Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

( 4 )

Overview

Identify, mitigate, and respond to network attacks

  • Understand the evolution of security technologies that make up the unified ASA device and how to install the ASA hardware
  • Examine firewall solutions including network access control, IP routing, AAA, application inspection, virtual firewalls, transparent (Layer 2) firewalls, failover and redundancy, and QoS
  • Evaluate ...
See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (10) from $3.81   
  • New (2) from $66.28   
  • Used (8) from $3.81   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$66.28
Seller since 2008

Feedback rating:

(213)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New

Ships from: Chicago, IL

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$75.50
Seller since 2015

Feedback rating:

(362)

Condition: New
Brand New Item.

Ships from: Chatham, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Identify, mitigate, and respond to network attacks

  • Understand the evolution of security technologies that make up the unified ASA device and how to install the ASA hardware
  • Examine firewall solutions including network access control, IP routing, AAA, application inspection, virtual firewalls, transparent (Layer 2) firewalls, failover and redundancy, and QoS
  • Evaluate Intrusion Prevention System (IPS) solutions including IPS integration and Adaptive Inspection and Prevention Security Services Module (AIP-SSM) configuration
  • Deploy VPN solutions including site-to-site IPsec VPNs, remote- access VPNs, and Public Key Infrastructure (PKI)
  • Learn to manage firewall, IPS, and VPN solutions with Adaptive Security Device Manager (ASDM)

Achieving maximum network security is a challenge for most organizations. Cisco® ASA, a new unified security device that combines firewall, network antivirus, intrusion prevention, and virtual private network (VPN) capabilities, provides proactive threat defense that stops attacks before they spread through the network.

This new family of adaptive security appliances also controls network activity and application traffic and delivers flexible VPN connectivity. The result is a powerful multifunction network security device that provides the security breadth and depth for protecting your entire network, while reducing the high deployment and operations costs and complexities associated with managing multiple point products.

Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance is a practitioner’s guide to planning, deploying, and troubleshooting a comprehensive security plan with Cisco ASA. The book provides valuable insight and deployment examples and demonstrates how adaptive identification and mitigation services on Cisco ASA provide a sophisticated security solution for both large and small network environments.

The book contains many useful sample configurations, proven design scenarios, and discussions of debugs that help you understand how to get the most out of Cisco ASA in your own network.

“I have found this book really highlights the practical aspects needed for building real-world security. It offers the insider’s guidance needed to plan, implement, configure, and troubleshoot the Cisco ASA in customer environments and demonstrates the potential and power of Self-Defending Networks.”

–Jayshree Ullal, Sr. Vice President, Security Technologies Group, Cisco Systems®

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Read More Show Less

Product Details

  • ISBN-13: 9781587052095
  • Publisher: Cisco Press
  • Publication date: 10/14/2005
  • Series: Networking Technology
  • Edition description: Older Edition
  • Edition number: 1
  • Pages: 840
  • Product dimensions: 7.35 (w) x 9.12 (h) x 1.63 (d)

Meet the Author

Jazib Frahim, CCIE® No. 5459, is a senior network security engineer in the Worldwide Security Services Practice of Advanced Services for Network Security at Cisco. He is responsible for guiding customers in the design and implementation of their networks with a focus in network security.

Omar Santos is a senior network security engineer in the Worldwide Security Services Practice of Advanced Services for Network Security at Cisco. He has more than 12 years of experience in secure data communications.

Read More Show Less

Table of Contents

Pt. I Product overview 3
Ch. 1 Introduction to network security 5
Ch. 2 Product history 31
Ch. 3 Hardware overview 37
Pt. II Firewall solution 47
Ch. 4 Initial setup and system maintenance 49
Ch. 5 Network access control 117
Ch. 6 IP routing 175
Ch. 7 Authentication, authorization, and accounting (AAA) 213
Ch. 8 Application inspection 247
Ch. 9 Security contexts 291
Ch. 10 Transparent firewalls 321
Ch. 11 Failover and redundancy 347
Ch. 12 Quality of service 381
Pt. III Intrusion prevention system (IPS) solution 405
Ch. 13 Intrusion prevention system integration 407
Ch. 14 Configuring and troubleshooting Cisco IPS software via CLI 421
Pt. IV Virtual private network (VPN) solution 465
Ch. 15 Site-to-site IPSec VPNs 467
Ch. 16 Remote access VPN 499
Ch. 17 Public key infrastructure (PKI) 575
Pt. V Adaptive security device manager 609
Ch. 18 Introduction to ASDM 611
Ch. 19 Firewall management using ASDM 645
Ch. 20 IPS management using ASDM 679
Ch. 21 VPN management using ASDM 705
Ch. 22 Case studies 751
Read More Show Less

Customer Reviews

Average Rating 4
( 4 )
Rating Distribution

5 Star

(2)

4 Star

(0)

3 Star

(2)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 4 Customer Reviews
  • Anonymous

    Posted December 3, 2005

    Outstanding book!!

    It gave me the answers I was looking for since the new Cisco solution was released. Very good examples and case studies!!!! Kudos to the authors!!!

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted November 4, 2005

    Great book on the Cisco ASA

    Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance (Paperback) by Omar Santos, Jazib Frahim ISBN: 1587052091 Lately there is a fashion to say that now the network layer has been secured and so application security rules and that is what we need to worry about. Nothing can be further from the truth, imagine if a VPN implementation is not working as desired is it possible to still have a secure application layer, I think not. That is why they are called layers as they work in perfect harmony with each other. The book on Cisco ASA provides a very good understanding of the Adaptive behaviour of the next generation of cisco products which do the work of detection, prevention and combatting network threats. The book explains in a very lucid way to implement and configure a complex device which handles the work of a virus scanner, content filter, firewall and VPN. Through various confguration examples and designs the book explains the complex task of troubleshooting and that itself is worth the price of the book. The tips on how to use the various debug commands to fine tune the device are invaluable and a must for any one attempting to tame this beast. The coauthor Jazib Frahim, CCIE is a senior network security engineer in the Worldwide Security Services Practice of Advanced Services for Network Security at Cisco. The coauthor Omar Santos is a senior network security engineer in the Worldwide Security Services Practice of Advanced Services for Network Security at Cisco. I give this book 5 stars on a scale of 5, 5 being the highest. I strongly recommend this book. Niloufer Tamboly, CISSP

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 9, 2010

    No text was provided for this review.

  • Anonymous

    Posted December 27, 2010

    No text was provided for this review.

Sort by: Showing all of 4 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)