Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services

( 13 )

Overview

Cisco® ASA

All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition

Identify, mitigate, and respond to today’s highly-sophisticated network attacks.

Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services has been fully updated to cover the newest techniques and Cisco technologies for ...

See more details below
Paperback
$61.84
BN.com price
(Save 22%)$79.99 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Paperback)
  • All (13) from $52.00   
  • New (10) from $54.74   
  • Used (3) from $52.00   
Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services

Available on NOOK devices and apps  
  • NOOK Devices
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK Study

Want a NOOK? Explore Now

NOOK Book (eBook)
$36.49
BN.com price
(Save 42%)$63.99 List Price

Overview

Cisco® ASA

All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition

Identify, mitigate, and respond to today’s highly-sophisticated network attacks.

Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services has been fully updated to cover the newest techniques and Cisco technologies for maximizing end-to-end security in your environment. Three leading Cisco security experts guide you through every step of creating a complete security plan with Cisco ASA, and then deploying, configuring, operating, and troubleshooting your solution.

Fully updated for today’s newest ASA releases, this edition adds new coverage of ASA 5500-X, ASA 5585-X, ASA Services Module, ASA next-generation firewall services, EtherChannel, Global ACLs, clustering, IPv6 improvements, IKEv2, AnyConnect Secure Mobility VPN clients, and more. The authors explain significant recent licensing changes; introduce enhancements to ASA IPS; and walk you through configuring IPsec, SSL VPN, and NAT/PAT.

You’ll learn how to apply Cisco ASA adaptive identification and mitigation services to systematically strengthen security in network environments of all sizes and types. The authors present up-to-date sample configurations, proven design scenarios, and actual debugs–
all designed to help you make the most of Cisco ASA in your rapidly evolving network.

Jazib Frahim, CCIE® No. 5459 (Routing and Switching; Security), Principal Engineer in the Global Security Solutions team, guides top-tier Cisco customers in security-focused network design and implementation. He architects, develops, and launches new security services concepts. His books include Cisco SSL VPN Solutions and Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting.

Omar Santos, CISSP No. 463598, Cisco Product Security Incident Response Team (PSIRT) technical leader, leads and mentors engineers and incident managers in investigating and resolving vulnerabilities in Cisco products and protecting Cisco customers. Through 18 years in IT and cybersecurity, he has designed, implemented, and supported numerous secure networks for Fortune® 500 companies and the U.S. government. He is also the author of several other books and numerous whitepapers and articles.

Andrew Ossipov, CCIE® No. 18483 and CISSP No. 344324, is a Cisco Technical Marketing Engineer focused on firewalls, intrusion prevention, and data center security. Drawing on more than 16 years in networking, he works to solve complex customer technical problems, architect new features and products, and define future directions for Cisco’s product portfolio. He holds several pending patents.

Understand, install, configure, license, maintain, and troubleshoot the newest ASA devices

Efficiently implement Authentication, Authorization, and Accounting (AAA) services

Control and provision network access with packet filtering, context-aware Cisco ASA next-generation firewall services, and new NAT/PAT concepts

Configure IP routing, application inspection, and QoS

Create firewall contexts with unique configurations, interfaces, policies, routing tables, and administration

Enable integrated protection against many types of malware and advanced persistent threats (APTs) via Cisco Cloud Web Security and Cisco Security Intelligence Operations (SIO)

Implement high availability with failover and elastic scalability with clustering

Deploy, troubleshoot, monitor, tune, and manage Intrusion Prevention System (IPS) features

Implement site-to-site IPsec VPNs and all forms of remote-access VPNs (IPsec, clientless SSL, and client-based SSL)

Configure and troubleshoot Public Key Infrastructure (PKI)

Use IKEv2 to more effectively resist attacks against VPNs

Leverage IPv6 support for IPS, packet inspection, transparent firewalls, and site-to-site IPsec VPNs

