text.skipToContent text.skipToNavigation

Firewall Fundamentals, 1st edition

  • Wes Noonan
  • Ido Dubrawsky

Published by Cisco Press (June 2nd 2006) - Copyright © 2006

1st edition

Chosen format
View all
Firewall Fundamentals

ISBN-13: 9780132798341

Includes: Instant Access

This product is not available in your country

What's included

  • Instant Access

    You'll get instant access to the digital content.


The essential guide to understanding and using firewalls to protect personal computers and your network

  • An easy-to-read introduction to the most commonly deployed network security device
  • Understand the threats firewalls are designed to protect against
  • Learn basic firewall architectures, practical deployment scenarios, and common management and troubleshooting tasks
  • Includes configuration, deployment, and management checklists

Increasing reliance on the Internet in both work and home environments has radically increased the vulnerability of computing systems to attack from a wide variety of threats. Firewall technology continues to be the most prevalent form of protection against existing and new threats to computers and networks. A full understanding of what firewalls can do, how they can be deployed to maximum effect, and the differences among firewall types can make the difference between continued network integrity and complete network or computer failure. Firewall Fundamentals introduces readers to firewall concepts and explores various commercial and open source firewall implementations--including Cisco, Linksys, and Linux--allowing network administrators and small office/home office computer users to effectively choose and configure their devices. Firewall Fundamentals is written in clear and easy-to-understand language and helps novice users understand what firewalls are and how and where they are used. It introduces various types of firewalls, first conceptually and then by explaining how different firewall implementations actually work. It also provides numerous implementation examples, demonstrating the use of firewalls in both personal and business-related scenarios, and explains how a firewall should be installed and configured. Additionally, generic firewall troubleshooting methodologies and common management tasks are clearly defined and explained.

Table of contents


Part 1      Introduction to Firewalls3

Chapter 1 Introduction to Firewalls

What Is a Firewall?

What Can Firewalls Do?

     Firewalls Manage and Control Network Traffic

     Firewalls Authenticate Access

     Firewalls Act as an Intermediary

     Firewalls Protect Resources

     Firewalls Record and Report on Events

What Are the Threats?

     Targeted Versus Untargeted Attacks

     Viruses, Worms, and Trojans

     Malicious Content and Malware

     Denial of Service


     Compromise of Personal Information and Spyware

     Social Engineering

     New Attack Vectors

     Insecure/Poorly Designed Applications

What Are the Motives?

Security Policies

     Examples of Security Policies

     Firewalls and Trust

Determining If You Need a Firewall


Chapter 2 Firewall Basics

Firewall Taxonomy

     Personal Firewalls

     Network Firewalls

Firewall Products

     Software Firewalls

     Appliance Firewalls

     Integrated Firewalls

Firewall Technologies

     Personal Firewalls

     Packet Filters

     NAT Firewalls

     Circuit-Level Firewalls

     Proxy Firewalls

     Stateful Firewalls

     Transparent Firewalls

     Virtual Firewalls

Open and Closed Source Firewalls


Chapter 3 TCP/IP for Firewalls

Protocols, Services, and Applications

     The OSI Model

     The Department of Defense (DoD) Model

     How Firewalls Use Protocols, Applications, and Services

Internet Protocol (IP)

     IP Packet Structure

     The IP Packet Header


For teachers

All the material you need to teach your courses.

Discover teaching material