Chapter 7. Deploying Authentication


In this chapter, you learn how to deploy authentication, the first layer of defense in depth, as described in Chapter 2, "Principles of Network Defense."

This chapter addresses the following topics:

  • Defining Authentication This section provides a brief description of authentication.

  • Purpose of Authentication This section explains why you need authentication in your network.

  • Deploying Authentication This section explains how you can use ASDM to deploy authentication at different levels in your network.

Now that you have completed the initial configuration of the ASA/PIX, you must start securing the security appliance so that an attacker cannot compromise the device. You can do this with the first layer of defense in depth, described in Chapter 2, called authentication. This chapter explains authentication and provides a step-by-step procedure on how to secure your security appliance from unauthorized access from both inside and outside of your network.

As well as covering how to authenticate users to access the ASA/PIX Security Appliance, this chapter explains how to use the security appliance to authenticate inside users and Internet users requesting certain access, such as web services.



Securing Your Business with Cisco ASA and PIX Firewalls
Securing Your Business with Cisco ASA and PIX Firewalls
ISBN: 1587052148
EAN: 2147483647
Year: 2006
Pages: 120
Authors: Greg Abelar

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net