Book Description

For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide to planning, deploying, managing, and troubleshooting security with Cisco ASA. Written by two leading Cisco security experts, this book presents each Cisco ASA solution in depth, offering comprehensive sample configurations, proven troubleshooting methodologies, and debugging examples. Readers will learn about the Cisco ASA Firewall solution and capabilities; secure configuration and troubleshooting of site-to-site and remote access VPNs; Intrusion Prevention System features built into Cisco ASA's Advanced Inspection and Prevention Security Services Module (AIP-SSM); and Anti-X features in the ASA Content Security and Control Security Services Module (CSC-SSM). This new edition has been updated with detailed information on the latest ASA models and features.

  • Everything network professionals need to know to identify, mitigate, and respond to network attacks with Cisco ASA

  • Includes detailed configuration examples, with screenshots and command line references

  • Covers the ASA 8.2 release

  • Presents complete troubleshooting methodologies and architectural references

  • Table of Contents

    1. Title Page
    2. Copyright Page
    3. Dedications
    4. Contents at a Glance
    5. Contents
    6. About the Authors
    7. About the Technical Reviewers
    8. Acknowledgments
    9. Icons Used in This Book
    10. Introduction
    11. Part I: Product Overview
      1. Chapter 1. Introduction to Security Technologies
      2. Chapter 2. Cisco ASA Product and Solution Overview
      3. Chapter 3. Initial Setup and System Maintenance
    12. Part II: Firewall Technology
      1. Chapter 4. Controlling Network Access
      2. Chapter 5. IP Routing
      3. Chapter 6. Authentication, Authorization, and Accounting (AAA)
      4. Chapter 7. Application Inspection
      5. Chapter 8. Virtualization
      6. Chapter 9. Transparent Firewalls
      7. Chapter 10. Failover and Redundancy
      8. Chapter 11. Quality of Service
    13. Part III: Intrusion Prevention System (IPS) Solutions
      1. Chapter 12. Configuring and Troubleshooting Intrusion Prevention System (IPS)
      2. Chapter 13. Tuning and Monitoring IPS
    14. Part IV: Content Security
      1. Chapter 14. Configuring Cisco Content Security and Control Security Services Module
      2. Chapter 15. Monitoring and Troubleshooting the Cisco Content Security and Control Security Services Module
    15. Part V: Virtual Private Network (VPN) Solutions
      1. Chapter 16. Site-to-Site IPSec VPNs
      2. Chapter 17. IPSec Remote-Access VPNs
      3. Chapter 18. Public Key Infrastructure (PKI)
      4. Chapter 19. Clientless Remote-Access SSL VPNs
      5. Chapter 20. Client-Based Remote-Access SSL VPNs
    16. Index