How This Book Is Organized


The book is divided into three distinct parts. Part I is dedicated to helping you understand security and the technology used to mitigate security risks. Part II guides you through step-by-step procedures of how to deploy ASDM, ASA/PIX version 7, and CSA, which mitigate those security risks. The appendixes in Part III help you to understand the new features of the ASA/PIX version 7 operating system along with some best practices for deploying those features.

The book is intended to be read cover to cover but is flexible enough that if you have experience with security, the PIX Firewall, or the ASA/PIX Security Appliance, you can use a specific chapter as a reference for deploying specific security mitigation technology.

The book is formatted according to the following list of sections and chapters.

  • Part I, "Network Security and the ASA/PIX Security Appliance" This section establishes a foundation of security, firewall, and ASDM knowledge:

    - Chapter 1, "Internet Security 101" This chapter explains the risks associated with doing business on the Internet. It covers how a security attack can impact you or your business and outlines the different ways that an attack can occur.

    - Chapter 2, "Principles of Network Defense" This chapter covers a security defense method called defense in depth, which is the model used in this book for deploying security appliance and host protection.

    - Chapter 3, "Getting Started with the ASA/PIX Security Appliance" This chapter walks you through setting up ASA/PIX Security Appliance and ASDM hardware and software.

    - Chapter 4, "Exploring the Adaptive Security Device Manager" This chapter is an in-depth discussion of the navigation methods and features of ASDM.

  • Part II: "Securing Network Infrastructures with ASDM" This section is a step-by-step deployment guide for deploying defense in depth by using a combination of ASA/PIX version 7 and ASDM.

    - Chapter 5, "Deploying Secure Internet Connectivity" This chapter is a step-by-step deployment guide explaining how to use the ASDM Startup Wizard to connect your business securely to the Internet.

    - Chapter 6, "Deploying Web and Mail Services" This chapter is a step-by-step deployment guide explaining how to use the ASDM Startup Wizard to securely add public devices such as mail or web servers to your network.

    - Chapter 7, "Deploying Authentication" This chapter is a step-by-step deployment guide explaining how to use ASDM to authenticate users of the ASA/PIX Security Appliance and how to authenticate users of public web services.

    - Chapter 8, "Deploying Perimeter Protection" This chapter is a step-by-step deployment guide explaining how to use ASDM to filter only wanted traffic and protect your network from perimeter attacks.

    - Chapter 9, "Deploying Network Intrusion Prevention" This chapter is a step-by-step deployment guide explaining how to use ASDM to deploy intrusion prevention software (IPS). IPS examines the traffic you let into you network in Chapter 8 and ensures that attack traffic is not buried inside the packets.

    - Chapter 10: "Deploying Host Intrusion Prevention" This chapter examines CSA host intrusion prevention software, which is a key element in defense in depth. It covers in detail how CSA works and provides some suggestions for deployment in your environment.

    - Chapter 11: "Deploying VPNs" This chapter provides a step-by-step guide for configuring and monitoring network remote access using the IPSec VPN technology.

  • Part III, "Appendixes" This section outlines the new features of the ASA/PIX version 7 operating system and includes some best practices for deploying those features:

    - Appendix A, "Deploying Effective Security Management" This appendix covers security management best practices to help increase the security posture and effectiveness of your security system.

    - Appendix B, "ASA/PIX Version 7 Advanced Features" This appendix covers the new advanced features available with the ASA/PIX version 7 operating system.

    - Appendix C, "ASA/PIX Version 7 and ASDM Software Recovery" This appendix is a step-by-step procedure of how to recover your security appliance in the event of failure.



Securing Your Business with Cisco ASA and PIX Firewalls
Securing Your Business with Cisco ASA and PIX Firewalls
ISBN: 1587052148
EAN: 2147483647
Year: 2006
Pages: 120
Authors: Greg Abelar

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net