Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

CCNA Voice Official Exam Certification Guide (640-460 IIUC)

CCNA Voice Official Exam Certification Guide (640-460 IIUC)2009

Jeremy Cioara

4.0(19)on Goodreads

About this book

Master IIUC 640-460 exam topics with the official study guideAssess your knowledge with chapter-opening quizzesReview key concepts with Exam Preparation TasksPractice with realistic exam questions on the CD-ROMCisco Secure Firewall Services Module (FWSM)Best practices for securing networks with FWSMRay Blair, CCIE® No. 7050Arvind Durai, CCIE No. 7016The Firewall Services Module (FWSM) is a high-performance stateful-inspection firewall that integrates into the Cisco® 6500 switch and 7600 router chassis. The FWSM monitors traffic flows using application inspection engines to provide a strong level of network security. The FWSM defines the security parameter and enables the enforcement of security policies through authentication, access control lists, and protocol inspection. The FWSM is a key component to anyone deploying network security.Cisco Secure Firewall Services Module (FWSM) covers all aspects of the FWSM. The book provides a detailed look at how the FWSM processes information, as well as installation advice, configuration details, recommendations for network integration, and reviews of operation and management. This book provides you with a single source that comprehensively answers how and why the FWSM functions as it does. This information enables you to successfully deploy the FWSM and gain the greatest functional benefit from your deployment. Practical examples throughout show you how other customers have successfully deployed the FWSM.By reading this book, you will learn how the FWSM functions, the differences between the FWSM and the ASA Security Appliance, how to implement and maintain the FWSM, the latest features of the FWSM, and how to configure common installations.Ray Blair, CCIE® No. 7050, is a consulting systems architect who has been with Cisco for more than 8 years, working primarily on security and large network designs. He has 20 years of experience in designing, implementing, and maintaining networks that have included nearly all networking technologies. Mr. Blair maintains three CCIE certifications in Routing and Switching, Security, and Service Provider. He is also a CNE and a CISSP.Arvind Durai, CCIE No. 7016, is an advanced services technical leader for Cisco. His primary responsibility has been in supporting major Cisco customers in the enterprise sector. One of his focuses has been on security, and he has authored several white papers and design guides in various technologies. Mr. Durai maintains two CCIE certifications, in Routing and Switching and Security.Understand modes of operation, security levels, and contexts for the FWSMConfigure routing protocols and the host-chassis to support the FWSMDeploy ACLs and Authentication, Authorization, and Accounting (AAA)Apply class and policy mapsConfigure multiple FWSMs for failover supportConfigure application and protocol inspectionFilter traffic using filter servers, ActiveX, and Java filtering functionsLearn how IP multicast and the FWSM interactIncrease performance with firewall load balancingConfigure IPv6 and asymmetric routingMitigate network attacks using shunning, anti-spoofing, connection limits, and timeoutsExamine network design, management, and troubleshooting best practicesThis security book is part of the Cisco Press® Networking Technology series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks …This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version.

Details

First published
2009
OL Work ID
OL15171337W

Subjects

Computer TechnologyNonfiction

Find this book

GoodreadsOpen Library
Book data from Open Library. Cover images courtesy of Open Library.