Cisco ASA all-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance. - Description based on print version record. - Includes index [2nd ed] 9781587058196, 1587058197, 9781587141010, 1587141019

For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security.

199 90 26MB

English Pages 1119 [1151] Year 2010

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Cover......Page 1
Contents......Page 9
Introduction......Page 24
Firewalls......Page 28
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)......Page 35
Virtual Private Networks......Page 39
Summary......Page 50
Chapter 2 Cisco ASA Product and Solution Overview......Page 52
Cisco ASA 5505 Model......Page 53
Cisco ASA 5510 Model......Page 56
Cisco ASA 5520 Model......Page 61
Cisco ASA 5550 Model......Page 63
Cisco ASA 5580-20 and 5580-40 Models......Page 65
Cisco ASA AIP-SSM Module......Page 68
Cisco ASA Gigabit Ethernet Modules......Page 71
Cisco ASA CSC-SSM Module......Page 73
Summary......Page 74
Accessing the Cisco ASA Appliances......Page 76
Managing Licenses......Page 81
Initial Setup......Page 84
Device Setup......Page 94
IP Version 6......Page 105
Setting Up the System Clock......Page 111
Configuration Management......Page 115
Remote System Management......Page 121
System Maintenance......Page 128
System Monitoring......Page 140
Device Monitoring and Troubleshooting......Page 160
Summary......Page 166
Packet Filtering......Page 168
Configuring Traffic Filtering......Page 174
Advanced ACL Features......Page 186
Content and URL Filtering......Page 200
Deployment Scenarios for Traffic Filtering......Page 212
Monitoring Network Access Control......Page 220
Understanding Address Translation......Page 226
DNS Doctoring......Page 252
Monitoring Address Translations......Page 256
Summary......Page 257
Configuring Static Routes......Page 258
RIP......Page 267
OSPF......Page 279
EIGRP......Page 307
IP Multicast......Page 328
Summary......Page 337
Chapter 6 Authentication, Authorization, and Accounting (AAA)......Page 338
AAA Protocols and Services Supported by Cisco ASA......Page 339
Defining an Authentication Server......Page 345
Configuring Authentication of Administrative Sessions......Page 352
Authenticating Firewall Sessions (Cut-Through Proxy Feature)......Page 357
Configuring Authorization......Page 363
Configuring Accounting......Page 367
Summary......Page 374
Chapter 7 Application Inspection......Page 376
Enabling Application Inspection......Page 378
Selective Inspection......Page 380
Computer Telephony Interface Quick Buffer Encoding Inspection......Page 383
Distributed Computing Environment Remote Procedure Calls (DCERPC)......Page 385
Domain Name System......Page 386
Extended Simple Mail Transfer Protocol......Page 390
File Transfer Protocol......Page 394
General Packet Radio Service Tunneling Protocol......Page 396
H.323......Page 403
Unified Communications Advanced Support......Page 410
HTTP......Page 417
ILS......Page 426
Instant Messenger (IM)......Page 427
IPSec Pass-Through......Page 430
MGCP......Page 431
PPTP......Page 433
RSH......Page 434
SIP......Page 435
Skinny (SCCP)......Page 437
SNMP......Page 438
TFTP......Page 439
Summary......Page 440
Chapter 8 Virtualization......Page 442
Architectural Overview......Page 444
Configuration of Security Contexts......Page 454
Deployment Scenarios......Page 470
Monitoring and Troubleshooting the Security Contexts......Page 493
Summary......Page 497
Chapter 9 Transparent Firewalls......Page 498
Restrictions Within Transparent Firewalls......Page 505
Configuration of Transparent Firewalls......Page 509
Deployment Scenarios......Page 523
Monitoring and Troubleshooting the Transparent Firewalls......Page 541
Summary......Page 546
Architectural Overview......Page 548
Failover Configuration......Page 560
Deployment Scenarios......Page 586
