Table of Contents


book cover
Securing Your Business with Cisco ASA and PIX Firewalls
By Greg Abelar
...............................................
Publisher: Cisco Press
Pub Date: May 27, 2005
ISBN: 1-58705-214-8
Pages: 288
 

Table of Contents  | Index


   Copyright
   About the Author
      About the Technical Reviewers
   Acknowledgments
   Icons Used in This Book
      Command Syntax Conventions
   Foreword
   Introduction
      Goals and Methods
      Who Should Read This Book?
      How This Book Is Organized
   Part I.  Network Security and the ASA/PIX Security Appliance
        Chapter 1.  Internet Security 101
      Network Attacks: A Serious Problem
      Assessing Your Vulnerability to Network Attacks
      Attack Impact
      Attackers
      Protecting Yourself and Your Business
      Summary
        Chapter 2.  Principles of Network Defense
      Understanding Defense in Depth
      Defense-in-Depth Implementation Details
      Network Intrusion Prevention
      Additional Security Best Practices
      Summary
        Chapter 3.  Getting Started with the ASA/PIX Security Appliance
      Cisco ASA/PIX Security Appliance Overview
      Models
      Installing the ASA/PIX Security Appliance
      Booting the ASA/PIX Security Appliance
      Troubleshooting
      Installing the ASA/PIX Software
      Summary
        Chapter 4.  Exploring the Adaptive Security Device Manager
      Exploring the GUI
      Summary
   Part II.  Securing Network Infrastructures with ASDM
        Chapter 5.  Deploying Secure Internet Connectivity
      Introducing the ASDM Startup Wizard
      Basic Network Topology
      Using the ASDM Startup Wizard
      Summary
        Chapter 6.  Deploying Web and Mail Services
      Review of Your Current Network Topology
      Designing the Network Topology to Include Web and Mail Services
      Use the ASDM Startup Wizard to Deploy Web and Mail Services
      Summary
        Chapter 7.  Deploying Authentication
      Defining Authentication
      The Purpose of Authentication
      Implementing Authentication
      Summary
        Chapter 8.  Deploying Perimeter Protection
      Perimeter Protocol Enforcement
      Customizing Protocol Inspections
      Perimeter Traffic Filtering
      Perimeter Denial-of-Service Protection
      Summary
        Chapter 9.  Deploying Network Intrusion Prevention
      What Is Intrusion Prevention?
      Deploying Intrusion Prevention on the ASA/PIX
      Summary
        Chapter 10.  Deploying Host Intrusion Prevention
      Why Use Host Intrusion Prevention
      CSA Internals
      Implementing Host Intrusion Prevention
      Virus Scanners and CSA: The Complete Solution
      Summary
        Chapter 11.  Deploying VPNs
      Understanding Virtual Private Networks
      Implementing VPN Using ASDM
      Monitoring VPN Usage with ASDM
      Summary
   Part III.  Appendixes
        Appendix A.  Deploying Effective Security Management
      Layer 2 Best Practices
      Authentication Best Practices
      Perimeter Best Practices
      Intrusion Prevention Best Practices
      Host Intrusion Prevention Best Practices
      VPN Best Practices
      Event Logging Best Practices
        Appendix B.  ASA/PIX Version 7 Advanced Features
      Authentication Enhancements
      Perimeter Protection Enhancements
      Intrusion Prevention Enhancements
      Security Management
      VPN Enhancements
      General Security Appliance Enhancements
        Appendix C.  ASA/PIX Version 7 and ASDM Software Recovery
      Obtaining the ASA/PIX Version 7 and ASDM Software
      Prepare Your PC for an ASA/PIX Upgrade
      Preparing ASA/PIX Security Appliance for Software Recovery
      Recovering the ASA/PIX to Version 7
      Installing ASDM 5.0 on the ASA/PIX Security Appliance
   Index


Securing Your Business with Cisco ASA and PIX Firewalls
Securing Your Business with Cisco ASA and PIX Firewalls
ISBN: 1587052148
EAN: 2147483647
Year: 2006
Pages: 120
Authors: Greg Abelar

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net