skip to content
Securing your business using pix device manager Preview this item
ClosePreview this item

Securing your business using pix device manager

Author: Greg Abelar; Safari Tech Books Online.
Publisher: Indianapolis, IN : Cisco Press, 2005.
Edition/Format:   Computer file : EnglishView all editions and formats

Provides you with step-by-step processes for using Cisco ASDM in conjunction with Cisco Security Agent to ensure that your security posture is strong enough to stand up against any network or host  Read more...


(not yet rated) 0 with reviews - Be the first.

More like this


Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Material Type: Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Greg Abelar; Safari Tech Books Online.
OCLC Number: 873842749
Notes: Made available through: Safari Books Online, LLC.
Mode of access: World Wide Web.
Reproduction Notes: Electronic reproduction Available via World Wide Web Boston, MA : Safari.
Description: p. cm S.
Contents: Table of ContentsForewordIntroductionPart I Network Security and the ASA/PIX Security ApplianceChapter 1 Internet Security 101Network Attacks: A Serious ProblemRising Security IncidentsHacking ToolsAssessing Your Vulnerability to Network AttacksAttack ImpactTangible CostsIntangible CostsGovernment Network Security RegulationsAttackersMotivation for AttacksAnatomy of a Computer AttackChoosing VictimsProtecting Yourself and Your BusinessDeveloping a Security PolicySummaryChapter 2 Principles of Network DefenseUnderstanding Defense in DepthStopping a Computer AttackDefense-in-Depth Implementation DetailsAuthentication, Authorization, and AccountingPerimeter SecurityNetwork Intrusion PreventionHost Intrusion PreventionAdditional Security Best PracticesRemote-Access DefenseSecurity Management of the ASA/PIX Security ApplianceSummaryChapter 3 Getting Started with the ASA/PIX Security ApplianceCisco ASA/PIX Security Appliance OverviewDenial-of-Service ProtectionTraffic FilteringInterface Isolation (DMZ Deployment)Stateful Traffic InspectionApplication InspectionUser AuthenticationIntrusion PreventionSecure ManagementEvent LoggingModelsPIX 515EPIX 525PIX 535Cisco ASA 5510 Security ApplianceCisco ASA 5520 Security ApplianceCisco ASA 5540 Security ApplianceInstalling the ASA/PIX Security ApplianceUnderstanding the ASA/PIX Hardware PortsInstalling PowerBooting the ASA/PIX Security ApplianceTroubleshootingInstalling the ASA/PIX SoftwareManual ASA/PIX Version 7 InstallationASA/PIX LicensesInstalling the PIX License KeySummaryChapter 4 Exploring the Adaptive Security Device ManagerExploring the GUIExploring the Pull-Down MenusExploring the Navigation BarSummaryPart II Securing Network Infrastructures with ASDMChapter 5 Deploying Secure Internet ConnectivityIntroducing the ASDM Startup WizardBasic Network TopologyUnderstanding the Elements of Your NetworkUsing the ASDM Startup WizardConnecting to the ASA/PIX Security Appliance with ASDMUsing the ASDM Startup Wizard to Configure the ASA/PIX Security ApplianceSummaryChapter 6 Deploying Web and Mail ServicesReview of Your Current Network TopologyDesigning the Network Topology to Include Web and Mail ServicesLogical Placement of the ServersDefining Inside and Outside Server AddressesDefining ServicesNew TopologyUse the ASDM Startup Wizard to Deploy Web and Mail ServicesConnect the New Servers to the ASA/PIX Security ApplianceConfigure Your ASA/PIX Security Using ASDMSummaryChapter 7 Deploying AuthenticationDefining AuthenticationThe Purpose of AuthenticationImplementing AuthenticationSecuring Access to the Security ApplianceMonitoring Security Appliance AccessAAA Authentication AccessAuthentication for Inbound and Outbound ServicesOutbound URL Filtering for Public ServicesVPN AuthenticationSummaryChapter 8 Deploying Perimeter ProtectionPerimeter Protocol EnforcementCustomizing Protocol InspectionsPerimeter Traffic FilteringPerimeter Denial-of-Service ProtectionMitigating Network Bandwidth DoS AttacksMitigating Resource-Intensive DoS AttacksSummaryChapter 9 Deploying Network Intrusion PreventionWhat Is Intrusion Prevention?Why Use IPS and IP Audit?What Are the ASA/PIX IPS and IP Audit Signatures?Deploying Intrusion Prevention on the ASA/PIXViewing and Changing ASA/PIX IP Audit SignaturesSummaryChapter 10 Deploying Host Intrusion PreventionWhy Use Host Intrusion PreventionAnatomy of a Host or Server AttackCSA InternalsCSA in ActionImplementing Host Intrusion PreventionCSA Deployment SuggestionsVirus Scanners and CSA: The Complete SolutionSummaryChapter 11 Deploying VPNsUnderstanding Virtual Private NetworksImplementing VPN Using ASDMDownloading and Installing the Cisco VPN ClientConfigure VPN on the ASA/PIX Security ApplianceConfigure and Connect Using the VPN ClientUsing the VPN Client with NATMonitoring VPN Usage with ASDMVPN Client | Statistics PanelMonitor VPN Statistics from ASDMSummaryPart III AppendixesAppendix A Deploying Effective Security ManagementAppendix B ASA/PIX Version 7 Advanced FeaturesAppendix C ASA/PIX Version 7 and ASDM Software RecoveryIndex
Responsibility: Greg Abelar.


User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


Be the first.

Similar Items

Related Subjects:(1)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data

Primary Entity

<> # Securing your business using pix device manager
    a bgn:ComputerFile, schema:CreativeWork ;
   library:oclcnum "873842749" ;
   library:placeOfPublication <> ;
   library:placeOfPublication <> ; # Indianapolis, IN
   schema:about <> ; # Electronic books / local
   schema:contributor <> ; # Safari Tech Books Online.
   schema:creator <> ; # Greg Abelar
   schema:datePublished "2005" ;
   schema:exampleOfWork <> ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <> ;
   schema:name "Securing your business using pix device manager" ;
   schema:productID "873842749" ;
   schema:publication <> ;
   schema:publisher <> ; # Cisco Press
   schema:url <> ;
   schema:url <> ;
   wdrs:describedby <> ;

Related Entities

<> # Safari Tech Books Online.
    a schema:Organization ;
   schema:name "Safari Tech Books Online." ;

<> # Greg Abelar
    a schema:Person ;
   schema:familyName "Abelar" ;
   schema:givenName "Greg" ;
   schema:name "Greg Abelar" ;

<> # Indianapolis, IN
    a schema:Place ;
   schema:name "Indianapolis, IN" ;

<> # Electronic books / local
    a schema:Thing ;
   schema:name "Electronic books / local" ;

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.