Securing Your Business with Cisco ASA and PIX Firewalls

Securing Your Business with Cisco ASA and PIX Firewalls

4 (1 rating by Goodreads)
By (author) 

List price: US$40.01

Currently unavailable

We can notify you when this item is back in stock

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall, and ASDM hardware and software Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network Authenticate firewall users and users of public web servers Filter traffic and protect your network from perimeter attacks Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response Stop attacks launched at the desktop by deploying Cisco Security Agent Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN) Enhance your security posture through proper security managementUnderstand the advanced features available in the Cisco PIX version 7 operating system Recover from software failure with Cisco PIX version 7Many people view security as a "black-box-voodoo" technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security. Securing Your Business with Cisco ASA and PIX Firewalls is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco (R) ASA and PIX (R) version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network. Securing Your Business with Cisco ASA and PIX Firewalls provides you with complete step-by-step processes for using Cisco ASDM in conjunction with Cisco Security Agent to ensure that your security posture is strong enough to stand up against any network or host attack whether sourced from the Internet or from inside your own network. "Firewalls are a critical part of any integrated network security strategy, and books such as this will help raise awareness of both the threats inherent in today's open, heterogeneous internetworking environments and the solutions that can be applied to make the Internet a safer place."-Martin E. Hellman, professor emeritus of Electrical Engineering, Stanford University and co-inventor of public key cryptography This security book is part of the Cisco Press (R) Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.show more

Product details

  • Paperback | 288 pages
  • 185.4 x 226.1 x 20.3mm | 453.6g
  • Pearson Education (US)
  • Cisco Press
  • Indianapolis, United States
  • English
  • 1587052148
  • 9781587052149
  • 1,311,394

About Greg Abelar

Greg Abelar has been an employee of Cisco Systems (R) since December 1996. He was an original member of the Cisco Technical Assistance Security team, helping to hire and train many of the engineers. He has held various positions in both the Security Architecture and Security Technical Marketing Engineering teams at Cisco. Greg is the primary founder and project manager of the Cisco written CCIE (R) Security exam.show more

Back cover copy

Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall, and ASDM hardware and software Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network Authenticate firewall users and users of public web servers Filter traffic and protect your network from perimeter attacks Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response Stop attacks launched at the desktop by deploying Cisco Security Agent Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN) Enhance your security posture through proper security management Understand the advanced features available in the Cisco PIX version 7 operating system Recover from software failure with Cisco PIX version 7 Many people view security as a "black-box-voodoo" technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security. "Securing Your Business with Cisco ASA and PIX Firewalls "is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco(R) ASA and PIX(R) version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network." Securing Your Business with Cisco ASA and PIX Firewalls "provides you with complete step-by-step processes for using Cisco ASDM in conjunction with Cisco Security Agent to ensure that your security posture is strong enough to stand up against any network or host attack whether sourced from the Internet or from inside your own network. "Firewalls are a critical part of any integrated network security strategy, and books such as this will help raise awareness of both the threats inherent in today's open, heterogeneous internetworking environments and the solutions that can be applied to make the Internet a safer place." -Martin E. Hellman, professor emeritus of Electrical Engineering, Stanford University and co-inventor of public key cryptography This security book is part of the Cisco Press(R) Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.show more

