April 13, 2009, 10:15 AM — What Ray Blair, co-author of Cisco Secure Firewall Services Module (FWSM) likes best about networking technology is that it is continuously changing and there is always more to be learned. But he warns against making things harder for yourself: "Don't troubleshoot alone," says Blair. "A second pair of eyes and ears can be very valuable." Read more of Blair's dos and don'ts below.
This is part of a regular series that highlights new books and their authors. Also in this series: Michael Ogrinz on Mashups, J. Peter Bruzzese on Exchange Server 2007, Joel Scambray on exposing the hacker's advantage, and Scott Hogg on IPv6 security. (You can find all the installments in this series here.)
Who should read this book? Anyone that needs or has a desire to learn how the Firewall Services Module (FWSM) functions, the differences between the FWSM and the ASA Security Appliance, how to implement and maintain the FWSM, the latest features of the FWSM, and how to configure common installations.
What can readers expect to learn? The book provides a detailed look at how the FWSM processes information, as well as installation advice, configuration details, recommendations for network integration, and reviews of operation and management. Readers will learn how and why the FWSM functions as it does, enabling them to successfully deploy the FWSM and gain the greatest functional benefit from their deployment. Practical examples throughout show how other customers have successfully deployed the FWSM.