版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。
http://blog.csdn.net/topmvp - topmvp
*Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic
*Configure firewall interfaces, routing, IP addressing services, and IP multicast support
*Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP
*Authenticate, authorize, and maintain accounting records for firewall users
*Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning
*Define security policies that identify and act on various types of traffic with the Modular Policy Framework
*Increase firewall availability with firewall failover operation
*Understand how firewall load balancing works
*Generate firewall activity logs and learn how to analyze the contents of the log
*Verify firewall operation and connectivity and observe data passing through a firewall
*Configure Security Services Modules, such as the Content Security Control (CSC) module and the Advanced Inspection Processor (AIP) module
http://rapidshare.com/files/67288288/1587054574.zip
http://depositfiles.com/files/2254648
*Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic
*Configure firewall interfaces, routing, IP addressing services, and IP multicast support
*Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP
*Authenticate, authorize, and maintain accounting records for firewall users
*Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning
*Define security policies that identify and act on various types of traffic with the Modular Policy Framework
*Increase firewall availability with firewall failover operation
*Understand how firewall load balancing works
*Generate firewall activity logs and learn how to analyze the contents of the log
*Verify firewall operation and connectivity and observe data passing through a firewall
*Configure Security Services Modules, such as the Content Security Control (CSC) module and the Advanced Inspection Processor (AIP) module
http://rapidshare.com/files/67288288/1587054574.zip
http://depositfiles.com/files/2254648