Flylib.com
Securing Your Business with Cisco ASA and PIX Firewalls
Securing Your Business with Cisco ASA and PIX Firewalls
ISBN: 1587052148
EAN: 2147483647
Year: 2006
Pages: 120
Authors:
Greg Abelar
BUY ON AMAZON
Securing Your Business with Cisco ASA and PIX Firewalls
Table of Contents
Copyright
About the Author
About the Technical Reviewers
Acknowledgments
Icons Used in This Book
Command Syntax Conventions
Foreword
Introduction
Goals and Methods
Who Should Read This Book?
How This Book Is Organized
Part I: Network Security and the ASAPIX Security Appliance
Chapter 1. Internet Security 101
Network Attacks: A Serious Problem
Assessing Your Vulnerability to Network Attacks
Attack Impact
Attackers
Protecting Yourself and Your Business
Summary
Chapter 2. Principles of Network Defense
Understanding Defense in Depth
Defense-in-Depth Implementation Details
Network Intrusion Prevention
Additional Security Best Practices
Summary
Chapter 3. Getting Started with the ASAPIX Security Appliance
Cisco ASAPIX Security Appliance Overview
Models
Installing the ASAPIX Security Appliance
Booting the ASAPIX Security Appliance
Troubleshooting
Installing the ASAPIX Software
Summary
Chapter 4. Exploring the Adaptive Security Device Manager
Exploring the GUI
Summary
Part II: Securing Network Infrastructures with ASDM
Chapter 5. Deploying Secure Internet Connectivity
Introducing the ASDM Startup Wizard
Basic Network Topology
Using the ASDM Startup Wizard
Summary
Chapter 6. Deploying Web and Mail Services
Review of Your Current Network Topology
Designing the Network Topology to Include Web and Mail Services
Use the ASDM Startup Wizard to Deploy Web and Mail Services
Summary
Chapter 7. Deploying Authentication
Defining Authentication
The Purpose of Authentication
Implementing Authentication
Summary
Chapter 8. Deploying Perimeter Protection
Perimeter Protocol Enforcement
Customizing Protocol Inspections
Perimeter Traffic Filtering
Perimeter Denial-of-Service Protection
Summary
Chapter 9. Deploying Network Intrusion Prevention
What Is Intrusion Prevention?
Deploying Intrusion Prevention on the ASAPIX
Summary
Chapter 10. Deploying Host Intrusion Prevention
Why Use Host Intrusion Prevention
CSA Internals
Implementing Host Intrusion Prevention
Virus Scanners and CSA: The Complete Solution
Summary
Chapter 11. Deploying VPNs
Understanding Virtual Private Networks
Implementing VPN Using ASDM
Monitoring VPN Usage with ASDM
Summary
Part III: Appendixes
Appendix A. Deploying Effective Security Management
Layer 2 Best Practices
Authentication Best Practices
Perimeter Best Practices
Intrusion Prevention Best Practices
Host Intrusion Prevention Best Practices
VPN Best Practices
Event Logging Best Practices
Appendix B. ASAPIX Version 7 Advanced Features
Authentication Enhancements
Perimeter Protection Enhancements
Intrusion Prevention Enhancements
Security Management
VPN Enhancements
General Security Appliance Enhancements
Appendix C. ASAPIX Version 7 and ASDM Software Recovery
Obtaining the ASAPIX Version 7 and ASDM Software
Prepare Your PC for an ASAPIX Upgrade
Preparing ASAPIX Security Appliance for Software Recovery
Recovering the ASAPIX to Version 7
Installing ASDM 5.0 on the ASAPIX Security Appliance
Index
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
Securing Your Business with Cisco ASA and PIX Firewalls
ISBN: 1587052148
EAN: 2147483647
Year: 2006
Pages: 120
Authors:
Greg Abelar
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
Challenging the Unpredictable: Changeable Order Management Systems
ERP System Acquisition: A Process Model and Results From an Austrian Survey
Enterprise Application Integration: New Solutions for a Solved Problem or a Challenging Research Field?
Healthcare Information: From Administrative to Practice Databases
Development of Interactive Web Sites to Enhance Police/Community Relations
Interprocess Communications in Linux: The Nooks and Crannies
Real and Effective User and Group IDs
File System Information
File Information
Key Terms and Concepts
Exiting a Thread
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Dial Plan Considerations
Step 4: Configuring Extensions and Phones
Summary
Missing Transfer Patterns
Tracing a Call Flow in the AA
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Tools
Computers as Persuasive Social Actors
Credibility and Computers
Increasing Persuasion through Mobility and Connectivity
Captology Looking Forward
Junos Cookbook (Cookbooks (OReilly))
Choosing Primary and Preferred Interface Addresses
Configuring Ethernet Interfaces
Filtering Traffic Transiting the Router
Mitigating Route Instabilities with Route Flap Damping
Configuring PIM-SM
DNS & BIND Cookbook
Configuring a Name Server as Slave for All of Your Zones
Monitoring a Name Server
Setting Up a Backup Primary Master Name Server
Changing Your Zones Name Servers
Logging Dynamic Updates
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies