In this book, you use ASDM to implement authentication on the ASA/PIX Security Appliance. The following list of authentication tasks are performed:
Secure Telnet security appliance access
Secure SSH security appliance access
Secure ASDM/HTTPS security appliance access
Secure inbound and outbound web users (optional)
Authorize security appliance users
Securing Access to the Security Appliance
Now that you have a basic understanding of both authentication and its importance, you can start ASDM and follow these procedures to deploy authentication.
This step-by-step procedure leverages off of the configuration work that you have already done on your ASA/PIX Security Appliance in Chapter 5, “Deploying Secure Internet Connectivity,” ...
Get Securing Your Business with Cisco ASA and PIX Firewalls now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.