Flylib.com
Securing Your Business with Cisco ASA and PIX Firewalls
Securing Your Business with Cisco ASA and PIX Firewalls
ISBN: 1587052148
EAN: 2147483647
Year: 2006
Pages: 120
Authors:
Greg Abelar
BUY ON AMAZON
Securing Your Business with Cisco ASA and PIX Firewalls
Table of Contents
Copyright
About the Author
About the Technical Reviewers
Acknowledgments
Icons Used in This Book
Command Syntax Conventions
Foreword
Introduction
Goals and Methods
Who Should Read This Book?
How This Book Is Organized
Part I: Network Security and the ASAPIX Security Appliance
Chapter 1. Internet Security 101
Network Attacks: A Serious Problem
Assessing Your Vulnerability to Network Attacks
Attack Impact
Attackers
Protecting Yourself and Your Business
Summary
Chapter 2. Principles of Network Defense
Understanding Defense in Depth
Defense-in-Depth Implementation Details
Network Intrusion Prevention
Additional Security Best Practices
Summary
Chapter 3. Getting Started with the ASAPIX Security Appliance
Cisco ASAPIX Security Appliance Overview
Models
Installing the ASAPIX Security Appliance
Booting the ASAPIX Security Appliance
Troubleshooting
Installing the ASAPIX Software
Summary
Chapter 4. Exploring the Adaptive Security Device Manager
Exploring the GUI
Summary
Part II: Securing Network Infrastructures with ASDM
Chapter 5. Deploying Secure Internet Connectivity
Introducing the ASDM Startup Wizard
Basic Network Topology
Using the ASDM Startup Wizard
Summary
Chapter 6. Deploying Web and Mail Services
Review of Your Current Network Topology
Designing the Network Topology to Include Web and Mail Services
Use the ASDM Startup Wizard to Deploy Web and Mail Services
Summary
Chapter 7. Deploying Authentication
Defining Authentication
The Purpose of Authentication
Implementing Authentication
Summary
Chapter 8. Deploying Perimeter Protection
Perimeter Protocol Enforcement
Customizing Protocol Inspections
Perimeter Traffic Filtering
Perimeter Denial-of-Service Protection
Summary
Chapter 9. Deploying Network Intrusion Prevention
What Is Intrusion Prevention?
Deploying Intrusion Prevention on the ASAPIX
Summary
Chapter 10. Deploying Host Intrusion Prevention
Why Use Host Intrusion Prevention
CSA Internals
Implementing Host Intrusion Prevention
Virus Scanners and CSA: The Complete Solution
Summary
Chapter 11. Deploying VPNs
Understanding Virtual Private Networks
Implementing VPN Using ASDM
Monitoring VPN Usage with ASDM
Summary
Part III: Appendixes
Appendix A. Deploying Effective Security Management
Layer 2 Best Practices
Authentication Best Practices
Perimeter Best Practices
Intrusion Prevention Best Practices
Host Intrusion Prevention Best Practices
VPN Best Practices
Event Logging Best Practices
Appendix B. ASAPIX Version 7 Advanced Features
Authentication Enhancements
Perimeter Protection Enhancements
Intrusion Prevention Enhancements
Security Management
VPN Enhancements
General Security Appliance Enhancements
Appendix C. ASAPIX Version 7 and ASDM Software Recovery
Obtaining the ASAPIX Version 7 and ASDM Software
Prepare Your PC for an ASAPIX Upgrade
Preparing ASAPIX Security Appliance for Software Recovery
Recovering the ASAPIX to Version 7
Installing ASDM 5.0 on the ASAPIX Security Appliance
Index
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
Securing Your Business with Cisco ASA and PIX Firewalls
ISBN: 1587052148
EAN: 2147483647
Year: 2006
Pages: 120
Authors:
Greg Abelar
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Connecting to an Oracle Database
Mapping .NET Data Provider Data Types to .NET Framework Data Types
Updating Server Data Using .NET Remoting
Exporting the Results of a Query to an Array
Working with XML
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 2.1 Use the OpenSSH Tool Suite to Replace Clear-Text Programs
Step 4.3 How to Generate a Key Pair Using OpenSSH
Step 6.3 X11 Forwarding
Conclusion
Appendix - Sample sshd_config File
A+ Fast Pass
Domain 1 Installation, Configuration, and Upgrading
Domain 5 Printers
Domain 1 Operating System Fundamentals
Domain 3 Diagnosing and Troubleshooting
Domain 4 Networks
Introduction to 80x86 Assembly Language and Computer Architecture
Representing Data in a Computer
Parts of a Computer System
Basic Instructions
Appendix B Useful MS-DOS Commands
Appendix C MASM 6.11 Reserved Words
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Crash Course in the Internet Protocol Suite
Unauthorized Activity II
Tcpdump
IDS and IPS Internals
Snort
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Executing SQL*Plus Commands
Totals and Subtotals
Resetting Your SQL*Plus Environment
Reloading the Data
iSQL*Plus User Preferences
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies