This appendix provides a short summary of security best practices for you to use when deploying the ASA/PIX Security Appliance in your network. This appendix addresses the following topics:
Congratulations! If you have followed the steps outlined in this book, the layers of defense in depth should be effectively deployed. This appendix highlights some of the best practices that have been discussed in previous chapters as well as some additional best practices that you can implement to improve the security posture of your network. Many of the concepts presented in this appendix are covered in detail in the white paper titled "SAFE: A Security Blueprint for Enterprise Networks" located on the Cisco website at http://www.cisco.com/go/safe. This appendix is a summary by design. The hope is that you can go directly to any topic and immediately find best practice information for any security technology addressed in the previous chapters. |