- Paperback: 912 pages
- Publisher: Cisco Press (August 20, 2004)
- Language: English
- ISBN-10: 1587051753
- ISBN-13: 978-1587051753
- Product Dimensions: 7.3 x 2.1 x 9.1 inches
- Shipping Weight: 3.2 pounds (View shipping rates and policies)
- Average Customer Review: 7 customer reviews
- Amazon Best Sellers Rank: #2,093,785 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Cisco Router Firewall Security
Use the Amazon App to scan ISBNs and compare prices.
Fulfillment by Amazon (FBA) is a service we offer sellers that lets them store their products in Amazon's fulfillment centers, and we directly pack, ship, and provide customer service for these products. Something we hope you'll especially enjoy: FBA items qualify for FREE Shipping and Amazon Prime.
If you're a seller, Fulfillment by Amazon can help you increase your sales. We invite you to learn more about Fulfillment by Amazon .
Frequently bought together
Customers who bought this item also bought
What other items do customers buy after viewing this item?
About the Author
Richard A. Deal has 18 years experience in the computing and networking industry including networking, training, systems administration, and programming. In addition to a B.S. in mathematics and computer science from Grove City College, Richard holds many certifications from Cisco, including the CCNP and CCSP(tm) certifications. For the past seven years, Richard has operated his own company, The Deal Group, Inc., in Orlando, Florida.
Author interviews, book reviews, editors picks, and more. Read it now
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
Networking professionals having an intermediate to advanced knowledge of Cisco routers, or at least a Cisco CCNA certification will benefit immensely from reading and applying the Cisco IOS firewall security features discussed in the book. All concepts and examples, such as configuration command files, are clearly explained against the backdrop of example network illustrations and thus easy to follow. Deal reinforces each and every illustration with appropriate, well-executed discussions for you to follow as he pin-points the reasons for implementing, or applying, Cisco IOS firewall security and how best to configure it for maximum advantage.
For networking professionals interested in pursuing a Cisco security certification, Cisco Router Firewall Security provides a wealth of tips, recommendations, considerations and cautions. While there is no CD-ROM included with the book, an abundance of configuration command file listings provide network administrators and engineers the opportunity of a virtual experience in the nuts-and-bolts of configuring Cisco IOS firewalls in a secure manner. Networking professionals will develop an unparalleled depth of understanding in best practice network security-such as properly securing the various modes and methods of accessing Cisco routers as well as the Cisco IOS firewall.
If shooting from the hip in dealing with network security issues is your stick, Cisco Router Firewall Security is the book for you. Cisco Router Firewall Security provides a smorgasbord of tried and tested network security process, procedure and application-providing a comprehensive set of tools and case study material that can be either adapted in whole or in part when making your case, or justifying, how you intend to protect or defend your network against attacks.
Without question, you absolutely must add Deal's Cisco Router Firewall Security-a stellar treatise on both applied network security and applied firewall security-to your networking bookshelf. Arm yourself with the necessary knowledge, skills and practical application to secure and defend your network-and in essence your job-or else, you're fired!
Within the book Richard emphasizes that an individual can either read it cover to cover, or skip around and I agree that at sometimes reading cover to cover especially if you do not know a subject is an excellent approach, but with this one even not knowing and using it for the references offers is just as much benefit. Cause within the individual sections of the book there's enough information that you will not get lost as long as you have understanding of other Cisco devices like TACACS+ or general network concepts like RADIUS. Richard presents clear examples and details the steps to implement many of the book suggestions without much issue. I was able to take one of my lab routers and execute numerous of his examples without difficulty and still have the unit function as expected.
While Cisco continues to publish new IOS code for their devices Richard spends a few minutes at different points like in Chapter 6 "Basic ACL Configuration" to highlight which version of IOS is needed to accomplish the issue being explained. Considering this feature does help to enhance the value of the book even further, but amongst my favorite chapters and section was Part VI "Managing Access through Routers" for he the book combined numerous prior items from Access Control List (ACL) configuration to routing protocols and authentication proxy using features like AAA with both TACACS+ and RADIUS. These configuration examples combined with Part VIII on "Virtual Private Networks (VPN)" only go to enhance each other. Yet as mentioned before the book was designed to allow individuals to either research a sub-set of the features in a router or the entire book itself. Thus in the middle of what appears to be two clear parts that would naturally fit together Part VI and VIII, Richard places Part VII on "Detecting and Preventing Attacks" demonstrates this feature covering areas of Intrusion Detection Systems, DoS Protection and Logging Events. The concept that attacks could come in any form, but commonly from external interaction is widely known. Seeing this section of the book only goes further to enforce and emphasis the importance of securing routers to protect the network.
As anyone in the Information Technology industry is aware it is important to protect the environment and to say that this book could not help in that protection is a clear understatement. I believe that anyone from the "small business jack of all trade IT person" to the "corporate IT Network Specialist" could benefit in some manor from this book and the explanations and examples presented. If I was to say there was one thing I would do different on this book is of had it published in a hard bound cover cause Cisco Press has not often published a book that does not have a clear basis for use and this book is no except to that, thus I believe it would be a benefit and often used book of any network individuals library.