Read More Show Less

Product Details

  • ISBN-13: 9781587143076
  • Publisher: Cisco Press
  • Publication date: 5/19/2014
  • Edition number: 3
  • Pages: 1200
  • Sales rank: 305,607
  • Product dimensions: 7.40 (w) x 9.00 (h) x 2.50 (d)

Meet the Author

Jazib Frahim, CCIE No. 5459, is a Principal Engineer in the Global Security Services Practice at Cisco. He has been with Cisco for over 15 years, with a focus on cyber-security and emerging security technologies. Jazib is also responsible for guiding customers in

the design and implementation of security solutions and technologies in their networks with a focus on network security. He leads a team of solutions architects to guide them through the lifecycle of services and solutions development. Jazib has also been engaged

in the development of a number of customer-focused services, such as managed threat defense, network-based identity, bring-your-own-device (BYOD), and many others. Jazib holds a bachelor’s degree in computer engineering from Illinois Institute of

Technology and a master’s degree in business administration (MBA) from North Carolina State University. In addition to CISSP, Jazib also holds two CCIEs, one in routing and switching and the other in security. He has presented at many industry events, such as Cisco Live, Interop, and ISSA, on multiple occasions. He has also authored and coauthored numerous technical documents, whitepapers, and books, including the following Cisco Press titles:

¿ Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

¿ Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance, Second Edition

¿ Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting

¿ SSL Remote Access VPNs

Omar Santos, CISSP No. 463598 is a Senior Incident Manager of Cisco’s Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of security vulnerabilities in all Cisco products. Omar has designed, implemented, and supported numerous secure networks for Fortune 500 companies and the U.S. government. Prior to his current role, he was a technical leader within the World Wide Security Practice and Cisco’s Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within both organizations. Omar is an active member of the security community, where he leads several industrywide initiatives and standards bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants that are dedicated to increasing the security of the critical infrastructure. Omar has delivered numerous technical presentations at conferences and to Cisco customers and partners, as well as many C-level executive presentations to many organizations. He has authored numerous whitepapers, articles, and security configuration guidelines and best practices, and has also authored or coauthored the following Cisco Press books:

¿ Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

¿ Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security

¿ Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting

¿ End-to-End Network Security: Defense-in-Depth

Andrew Ossipov, CCIE No. 18483 and CISSP No. 344324, is currently a Technical Marketing Engineer at Cisco with primary concentration on firewall, intrusion prevention, and other Cisco Data Center Security solutions. With over 15 years of networking

experience, Andrew previously worked with LAN switching, routing protocol, and network data storage technologies and performed academic research in the area of VoIP. At Cisco, Andrew is involved in a broad range of activities that include solving customers’ technical problems of the highest complexity, architecting features and products, and defining the future direction of the product portfolio. He is an inventor and co-inventor of multiple pending cross-technology patents. Andrew received his bachelor of science in computer engineering and master of science in electrical engineering degrees from Wichita State University.

Read More Show Less

Table of Contents

Part I Product Overview
1. Introduction to Security Technologies
2. Cisco ASA Product and Solution Overview
3. Licensing
4. Initial Setup
5. System Maintenance
6. IPv6 Support

Part II Firewall Technology
7. Controlling Network Access
8. Network Address Translation
9. ASA IP Routing
10. Multicast Routing
11. Authentication, Authorization, and Accounting (AAA) Services
12. ASA Application Inspection (Fixup protocols)
13. Virtualization
14. Transparent Firewalls
15. Failover and Redundancy
16. Quality of Service (QoS)

Part III Intrusion Prevention System (IPS) Solution
17. Configuring and Troubleshooting Intrusion Prevention System (IPS) Technologies
18. Tuning and Monitoring (IPS)

Part V Virtual Private Network (VPN) Solutions
19. Site-to-site IPSec VPNs
20. IPSec Remote Access VPNs
21. Configuring and Troubleshooting Public Key Infrastructure (PKI)
22. Clientless Remote Access SSL VPN (104 pages)
23. Client-based Remote Access SSL VPN

