Implementing Authentication

In this book, you use ASDM to implement authentication on the ASA/PIX Security Appliance. The following list of authentication tasks are performed:

  • Secure Telnet security appliance access

  • Secure SSH security appliance access

  • Secure ASDM/HTTPS security appliance access

  • Secure inbound and outbound web users (optional)

  • Authorize security appliance users

Securing Access to the Security Appliance

Now that you have a basic understanding of both authentication and its importance, you can start ASDM and follow these procedures to deploy authentication.

This step-by-step procedure leverages off of the configuration work that you have already done on your ASA/PIX Security Appliance in Chapter 5, “Deploying Secure Internet Connectivity,” ...

Get Securing Your Business with Cisco ASA and PIX Firewalls now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.