Chapter 1 Types of Firewalls
Understanding Packet-Filtering Firewalls
Understanding Application/Proxy Firewalls
Understanding Reverse-Proxy Firewalls
Utilizing Packet Inspection
Chapter 2 Overview of the Firewall Services Module
Comparing the FWSM to Other Security Devices
Chapter 3 Examining Modes of Operation
Working with Transparent Mode
Chapter 4 Understanding Security Levels
Traffic Flow Between Interfaces
Network Address Translation/Port Address Translation
Chapter 5 Understanding Contexts
Benefits of Multiple Contexts
Disadvantages of Multiple Contexts
Adding and Removing Contexts
Changing Between Contexts
Understanding Resource Management
Part II: Initial Configuration
Chapter 6 Configuring and Securing the 6500/7600 Chassis
Understanding the Interaction Between the Host-Chassis and the FWSM
Securing the 6500/7600 (Host-Chassis)
Chapter 7 Configuring the FWSM
Configuring FWSM in the Switch
Exploring Transparent Mode
Using Multiple Context Mode for FWSM
Configuration Steps for Firewall Services Module
Chapter 8 Access Control Lists
Introducing Types of Access Lists
Understanding Object Groups
Monitoring Access List Resources
Configuring Object Groups and Access Lists
Chapter 9 Configuring Routing Protocols
Supporting Routing Methods
Understanding AAA Components
Comparing Security Protocols
Understanding Two-Step Authentication
Understanding Fallback Support
Understanding Cut-Through Proxy in FWSM
Chapter 11 Modular Policy
Using Modular Policy in FWSM
Understanding Classification of Traffic
Configuring Service Policy
Understanding Default Policy Map
Sample Configuration of Modular Policy in FWSM
Part III: Advanced Configuration
Chapter 12 Understanding Failover in FWSM
Creating Redundancy in the FWSM
Understanding Failover Link and State Link
Requirements for Failover
Synchronizing the Primary and Secondary Firewalls
Configuring Poll Intervals
Design Principle for Monitoring Interfaces
Configuring Single Context FWSM Failover
Configuring Multiple Context FWSM Failover
Chapter 13 Understanding Application Protocol Inspection
Inspecting Hypertext Transfer Protocol
Inspecting File Transfer Protocol
Working with Supported Applications
Working with URLs and FTP
Configuring ActiveX and Java
Chapter 15 Managing and Monitoring the FWSM
Using Adaptive Security Device Manager