Flylib.com
Securing Your Business with Cisco ASA and PIX Firewalls
Securing Your Business with Cisco ASA and PIX Firewalls
ISBN: 1587052148
EAN: 2147483647
Year: 2006
Pages: 120
Authors:
Greg Abelar
BUY ON AMAZON
Securing Your Business with Cisco ASA and PIX Firewalls
Table of Contents
Copyright
About the Author
About the Technical Reviewers
Acknowledgments
Icons Used in This Book
Command Syntax Conventions
Foreword
Introduction
Goals and Methods
Who Should Read This Book?
How This Book Is Organized
Part I: Network Security and the ASAPIX Security Appliance
Chapter 1. Internet Security 101
Network Attacks: A Serious Problem
Assessing Your Vulnerability to Network Attacks
Attack Impact
Attackers
Protecting Yourself and Your Business
Summary
Chapter 2. Principles of Network Defense
Understanding Defense in Depth
Defense-in-Depth Implementation Details
Network Intrusion Prevention
Additional Security Best Practices
Summary
Chapter 3. Getting Started with the ASAPIX Security Appliance
Cisco ASAPIX Security Appliance Overview
Models
Installing the ASAPIX Security Appliance
Booting the ASAPIX Security Appliance
Troubleshooting
Installing the ASAPIX Software
Summary
Chapter 4. Exploring the Adaptive Security Device Manager
Exploring the GUI
Summary
Part II: Securing Network Infrastructures with ASDM
Chapter 5. Deploying Secure Internet Connectivity
Introducing the ASDM Startup Wizard
Basic Network Topology
Using the ASDM Startup Wizard
Summary
Chapter 6. Deploying Web and Mail Services
Review of Your Current Network Topology
Designing the Network Topology to Include Web and Mail Services
Use the ASDM Startup Wizard to Deploy Web and Mail Services
Summary
Chapter 7. Deploying Authentication
Defining Authentication
The Purpose of Authentication
Implementing Authentication
Summary
Chapter 8. Deploying Perimeter Protection
Perimeter Protocol Enforcement
Customizing Protocol Inspections
Perimeter Traffic Filtering
Perimeter Denial-of-Service Protection
Summary
Chapter 9. Deploying Network Intrusion Prevention
What Is Intrusion Prevention?
Deploying Intrusion Prevention on the ASAPIX
Summary
Chapter 10. Deploying Host Intrusion Prevention
Why Use Host Intrusion Prevention
CSA Internals
Implementing Host Intrusion Prevention
Virus Scanners and CSA: The Complete Solution
Summary
Chapter 11. Deploying VPNs
Understanding Virtual Private Networks
Implementing VPN Using ASDM
Monitoring VPN Usage with ASDM
Summary
Part III: Appendixes
Appendix A. Deploying Effective Security Management
Layer 2 Best Practices
Authentication Best Practices
Perimeter Best Practices
Intrusion Prevention Best Practices
Host Intrusion Prevention Best Practices
VPN Best Practices
Event Logging Best Practices
Appendix B. ASAPIX Version 7 Advanced Features
Authentication Enhancements
Perimeter Protection Enhancements
Intrusion Prevention Enhancements
Security Management
VPN Enhancements
General Security Appliance Enhancements
Appendix C. ASAPIX Version 7 and ASDM Software Recovery
Obtaining the ASAPIX Version 7 and ASDM Software
Prepare Your PC for an ASAPIX Upgrade
Preparing ASAPIX Security Appliance for Software Recovery
Recovering the ASAPIX to Version 7
Installing ASDM 5.0 on the ASAPIX Security Appliance
Index
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
Securing Your Business with Cisco ASA and PIX Firewalls
ISBN: 1587052148
EAN: 2147483647
Year: 2006
Pages: 120
Authors:
Greg Abelar
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Optimizing: The Crystal Reports Side
Other Tips
Data Dictionary Report
The Crystal Repository
Appendix A Common Issues
Software Configuration Management
Introduction to Software Configuration Management
Project Management in a CM Environment
The DoD CM Process Model
Configuration Management and Data Management
Metrics and Configuration Management Reference
C++ How to Program (5th Edition)
Scope Rules
Arrays
STL Internet and Web Resources
G.4. Class Keypad
J.11. Intermediate XHTML Tables and Formatting
The Java Tutorial: A Short Course on the Basics, 4th Edition
Creating Classes
How to Throw Exceptions
Using the Streams
Why Is Thread.stop Deprecated?
Path Help
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 1. Get Around http://maps.google.com
Hack 2. Find Yourself (and Others) on Google Maps
Hack 3. Navigate the World in Your Web Browser
Hack 25. Track Your UPS Packages
Hack 42. Get More out of What You Read
Special Edition Using Crystal Reports 10
Introduction
Troubleshooting
The Server Tier: Overview of the Crystal Enterprise Services
Understanding the Java Reporting Components Architecture
Accessing the Java SDK
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies