CISCO CCNP SECURITY FIREWALL 642-618 PDF

They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Expert networking consultants Dave Hucaby, Dave Garneau, and Anthony Sequeira share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

Author:Jukora Fenrirn
Country:Latvia
Language:English (Spanish)
Genre:Business
Published (Last):19 August 2015
Pages:340
PDF File Size:15.15 Mb
ePub File Size:3.68 Mb
ISBN:934-6-90504-759-6
Downloads:78766
Price:Free* [*Free Regsitration Required]
Uploader:Talar



It teaches you how to work and play with devices like the Cisco ASA family, and works as a definitive guide to all forms of network security features.

The publication is a master class in itself. Not only does it inform us about each Cisco ASA device, but also skilfully explains various types of network security flaws, weaknesses, points of security failures and attacks.

Then it goes about explaining how such network security issues can be dealt with by showing a corresponding firewall feature to counter such risks. Features As mentioned, the formative chapters of this publication are spent on explaining various network security flaws, weaknesses, points of security failures and attacks. But, before that, there is an introductory chapter on firewalls. Extensive explanations are given based on scenarios as to when, where and why it is imperative to preserve a network resource.

Our world is being steadily governed and managed by the use of IT and networks are becoming its backbone, which is why defending the integrity of a network and protecting data becomes so much more important. Much care and effort goes into running of a home that houses a family. As a home owner you tend to implement every caution and protection possible to ensure that no harm comes to it or its occupants.

The same goes for a network. It explains how important your network is and then it shows how it can be attacked and breached. Finally it shows you how to effectively use various features of firewalls to protect against, and in turn prevent, such intrusions. It mainly bases the concepts on the ASA family of devices, hence readers will get to know how to communicate with such devices. Further on, they will learn how to do basic tasks and, by the end, be able to implement complex and more secure firewall features.

Much emphasis is given to the configuration of various types of ASA interfaces. Being a device itself, an ASA will need its own monitoring and management. Also any work or configuration or access to an ASA device will need its audit trail.

All such issues are dealt with in depth. Features like NAT have been addressed in detail. And then finally it starts talking about one of the most important aspects of this title, how to control access by using an ASA device. This forms the core of Cisco ASA.

There is an overview of access controls and access rules. New concepts like Global ACL are introduced in this publication. Pass through analysis of traffic to ensure protocols are meeting criteria set in security policies for a particular network is another key issue that is explained.

Another neat feature was the ability to control access and provide proxy services based on the identity of a user on the network. Traffic handling and management by an ASA device is a very interesting topic, traffic prioritization and bandwidth control were the key issues discussed under this topic. But then the penultimate chapters started throwing in some high value trump cards like virtual firewall based on specific users, high availability, modules and special cards to deploy integrated services for entire organisations, and traffic analysis tools.

Once I had finished going through the chapters, my brain was buzzing at the thought of being able to implement some of these features on the next ASA I get my hands on. But then reality kicked in and it reminded me of the purpose of a certification that goes along with this publication, which cannot be ignored. At the end of the day, this book empowers you to deliver some killer punches to any network security threats, but only once you have proved to yourself, and of course to the Cisco certification community, that you are worth your CCNP in gold.

Conclusion I was not let down by this publication. As mentioned time and time again, networks are important to us and so is their security and integrity. It is in our best interest to ensure that they work in a safe environment. Intrusions, hacks and breaches are constant threats, we can surely implement features to stop them and prevent them. One sure way to fulfil that requirement is to put the subject matter of this publication to good use.

This review ends with two key phrases — the certification is very much needed, and the publication is highly recommended for that purpose.

JEFF HWANG POT LIMIT OMAHA PDF

Retired Certification Exams

It teaches you how to work and play with devices like the Cisco ASA family, and works as a definitive guide to all forms of network security features. The publication is a master class in itself. Not only does it inform us about each Cisco ASA device, but also skilfully explains various types of network security flaws, weaknesses, points of security failures and attacks. Then it goes about explaining how such network security issues can be dealt with by showing a corresponding firewall feature to counter such risks. Features As mentioned, the formative chapters of this publication are spent on explaining various network security flaws, weaknesses, points of security failures and attacks.

BASICS IN RHYTHM GARWOOD WHALEY PDF

Exam Profile: CCNP Security FIREWALL 642-618 (Firewall v2.0)

.

LEY 25345 PDF

CCNP Security FIREWALL 642-618 Official Cert Guide

.

EINFHRUNG IN DIE INFORMATIK GUMM SOMMER PDF

Book Review: CCNP Security FIREWALL 642-618 Official Cert Guide

.

Related Articles