In this chapter, you learn how to deploy authentication, the first layer of defense in depth, as described in Chapter 2, "Principles of Network Defense." This chapter addresses the following topics:
Now that you have completed the initial configuration of the ASA/PIX, you must start securing the security appliance so that an attacker cannot compromise the device. You can do this with the first layer of defense in depth, described in Chapter 2, called authentication. This chapter explains authentication and provides a step-by-step procedure on how to secure your security appliance from unauthorized access from both inside and outside of your network. As well as covering how to authenticate users to access the ASA/PIX Security Appliance, this chapter explains how to use the security appliance to authenticate inside users and Internet users requesting certain access, such as web services. |