Securing Your Business with Cisco ASA and PIX Firewalls
暫譯: 使用 Cisco ASA 和 PIX 防火牆保護您的業務

Greg Abelar

  • 出版商: Cisco Press
  • 出版日期: 2005-05-26
  • 售價: $1,710
  • 貴賓價: 9.5$1,625
  • 語言: 英文
  • 頁數: 288
  • 裝訂: Paperback
  • ISBN: 1587052148
  • ISBN-13: 9781587052149
  • 相關分類: Cisco
  • 已過版

買這商品的人也買了...

商品描述

Description:

Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent 

  • Understand how attacks can impact your business and the different ways attacks can occur
  • Learn about the defense-in-depth model for deploying firewall and host protection
  • Examine navigation methods and features of Cisco ASDM
  • Set up Cisco ASA, PIX Firewall, and ASDM hardware and software
  • Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network
  • Authenticate firewall users and users of public web servers
  • Filter traffic and protect your network from perimeter attacks
  • Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response
  • Stop attacks launched at the desktop by deploying Cisco Security Agent
  • Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN)
  • Enhance your security posture through proper security management
  • Understand the advanced features available in the Cisco PIX version 7 operating system
  • Recover from software failure with Cisco PIX version 7

Many people view security as a “black-box-voodoo” technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security.

 

Securing Your Business with Cisco ASA and PIX Firewalls is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco® ASA and PIX® version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network.

 

Securing Your Business with Cisco ASA and PIX Firewalls provides you with complete step-by-step processes for using Cisco ASDM in conjunction with Cisco Security Agent to ensure that your security posture is strong enough to stand up against any network or host attack whether sourced from the Internet or from inside your own network.

 

"Firewalls are a critical part of any integrated network security strategy, and books such as this will help raise awareness of both the threats inherent in today’s open, heterogeneous internetworking environments and the solutions that can be applied to make the Internet a safer place."

—Martin E. Hellman, professor emeritus of Electrical Engineering,

Stanford University and co-inventor of public key cryptography

 

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. 

 

 

 

Table of Contents:

Foreword

Introduction

Part I   Network Security and the ASA/PIX Security Appliance

Chapter 1   Internet Security 101

Network Attacks: A Serious Problem

Rising Security Incidents

Hacking Tools

Assessing Your Vulnerability to Network Attacks

Attack Impact

Tangible Costs

Intangible Costs

Government Network Security Regulations

Attackers

Motivation for Attacks

Anatomy of a Computer Attack

Choosing Victims

Protecting Yourself and Your Business

Developing a Security Policy

Summary

Chapter 2   Principles of Network Defense

Understanding Defense in Depth

Stopping a Computer Attack

Defense-in-Depth Implementation Details

Authentication, Authorization, and Accounting

Perimeter Security

Network Intrusion Prevention

Host Intrusion Prevention

Additional Security Best Practices

Remote-Access Defense

Security Management of the ASA/PIX Security Appliance

Summary

Chapter 3   Getting Started with the ASA/PIX Security Appliance

Cisco ASA/PIX Security Appliance Overview

Denial-of-Service Protection

Traffic Filtering

Interface Isolation (DMZ Deployment)

Stateful Traffic Inspection

Application Inspection

User Authentication

Intrusion Prevention

Secure Management

Event Logging

Models

PIX 515E

PIX 525

PIX 535

Cisco ASA 5510 Security Appliance

Cisco ASA 5520 Security Appliance

Cisco ASA 5540 Security Appliance

Installing the ASA/PIX Security Appliance

Understanding the ASA/PIX Hardware Ports

Installing Power

Booting the ASA/PIX Security Appliance

Troubleshooting


Installing the ASA/PIX Software

Manual ASA/PIX Version 7 Installation

ASA/PIX Licenses

Installing the PIX License Key

Summary

Chapter 4   Exploring the Adaptive Security Device Manager

Exploring the GUI

Exploring the Pull-Down Menus

Exploring the Navigation Bar

Summary

Part II   Securing Network Infrastructures with ASDM

Chapter 5   Deploying Secure Internet Connectivity

Introducing the ASDM Startup Wizard

Basic Network Topology

Understanding the Elements of Your Network

Using the ASDM Startup Wizard

Connecting to the ASA/PIX Security Appliance with ASDM

Using the ASDM Startup Wizard to Configure the ASA/PIX
Security Appliance

Summary

Chapter 6   Deploying Web and Mail Services

Review of Your Current Network Topology

Designing the Network Topology to Include Web and Mail Services

Logical Placement of the Servers

Defining Inside and Outside Server Addresses

Defining Services

New Topology

Use the ASDM Startup Wizard to Deploy Web and Mail Services

Connect the New Servers to the ASA/PIX Security Appliance

Configure Your ASA/PIX Security Using ASDM

Summary

Chapter 7   Deploying Authentication

Defining Authentication

The Purpose of Authentication

Implementing Authentication

Securing Access to the Security Appliance

Monitoring Security Appliance Access

AAA Authentication Access

Authentication for Inbound and Outbound Services

Outbound URL Filtering for Public Services

VPN Authentication

Summary

Chapter 8   Deploying Perimeter Protection

Perimeter Protocol Enforcement

Customizing Protocol Inspections

Perimeter Traffic Filtering

Perimeter Denial-of-Service Protection

Mitigating Network Bandwidth DoS Attacks

Mitigating Resource-Intensive DoS Attacks

Summary

Chapter 9   Deploying Network Intrusion Prevention

What Is Intrusion Prevention?

Why Use IPS and IP Audit?

What Are the ASA/PIX IPS and IP Audit Signatures?