Table of contents

Table of ContentsForewordIntroductionPart I Network Security and the ASA/PIX Security ApplianceChapter 1 Internet Security 101Network Attacks: A Serious ProblemRising Security IncidentsHacking ToolsAssessing Your Vulnerability to Network AttacksAttack ImpactTangible CostsIntangible CostsGovernment Network Security RegulationsAttackersMotivation for AttacksAnatomy of a Computer AttackChoosing VictimsProtecting Yourself and Your BusinessDeveloping a Security PolicySummaryChapter 2 Principles of Network DefenseUnderstanding Defense in DepthStopping a Computer AttackDefense-in-Depth Implementation DetailsAuthentication, Authorization, and AccountingPerimeter SecurityNetwork Intrusion PreventionHost Intrusion PreventionAdditional Security Best PracticesRemote-Access DefenseSecurity Management of the ASA/PIX Security ApplianceSummaryChapter 3 Getting Started with the ASA/PIX Security ApplianceCisco ASA/PIX Security Appliance OverviewDenial-of-Service ProtectionTraffic FilteringInterface Isolation (DMZ Deployment)Stateful Traffic InspectionApplication InspectionUser AuthenticationIntrusion PreventionSecure ManagementEvent LoggingModelsPIX 515EPIX 525PIX 535Cisco ASA 5510 Security ApplianceCisco ASA 5520 Security ApplianceCisco ASA 5540 Security ApplianceInstalling the ASA/PIX Security ApplianceUnderstanding the ASA/PIX Hardware PortsInstalling PowerBooting the ASA/PIX Security ApplianceTroubleshootingInstalling the ASA/PIX SoftwareManual ASA/PIX Version 7 InstallationASA/PIX LicensesInstalling the PIX License KeySummaryChapter 4 Exploring the Adaptive Security Device ManagerExploring the GUIExploring the Pull-Down MenusExploring the Navigation BarSummaryPart II Securing Network Infrastructures with ASDMChapter 5 Deploying Secure Internet ConnectivityIntroducing the ASDM Startup WizardBasic Network TopologyUnderstanding the Elements of Your NetworkUsing the ASDM Startup WizardConnecting to the ASA/PIX Security Appliance with ASDMUsing the ASDM Startup Wizard to Configure the ASA/PIX Security ApplianceSummaryChapter 6 Deploying Web and Mail ServicesReview of Your Current Network TopologyDesigning the Network Topology to Include Web and Mail ServicesLogical Placement of the ServersDefining Inside and Outside Server AddressesDefining ServicesNew TopologyUse the ASDM Startup Wizard to Deploy Web and Mail ServicesConnect the New Servers to the ASA/PIX Security ApplianceConfigure Your ASA/PIX Security Using ASDMSummaryChapter 7 Deploying AuthenticationDefining AuthenticationThe Purpose of AuthenticationImplementing AuthenticationSecuring Access to the Security ApplianceMonitoring Security Appliance AccessAAA Authentication AccessAuthentication for Inbound and Outbound ServicesOutbound URL Filtering for Public ServicesVPN AuthenticationSummaryChapter 8 Deploying Perimeter ProtectionPerimeter Protocol EnforcementCustomizing Protocol InspectionsPerimeter Traffic FilteringPerimeter Denial-of-Service ProtectionMitigating Network Bandwidth DoS AttacksMitigating Resource-Intensive DoS AttacksSummaryChapter 9 Deploying Network Intrusion PreventionWhat Is Intrusion Prevention?Why Use IPS and IP Audit?What Are the ASA/PIX IPS and IP Audit Signatures?Deploying Intrusion Prevention on the ASA/PIXViewing and Changing ASA/PIX IP Audit SignaturesSummaryChapter 10 Deploying Host Intrusion PreventionWhy Use Host Intrusion PreventionAnatomy of a Host or Server AttackCSA InternalsCSA in ActionImplementing Host Intrusion PreventionCSA Deployment SuggestionsVirus Scanners and CSA: The Complete SolutionSummaryChapter 11 Deploying VPNsUnderstanding Virtual Private NetworksImplementing VPN Using ASDMDownloading and Installing the Cisco VPN ClientConfigure VPN on the ASA/PIX Security ApplianceConfigure and Connect Using the VPN ClientUsing the VPN Client with NATMonitoring VPN Usage with ASDMVPN Client | Statistics PanelMonitor VPN Statistics from ASDMSummaryPart III AppendixesAppendix A Deploying Effective Security ManagementAppendix B ASA/PIX Version 7 Advanced FeaturesAppendix C ASA/PIX Version 7 and ASDM Software RecoveryIndexshow more

Rating details

1 ratings
4 out of 5 stars
5 0% (0)
4 100% (1)
3 0% (0)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X