Cisco ASA Configuration (Network Professional's Library)
Books / Paperback
Books › Computers › Security › General
ISBN: 0071622691 / Publisher: McGraw-Hill, June 2009
Author Deal, who has broad experience in the computing and networking industry as well as numerous Cisco certifications, offers a hands on guide for configuring and maintaining a Cisco ASA platform to meet security policy requirements. The author also provides clear and concise instruction in how to control traffic in the corporate network to protect it from internal and external threats. He also explores the latest features in Cisco ASA version 8.0, and provides detailed examples of complex configurations and trouble shooting. A sampling of additional content includes: authenticating and authorizing connections using Cut-through Proxy (CTP), performing protocol and application inspection, and configuring WebVPN components for SSL VPN access. Annotation ©2009 Book News, Inc., Portland, OR (booknews.com)
Read More
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.A hands-on guide to implementing Cisco ASA Configure and maintain a Cisco ASA platform to meet the requirements of your security policy. Cisco ASA Configuration shows you how to control traffic in the corporate network and protect it from internal and external threats. This comprehensive resource covers the latest features available in Cisco ASA version 8.0, and includes detailed examples of complex configurations and troubleshooting. Implement and manage Cisco's powerful, multifunction network adaptive security appliance with help from this definitive guide. Configure Cisco ASA using the command-line interface (CLI) and Adaptive Security Device Manager (ASDM)Control traffic through the appliance with access control lists (ACLs) and object groupsFilter Java, ActiveX, and web content Authenticate and authorize connections using Cut-through Proxy (CTP)Use Modular Policy Framework (MPF) to configure security appliance featuresPerform protocol and application inspectionEnable IPSec site-to-site and remote access connectionsConfigure WebVPN components for SSL VPN accessImplement advanced features, including the transparent firewall, security contexts, and failoverDetect and prevent network attacksPrepare and manage the AIP-SSM and CSC-SSM cards
Read Less