Flylib.com
Securing Your Business with Cisco ASA and PIX Firewalls
Securing Your Business with Cisco ASA and PIX Firewalls
ISBN: 1587052148
EAN: 2147483647
Year: 2006
Pages: 120
Authors:
Greg Abelar
BUY ON AMAZON
Securing Your Business with Cisco ASA and PIX Firewalls
Table of Contents
Copyright
About the Author
About the Technical Reviewers
Acknowledgments
Icons Used in This Book
Command Syntax Conventions
Foreword
Introduction
Goals and Methods
Who Should Read This Book?
How This Book Is Organized
Part I: Network Security and the ASAPIX Security Appliance
Chapter 1. Internet Security 101
Network Attacks: A Serious Problem
Assessing Your Vulnerability to Network Attacks
Attack Impact
Attackers
Protecting Yourself and Your Business
Summary
Chapter 2. Principles of Network Defense
Understanding Defense in Depth
Defense-in-Depth Implementation Details
Network Intrusion Prevention
Additional Security Best Practices
Summary
Chapter 3. Getting Started with the ASAPIX Security Appliance
Cisco ASAPIX Security Appliance Overview
Models
Installing the ASAPIX Security Appliance
Booting the ASAPIX Security Appliance
Troubleshooting
Installing the ASAPIX Software
Summary
Chapter 4. Exploring the Adaptive Security Device Manager
Exploring the GUI
Summary
Part II: Securing Network Infrastructures with ASDM
Chapter 5. Deploying Secure Internet Connectivity
Introducing the ASDM Startup Wizard
Basic Network Topology
Using the ASDM Startup Wizard
Summary
Chapter 6. Deploying Web and Mail Services
Review of Your Current Network Topology
Designing the Network Topology to Include Web and Mail Services
Use the ASDM Startup Wizard to Deploy Web and Mail Services
Summary
Chapter 7. Deploying Authentication
Defining Authentication
The Purpose of Authentication
Implementing Authentication
Summary
Chapter 8. Deploying Perimeter Protection
Perimeter Protocol Enforcement
Customizing Protocol Inspections
Perimeter Traffic Filtering
Perimeter Denial-of-Service Protection
Summary
Chapter 9. Deploying Network Intrusion Prevention
What Is Intrusion Prevention?
Deploying Intrusion Prevention on the ASAPIX
Summary
Chapter 10. Deploying Host Intrusion Prevention
Why Use Host Intrusion Prevention
CSA Internals
Implementing Host Intrusion Prevention
Virus Scanners and CSA: The Complete Solution
Summary
Chapter 11. Deploying VPNs
Understanding Virtual Private Networks
Implementing VPN Using ASDM
Monitoring VPN Usage with ASDM
Summary
Part III: Appendixes
Appendix A. Deploying Effective Security Management
Layer 2 Best Practices
Authentication Best Practices
Perimeter Best Practices
Intrusion Prevention Best Practices
Host Intrusion Prevention Best Practices
VPN Best Practices
Event Logging Best Practices
Appendix B. ASAPIX Version 7 Advanced Features
Authentication Enhancements
Perimeter Protection Enhancements
Intrusion Prevention Enhancements
Security Management
VPN Enhancements
General Security Appliance Enhancements
Appendix C. ASAPIX Version 7 and ASDM Software Recovery
Obtaining the ASAPIX Version 7 and ASDM Software
Prepare Your PC for an ASAPIX Upgrade
Preparing ASAPIX Security Appliance for Software Recovery
Recovering the ASAPIX to Version 7
Installing ASDM 5.0 on the ASAPIX Security Appliance
Index
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
Securing Your Business with Cisco ASA and PIX Firewalls
ISBN: 1587052148
EAN: 2147483647
Year: 2006
Pages: 120
Authors:
Greg Abelar
BUY ON AMAZON
CompTIA Project+ Study Guide: Exam PK0-003
IT Project+ Study Guide
Project Initiation
Schedule Planning
Cost Planning
Project Control
The CISSP and CAP Prep Guide: Platinum Edition
Security Architecture and Design
Application Security
Appendix A Answers to Assessment Questions
Appendix E The Information System Security Management Professional (ISSMP) Certification
Appendix G Control Baselines
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Review Questions
Hash Functions
Authentication and Integrity
Summary
Review Questions
Java for RPG Programmers, 2nd Edition
Structured Operations And Statements
String Manipulation
Exceptions
Threads
Database Access
Cisco Voice Gateways and Gatekeepers
Chapter Review Questions
Review Questions
Review Questions
Connecting to the PSTN
Cisco IOS Cookbook (Cookbooks (OReilly))
Compressing Frame Relay Data with Maps
Setting the Clock Period
Debugging NTP
Analyzing ACL Log Entries
PE-CE Communication via BGP
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies