Securing Your Business with Cisco ASA and PIX Firewalls
暫譯: 使用 Cisco ASA 和 PIX 防火牆保護您的業務
Greg Abelar
- 出版商: Cisco Press
- 出版日期: 2005-05-26
- 售價: $1,710
- 貴賓價: 9.5 折 $1,625
- 語言: 英文
- 頁數: 288
- 裝訂: Paperback
- ISBN: 1587052148
- ISBN-13: 9781587052149
-
相關分類:
Cisco
已過版
買這商品的人也買了...
-
$680$537 -
$990$782 -
$750$638 -
$560$476 -
$650$514 -
$650$507 -
$390$351 -
$580$452 -
$620$490 -
$750$593 -
$880$748 -
$780$616 -
$550$435 -
$580$493 -
$620$490 -
$880$748 -
$650$514 -
$580$458 -
$990$891 -
$600$480 -
$1,180$932 -
$750$593 -
$980$774 -
$360$284 -
$1,920$1,824
商品描述
Description:
Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent
- Understand how attacks can impact your business and the different ways attacks can occur
- Learn about the defense-in-depth model for deploying firewall and host protection
- Examine navigation methods and features of Cisco ASDM
- Set up Cisco ASA, PIX Firewall, and ASDM hardware and software
- Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network
- Authenticate firewall users and users of public web servers
- Filter traffic and protect your network from perimeter attacks
- Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response
- Stop attacks launched at the desktop by deploying Cisco Security Agent
- Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN)
Enhance your security posture through proper security management- Understand the advanced features available in the Cisco PIX version 7 operating system
- Recover from software failure with Cisco PIX version 7
Many people view security as a “black-box-voodoo” technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security.
Securing Your Business with Cisco ASA and PIX Firewalls is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco® ASA and PIX® version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network.
Securing Your Business with Cisco ASA and PIX Firewalls provides you with complete step-by-step processes for using Cisco ASDM in conjunction with Cisco Security Agent to ensure that your security posture is strong enough to stand up against any network or host attack whether sourced from the Internet or from inside your own network.
"Firewalls are a critical part of any integrated network security strategy, and books such as this will help raise awareness of both the threats inherent in today’s open, heterogeneous internetworking environments and the solutions that can be applied to make the Internet a safer place."
—Martin E. Hellman, professor emeritus of Electrical Engineering,
Stanford University and co-inventor of public key cryptography
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.
Table of Contents:
Foreword
Introduction
Part I Network Security and the ASA/PIX Security Appliance
Chapter 1 Internet Security 101
Network Attacks: A Serious Problem
Rising Security Incidents
Hacking Tools
Assessing Your Vulnerability to Network Attacks
