This chapter explains how to deploy perimeter protection for your network using the ASA/PIX Security Appliance. This chapter addresses the following topics:
By this point in the book, you have completed the steps to connect your network to the Internet, deploy public services, and lock down authentication on your network devices and services. The next step, which is addressed in this chapter, is to lock down the perimeter of your network. The following are the four steps you need to accomplish to lock down your network perimeter using the ASA/PIX Security Appliance:
Because the ASA/PIX is shipped pre-optimized for perimeter protection, you might be surprised at how little you need to do to deploy additional perimeter security. |