Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010251394 | TK5105.59 D429 2009 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
A hands-on guide to implementing Cisco ASA
Configure and maintain a Cisco ASA platform to meet the requirements of your security policy. Cisco ASA Configuration shows you how to control traffic in the corporate network and protect it from internal and external threats. This comprehensive resource covers the latest features available in Cisco ASA version 8.0, and includes detailed examples of complex configurations and troubleshooting. Implement and manage Cisco's powerful, multifunction network adaptive security appliance with help from this definitive guide.
Configure Cisco ASA using the command-line interface (CLI) and Adaptive Security Device Manager (ASDM) Control traffic through the appliance with access control lists (ACLs) and object groups Filter Java, ActiveX, and web content Authenticate and authorize connections using Cut-through Proxy (CTP) Use Modular Policy Framework (MPF) to configure security appliance features Perform protocol and application inspection Enable IPSec site-to-site and remote access connections Configure WebVPN components for SSL VPN access Implement advanced features, including the transparent firewall, security contexts, and failover Detect and prevent network attacks Prepare and manage the AIP-SSM and CSC-SSM cardsAuthor Notes
Richard Deal, CCNA, CCNP, CCDA, CCDP is a certified Cisco instructor, a Cisco certification test writer, consultant, and trainer. He is the author of Cisco PIX Firewalls and CCNA Cisco Certified Network Associate Study Guide
Table of Contents
Part I Introduction to Firewalls and the ASAs |
Chapter 1 Firewall Basics |
Chapter 2 ASA Product Family |
Part II ASA Basic Configuration Tasks |
Chapter 3 CLI Basics |
Chapter 4 Basic ASA Configuration |
Chapter 5 Routing and Multicasting |
Part III Controlling Traffic Through the ASA |
Chapter 6 Address Translation |
Chapter 7 Access Control |
Chapter 8 Web Content |
Chapter 9 Cut-Through Proxy |
Chapter 10 IPv6 |
Part IV Policy Implementation |
Chapter 11 Modular Policy Framework |
Chapter 12 Protocols and Policies |
Chapter 13 Data Applications and Policies |
Chapter 14 Voice and Policies |
Chapter 15 Multimedia and Policies |
Part V VPNs |
Chapter 16 ASA as a Certificate Authority |
Chapter 17 IPSec Site-to-Site |
Chapter 18 IPSec Remote Access Server |
Chapter 19 IPSec Remote Access Client |
Chapter 20 SSL VPNs: Clientless |
Chapter 21 SSL VPNs: AnyConnect Client |
Part VI Advanced Features of the ASA |
Chapter 22 Transparent Firewall |
Chapter 23 Contexts |
Chapter 24 Failover |
Chapter 25 Network Attack Prevention |
Chapter 26 SSM Cards |
Part VII Management of the ASA |
Chapter 27 Basic Management |
Chapter 28 ASDM |