Register your product to gain access to bonus material or receive a coupon.
This book is Safari Enabled. When you buy this book, you get free access to the online edition for 45 days.
Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent
Many people view security as a “black-box-voodoo” technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security.
Securing Your Business with Cisco ASA and PIX Firewalls is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco® ASA and PIX® version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network.
Securing Your Business with Cisco ASA and PIX Firewalls provides you with complete step-by-step processes for using Cisco ASDM in conjunction with Cisco Security Agent to ensure that your security posture is strong enough to stand up against any network or host attack whether sourced from the Internet or from inside your own network.
"Firewalls are a critical part of any integrated network security strategy, and books such as this will help raise awareness of both the threats inherent in today’s open, heterogeneous internetworking environments and the solutions that can be applied to make the Internet a safer place."
—Martin E. Hellman, professor emeritus of Electrical Engineering,
Stanford University and co-inventor of public key cryptography
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.
Download related content from TechRepublic.com
Cisco PIX Firewall: Lock it down in 10 steps
Firewall failure plan checklist
Design the best network security topology for your firewall using these diagrams
|
7 of 9 people found the following review helpful
By
This review is from: Securing Your Business with Cisco ASA and PIX Firewalls (Paperback)
Oh if life were only easier. The web must be a lot like the old west was rumored to be. Except that there doesn't even appear to be a sheriff anywhere around. All of us have to build our own little forts for protection against the bad guys. One of the best forts you can build uses the Cisco ASA/PIX Security Appliance.You can, of course, set up the equipment without anything but the manual. But this book goes into a lot more background that is very nice to know. It starts with why they might want into your network. (I couldn't imagine why anyone would want into mine until they started attacking to use my equipment for re-mailing and bandwidth.) It then goes into they types of attacks that might be used against you. It's probably impossible to build a totally secure system unless it isn't connected to the outside world in any way at all. But when your users want things like e-mail, web access and more, you've got to do something. The Cisco approach at least makes... Read more
6 of 9 people found the following review helpful
This review is from: Securing Your Business with Cisco ASA and PIX Firewalls (Paperback)
I'm a system admin in a medium size company, 800 epmloyees in 4 locations across the US. Our Security Admin position was eliminated because of budget considerations. I was forced into the role (opportunity) without any training and have been learning as I go. I needed to deploy firewall in all four locations so I bought this book- Securing Your Business with Cisco ASA and PIX Firewalls by Greg Abelar. It was a life saver. Not only was it comprehensive in it's deployment instructions but it did such a great job of explaining internet threats and why deploying these devices are so important. It also made me aware of Host Intrusion Prevention, I am going to go out and evaluate CSA.I would recommend this book to anyone deploying ASA or anyone who would just like to understand security, why it is neccessary, what ASA will do for you and most of all how it fits into the concept of defense in depth. By
This review is from: Securing Your Business with Cisco ASA and PIX Firewalls (Paperback)
This book is well written and organized. It provides all the necessary information and details that you need to setup and manage ASA/PIX and ASDM. This book will not teach you the command line configurations, but it will give you great instructions for the operation and installation.I would recommend this book to anyone who has the PIX firewall at his office, and he is dealing with the Cisco host base intrusion prevention system. |
Download - 58 KB -- Index
Table of Contents
Foreword
Introduction
Part I Network Security and the ASA/PIX Security Appliance
Chapter 1 Internet Security 101
Network Attacks: A Serious Problem
Rising Security Incidents
Hacking Tools
Assessing Your Vulnerability to Network Attacks
Attack Impact
Tangible Costs
Intangible Costs
Government Network Security Regulations
Attackers
Motivation for Attacks
Anatomy of a Computer Attack