Attack Impact
Tangible Costs
Intangible Costs
Government Network Security Regulations
Attackers
Motivation for Attacks
Anatomy of a Computer Attack
Choosing Victims
Protecting Yourself and Your Business
Developing a Security Policy
Summary
Chapter 2 Principles of Network Defense
Understanding Defense in Depth
Stopping a Computer Attack
Defense-in-Depth Implementation Details
Authentication, Authorization, and Accounting
Perimeter Security
Network Intrusion Prevention
Host Intrusion Prevention
Additional Security Best Practices
Remote-Access Defense
Security Management of the ASA/PIX Security Appliance
Summary
Chapter 3 Getting Started with the ASA/PIX Security Appliance
Cisco ASA/PIX Security Appliance Overview
Denial-of-Service Protection
Traffic Filtering
Interface Isolation (DMZ Deployment)
Stateful Traffic Inspection
Application Inspection
User Authentication
Intrusion Prevention
Secure Management
Event Logging
Models
PIX 515E
PIX 525
PIX 535
Cisco ASA 5510 Security Appliance
Cisco ASA 5520 Security Appliance
Cisco ASA 5540 Security Appliance
Installing the ASA/PIX Security Appliance
Understanding the ASA/PIX Hardware Ports
Installing Power
Booting the ASA/PIX Security Appliance
Troubleshooting
Installing the ASA/PIX Software
Manual ASA/PIX Version 7 Installation
ASA/PIX Licenses
Installing the PIX License Key
Summary
Chapter 4 Exploring the Adaptive Security Device Manager
Exploring the GUI
Exploring the Pull-Down Menus
Exploring the Navigation Bar
Summary
Part II Securing Network Infrastructures with ASDM
Chapter 5 Deploying Secure Internet Connectivity
Introducing the ASDM Startup Wizard
Basic Network Topology
Understanding the Elements of Your Network
Using the ASDM Startup Wizard
Connecting to the ASA/PIX Security Appliance with ASDM
Using the ASDM Startup Wizard to Configure the ASA/PIX
Security ApplianceSummary
Chapter 6 Deploying Web and Mail Services
Review of Your Current Network Topology
Designing the Network Topology to Include Web and Mail Services
Logical Placement of the Servers
Defining Inside and Outside Server Addresses
Defining Services
New Topology
Use the ASDM Startup Wizard to Deploy Web and Mail Services
Connect the New Servers to the ASA/PIX Security Appliance
Configure Your ASA/PIX Security Using ASDM
Summary
Chapter 7 Deploying Authentication
Defining Authentication
The Purpose of Authentication
Implementing Authentication
Securing Access to the Security Appliance
Monitoring Security Appliance Access
AAA Authentication Access
Authentication for Inbound and Outbound Services
Outbound URL Filtering for Public Services
VPN Authentication
Summary
Chapter 8 Deploying Perimeter Protection
Perimeter Protocol Enforcement
Customizing Protocol Inspections
Perimeter Traffic Filtering
Perimeter Denial-of-Service Protection
Mitigating Network Bandwidth DoS Attacks
Mitigating Resource-Intensive DoS Attacks
Summary
