Flylib.com
Securing Your Business with Cisco ASA and PIX Firewalls
Securing Your Business with Cisco ASA and PIX Firewalls
ISBN: 1587052148
EAN: 2147483647
Year: 2006
Pages: 120
Authors:
Greg Abelar
BUY ON AMAZON
Securing Your Business with Cisco ASA and PIX Firewalls
Table of Contents
Copyright
About the Author
About the Technical Reviewers
Acknowledgments
Icons Used in This Book
Command Syntax Conventions
Foreword
Introduction
Goals and Methods
Who Should Read This Book?
How This Book Is Organized
Part I: Network Security and the ASAPIX Security Appliance
Chapter 1. Internet Security 101
Network Attacks: A Serious Problem
Assessing Your Vulnerability to Network Attacks
Attack Impact
Attackers
Protecting Yourself and Your Business
Summary
Chapter 2. Principles of Network Defense
Understanding Defense in Depth
Defense-in-Depth Implementation Details
Network Intrusion Prevention
Additional Security Best Practices
Summary
Chapter 3. Getting Started with the ASAPIX Security Appliance
Cisco ASAPIX Security Appliance Overview
Models
Installing the ASAPIX Security Appliance
Booting the ASAPIX Security Appliance
Troubleshooting
Installing the ASAPIX Software
Summary
Chapter 4. Exploring the Adaptive Security Device Manager
Exploring the GUI
Summary
Part II: Securing Network Infrastructures with ASDM
Chapter 5. Deploying Secure Internet Connectivity
Introducing the ASDM Startup Wizard
Basic Network Topology
Using the ASDM Startup Wizard
Summary
Chapter 6. Deploying Web and Mail Services
Review of Your Current Network Topology
Designing the Network Topology to Include Web and Mail Services
Use the ASDM Startup Wizard to Deploy Web and Mail Services
Summary
Chapter 7. Deploying Authentication
Defining Authentication
The Purpose of Authentication
Implementing Authentication
Summary
Chapter 8. Deploying Perimeter Protection
Perimeter Protocol Enforcement
Customizing Protocol Inspections
Perimeter Traffic Filtering
Perimeter Denial-of-Service Protection
Summary
Chapter 9. Deploying Network Intrusion Prevention
What Is Intrusion Prevention?
Deploying Intrusion Prevention on the ASAPIX
Summary
Chapter 10. Deploying Host Intrusion Prevention
Why Use Host Intrusion Prevention
CSA Internals
Implementing Host Intrusion Prevention
Virus Scanners and CSA: The Complete Solution
Summary
Chapter 11. Deploying VPNs
Understanding Virtual Private Networks
Implementing VPN Using ASDM
Monitoring VPN Usage with ASDM
Summary
Part III: Appendixes
Appendix A. Deploying Effective Security Management
Layer 2 Best Practices
Authentication Best Practices
Perimeter Best Practices
Intrusion Prevention Best Practices
Host Intrusion Prevention Best Practices
VPN Best Practices
Event Logging Best Practices
Appendix B. ASAPIX Version 7 Advanced Features
Authentication Enhancements
Perimeter Protection Enhancements
Intrusion Prevention Enhancements
Security Management
VPN Enhancements
General Security Appliance Enhancements
Appendix C. ASAPIX Version 7 and ASDM Software Recovery
Obtaining the ASAPIX Version 7 and ASDM Software
Prepare Your PC for an ASAPIX Upgrade
Preparing ASAPIX Security Appliance for Software Recovery
Recovering the ASAPIX to Version 7
Installing ASDM 5.0 on the ASAPIX Security Appliance
Index
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
Securing Your Business with Cisco ASA and PIX Firewalls
ISBN: 1587052148
EAN: 2147483647
Year: 2006
Pages: 120
Authors:
Greg Abelar
BUY ON AMAZON
MySQL Stored Procedure Programming
Conditional Execution
Defining a Transaction
Triggers
Conclusion
Executing Stored Programs with DBD::mysql
Certified Ethical Hacker Exam Prep
Ethics and Legality
Summary
Viruses and Worms
Certified Ethical Hacker
Installing ExamGear Special Edition
High-Speed Signal Propagation[c] Advanced Black Magic
Power Ratios
Adaptive Equalization: Accelerant Networks Transceiver
Pcb Connectors
Wavelengths of Operation
Multimode Glass Fiber-Optic Cabling
Oracle Developer Forms Techniques
Ordering by Foreign Key Items in Forms
Using Form and Global Variables
Base Tables
Multi-form Applications
Handling Errors
FileMaker Pro 8: The Missing Manual
Advanced Field Options
Comments
The Importance of the Layout
Script Steps
Putting a Complex Script Together
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Computers as Persuasive Social Actors
Credibility and the World Wide Web
Captology Looking Forward
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies