhat familiar to you because of their counterparts in the Cisco router environment and from the IOS Firewall chapters 6 through 8. As the PIX Firewall moves to be more fully IOS command compatible with each new release, your existing strengths are leveraged further.
If you aren’t familiar with Cisco’s Voice over IP (VoIP) strategy and implementation, give serious thought to looking over a few of the related documents available on the Cisco web site. While this chapter discusses the protocols that facilitate VoIP through the PIX Firewall, a little higher overview might help you gain perspective. Because this is one of the technologies Cisco has identified as its future, having a little broader understanding can’t hurt.