Why Use Host Intrusion Prevention
The primary purpose of this book is to show you how to use PIX version 7 and ASDM to deploy defense in depth in your network. As explained in Chapter 2, “Principles of Network Defense,” the ASA/PIX Security Appliance does an excellent job of providing security services at the network level and some services at the application level. By following the steps in the previous chapters, you have already mitigated numerous potential attacks, providing examples on how to implement the following:
Device authentication
Traffic authentication
Public server isolation (DMZ)
Network device hardening
Traffic filtering
DoS protection
Protocol violation protection
Intrusion prevention and detection
In the Internet of yesterday, one ...
Get Securing Your Business with Cisco ASA and PIX Firewalls now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.