- Paperback: 840 pages
- Publisher: Cisco Press; 1 edition (June 7, 2005)
- Language: English
- ISBN-10: 1587051583
- ISBN-13: 978-1587051586
- Product Dimensions: 7.4 x 1.9 x 9.3 inches
- Shipping Weight: 3.1 pounds
- Average Customer Review: 19 customer reviews
- Amazon Best Sellers Rank: #3,289,459 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Cisco ASA and PIX Firewall Handbook 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
There is a newer edition of this item:
See the Best Books of 2018 So Far
Looking for something great to read? Browse our editors' picks for the best books of the year so far in fiction, nonfiction, mysteries, children's books, and much more.
About the Author
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with healthcare networks based on the Cisco Catalyst, IP Telephony, PIX, and VPN product lines. David was one of the beta reviewers of the PIX version 7 Firewall operating system software.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
I have been administering Cisco PIXs since around 2001 and have plenty of experience with configuring and administering Cisco's earlier PIX OSs (5.x & 6.x). This book does a superb job at bringing me up to speed on the latest commands for the 7.x while still providing the full body of commands for earlier OSs. When in the field and administering a PIX and, probably in a situation where the Internet is not up to check Cisco's website, this is the only book I need to bring along.
* Chapter 6 provides the most up-to-date description of the different types of NAT employed (Static, Policy, Identity, Exception, & PAT) and configuration examples of each.
* Chapter 7 - Failover - this chapter was really the first chapter I referenced on a regular basis. When Cisco updated the OS to 7.0, the functionality of failover was greatly improved. This chapter does a great job at documenting the new options as well as including material on the older failover options. Couple with Chapter 8 on load balancing.
* Chapter 10 - Monitoring the Firewall - the book demonstrates the power and flexibility of the updated packet capture features.
I did find some minor typos/editorial mistakes but nothing too grave. One topic this book is sorely lacking is VPN coverage (the author readily acknowledges this). Overall, I believe this book is a superb resource for a firewall admin or a candidate for the CCSP or CCIE Security. I'm usually not too fond of CiscoPress's Firewall books, but this book is definitely a welcome addition.
I give this book 5 pings out of 5:
The author is a lead network engineer for the University of Kentucky. It's clear that so far as a firewall is concerned, he's been there and done that. His description of what is done/examined/checked about incoming packets before passing them through the firewall is the best I've ever seen. Unlike so many computer books, his introductory chapters tell you the 'this is what we are trying to do here' before getting down to the type this in kind of commands.
This book is based on Cisco hardware and the Cisco philosophy of how a firewall should be implemented. If it is your job to handle a Cisco firewall of any type I recommend this book. It concentrates on ASA and PIX (Version 7), if you have (or are getting) one of them this book should be considered mandatory.
Hucaby has good concise coverage of concepts while diving into the minutia of configuration examples. Case studies are used, but not to verbose. Hucaby simply states the goals and shows you the configurations in an outlined format. The structure of each chapter includes a description, steps to configure, sample configurations, and how to verify a feature is functioning.
This book will now replace an older title I had on the PIX Firewall as my desk reference. I will also consult it when configuring the other
If you work through this book with your equipment, perhaps the greatest benefit will be the understanding you will gain for interpreting
error logs. This will benefit both security as well as troubleshooting.
During my first reading through of the book, I found useful commands that I was unaware of and do not show up when typing a question mark at the command prompt. Because of this I was able to more accurately view the traffic from a recent setup and had more confidence in knowing that it was working correctly.
Primarily because the title is so concise, yet thorough, I rate this book 5 stars and look forward to reading more books by this author.
Most recent customer reviews
This allows you to work on multiple platforms easily with one handbook.Read more