CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Greg Bastien; Earl Carter; Christian Degu

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید






  • Foundation Summary


    The "Foundation Summary" provides a convenient review of many key concepts in this chapter. If you are already comfortable with the topics in this chapter, this summary can help you recall a few details. If you just read this chapter, this review should help solidify some key facts. If you are doing your final preparation before the exam, this summary provides a convenient way to review the day before the exam.


    Firewall Technologies


    There are three firewall technologies:

    • Packet filtering Inspects the incoming and outgoing packets and allows/denies traffic based on source, destination, protocol, and service.

    • Proxy Connections are initiated by the firewall on behalf of the requestor. Traffic does not pass through a proxy-based firewall but rather is re-created by the firewall.

    • Stateful inspection Stateful inspection firewalls, also know as stateful packet filters, allow/deny traffic based on source, destination, and service while maintaining a state table to keep track of existing connections. This ensures that inbound connections are valid replies to outbound requests.



    Cisco PIX Firewall


    Four major characteristics of the Cisco Secure PIX Firewall design make it a leading-edge, high-performance security solution:

    • Secure real-time embedded system This is a single proprietary embedded system designed for improved security, functionality, and performance.

    • Adaptive Security Algorithm The ASA is the key to stateful session control in the PIX Firewall. The ASA maintains state information in the state table and randomly generates TCP sequence numbers to prevent session hijacking.

    • Cut-through proxy Cut-through proxy is a method for transparently performing authentication and authorization of inbound and outbound connections at the firewall.

    • Redundancy The Cisco Secure PIX 515 series and above can be configured in pairs with a primary system and a hot standby.



    • / 191