Chapter 9 Deploying Network Intrusion Prevention
What Is Intrusion Prevention?
Why Use IPS and IP Audit?
What Are the ASA/PIX IPS and IP Audit Signatures?
Deploying Intrusion Prevention on the ASA/PIX
Viewing and Changing ASA/PIX IP Audit Signatures
Summary
Chapter 10 Deploying Host Intrusion Prevention
Why Use Host Intrusion Prevention
Anatomy of a Host or Server Attack
CSA Internals
CSA in Action
Implementing Host Intrusion Prevention
CSA Deployment Suggestions
Virus Scanners and CSA: The Complete Solution
Summary
Chapter 11 Deploying VPNs
Understanding Virtual Private Networks
Implementing VPN Using ASDM
Downloading and Installing the Cisco VPN Client
Configure VPN on the ASA/PIX Security Appliance
Configure and Connect Using the VPN Client
Using the VPN Client with NAT
Monitoring VPN Usage with ASDM
VPN Client | Statistics Panel
Monitor VPN Statistics from ASDM
Summary
Part III Appendixes
Appendix A Deploying Effective Security Management
Appendix B ASA/PIX Version 7 Advanced Features
Appendix C ASA/PIX Version 7 and ASDM Software Recovery
Index
商品描述(中文翻譯)
**描述:**
保護關鍵數據並維持正常運行,使用 Cisco ASDM 和 Cisco Security Agent
- 了解攻擊如何影響您的業務以及攻擊可能發生的不同方式
- 學習防禦深度模型以部署防火牆和主機保護
- 檢查 Cisco ASDM 的導航方法和功能
- 設置 Cisco ASA、PIX 防火牆及 ASDM 硬體和軟體
- 使用 Cisco ASDM 啟動精靈安全地將您的網路連接到互聯網,並安全地將公共設備(如郵件和網頁伺服器)添加到您的網路中
- 驗證防火牆用戶和公共網頁伺服器的用戶
- 過濾流量並保護您的網路免受邊界攻擊
- 部署 Cisco 入侵防護系統(IPS)以提供更細緻的流量檢查和主動威脅響應
- 通過部署 Cisco Security Agent 停止針對桌面的攻擊
- 通過 IPSec 虛擬私人網路(VPN)將防禦深度模型擴展到遠端用戶
- 通過適當的安全管理增強您的安全姿態
- 了解 Cisco PIX 版本 7 操作系統中的高級功能
- 使用 Cisco PIX 版本 7 從軟體故障中恢復
許多人將安全視為一種「黑箱巫術」技術,認為它非常複雜且令人畏懼。雖然幾年前這可能是事實,但供應商已成功降低了複雜性,並將安全帶到幾乎任何對技術有良好理解的人都能部署網路安全的程度。
《使用 Cisco ASA 和 PIX 防火牆保護您的業務》是簡化安全部署工作的延伸。這本易於使用的指南幫助您設計和部署一個防禦深度解決方案,特別是針對新發布的 Cisco® ASA 和 PIX® 版本 7 以及 Cisco Security Agent 主機入侵防護軟體。該書通過討論如何使用 Cisco 自適應安全設備管理器(ASDM)來簡化這些強大安全設備的配置和管理,ASDM 提供通過直觀的 GUI 進行安全管理和監控服務,並集成在線幫助和智能精靈以簡化設置和持續管理。此外,信息豐富的實時和歷史報告提供了對使用趨勢、性能基準和安全事件的關鍵見解。這本書包含了您需要知道的所有內容,以在您的網路中部署最新的安全技術。
《使用 Cisco ASA 和 PIX 防火牆保護您的業務》為您提供完整的逐步流程,使用 Cisco ASDM 結合 Cisco Security Agent,以確保您的安全姿態足夠強大,能夠抵禦來自互聯網或您自己網路內部的任何網路或主機攻擊。
「防火牆是任何綜合網路安全策略的重要組成部分,像這樣的書籍將有助於提高人們對當今開放的異構互聯網環境中固有威脅的認識,以及可以應用的解決方案,以使互聯網變得更安全。」
— Martin E. Hellman,斯坦福大學電機工程名譽教授及公鑰密碼學的共同發明人
這本安全書籍是 Cisco Press® 網路技術系列的一部分。Cisco Press 的安全書籍幫助網路專業人員保護關鍵數據和資源,防止和減輕網路攻擊,並建立端到端的自我防禦網路。
**目錄:**
- 前言
- 介紹
- 第一部分 網路安全與 ASA/PIX 安全設備
- 第 1 章 網際網路安全 101
- 網路攻擊:一個嚴重的問題
- 安全事件上升
- 駭客工具
- 評估您對網路攻擊的脆弱性
- 攻擊影響
- 有形成本
- 無形成本
- 政府網路安全法規
- 攻擊者
- 攻擊動機
- 電腦攻擊的解剖
- 選擇受害者
- 保護您自己和您的業務
- 制定安全政策
- 總結
- 第 2 章 網路防禦原則
- 了解防禦深度
- 停止電腦攻擊
- 防禦深度實施細節
- 認證、授權和會計
- 邊界安全
- 網路入侵防護
- 主機入侵防護
- 其他安全最佳實踐
- 遠端訪問防禦
- ASA/PIX 安全設備的安全管理
- 總結
- 第 3 章 開始使用 ASA/PIX 安全設備
- Cisco ASA/PIX 安全設備概述
- 拒絕服務保護
- 流量過濾
- 介面隔離(DMZ 部署)
- 有狀態流量檢查
- 應用檢查
- 用戶認證
- 入侵防護
- 安全管理
- 事件日誌
- 型號
- PIX 515E
- PIX 525
- PIX 535
- Cisco ASA 5510 安全設備
- Cisco ASA 5520 安全設備
- Cisco ASA 5540 安全設備
- 安裝 ASA/PIX 安全設備
- 了解 ASA/PIX 硬體端口
- 安裝電源
- 啟動 ASA/PIX 安全設備