Read More Show Less

Customer Reviews

Average Rating 4.5
( 13 )
Rating Distribution

5 Star

(11)

4 Star

(1)

3 Star

(0)

2 Star

(0)

1 Star

(1)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 13 Customer Reviews
  • Anonymous

    Posted July 8, 2014

    Lexii

    Babe Im really sleepy. She hops into his arms

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 8, 2014

    Ali

    *she walks in with a light blue dress with her hair perfectly curled and her earing dangling from her ears. She looks around standing alone in the crowd.*

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 8, 2014

    Comes in nu .de

    Steven

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 8, 2014

    Shadow

    Ok

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 8, 2014

    Ghost

    This is very boring babe lets go

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 10, 2014

    Jewel

    Walks in.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 8, 2014

    John

    Smiles back. Babe imma have to go soon

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 8, 2014

    Nathan to all

    I think its at the next res.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 9, 2014

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 8, 2014

    Adain to rolo

    Hey you said you would do it cmon

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 9, 2014

    Too smalpl

    Rolo

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 9, 2014

    Willow

    Okau

    Was this review helpful? Yes  No   Report this review
  • Posted June 29, 2014

    Are you a network professional who manages network security or i

    Are you a network professional who manages network security or installs and configures firewalls? If you are, then this book is for you! Authors Jazib Frahim, Omar Santos and Andrew Ossipov, have done an outstanding job of writing a book that is an insiders guide to planning, implementing, configuring, and troubleshooting the Cisco Adaptive Security Appliances.

    Authors Frahim, Santos and Ossipov, begin by providing an overview of different technologies that are supported by the Cisco ASA and widely used by today’s network security professionals. Then, the authors describe how the Cisco ASA incorporates features from each of the products, integrating comprehensive firewall, intrusion detection and prevention, and VPN technologies in a cost-effective, single-box format. They continue by examining the available licenses for each Cisco ASA model and specific features, and explain how to install such licenses. Then, the authors introduce a comprehensive list of initial setup tasks. They then show you how to perform system maintenance of the Cisco ASA, including system upgrades and health monitoring, and provide tips on how to troubleshoot hardware and data issues. Next, the authors show you how to configure the Cisco ASA Services Module; as well as, how to configure the Cisco Catalyst 6500 Series Switches and 7600 Series Routers to send traffic to be protected and inspected by the module. They continue by showing you how to configure AAA services by defining a list of authentication methods applied to various implementations. Then, the authors show you how to implement your organization’s security policy, by using the features that the Cisco ASA provides. They then cover the features, benefits deployment, configuration, and troubleshooting of the Cisco ASA Next-Generation Firewall Services. Next, the authors show you how to configure Network Address Translation on the Cisco ASA. They continue by covering the configuration and deployment of IPv6 support in the Cisco ASA. Then, the authors deal with the different routing capabilities of the Cisco ASA. They then show you how to use and configure application inspection. Next, the authors show you how to configure and troubleshoot each of the security contexts. They continue by introducing the transparent firewall model within the Cisco ASA. Then, the authors discuss the different redundancy and high availability mechanisms that the Cisco ASA provides. They then describe the integration of IPS features within Cisco ASA and provide expert guidance on how to configure the Cisco IPS software. Next, the authors cover the IPS tuning process; as well as, best practices on how to monitor IPS events. They continue by providing configuration and troubleshooting guidelines to successfully deploy site-to-site IPsec VPNs in both single- and multiple-mode firewalls. Then, the authors discuss two IPsec remote-access VPN solutions that are supported on the Cisco ASA. Finally, they show you how to configure, troubleshoot, and deploy the QoS features in the Cisco ASA.

    This excellent book delivers expert guidance from senior Cisco security engineers. In other words, this great book brings together expert guidance for virtually every challenge you will face­from building basic network security policies to advanced next-generation firewall, VPN, and IPS implementations.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 13 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)