Cisco ASA Configuration (e-bog) af Deal, Richard
Deal, Richard (forfatter)

Cisco ASA Configuration e-bog

473,39 DKK (inkl. moms 591,74 DKK)
&quote;Richard Deal's gift of making difficult technology concepts understandable has remained constant. Whether it is presenting to a room of information technology professionals or writing books, Richard's communication skills are unsurpassed. As information technology professionals we are faced with overcoming challenges every day...Cisco ASA Configuration is a great reference and tool for a...
E-bog 473,39 DKK
Forfattere Deal, Richard (forfatter)
Forlag McGraw Hill
Udgivet 24 august 2009
Længde 736 sider
Genrer Computer networking and communications
Sprog English
Format pdf
Beskyttelse LCP
ISBN 9780071622684
"e;Richard Deal's gift of making difficult technology concepts understandable has remained constant. Whether it is presenting to a room of information technology professionals or writing books, Richard's communication skills are unsurpassed. As information technology professionals we are faced with overcoming challenges every day...Cisco ASA Configuration is a great reference and tool for answering our challenges."e; --From the Foreword by Steve Marcinek (CCIE 7225), Systems Engineer, Cisco SystemsA hands-on guide to implementing Cisco ASAConfigure and maintain a Cisco ASA platform to meet the requirements of your security policy. Cisco ASA Configuration shows you how to control traffic in the corporate network and protect it from internal and external threats. This comprehensive resource covers the latest features available in Cisco ASA version 8.0, and includes detailed examples of complex configurations and troubleshooting. Implement and manage Cisco's powerful, multifunction network adaptive security appliance with help from this definitive guide.Configure Cisco ASA using the command-line interface (CLI) and Adaptive Security Device Manager (ASDM)Control traffic through the appliance with access control lists (ACLs) and object groupsFilter Java, ActiveX, and web contentAuthenticate and authorize connections using Cut-through Proxy (CTP)Use Modular Policy Framework (MPF) to configure security appliance featuresPerform protocol and application inspectionEnable IPSec site-to-site and remote access connectionsConfigure WebVPN components for SSL VPN accessImplement advanced features, including the transparent firewall, security contexts, and failoverDetect and prevent network attacksPrepare and manage the AIP-SSM and CSC-SSM cards