Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (Networking Technology: Security Series) / Edition 2

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $45.31
Usually ships in 1-2 business days
(Save 46%)
Other sellers (Paperback)
  • All (12) from $45.31   
  • New (5) from $62.48   
  • Used (7) from $45.31   


For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide to planning, deploying, managing, and troubleshooting security with Cisco ASA. Written by two leading Cisco security experts, this book presents each Cisco ASA solution in depth, offering comprehensive sample configurations, proven troubleshooting methodologies, and debugging examples. Readers will learn about the Cisco ASA Firewall solution and capabilities; secure configuration and troubleshooting of site-to-site and remote access VPNs; Intrusion Prevention System features built into Cisco ASA's Advanced Inspection and Prevention Security Services Module (AIP-SSM); and Anti-X features in the ASA Content Security and Control Security Services Module (CSC-SSM). This new edition has been updated with detailed information on the latest ASA models and features.

  • Everything network professionals need to know to identify, mitigate, and respond to network attacks with Cisco ASA
  • Includes detailed configuration examples, with screenshots and command line references
  • Covers the ASA 8.2 release
  • Presents complete troubleshooting methodologies and architectural references
Read More Show Less

Product Details

  • ISBN-13: 9781587058196
  • Publisher: Cisco Press
  • Publication date: 1/12/2010
  • Series: Networking Technology: Security Series
  • Edition description: Second Edition
  • Edition number: 2
  • Pages: 1119
  • Sales rank: 801,989
  • Product dimensions: 7.30 (w) x 9.00 (h) x 2.40 (d)

Meet the Author

Jazib Frahim CCIE # 5459, is Technical Leader in the Worldwide Security Services Practice of Cisco's Advanced Services for Network Security. He was previously Technical Lead for Cisco's TAC Security team, leading twenty engineers in resolving complicated security and VPN technologies. He is author of Cisco Network Admission Control, Volume II and Cisco SSL VPN Solutions. Omar Santos Senior Network Security Engineer and Incident Manager at Cisco's Product Security Incident Response Team, has designed, implemented, and supported secure networks for Fortune 500 companies and the U.S. government, including the Marine Corps and DOD.
Read More Show Less

Table of Contents

1. Introduction to Firewall Technologies
2. Product Overview
3. System Maintenance
4. ASA Network Access Control and Use
5. ASA IP Routing
6. Authentication, Authorization, and Accounting (AAA) Services
7. ASA Application Inspection (Fixup protocols)
8. Security Contexts
9. Transparent Firewall Feature (Layer 2 Firewall)
10. Failover and Redundancy
11. Quality of Service (QoS)
12. Introduction to Intrusion Prevention System (IPS) Technologies
13. Intrusion Prevention System (IPS) Integration
14. Configuring and Troubleshooting IPS
15. Tuning and Monitoring IPS
16. Introduction to Anti-X
17. Content Security and Control Security Services Module (CSC-SSM) Integration
18. Configuring and Troubleshooting Anti-X Services
19. Introduction to VPN
20. Site-to-site IPSec VPNs
21. IPSec Remote Access VPNs
22. Configuring and Troubleshooting Public Key Infrastructure (PKI)
23. Clientless Remote Access SSL VPN
24. Client-based Remote Access SSL VPN
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 6 Customer Reviews
  • Posted April 3, 2010

    more from this reviewer

    Excellent resource for ASA management

    The sheer weight of this book intimidates you right out of the box! However, once you open it up and start reading, you realize that you have an excellent reference for the Cisco ASA product. From the beginning where the book introduces you to the overall solution to where it spends a chapter on each of the components mentioned in the title (even better- some have much more in-depth coverage) to the end where an entire section is dedicated to configuring the Virtual Private Networks, this book provides the necessary information to securely set up and use this important appliance.

    I liked many aspects of this book, but when I initially cracked it open and saw the product overview alone, I knew that this was the type of book that I needed if I wanted to maintain this type of solution. Why? Well, this particular section walked you through the different models of the ASA product line, complete with pictures of each and diagrams of where and what all the different features are. This is the type of information that you don't need every day, but when you need it you typically end up scrounging for it on the web, taking considerable time and effort away from your troubleshooting efforts.

    The rest of the book is equally detailed, providing the step by step information that you need to set up the important features of this product. Throughout the sections that explain the features, you find notes about default settings and other limitations that the feature may encounter. Architecture diagrams and screen shots also help the reader to understand what they are actually doing rather than just barking out orders and having the setup be dictated.

    Lastly, to clear up one mystery that puzzled me from the start: Anti-X isn't a new fangled threat that we need to worry about. It appears that description covers the anti-spam, anti-virus and anti-spyware configurations of the features that the box provides.

    If you have an ASA appliance, then this book will be invaluable in your support of this device.

    Was this review helpful? Yes  No   Report this review
  • Posted March 1, 2010

    more from this reviewer

    Excellent Resource for Cisco ASA admins and for CCIE Security Candidates

    This book is written by Omar Santos and Jazib Frahim and both of them are leading Security engineers from Cisco Systems. Hence you are in extremely capable hands and the book is worth every penny. Having said that, the book is huge (over 1000 pages) and it may not be feasible to read it cover to cover but it is filled with excellent information. It is comprised of 20 chapters emphasizing five key technology areas including Cisco ASA product overview and firewall portfolio, Firewall technology, IPS, Content Security (URL Filtering, Anti-X etc) and VPNs.

    The book is filled with configuration examples for both CLI and ASDM GUI. It covers ASA 8.2 code and hence the content is extremely current, fresh and relevant. The book explains firewall theory, implementation, tuning and troubleshooting in great detail, making it an excellent resource for Cisco ASA administrators and CCIE Security candidates as the lab test ASA firewall in great detail.

    I bought this book to learn more about firewall visualization and transparent firewalls. The book spends over 100 pages on these two technologies and cover them with great detail. Visualization is configured step by step using both CLI and ASDM and then important troubleshooting commands are also covered. Transparent firewalls are clearly explained with detailed configuration examples. Also the chapter contains a table showing readers how routed mode firewalls differ from transparent firewalls and what features are not supported when ASA is running in transparent mode.

    Only minor complaint I have is the book should dedicate one more chapter for a detailed case study and showcase all technologies like Site to Site VPNs, Remote Access VPNs, SSL VPNs, IPS, AntiX, Transparent Firewalls and Virtual Firewalls at the same time by showing a enterprise network with one head office and two branch offices. This will help readers to see all technologies in action at the same time and further clarify things.

    Overall I am extremely satisfied with this product and strongly endorse it for CCIE Security candidates and Cisco ASA administrators as their one stop resource for Cisco ASA firewalls.

    Was this review helpful? Yes  No   Report this review
  • Posted February 7, 2010

    Great book!

    When I bought this book I thought that it was too big. However, it is just perfect! It already helped me resolve several issues in my ASA configuration and my overall network implementation.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 24, 2011

    No text was provided for this review.

  • Anonymous

    Posted February 28, 2010

    No text was provided for this review.

  • Anonymous

    Posted December 12, 2010

    No text was provided for this review.

Sort by: Showing all of 6 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)