Monitoring and Troubleshooting Failovers......Page 596
Summary......Page 602
Chapter 11 Quality of Service......Page 604
QoS Types......Page 606
QoS Architecture......Page 609
Configuring Quality of Service......Page 615
QoS Deployment Scenarios......Page 627
Monitoring QoS......Page 638
Summary......Page 640
Overview of the Adaptive Inspection Prevention Security Services Module (AIP-SSM) and Adaptive Inspection Prevention Security Services Card (AIP-SSC)......Page 642
AIP-SSM and AIP-SSC Management......Page 643
Cisco IPS Software Architecture......Page 646
Configuring the AIP-SSM......Page 652
AIP-SSM Maintenance......Page 663
Advanced Features and Configuration......Page 677
Cisco ASA Botnet Detection......Page 697
Summary......Page 702
IPS Tuning......Page 704
Monitoring and Tuning the AIP-SSM Using CS-MARS......Page 708
Displaying and Clearing Statistics......Page 711
Summary......Page 715
Chapter 14 Configuring Cisco Content Security and Control Security Services Module......Page 716
Initial CSC SSM Setup......Page 717
Configuring CSC SSM Web-Based Features......Page 721
Configuring CSC SSM Mail-Based Features......Page 728
Configuring CSC SSM File Transfer Protocol (FTP)......Page 736
Summary......Page 740
Monitoring the CSC SSM......Page 742
Troubleshooting the CSC SSM......Page 746
Summary......Page 761
Chapter 16 Site-to-Site IPSec VPNs......Page 762
Preconfiguration Checklist......Page 763
Configuration Steps......Page 765
Advanced Features......Page 781
Modifying Default Parameters......Page 789
Deployment Scenarios......Page 795
Monitoring and Troubleshooting Site-to-Site IPSec VPNs......Page 816
Summary......Page 825
Chapter 17 IPSec Remote-Access VPNs......Page 826
Cisco IPSec Remote Access VPN Solution......Page 827
Advanced Cisco IPSec VPN Features......Page 855
L2TP Over IPSec Remote Access VPN Solution......Page 870
Deployment Scenarios......Page 876
Monitoring and Troubleshooting Cisco Remote-Access VPN......Page 887
Summary......Page 895
Introduction to PKI......Page 896
Installing Certificates......Page 901
The Local Certificate Authority......Page 923
Configuring IPSec Site-to-Site Tunnels Using Certificates......Page 933
Configuring the Cisco ASA to Accept Remote-Access IPSec VPN Clients Using Certificates......Page 937
Troubleshooting PKI......Page 944
Summary......Page 949
Chapter 19 Clientless Remote-Access SSL VPNs......Page 950
SSL VPN Design Considerations......Page 951
SSL VPN Prerequisites......Page 953
Pre-SSL VPN Configuration Guide......Page 958
Clientless SSL VPN Configuration Guide......Page 974
Cisco Secure Desktop......Page 1007
Host Scan......Page 1025
Dynamic Access Policies......Page 1030
Deployment Scenarios......Page 1044
Monitoring and Troubleshooting SSL VPN......Page 1048
Summary......Page 1053
Chapter 20 Client-Based Remote-Access SSL VPNs......Page 1054
SSL VPN Deployment Considerations......Page 1055
SSL VPN Prerequisites......Page 1059
Pre-SSL VPN Configuration Guide......Page 1062
AnyConnect VPN Client Configuration Guide......Page 1067
Deployment Scenario of AnyConnect Client......Page 1086
Monitoring and Troubleshooting AnyConnect SSL VPNs......Page 1090
Summary......Page 1093
A......Page 1094
C......Page 1102
D......Page 1109
E......Page 1111
F......Page 1112
H......Page 1115
I......Page 1117
L......Page 1122
M......Page 1123
N......Page 1125
O......Page 1126
P......Page 1127
Q......Page 1129
R......Page 1130
S......Page 1132
T......Page 1139
U......Page 1142
V......Page 1143
W......Page 1145
X - Y - Z......Page 1146

Cisco ASA all-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance. - Description based on print version record. - Includes index [2nd ed]
 9781587058196, 1587058197, 9781587141010, 1587141019

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Recommend Papers