Choosing Victims
Protecting Yourself and Your Business
Developing a Security Policy
Summary
Chapter 2 Principles of Network Defense
Understanding Defense in Depth
Stopping a Computer Attack
Defense-in-Depth Implementation Details
Authentication, Authorization, and Accounting
Perimeter Security
Network Intrusion Prevention
Host Intrusion Prevention
Additional Security Best Practices
Remote-Access Defense
Security Management of the ASA/PIX Security Appliance
Summary
Chapter 3 Getting Started with the ASA/PIX Security Appliance
Cisco ASA/PIX Security Appliance Overview
Denial-of-Service Protection
Traffic Filtering
Interface Isolation (DMZ Deployment)
Stateful Traffic Inspection
Application Inspection
User Authentication
Intrusion Prevention
Secure Management
Event Logging
Models
PIX 515E
PIX 525
PIX 535
Cisco ASA 5510 Security Appliance
Cisco ASA 5520 Security Appliance
Cisco ASA 5540 Security Appliance
Installing the ASA/PIX Security Appliance
Understanding the ASA/PIX Hardware Ports
Installing Power
Booting the ASA/PIX Security Appliance
Troubleshooting
Installing the ASA/PIX Software
Manual ASA/PIX Version 7 Installation
ASA/PIX Licenses
Installing the PIX License Key
Summary
Chapter 4 Exploring the Adaptive Security Device Manager
Exploring the GUI
Exploring the Pull-Down Menus
Exploring the Navigation Bar
Summary
Part II Securing Network Infrastructures with ASDM
Chapter 5 Deploying Secure Internet Connectivity
Introducing the ASDM Startup Wizard
Basic Network Topology
Understanding the Elements of Your Network
Using the ASDM Startup Wizard
Connecting to the ASA/PIX Security Appliance with ASDM
Using the ASDM Startup Wizard to Configure the ASA/PIX
Security Appliance
Summary
Chapter 6 Deploying Web and Mail Services
Review of Your Current Network Topology
Designing the Network Topology to Include Web and Mail Services
Logical Placement of the Servers
Defining Inside and Outside Server Addresses
Defining Services
New Topology
Use the ASDM Startup Wizard to Deploy Web and Mail Services
Connect the New Servers to the ASA/PIX Security Appliance
Configure Your ASA/PIX Security Using ASDM
Summary
Chapter 7 Deploying Authentication
Defining Authentication
The Purpose of Authentication
Implementing Authentication
Securing Access to the Security Appliance
Monitoring Security Appliance Access
AAA Authentication Access
Authentication for Inbound and Outbound Services
Outbound URL Filtering for Public Services
VPN Authentication
Summary
Chapter 8 Deploying Perimeter Protection
Perimeter Protocol Enforcement
Customizing Protocol Inspections
Perimeter Traffic Filtering
Perimeter Denial-of-Service Protection
Mitigating Network Bandwidth DoS Attacks
Mitigating Resource-Intensive DoS Attacks
Summary
Chapter 9 Deploying Network Intrusion Prevention
What Is Intrusion Prevention?
Why Use IPS and IP Audit?
What Are the ASA/PIX IPS and IP Audit Signatures?
Deploying Intrusion Prevention on the ASA/PIX
Viewing and Changing ASA/PIX IP Audit Signatures
Summary
Chapter 10 Deploying Host Intrusion Prevention
Why Use Host Intrusion Prevention
Anatomy of a Host or Server Attack
CSA Internals
CSA in Action
Implementing Host Intrusion Prevention
CSA Deployment Suggestions
Virus Scanners and CSA: The Complete Solution
Summary
Chapter 11 Deploying VPNs
Understanding Virtual Private Networks
Implementing VPN Using ASDM
Downloading and Installing the Cisco VPN Client
Configure VPN on the ASA/PIX Security Appliance
Configure and Connect Using the VPN Client
Using the VPN Client with NAT
Monitoring VPN Usage with ASDM
VPN Client | Statistics Panel
Monitor VPN Statistics from ASDM
Summary
Part III Appendixes
Appendix A Deploying Effective Security Management
Appendix B ASA/PIX Version 7 Advanced Features
Appendix C ASA/PIX Version 7 and ASDM Software Recovery
Index
Download - 493 KB -- Chapter 5: Deploying Secure Internet Connectivity

This book includes free shipping!
This book includes free shipping!
eBook (Watermarked)
$32.00
$25.60
This PDF will be accessible from your Account page after purchase and requires the free Adobe® Reader® software to read it.
The eBook requires no passwords or activation to read. We customize your eBook by discretely watermarking it with your name, making it uniquely yours.
Get access to thousands of books and training videos about technology, professional development and digital media from more than 40 leading publishers, including Addison-Wesley, Prentice Hall, Cisco Press, IBM Press, O'Reilly Media, Wrox, Apress, and many more. If you continue your subscription after your 30-day trial, you can receive 30% off a monthly subscription to the Safari Library for up to 12 months. That's a total savings of $199.