Deploying Intrusion Prevention on the ASA/PIX

Viewing and Changing ASA/PIX IP Audit Signatures

Summary

Chapter 10   Deploying Host Intrusion Prevention

Why Use Host Intrusion Prevention

Anatomy of a Host or Server Attack

CSA Internals

CSA in Action

Implementing Host Intrusion Prevention

CSA Deployment Suggestions

Virus Scanners and CSA: The Complete Solution

Summary

Chapter 11   Deploying VPNs

Understanding Virtual Private Networks

Implementing VPN Using ASDM

Downloading and Installing the Cisco VPN Client

Configure VPN on the ASA/PIX Security Appliance

Configure and Connect Using the VPN Client

Using the VPN Client with NAT

Monitoring VPN Usage with ASDM

VPN Client | Statistics Panel

Monitor VPN Statistics from ASDM

Summary

Part III   Appendixes

Appendix A   Deploying Effective Security Management

Appendix B   ASA/PIX Version 7 Advanced Features

Appendix C   ASA/PIX Version 7 and ASDM Software Recovery

Index

商品描述(中文翻譯)

**描述:**
保護關鍵數據並維持正常運行,使用 Cisco ASDM 和 Cisco Security Agent

- 了解攻擊如何影響您的業務以及攻擊可能發生的不同方式
- 學習防禦深度模型以部署防火牆和主機保護
- 檢查 Cisco ASDM 的導航方法和功能
- 設置 Cisco ASA、PIX 防火牆及 ASDM 硬體和軟體
- 使用 Cisco ASDM 啟動精靈安全地將您的網路連接到互聯網,並安全地將公共設備(如郵件和網頁伺服器)添加到您的網路中
- 驗證防火牆用戶和公共網頁伺服器的用戶
- 過濾流量並保護您的網路免受邊界攻擊
- 部署 Cisco 入侵防護系統(IPS)以提供更細緻的流量檢查和主動威脅響應
- 通過部署 Cisco Security Agent 停止針對桌面的攻擊
- 通過 IPSec 虛擬私人網路(VPN)將防禦深度模型擴展到遠端用戶
- 通過適當的安全管理增強您的安全姿態
- 了解 Cisco PIX 版本 7 操作系統中的高級功能
- 使用 Cisco PIX 版本 7 從軟體故障中恢復

許多人將安全視為一種「黑箱巫術」技術,認為它非常複雜且令人畏懼。雖然幾年前這可能是事實,但供應商已成功降低了複雜性,並將安全帶到幾乎任何對技術有良好理解的人都能部署網路安全的程度。

《使用 Cisco ASA 和 PIX 防火牆保護您的業務》是簡化安全部署工作的延伸。這本易於使用的指南幫助您設計和部署一個防禦深度解決方案,特別是針對新發布的 Cisco® ASA 和 PIX® 版本 7 以及 Cisco Security Agent 主機入侵防護軟體。該書通過討論如何使用 Cisco 自適應安全設備管理器(ASDM)來簡化這些強大安全設備的配置和管理,ASDM 提供通過直觀的 GUI 進行安全管理和監控服務,並集成在線幫助和智能精靈以簡化設置和持續管理。此外,信息豐富的實時和歷史報告提供了對使用趨勢、性能基準和安全事件的關鍵見解。這本書包含了您需要知道的所有內容,以在您的網路中部署最新的安全技術。

《使用 Cisco ASA 和 PIX 防火牆保護您的業務》為您提供完整的逐步流程,使用 Cisco ASDM 結合 Cisco Security Agent,以確保您的安全姿態足夠強大,能夠抵禦來自互聯網或您自己網路內部的任何網路或主機攻擊。

「防火牆是任何綜合網路安全策略的重要組成部分,像這樣的書籍將有助於提高人們對當今開放的異構互聯網環境中固有威脅的認識,以及可以應用的解決方案,以使互聯網變得更安全。」
— Martin E. Hellman,斯坦福大學電機工程名譽教授及公鑰密碼學的共同發明人

這本安全書籍是 Cisco Press® 網路技術系列的一部分。Cisco Press 的安全書籍幫助網路專業人員保護關鍵數據和資源,防止和減輕網路攻擊,並建立端到端的自我防禦網路。

**目錄:**
- 前言
- 介紹
- 第一部分 網路安全與 ASA/PIX 安全設備
- 第 1 章 網際網路安全 101
- 網路攻擊:一個嚴重的問題
- 安全事件上升
- 駭客工具
- 評估您對網路攻擊的脆弱性
- 攻擊影響
- 有形成本
- 無形成本
- 政府網路安全法規
- 攻擊者
- 攻擊動機
- 電腦攻擊的解剖
- 選擇受害者
- 保護您自己和您的業務
- 制定安全政策
- 總結
- 第 2 章 網路防禦原則
- 了解防禦深度
- 停止電腦攻擊
- 防禦深度實施細節
- 認證、授權和會計
- 邊界安全
- 網路入侵防護
- 主機入侵防護
- 其他安全最佳實踐
- 遠端訪問防禦
- ASA/PIX 安全設備的安全管理
- 總結
- 第 3 章 開始使用 ASA/PIX 安全設備
- Cisco ASA/PIX 安全設備概述
- 拒絕服務保護
- 流量過濾
- 介面隔離(DMZ 部署)
- 有狀態流量檢查
- 應用檢查
- 用戶認證
- 入侵防護
- 安全管理
- 事件日誌
- 型號
- PIX 515E
- PIX 525
- PIX 535
- Cisco ASA 5510 安全設備
- Cisco ASA 5520 安全設備
- Cisco ASA 5540 安全設備
- 安裝 ASA/PIX 安全設備
- 了解 ASA/PIX 硬體端口
- 安裝電源
- 啟動 ASA/PIX 安全設備