Chapter 6. Deploying Web and Mail Services


This chapter provides you with all the necessary information to successfully use the ASDM Startup Wizard for adding both a web server and a mail server to your Internet deployment.

This chapter addresses the following topics:

  • Reviewing Your Current Network Topology This section is a review of the network topology deployed in Chapter 5, "Deploying Secure Internet Connectivity."

  • Updating Your Network Topology to Include Web and Mail Services This section discusses the addition of a web server and a mail server to your network topology. You use basic concepts to make it as easy and secure as possible, enabling you to move forward with your security appliance and Internet deployment.

  • Using the ASDM Startup Wizard to Add Web and Mail Internet Services to Your ASA/PIX Security Appliance This section provides step-by-step instructions on how to use ASDM to add both a web server and a mail server to your network.

If your business has no intention of hosting a web server or mail server on the inside of your network, you can skip this chapter unless, of course, you want to know how to do it just out of curiosity. Whether you plan to deploy a web or mail server, read Chapters 7 through 11 and continue your deployment of defense in depth to ensure that your network is as secure as possible.

This chapter is a step-by-step procedure explaining how to use the ASDM Startup Wizard to securely add a web server and a mail server to your network topology.

Upon completion of the steps outlined in this chapter, you will have achieved the following:

  • Secure access to the Internet

  • Protection from Internet-sourced attacks against the hosts on the inside of your network

  • Secure deployment of a web server and a mail server that can be accessed by other Internet users

  • Protection of your security appliance and servers from denial-of-service and other Internet-based attacks

Chapters 7 through 11 cover how to use ASDM (and host intrusion prevention software) to deploy defense in depth and additional security best practices within your network:

  • Chapter 7, "Deploying Authentication"

  • Chapter 8, "Deploying Perimeter Protection"

  • Chapter 9, "Deploying Network Intrusion Prevention"

  • Chapter 10, "Deploying Host Intrusion Prevention"

  • Chapter 11, "Deploying VPNs"



Securing Your Business with Cisco ASA and PIX Firewalls
Securing Your Business with Cisco ASA and PIX Firewalls
ISBN: 1587052148
EAN: 2147483647
Year: 2006
Pages: 120
Authors: Greg Abelar

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net