O'Reilly logo

Securing Your Business with Cisco ASA and PIX Firewalls by Greg Abelar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Why Use Host Intrusion Prevention

The primary purpose of this book is to show you how to use PIX version 7 and ASDM to deploy defense in depth in your network. As explained in Chapter 2, “Principles of Network Defense,” the ASA/PIX Security Appliance does an excellent job of providing security services at the network level and some services at the application level. By following the steps in the previous chapters, you have already mitigated numerous potential attacks, providing examples on how to implement the following:

  • Device authentication

  • Traffic authentication

  • Public server isolation (DMZ)

  • Network device hardening

  • Traffic filtering

  • DoS protection

  • Protocol violation protection

  • Intrusion prevention and detection

In the Internet of yesterday, one ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required