| 2 comments ]

How This Book Is Organized

This book has five parts, which provide a Cisco ASA product overview and then focus on firewalls, intrusion prevention, VPNs, and Adaptive Security Device Manager (ASDM). Each part comprises many sample configurations, accompanied by in-depth analyses of design scenarios. Your learning is further enhanced by a discussion of a set of debugs included in each technology. Ground-breaking features, such as WebVPN and virtual and Layer 2 firewalls, are discussed extensively.

  • Part I, "Product Overview," includes the following chapters:

    - Chapter 1, "Introduction to Network Security" This chapter provides an overview of different technologies that are supported by Cisco ASA and widely used by today's network security professionals.

    - Chapter 2, "Product History" Historically, Cisco PIX security appliances, the Cisco IOS Advanced Security Feature Set, and the security services modules for Cisco Catalyst 6500 Series Switches have provided integrated security solutions to small and large organizations. As described in this chapter, Cisco ASA incorporates features from each of these products, integrating comprehensive firewall, intrusion detection and prevention, and VPN technologies in a cost-effective, single-box format.

    - Chapter 3, "Hardware Overview" This chapter provides a hardware overview of Cisco ASA, including detailed technical specifications and installation guidelines. It also covers an overview of the Adaptive Inspection and Prevention Security Services Module (AIP-SSM).

  • Part II, "Firewall Solution," includes the following chapters:

    - Chapter 4, "Initial Setup and System Maintenance" A comprehensive list of initial setup tasks and system maintenance procedures is included in this chapter. These tasks and procedures are intended to be used by network professionals who will be installing, configuring, and managing Cisco ASA.

    - Chapter 5, "Network Access Control" Cisco ASA can protect one or more networks from intruders. Connections between these networks can be carefully controlled by advanced firewall capabilities, enabling you to ensure that all traffic from and to the protected networks passes only through the firewall based on the organization's security policy. This chapter shows you how to implement your organization's security policy using the features that Cisco ASA provides.

    - Chapter 6, "IP Routing" This chapter covers the different routing capabilities of Cisco ASA.

    - Chapter 7, "Authentication, Authorization, and Accounting (AAA)" Cisco ASA supports a wide range of AAA features. This chapter provides guidelines on how to configure AAA services by defining a list of authentication methods applied to various implementations.

    - Chapter 8, "Application Inspection" Cisco ASA stateful application inspection helps to secure the use of applications and services in your network. This chapter describes how to use and configure application inspection.

    - Chapter 9, "Security Contexts" Cisco ASA virtual firewall feature introduces the concept of operating multiple instances of firewalls (contexts) within the same hardware platform. This chapter shows how to configure and troubleshoot each of these security contexts.

    - Chapter 10, "Transparent Firewalls"� This chapter introduces the transparent (Layer 2) firewall model within Cisco ASA. It explains how users can configure Cisco ASA in transparent single mode and multiple mode while accommodating their security needs.

    - Chapter 11, "Failover and Redundancy" This chapter discusses the different redundancy and failover mechanisms that Cisco ASA provides. It includes not only the overview and configuration, but also detailed troubleshooting procedures.

    - Chapter 12, "Quality of Service"� QoS is a network feature that lets you give priority to certain types of traffic. This chapter covers how to configure and troubleshoot QoS in Cisco ASA.

  • Part III, "Intrusion Prevention System (IPS) Solution," includes the following chapters:

    - Chapter 13, "Intrusion Prevention System Integration"� Intrusion detection and prevention systems provide a level of protection beyond the firewall by securing the network against internal and external attacks and threats. This chapter describes the integration of Intrusion Prevention System (IPS) features within Cisco ASA.

    - Chapter 14, "Configuring and Troubleshooting Cisco IPS Software via the CLI"� This chapter provides expert guidance on how to configure the AIP-SSM IPS software via its command-line interface (CLI). Troubleshooting scenarios are also included to enhance learning.

  • Part IV, "Virtual Private Network (VPN) Solution," includes the following chapters:

    - Chapter 15, "Site-to-Site IPSec VPNs"� Cisco ASA supports IPSec VPN features that allows you to connect networks in different geographic locations. This chapter provides configuration and troubleshooting guidelines to successfully deploy site-to-site IPSec VPNs.

    - Chapter 16, "Remote Access VPNs"� This chapter discusses many different remote-access VPN solutions that are supported on Cisco ASA. A large number of sample configurations and troubleshooting scenarios are provided.

    - Chapter 17, "Public Key Infrastructure (PKI)"� This chapter starts by introducing PKI concepts. It then covers the configuration and troubleshooting of PKI in Cisco ASA.

  • Part V, "Adaptive Security Device Manager," includes the following chapters:

    - Chapter 18, "Introduction to ASDM"� This chapter introduces Cisco ASA GUI�the Adaptive Security Device Manager (ASDM).

    - Chapter 19, "Firewall Management Using ASDM"� This chapter guides you on how to configure and manage firewall features using ASDM.

    - Chapter 20, "IPS Management Using ASDM"� This chapter shows you how to configure and manage IPS features using ASDM.

    - Chapter 21, "VPN Management Using ASDM"� The configuration and management of remote-access and site-to-site VPNs using ASDM are covered in this chapter.

    - Chapter 22, "Case Studies"� In this chapter, you gain greater insight into how the implementation of Cisco ASA advanced features can benefit your organization. Several sample configurations and deployment scenarios are covered in detail.

