Securing Your Business with Cisco ASA and PIX Firewalls

 

book cover
Securing Your Business with Cisco ASA and PIX Firewalls
By Greg Abelar
...............................................
Publisher: Cisco Press
Pub Date: May 27, 2005
ISBN: 1-58705-214-8
Pages: 288
 

Table of Contents  | Index

overview
The easy-to-use guide for learning how to secure networks with the world-class PIX Firewall Ideal for network administrators with little or no firewall experience Easily explains how to implement a security system in small and medium businesses or at home using graphical PIX Device Manager (PDM) Presents best practices for locking down network devices, including routers, switches, hosts, and servers Covers PIX 7.0 and the most recent version of PDMAll networks need a strong security solution to prevent against the devastation of worms, viruses, and malicious intruders, but the reality is that small and medium businesses do not have the resources to invest in adequate security training. These businesses need a security solution that is simple to learn and easy to implement. Cisco PIX Device Manager (PDM) is a feature-rich, graphical management system that provides administrators with an easy-to-use interface for Cisco PIX security devices. PDM simplifies the configuration, operation, and monitoring of Cisco PIX security appliances.Securing Your Business Using PIX Device Manager helps readers secure small and medium-sized networks from network intrusions using PDM, the PIX Firewall, and Cisco Security Agent. Aimed at the beginner network security administrator, it is written in simple language and avoids technical jargon. The book starts by explaining how hackers operate and discusses how to protect against hacking attacks. Step-by-step instructions for entering commands into the graphical interface are interlaced with explanations of what attacks and network threats are mitigated with the commands. Upon reading this book, users will understand in simple terms the threats to their networks, the tools and commands used to mitigate such threats, and any exposures that may be outstanding when features are not in use.

 

book cover
Securing Your Business with Cisco ASA and PIX Firewalls
By Greg Abelar
...............................................
Publisher: Cisco Press
Pub Date: May 27, 2005
ISBN: 1-58705-214-8
Pages: 288
 

Table of Contents  | Index


   Copyright
   About the Author
      About the Technical Reviewers
   Acknowledgments
   Icons Used in This Book
      Command Syntax Conventions
   Foreword
   Introduction
      Goals and Methods
      Who Should Read This Book?
      How This Book Is Organized
   Part I.  Network Security and the ASA/PIX Security Appliance
        Chapter 1.  Internet Security 101
      Network Attacks: A Serious Problem
      Assessing Your Vulnerability to Network Attacks
      Attack Impact
      Attackers
      Protecting Yourself and Your Business
      Summary
        Chapter 2.  Principles of Network Defense
      Understanding Defense in Depth
      Defense-in-Depth Implementation Details
      Network Intrusion Prevention
      Additional Security Best Practices
      Summary
        Chapter 3.  Getting Started with the ASA/PIX Security Appliance
      Cisco ASA/PIX Security Appliance Overview
      Models
      Installing the ASA/PIX Security Appliance
      Booting the ASA/PIX Security Appliance
      Troubleshooting
      Installing the ASA/PIX Software
      Summary
        Chapter 4.  Exploring the Adaptive Security Device Manager
      Exploring the GUI
      Summary
   Part II.  Securing Network Infrastructures with ASDM
        Chapter 5.  Deploying Secure Internet Connectivity
      Introducing the ASDM Startup Wizard
      Basic Network Topology
      Using the ASDM Startup Wizard
      Summary
        Chapter 6.  Deploying Web and Mail Services
      Review of Your Current Network Topology
      Designing the Network Topology to Include Web and Mail Services
      Use the ASDM Startup Wizard to Deploy Web and Mail Services
      Summary
        Chapter 7.  Deploying Authentication
      Defining Authentication
      The Purpose of Authentication
      Implementing Authentication
      Summary
        Chapter 8.  Deploying Perimeter Protection
      Perimeter Protocol Enforcement
      Customizing Protocol Inspections
      Perimeter Traffic Filtering
      Perimeter Denial-of-Service Protection
      Summary
        Chapter 9.  Deploying Network Intrusion Prevention
      What Is Intrusion Prevention?
      Deploying Intrusion Prevention on the ASA/PIX
      Summary
        Chapter 10.  Deploying Host Intrusion Prevention
      Why Use Host Intrusion Prevention
      CSA Internals
      Implementing Host Intrusion Prevention
      Virus Scanners and CSA: The Complete Solution
      Summary
        Chapter 11.  Deploying VPNs
      Understanding Virtual Private Networks
      Implementing VPN Using ASDM
      Monitoring VPN Usage with ASDM
      Summary
   Part III.  Appendixes
        Appendix A.  Deploying Effective Security Management
      Layer 2 Best Practices
      Authentication Best Practices
      Perimeter Best Practices
      Intrusion Prevention Best Practices
      Host Intrusion Prevention Best Practices
      VPN Best Practices
      Event Logging Best Practices
        Appendix B.  ASA/PIX Version 7 Advanced Features
      Authentication Enhancements
      Perimeter Protection Enhancements
      Intrusion Prevention Enhancements
      Security Management
      VPN Enhancements
      General Security Appliance Enhancements
        Appendix C.  ASA/PIX Version 7 and ASDM Software Recovery
      Obtaining the ASA/PIX Version 7 and ASDM Software
      Prepare Your PC for an ASA/PIX Upgrade
      Preparing ASA/PIX Security Appliance for Software Recovery
      Recovering the ASA/PIX to Version 7
      Installing ASDM 5.0 on the ASA/PIX Security Appliance
   Index