|       |      |   Copyright  |  
  |       |      |   The CSPFA Cram Sheet  |  
  |       |      |      |   INTRODUCTION TO NETWORK SECURITY THREATS  |  
  |       |      |      |   BASICS OF THE PIX FIREWALL  |  
  |       |      |      |   SETTING UP A PIX FIREWALL  |  
  |       |      |      |   TRANSLATIONS AND CONNECTIONS  |  
  |       |      |      |   ACCESS CONTROL LISTS AND TRAFFIC CONTROL  |  
  |       |      |      |   SYSTEM MANAGEMENT  |  
  |       |      |      |   ADVANCED PROTOCOL HANDLING AND PIX FIREWALL FEATURES  |  
  |       |      |      |   ATTACK GUARDS AND INTRUSION DETECTION  |  
  |       |      |      |   AAA CONFIGURATION  |  
  |       |      |      |   FAILOVER  |  
  |       |      |      |   IPSEC AND VIRTUAL PRIVATE  |  
  |       |      |      |   THE PIX DEVICE MANAGER  |  
  |       |      |      |   ADVANCED MANAGEMENT  |  
  
  |       |      |   A Note from Series Editor Ed Tittel  |  
  |       |      |   About the Author  |  
  |       |      |   About the Technical Editors  |  
  |       |      |   Acknowledgments  |  
  |       |      |   We Want to Hear from You!  |  
  |       |      |   Introduction  |  
  |       |      |      |   Taking a Certification Exam  |  
  |       |      |      |   How to Prepare for an Exam  |  
  |       |      |      |   About This Book  |  
  
  |       |      |   Self-Assessment  |  
  |       |      |      |   PIX Certification in the Real World  |  
  |       |      |      |   Putting Yourself to the Test  |  
  |       |      |      |   Assessing Readiness for the CSPFA Exam  |  
  |       |      |      |   Onward, Through the Fog!  |  
  
  |       |      |   Chapter 1.  Introduction to Cisco Certification  |  
  |       |      |      |   The Exam Situation  |  
  |       |      |      |   Exam Layout and Design  |  
  |       |      |      |   Using Cisco's Exam Software Effectively  |  
  |       |      |      |   Exam-taking Basics  |  
  |       |      |      |   Question-handling Strategies  |  
  |       |      |      |   Mastering the Inner Game  |  
  |       |      |      |   Additional Resources  |  
  
  |       |      |   Chapter 2.  Introduction to Network Security Threats  |  
  |       |      |      |   Network Security Threats  |  
  |       |      |      |   Three Types of Attacks  |  
  |       |      |      |   The Secure Network  |  
  |       |      |      |   Exam Prep Questions  |  
  |       |      |      |   Need to Know More?  |  
  
  |       |      |   Chapter 3.  Basics of the PIX Firewall  |  
  |       |      |      |   Trusted, Untrusted, and DMZ Defined  |  
  |       |      |      |   Areas of a Network  |  
  |       |      |      |   Types of Firewall Filtering Technologies  |  
  |       |      |      |   Cisco PIX Firewall Features  |  
  |       |      |      |   ASA Security Rules  |  
  |       |      |      |   PIX Firewall Models  |  
  |       |      |      |   The Console Port and Basic Connection  |  
  |       |      |      |   Software Licensing and Activation Keys  |  
  |       |      |      |   Licensing  |  
  |       |      |      |   Exam Prep Questions  |  
  |       |      |      |   Need to Know More?  |  
  
  |       |      |   Chapter 4.  Setting Up a PIX Firewall  |  
  |       |      |      |   Factory Default Configurations  |  
  |       |      |      |   CLI Administrative Access Modes  |  
  |       |      |      |   Knowing the General Commands  |  
  |       |      |      |   Viewing and Saving the Configuration  |  
  |       |      |      |   The Six Basic Commands  |  
  |       |      |      |   Using the Six Commands  |  
  |       |      |      |   Working with the Trivial File Transfer Protocol  |  
  |       |      |      |   Configuration Files  |  
  |       |      |      |   Password Recovery  |  
  |       |      |      |   Exam Prep Questions  |  
  |       |      |      |   Need to Know More?  |  
  
  |       |      |   Chapter 5.  Translations and Connections  |  
  |       |      |      |   Transport Protocols (Layer 4)  |  
  |       |      |      |   Private Addresses  |  
  |       |      |      |   Address Translation  |  
  |       |      |      |   Translation ( xlate ) and Connection (conn) Tables  |  
  |       |      |      |   Outbound Traffic  |  
  |       |      |      |   Inbound Traffic  |  
  |       |      |      |   Exam Prep Questions  |  
  |       |      |      |   Need to Know More?  |  
  
  |       |      |   Chapter 6.  Access Control Lists and Traffic Control  |  
  |       |      |      |   Controlling Traffic Coming In  |  
  |       |      |      |   Controlling Traffic Going Out  |  
  |       |      |      |   Turbo ACLs  |  
  |       |      |      |   The Basics of Object Grouping  |  
  |       |      |      |   ICMP Through the PIX Firewall  |  
  |       |      |      |   Exam Prep Questions  |  
  |       |      |      |   Need to Know More?  |  
  
  |       |      |   Chapter 7.  System Management  |  
  |       |      |      |   The Importance of the Date and Time  |  
  |       |      |      |   Setting the Date and Time  |  
  |       |      |      |   Network Time Protocol  |  
  |       |      |      |   Accessing the PIX  |  
  |       |      |      |   Simple Network Management Protocol  |  
  |       |      |      |   Logging PIX Firewall Information  |  
  |       |      |      |   Exam Prep Questions  |  
  |       |      |      |   Need to Know More?  |  
  
  |       |      |   Chapter 8.  Advanced Protocol Handling and PIX Firewall Features  |  
  |       |      |      |   Problems with Advanced Protocols and ASA  |  
  |       |      |      |   The Function of Fixups  |  
  |       |      |      |   The File Transfer Protocol  |  
  |       |      |      |   The Hypertext Transfer Protocol  |  
  |       |      |      |   Remote Shell  |  
  |       |      |      |   SQL*Net Protocol  |  
  |       |      |      |   The Real Time Streaming Protocol  |  
  |       |      |      |   Voice Over IP  |  
  |       |      |      |   Web Traffic Filtering  |  
  |       |      |      |   Filtering Java Applets and ActiveX Scripts  |  
  |       |      |      |   The Dynamic Host Configuration Protocol  |  
  |       |      |      |   The Point-to-Point Protocol over Ethernet  |  
  |       |      |      |   Routing  |  
  |       |      |      |   Exam Prep Questions  |  
  |       |      |      |   Need to Know More?  |  
  
  |       |      |   Chapter 9.  Attack Guards and Intrusion Detection  |  
  |       |      |      |   Attack Guards  |  
  |       |      |      |   Intrusion Detection System  |  
  |       |      |      |   Exam Prep Questions  |  
  |       |      |      |   Need to Know More?  |  
  
  |       |      |   Chapter 10.  AAA Configuration  |  
  |       |      |      |   Introduction to AAA Services  |  
  |       |      |      |   AAA Server Protocols  |  
  |       |      |      |   Cisco Secure Access Control Server  |  
  |       |      |      |   Configuring AAA Services  |  
  |       |      |      |   Downloadable Access Control Lists  |  
  |       |      |      |   Authentication of Other Services and Authentication Issues  |  
  |       |      |      |   General AAA Commands  |  
  |       |      |      |   Exam Prep Questions  |  
  |       |      |      |   Need to Know More?  |  
  
  |       |      |   Chapter 11.  Failover  |  
  |       |      |      |   Introduction to Failover  |  
  |       |      |      |   Cable-based and LAN-based Configurations  |  
  |       |      |      |   Hardware and Software Requirements  |  
  |       |      |      |   Replication  |  
  |       |      |      |   Failover Detection  |  
  |       |      |      |   Fail Back  |  
  |       |      |      |   Failover Configuration  |  
  |       |      |      |   Exam Prep Questions  |  
  |       |      |      |   Need to Know More?  |  
  
  |       |      |   Chapter 12.  IPSec and Virtual Private Networks  |  
  |       |      |      |   The Basics of VPN  |  
  |       |      |      |   VPN Categories  |  
  |       |      |      |   Types of VPNs  |  
  |       |      |      |   Defining Hashing, Encryption, and Keys  |  
  |       |      |      |   Internet Protocol Security  |  
  |       |      |      |   Configuring an IPSec Site-to-Site Connection  |  
  |       |      |      |   Testing and Troubleshooting IPSec  |  
  |       |      |      |   Configuring Remote Access Client VPNs  |  
  |       |      |      |   Scaling VPN Tunnels  |  
  |       |      |      |   Exam Prep Questions  |  
  |       |      |      |   Need to Know More?  |  
  
  |       |      |   Chapter 13.  PIX Device Manager  |  
  |       |      |      |   PIX PDM Requirements  |  
  |       |      |      |   Installing the PDM  |  
  |       |      |      |   Configuring an HTTP Server  |  
  |       |      |      |   Connecting to the PDM  |  
  |       |      |      |   Using the PDM to Configure the PIX Firewall  |  
  |       |      |      |   Exam Prep Questions  |  
  |       |      |      |   Need to Know More?  |  
  
  |       |      |   Chapter 14.  Advance Management  |  
  |       |      |      |   Advanced Management  |  
  |       |      |      |   CiscoWorks  |  
  |       |      |      |   CiscoWorks VPN/Security Management Solution  |  
  |       |      |      |   CiscoWorks Management Center for Firewall  |  
  |       |      |      |   CiscoWorks Auto Update Server  |  
  |       |      |      |   Exam Prep Questions  |  
  |       |      |      |   Need to Know More?  |  
  
  |       |      |   Chapter 15.  Sample Test 1  |  
  |       |      |      |   Questions, Questions, Questions  |  
  |       |      |      |   Picking Proper Answers  |  
  |       |      |      |   Decoding Ambiguity  |  
  |       |      |      |   Working Within the Framework  |  
  |       |      |      |   Deciding What to Memorize  |  
  |       |      |      |   Preparing for the Test  |  
  |       |      |      |   Taking the Test  |  
  
  |       |      |   Chapter 16.  Answer Key 1  |  
  |       |      |   Chapter 17.  Sample Test 2  |  
  |       |      |   Chapter 18.  Answer Key 2  |  
  |       |      |   Appendix A.  Resources  |  
  |       |      |   Appendix B.  What's on the CD-ROM  |  
  |       |      |      |   The PrepLogic Practice Exams, Preview Edition Software  |  
  |       |      |      |   An Exclusive Electronic Version of the Text  |  
  
  |       |      |   Appendix C.  Using the PrepLogic Practice Exams, Preview Edition Software  |  
  |       |      |      |   The Exam Simulation  |  
  |       |      |      |   Question Quality  |  
  |       |      |      |   The Interface Design  |  
  |       |      |      |   The Effective Learning Environment  |  
  |       |      |      |   Software Requirements  |  
  |       |      |      |   Installing PrepLogic Practice Exams, Preview Edition  |  
  |       |      |      |   Removing PrepLogic Practice Exams, Preview Edition from Your Computer  |  
  |       |      |      |   How to Use the Software  |  
  |       |      |      |   Contacting PrepLogic  |  
  |       |      |      |   License Agreement  |  
  
  |       |      |   Glossary  |  
  |       |      |   Index  |