Securing Your Business with Cisco ASA and PIX Firewalls

  • Published: May 27, 2005
  • Copyright 2005
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 288
  • Edition: 1st
  • Book
  • ISBN-10: 1-58705-214-8
  • ISBN-13: 978-1-58705-214-9
  • eBook (Watermarked)
  • ISBN-10: 1-58705-401-9
  • ISBN-13: 978-1-58705-401-3

Register your product to gain access to bonus material or receive a coupon.

This book is Safari Enabled. When you buy this book, you get free access to the online edition for 45 days.

More Information

DescriptionExtrasReviewsSample Content

Product Description

Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent 

  • Understand how attacks can impact your business and the different ways attacks can occur
  • Learn about the defense-in-depth model for deploying firewall and host protection
  • Examine navigation methods and features of Cisco ASDM
  • Set up Cisco ASA, PIX Firewall, and ASDM hardware and software
  • Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network
  • Authenticate firewall users and users of public web servers
  • Filter traffic and protect your network from perimeter attacks
  • Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response
  • Stop attacks launched at the desktop by deploying Cisco Security Agent
  • Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN)
  • Enhance your security posture through proper security management
  • Understand the advanced features available in the Cisco PIX version 7 operating system
  • Recover from software failure with Cisco PIX version 7

Many people view security as a “black-box-voodoo” technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security.

 

Securing Your Business with Cisco ASA and PIX Firewalls is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco® ASA and PIX® version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network.

 

Securing Your Business with Cisco ASA and PIX Firewalls provides you with complete step-by-step processes for using Cisco ASDM in conjunction with Cisco Security Agent to ensure that your security posture is strong enough to stand up against any network or host attack whether sourced from the Internet or from inside your own network.

 

"Firewalls are a critical part of any integrated network security strategy, and books such as this will help raise awareness of both the threats inherent in today’s open, heterogeneous internetworking environments and the solutions that can be applied to make the Internet a safer place."

—Martin E. Hellman, professor emeritus of Electrical Engineering,

Stanford University and co-inventor of public key cryptography

 

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. 

Customer Reviews

7 of 9 people found the following review helpful
5.0 out of 5 stars Good Introduction, Good Instruction, August 26, 2005
By 
John Matlock "Gunny" (Winnemucca, NV) - See all my reviews
(REAL NAME)   
This review is from: Securing Your Business with Cisco ASA and PIX Firewalls (Paperback)
Oh if life were only easier. The web must be a lot like the old west was rumored to be. Except that there doesn't even appear to be a sheriff anywhere around. All of us have to build our own little forts for protection against the bad guys. One of the best forts you can build uses the Cisco ASA/PIX Security Appliance.

You can, of course, set up the equipment without anything but the manual. But this book goes into a lot more background that is very nice to know. It starts with why they might want into your network. (I couldn't imagine why anyone would want into mine until they started attacking to use my equipment for re-mailing and bandwidth.) It then goes into they types of attacks that might be used against you.

It's probably impossible to build a totally secure system unless it isn't connected to the outside world in any way at all. But when your users want things like e-mail, web access and more, you've got to do something. The Cisco approach at least makes... Read more
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


6 of 9 people found the following review helpful
5.0 out of 5 stars This Book was Great!!!, August 4, 2005
This review is from: Securing Your Business with Cisco ASA and PIX Firewalls (Paperback)
I'm a system admin in a medium size company, 800 epmloyees in 4 locations across the US. Our Security Admin position was eliminated because of budget considerations. I was forced into the role (opportunity) without any training and have been learning as I go. I needed to deploy firewall in all four locations so I bought this book- Securing Your Business with Cisco ASA and PIX Firewalls by Greg Abelar. It was a life saver. Not only was it comprehensive in it's deployment instructions but it did such a great job of explaining internet threats and why deploying these devices are so important. It also made me aware of Host Intrusion Prevention, I am going to go out and evaluate CSA.

I would recommend this book to anyone deploying ASA or anyone who would just like to understand security, why it is neccessary, what ASA will do for you and most of all how it fits into the concept of defense in depth.
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


5.0 out of 5 stars Good to Have!, May 9, 2010
This review is from: Securing Your Business with Cisco ASA and PIX Firewalls (Paperback)
This book is well written and organized. It provides all the necessary information and details that you need to setup and manage ASA/PIX and ASDM. This book will not teach you the command line configurations, but it will give you great instructions for the operation and installation.

I would recommend this book to anyone who has the PIX firewall at his office, and he is dealing with the Cisco host base intrusion prevention system.
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


Share your thoughts with other customers:
 See all 7 customer reviews...

