| | Copyright |
| | About the Author |
| | | About the Technical Reviewers |
| | Acknowledgments |
| | Icons Used in This Book |
| | | Command Syntax Conventions |
| | Foreword |
| | Introduction |
| | | Goals and Methods |
| | | Who Should Read This Book? |
| | | How This Book Is Organized |
| | Part I. Network Security and the ASA/PIX Security Appliance |
| | | Chapter 1. Internet Security 101 |
| | | Network Attacks: A Serious Problem |
| | | Assessing Your Vulnerability to Network Attacks |
| | | Attack Impact |
| | | Attackers |
| | | Protecting Yourself and Your Business |
| | | Summary |
| | | Chapter 2. Principles of Network Defense |
| | | Understanding Defense in Depth |
| | | Defense-in-Depth Implementation Details |
| | | Network Intrusion Prevention |
| | | Additional Security Best Practices |
| | | Summary |
| | | Chapter 3. Getting Started with the ASA/PIX Security Appliance |
| | | Cisco ASA/PIX Security Appliance Overview |
| | | Models |
| | | Installing the ASA/PIX Security Appliance |
| | | Booting the ASA/PIX Security Appliance |
| | | Troubleshooting |
| | | Installing the ASA/PIX Software |
| | | Summary |
| | | Chapter 4. Exploring the Adaptive Security Device Manager |
| | | Exploring the GUI |
| | | Summary |
| | Part II. Securing Network Infrastructures with ASDM |
| | | Chapter 5. Deploying Secure Internet Connectivity |
| | | Introducing the ASDM Startup Wizard |
| | | Basic Network Topology |
| | | Using the ASDM Startup Wizard |
| | | Summary |
| | | Chapter 6. Deploying Web and Mail Services |
| | | Review of Your Current Network Topology |
| | | Designing the Network Topology to Include Web and Mail Services |
| | | Use the ASDM Startup Wizard to Deploy Web and Mail Services |
| | | Summary |
| | | Chapter 7. Deploying Authentication |
| | | Defining Authentication |
| | | The Purpose of Authentication |
| | | Implementing Authentication |
| | | Summary |
| | | Chapter 8. Deploying Perimeter Protection |
| | | Perimeter Protocol Enforcement |
| | | Customizing Protocol Inspections |
| | | Perimeter Traffic Filtering |
| | | Perimeter Denial-of-Service Protection |
| | | Summary |
| | | Chapter 9. Deploying Network Intrusion Prevention |
| | | What Is Intrusion Prevention? |
| | | Deploying Intrusion Prevention on the ASA/PIX |
| | | Summary |
| | | Chapter 10. Deploying Host Intrusion Prevention |
| | | Why Use Host Intrusion Prevention |
| | | CSA Internals |
| | | Implementing Host Intrusion Prevention |
| | | Virus Scanners and CSA: The Complete Solution |
| | | Summary |
| | | Chapter 11. Deploying VPNs |
| | | Understanding Virtual Private Networks |
| | | Implementing VPN Using ASDM |
| | | Monitoring VPN Usage with ASDM |
| | | Summary |
| | Part III. Appendixes |
| | | Appendix A. Deploying Effective Security Management |
| | | Layer 2 Best Practices |
| | | Authentication Best Practices |
| | | Perimeter Best Practices |
| | | Intrusion Prevention Best Practices |
| | | Host Intrusion Prevention Best Practices |
| | | VPN Best Practices |
| | | Event Logging Best Practices |
| | | Appendix B. ASA/PIX Version 7 Advanced Features |
| | | Authentication Enhancements |
| | | Perimeter Protection Enhancements |
| | | Intrusion Prevention Enhancements |
| | | Security Management |
| | | VPN Enhancements |
| | | General Security Appliance Enhancements |
| | | Appendix C. ASA/PIX Version 7 and ASDM Software Recovery |
| | | Obtaining the ASA/PIX Version 7 and ASDM Software |
| | | Prepare Your PC for an ASA/PIX Upgrade |
| | | Preparing ASA/PIX Security Appliance for Software Recovery |
| | | Recovering the ASA/PIX to Version 7 |
| | | Installing ASDM 5.0 on the ASA/PIX Security Appliance |
| | Index |