Securing Your Business with Cisco ASA and PIX Firewalls

Author:   Greg Abelar
Publisher:   Pearson Education (US)
ISBN:  

9781587052149


Pages:   288
Publication Date:   28 June 2005
Format:   Paperback
Availability:   Out of stock   Availability explained


Our Price $105.60 Quantity:  
Add to Cart

Share |

Securing Your Business with Cisco ASA and PIX Firewalls


Add your own review!

Overview

The easy-to-use guide for learning how to secure networks with the world-class PIX Firewall - Ideal for network administrators with little or no firewall experience - Easily explains how to implement a security system in small and medium businesses or at home using graphical PIX Device Manager (PDM) - Presents best practices for locking down network devices, including routers, switches, hosts, and servers - Covers PIX 7. 0 and the most recent version of PDM All networks need a strong security solution to prevent against the devastation of worms, viruses, and malicious intruders, but the reality is that small and medium businesses do not have the resources to invest in adequate security training. These businesses need a security solution that is simple to learn and easy to implement. Cisco PIX Device Manager (PDM) is a feature-rich, graphical management system that provides administrators with an easy-to-use interface for Cisco PIX security devices. PDM simplifies the configuration, operation, and monitoring of Cisco PIX security appliances. Securing Your Business Using PIX Device Manager helps readers secure small and medium-sized networks from network intrusions using PDM, the PIX Firewall, and Cisco Security Agent. Aimed at the beginner network security administrator, it is written in simple language and avoids technical jargon. The book starts by explaining how hackers operate and discusses how to protect against hacking attacks. Step-by-step instructions for entering commands into the graphical interface are interlaced with explanations of what attacks and network threats are mitigated with the commands. Upon reading this book, users will understand in simple terms the threats to their networks, the tools and commands used to mitigate such threats, and any exposures that may be outstanding when features are not in use. Greg Abelar is a seven-year veteran of Cisco Systems where he helped assemble and train the world-class Technical Assistance Center Security Organization. He is a sought-after speaker on security and founded and served as a project manager and contributor to the CCIE Security Written Exam.

Full Product Details

Author:   Greg Abelar
Publisher:   Pearson Education (US)
Imprint:   Cisco Press
Dimensions:   Width: 19.00cm , Height: 2.00cm , Length: 23.00cm
Weight:   0.485kg
ISBN:  

9781587052149


ISBN 10:   1587052148
Pages:   288
Publication Date:   28 June 2005
Audience:   College/higher education ,  Tertiary & Higher Education
Format:   Paperback
Publisher's Status:   Out of Print
Availability:   Out of stock   Availability explained

Table of Contents

Table of Contents Foreword Introduction Part I   Network Security and the ASA/PIX Security Appliance Chapter 1   Internet Security 101 Network Attacks: A Serious Problem Rising Security Incidents Hacking Tools Assessing Your Vulnerability to Network Attacks Attack Impact Tangible Costs Intangible Costs Government Network Security Regulations Attackers Motivation for Attacks Anatomy of a Computer Attack Choosing Victims Protecting Yourself and Your Business Developing a Security Policy Summary Chapter 2   Principles of Network Defense Understanding Defense in Depth Stopping a Computer Attack Defense-in-Depth Implementation Details Authentication, Authorization, and Accounting Perimeter Security Network Intrusion Prevention Host Intrusion Prevention Additional Security Best Practices Remote-Access Defense Security Management of the ASA/PIX Security Appliance Summary Chapter 3   Getting Started with the ASA/PIX Security Appliance Cisco ASA/PIX Security Appliance Overview Denial-of-Service Protection Traffic Filtering Interface Isolation (DMZ Deployment) Stateful Traffic Inspection Application Inspection User Authentication Intrusion Prevention Secure Management Event Logging Models PIX 515E PIX 525 PIX 535 Cisco ASA 5510 Security Appliance Cisco ASA 5520 Security Appliance Cisco ASA 5540 Security Appliance Installing the ASA/PIX Security Appliance Understanding the ASA/PIX Hardware Ports Installing Power Booting the ASA/PIX Security Appliance Troubleshooting Installing the ASA/PIX Software Manual ASA/PIX Version 7 Installation ASA/PIX Licenses Installing the PIX License Key Summary Chapter 4   Exploring the Adaptive Security Device Manager Exploring the GUI Exploring the Pull-Down Menus Exploring the Navigation Bar Summary Part II   Securing Network Infrastructures with ASDM Chapter 5   Deploying Secure Internet Connectivity Introducing the ASDM Startup Wizard Basic Network Topology Understanding the Elements of Your Network Using the ASDM Startup Wizard Connecting to the ASA/PIX Security Appliance with ASDM Using the ASDM Startup Wizard to Configure the ASA/PIX Security Appliance Summary Chapter 6   Deploying Web and Mail Services Review of Your Current Network Topology Designing the Network Topology to Include Web and Mail Services Logical Placement of the Servers Defining Inside and Outside Server Addresses Defining Services New Topology Use the ASDM Startup Wizard to Deploy Web and Mail Services Connect the New Servers to the ASA/PIX Security Appliance Configure Your ASA/PIX Security Using ASDM Summary Chapter 7   Deploying Authentication Defining Authentication The Purpose of Authentication Implementing Authentication Securing Access to the Security Appliance Monitoring Security Appliance Access AAA Authentication Access Authentication for Inbound and Outbound Services Outbound URL Filtering for Public Services VPN Authentication Summary Chapter 8   Deploying Perimeter Protection Perimeter Protocol Enforcement Customizing Protocol Inspections Perimeter Traffic Filtering Perimeter Denial-of-Service Protection Mitigating Network Bandwidth DoS Attacks Mitigating Resource-Intensive DoS Attacks Summary Chapter 9   Deploying Network Intrusion Prevention What Is Intrusion Prevention? Why Use IPS and IP Audit? What Are the ASA/PIX IPS and IP Audit Signatures? Deploying Intrusion Prevention on the ASA/PIX Viewing and Changing ASA/PIX IP Audit Signatures Summary Chapter 10   Deploying Host Intrusion Prevention Why Use Host Intrusion Prevention Anatomy of a Host or Server Attack CSA Internals CSA in Action Implementing Host Intrusion Prevention CSA Deployment Suggestions Virus Scanners and CSA: The Complete Solution Summary Chapter 11   Deploying VPNs Understanding Virtual Private Networks Implementing VPN Using ASDM Downloading and Installing the Cisco VPN Client Configure VPN on the ASA/PIX Security Appliance Configure and Connect Using the VPN Client Using the VPN Client with NAT Monitoring VPN Usage with ASDM VPN Client | Statistics Panel Monitor VPN Statistics from ASDM Summary Part III   Appendixes Appendix A   Deploying Effective Security Management Appendix B   ASA/PIX Version 7 Advanced Features Appendix C   ASA/PIX Version 7 and ASDM Software Recovery Index  

Reviews

Author Information

Greg Abelar has been an employee of Cisco Systems® since December 1996. He was an original member of the Cisco Technical Assistance Security team, helping to hire and train many of the engineers. He has held various positions in both the Security Architecture and Security Technical Marketing Engineering teams at Cisco. Greg is the primary founder and project manager of the Cisco written CCIE® Security exam.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List