Index

Download - 58 KB -- Index

Table of Contents

Table of Contents

Foreword

Introduction

Part I   Network Security and the ASA/PIX Security Appliance

Chapter 1   Internet Security 101

Network Attacks: A Serious Problem

Rising Security Incidents

Hacking Tools

Assessing Your Vulnerability to Network Attacks

Attack Impact

Tangible Costs

Intangible Costs

Government Network Security Regulations

Attackers

Motivation for Attacks

Anatomy of a Computer Attack

Choosing Victims

Protecting Yourself and Your Business

Developing a Security Policy

Summary

Chapter 2   Principles of Network Defense

Understanding Defense in Depth

Stopping a Computer Attack

Defense-in-Depth Implementation Details

Authentication, Authorization, and Accounting

Perimeter Security

Network Intrusion Prevention

Host Intrusion Prevention

Additional Security Best Practices

Remote-Access Defense

Security Management of the ASA/PIX Security Appliance

Summary

Chapter 3   Getting Started with the ASA/PIX Security Appliance

Cisco ASA/PIX Security Appliance Overview

Denial-of-Service Protection

Traffic Filtering

Interface Isolation (DMZ Deployment)

Stateful Traffic Inspection

Application Inspection

User Authentication

Intrusion Prevention

Secure Management

Event Logging

Models

PIX 515E

PIX 525

PIX 535

Cisco ASA 5510 Security Appliance

Cisco ASA 5520 Security Appliance

Cisco ASA 5540 Security Appliance

Installing the ASA/PIX Security Appliance

Understanding the ASA/PIX Hardware Ports

Installing Power

Booting the ASA/PIX Security Appliance

Troubleshooting


Installing the ASA/PIX Software

Manual ASA/PIX Version 7 Installation

ASA/PIX Licenses

Installing the PIX License Key

Summary

Chapter 4   Exploring the Adaptive Security Device Manager

Exploring the GUI

Exploring the Pull-Down Menus

Exploring the Navigation Bar

Summary

Part II   Securing Network Infrastructures with ASDM

Chapter 5   Deploying Secure Internet Connectivity

Introducing the ASDM Startup Wizard

Basic Network Topology

Understanding the Elements of Your Network

Using the ASDM Startup Wizard

Connecting to the ASA/PIX Security Appliance with ASDM

Using the ASDM Startup Wizard to Configure the ASA/PIX
Security Appliance

Summary

Chapter 6   Deploying Web and Mail Services

Review of Your Current Network Topology

Designing the Network Topology to Include Web and Mail Services

Logical Placement of the Servers

Defining Inside and Outside Server Addresses

Defining Services

New Topology

Use the ASDM Startup Wizard to Deploy Web and Mail Services

Connect the New Servers to the ASA/PIX Security Appliance

Configure Your ASA/PIX Security Using ASDM

Summary

Chapter 7   Deploying Authentication

Defining Authentication

The Purpose of Authentication

Implementing Authentication

Securing Access to the Security Appliance

Monitoring Security Appliance Access

AAA Authentication Access

Authentication for Inbound and Outbound Services

Outbound URL Filtering for Public Services

VPN Authentication

Summary

Chapter 8   Deploying Perimeter Protection

Perimeter Protocol Enforcement

Customizing Protocol Inspections

Perimeter Traffic Filtering

Perimeter Denial-of-Service Protection

Mitigating Network Bandwidth DoS Attacks

Mitigating Resource-Intensive DoS Attacks

Summary

Chapter 9   Deploying Network Intrusion Prevention

What Is Intrusion Prevention?

Why Use IPS and IP Audit?

What Are the ASA/PIX IPS and IP Audit Signatures?

Deploying Intrusion Prevention on the ASA/PIX

Viewing and Changing ASA/PIX IP Audit Signatures

Summary

Chapter 10   Deploying Host Intrusion Prevention

Why Use Host Intrusion Prevention

Anatomy of a Host or Server Attack

CSA Internals

CSA in Action

Implementing Host Intrusion Prevention

CSA Deployment Suggestions

Virus Scanners and CSA: The Complete Solution

Summary

Chapter 11   Deploying VPNs

Understanding Virtual Private Networks

Implementing VPN Using ASDM

Downloading and Installing the Cisco VPN Client

Configure VPN on the ASA/PIX Security Appliance

Configure and Connect Using the VPN Client

Using the VPN Client with NAT

Monitoring VPN Usage with ASDM

VPN Client | Statistics Panel

Monitor VPN Statistics from ASDM

Summary

Part III   Appendixes

Appendix A   Deploying Effective Security Management

Appendix B   ASA/PIX Version 7 Advanced Features

Appendix C   ASA/PIX Version 7 and ASDM Software Recovery

Index

 

Downloadable Sample Chapter

Download - 493 KB -- Chapter 5: Deploying Secure Internet Connectivity

Best Value

Book + eBook Bundle $72.00 $43.20

Book Price: $32.00
eBook Price: $11.20

Buy

This book includes free shipping!

Buy

Book  $40.00  $32.00

Usually ships in 24 hours.

This book includes free shipping!

Buy

eBook (Watermarked)  $32.00  $25.60

About Watermarked eBooks

This PDF will be accessible from your Account page after purchase and requires the free Adobe® Reader® software to read it.

The eBook requires no passwords or activation to read. We customize your eBook by discretely watermarking it with your name, making it uniquely yours.

Watermarked eBook FAQ

Purchase Reward: One Month Free Subscription
By completing any purchase on Cisco Press, you become eligible for an unlimited access one-month subscription to Safari Books Online.

Get access to thousands of books and training videos about technology, professional development and digital media from more than 40 leading publishers, including Addison-Wesley, Prentice Hall, Cisco Press, IBM Press, O'Reilly Media, Wrox, Apress, and many more. If you continue your subscription after your 30-day trial, you can receive 30% off a monthly subscription to the Safari Library for up to 12 months. That's a total savings of $199.