"Richard Deal's gift of making difficult technology concepts understandable has remained constant. Whether it is presenting to a room of information technology professionals or writing books, Richard's communication skills are unsurpassed. As information technology professionals we are faced with overcoming challenges every day... Cisco ASA Configuration is a great reference and tool for answering our challenges." --From the Foreword by Steve Marcinek (CCIE 7225), Systems Engineer, Cisco Systems A hands-on guide to implementing Cisco ASA Configure and maintain a Cisco ASA platform to meet the…mehr
"Richard Deal's gift of making difficult technology concepts understandable has remained constant. Whether it is presenting to a room of information technology professionals or writing books, Richard's communication skills are unsurpassed. As information technology professionals we are faced with overcoming challenges every day... Cisco ASA Configuration is a great reference and tool for answering our challenges." --From the Foreword by Steve Marcinek (CCIE 7225), Systems Engineer, Cisco Systems A hands-on guide to implementing Cisco ASA Configure and maintain a Cisco ASA platform to meet the requirements of your security policy. Cisco ASA Configuration shows you how to control traffic in the corporate network and protect it from internal and external threats. This comprehensive resource covers the latest features available in Cisco ASA version 8.0, and includes detailed examples of complex configurations and troubleshooting. Implement and manage Cisco's powerful, multifunction network adaptive security appliance with help from this definitive guide. Configure Cisco ASA using the command-line interface (CLI) and Adaptive Security Device Manager (ASDM) Control traffic through the appliance with access control lists (ACLs) and object groups Filter Java, ActiveX, and web content Authenticate and authorize connections using Cut-through Proxy (CTP) Use Modular Policy Framework (MPF) to configure security appliance features Perform protocol and application inspection Enable IPSec site-to-site and remote access connections Configure WebVPN components for SSL VPN access Implement advanced features, including the transparent firewall, security contexts, and failover Detect and prevent network attacks Prepare and manage the AIP-SSM and CSC-SSM cardsHinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Richard A. Deal operates his own company, The Deal Group Inc., recently relocated to Orlando, FL. He has almost 15 years experience in the computing and networking industry including networking, training, systems administration, and programming. In addition to a BS in Mathematics and Literature from Grove City College, Richard has certifications from Cisco: Cisco instructor, Cisco Certified Network Associate (CCNA), Cisco Certified Design Associate (CCDA), Cisco Certified Network Professional (CCNP), and Cisco Certified Design Professional (CCDP). As a Cisco instructor, Richard teaches 9 different Cisco classes.
Inhaltsangabe
Part I: Introduction to Firewalls and the ASAs Chapter 1: Firewall Basics Chapter 2: ASA Product Family Part II: ASA Basic Configuration Tasks Chapter 3: CLI Basics Chapter 4: Basic ASA Configuration Chapter 5: Routing and Multicasting Part III: Controlling Traffic Through the ASA Chapter 6: Address Translation Chapter 7: Access Control Chapter 8: Web Content Chapter 9: Cut-Through Proxy Chapter 10: IPv6 Part IV: Policy Implementation Chapter 11: Modular Policy Framework Chapter 12: Protocols and Policies Chapter 13: Data Applications and Policies Chapter 14: Voice and Policies Chapter 15: Multimedia and Policies Part V: VPNs Chapter 16: ASA as a Certificate Authority Chapter 17: IPSec Site-to-Site Chapter 18: IPSec Remote Access Server Chapter 19: IPSec Remote Access Client Chapter 20: SSL VPNs: Clientless Chapter 21: SSL VPNs: AnyConnect Client Part VI: Advanced Features of the ASA Chapter 22: Transparent Firewall Chapter 23: Contexts Chapter 24: Failover Chapter 25: Network Attack Prevention Chapter 26: SSM Cards Part VII: Management of the ASA Chapter 27: Basic Management Chapter 28: ASDM