Read More ...
| 2 comments ]

Introduction
Part I: Troubleshooting Tools and Methodology
Chapter 1. Troubleshooting Methods
Proactive Actions for Handling Network Failure
Types of Failure
Problem-Solving Model
Summary
Chapter 2. Understanding Troubleshooting Tools
Using Device Diagnostic Commands
Test Commands
Network Analyzers
Trivial File Transfer Protocol (TFTP) Server
FTP Server
Syslog Server
Audit and Attack Tools
Core Dump
Part II: Troubleshooting Cisco Secure Firewalls
Chapter 3. Troubleshooting Cisco Secure PIX Firewalls
Overview of PIX Firewall
Diagnostic Commands and Tools
Problem Areas Breakdown
Case Studies
Common Problems and Resolutions
Best Practices
Chapter 4. Troubleshooting Firewall Services Module
Overview of FWSM Firewall
Diagnostic Commands and Tools
Analysis of Problem Areas
Case Studies
Common Problems and Resolutions
Best Practices
Chapter 5. Troubleshooting an IOS Firewall
Overview of IOS Firewall (CBAC)
Diagnostic Commands and Tools
Categories of Problem Areas
Case Studies
Common Problems and Resolutions
Best Practices
Part III: Troubleshooting Virtual Private Networks
Chapter 6. Troubleshooting IPsec VPNs on IOS Routers
Overview of IPsec Protocol
Diagnostic Commands and Tools
Analysis of Problem Areas
Case Studies
Common Problems and Resolutions
Best Practices
Chapter 7. Troubleshooting IPsec VPN on PIX Firewalls
Overview of IPsec Protocol
Diagnostic Commands and Tools
Categorization of Problem Areas
Case Studies
Common Problems and Resolutions
Best Practices
Chapter 8. Troubleshooting IPsec VPNs on VPN 3000 Series Concentrators
Diagnostic Commands and Tools
Analysis of Problem Areas
Case Studies
Common Problems and Resolutions
Best Practices
Part IV: Troubleshooting Network Access Control
Chapter 9. Troubleshooting AAA on IOS Routers
Overview of Authentication, Authorization, and Accounting (AAA)
Diagnostic Commands and Tools
Analysis of Problem Areas
Case Studies
Common Problems and Resolutions
Best Practices
Chapter 10. Troubleshooting AAA on PIX Firewalls and FWSM
Overview of Authentication, Authorization, and Accounting (AAA)
Diagnostic Commands and Tools
Problem Areas Analysis
Case Studies
Common Problems and Resolutions
Best Practices
Chapter 11. Troubleshooting AAA on the Switches
Overview of AAA
Diagnostic Commands and Tools
Categorization of Problem Areas
Case Studies
Common Problems and Resolutions
Best Practices
Chapter 12. Troubleshooting AAA on VPN 3000 Series Concentrator
AAA Implementation on the Concentrator
Diagnostic Commands and Tools
Analysis of Problem Areas
Case Studies
Common Problems and Resolutions
Best Practices
Chapter 13. Troubleshooting Cisco Secure ACS on Windows
Overview of CS ACS
Diagnostic Commands and Tools
Categorization of Problem Areas
Case Studies
User/NAS Import Options
Common Problems and Resolutions
Best Practices
Part V: Troubleshooting Intrusion Prevention Systems
Chapter 14. Troubleshooting Cisco Intrusion Prevention System
Overview of IPS Sensor Software
Diagnostic Commands and Tools
Classification of Problem Areas
Case Studies
Common Problems and Their Resolution
Best Practices
Chapter 15. Troubleshooting IDSM-2 Blade on Switch
Overview of IDSM-2 Blade on the Switch
Diagnostic Commands and Tools
Common Problems and Resolutions
Case Study
Common Problems and Resolutions
Best Practices
Chapter 16. Troubleshooting Cisco IDS Network Module (NM-CIDS)
Overview of NM-CIDS on the Router
Diagnostic Commands and Tools
Common Problems and Resolutions
Case Studies
Common Problems and Resolutions
Best Practices
Chapter 17. Troubleshooting CiscoWorks Common Services
Overview of CiscoWorks Common Services
Diagnostic Commands and Tools
Categorization of Problem Areas
Case Studies
Common Problems and Resolutions
Best Practices
Chapter 18. Troubleshooting IDM and IDS/IPS Management Console (IDS/IPS MC)
Overview of IDM and IDS/IPS Management Console (IDS/IPS MC)
Diagnostic Commands and Tools
Analysis of Problem Areas
Case Study
Common Problems and Resolutions
Best Practices
Chapter 19. Troubleshooting Firewall MC
Overview of Firewall MC
Diagnostic Commands and Tools
Analysis of Problem Areas
Common Problems and Resolutions
Best Practices
Chapter 20. Troubleshooting Router MC
Overview of Router MC
Diagnostic Commands and Tools
Analysis of Problem Areas
Case Study
Best Practices
Chapter 21. Troubleshooting Cisco Security Agent Management Console (CSA MC) and CSA Agent
Overview of CSA MC and Agent
Diagnostic Commands and Tools
Categorization of Problem Areas
Common Problems and Resolutions
Best Practices
Chapter 22. Troubleshooting IEV and Security Monitors
Overview of IEV and Security Monitor
Diagnostic Commands and Tools
Categorization of Problem Areas
Case Study
Common Problems and Resolutions
Best Practices
Index

Read More ...