O'Reilly logo

Securing Your Business with Cisco ASA and PIX Firewalls by Greg Abelar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Additional Security Best Practices

Along with defense in depth, you need to put some additional best practices into practice to ensure that network security is achieved in your business.

Specific issues that you need to address include the following:

  • VPN users are at higher risk of software infection because their environment isn't controlled by a corporate security policy.

  • Security management functions such as logging, reading, and responding to syslog messages and events need to be deployed.

The bulk of the best practices described throughout the book are summarized in Appendix A, “Deploying Effective Security Management.”

Remote-Access Defense

Remote access is a staple of many businesses in today's Internet environment. Increasingly, companies ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required