Cisco ASA Configuration

, by
Cisco ASA Configuration by Deal, Richard, 9780071622691
Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
  • ISBN: 9780071622691 | 0071622691
  • Cover: Paperback
  • Copyright: 6/26/2009

  • Rent

    (Recommended)

    $44.19
     
    Term
    Due
    Price
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.
  • Buy Used

    Usually Ships in 3-5 Business Days

    $47.04
  • Buy New

    Usually Ships in 3-4 Business Days

    $63.38
  • eBook

    eTextBook from VitalSource Icon

    Available Instantly

    Online: 1825 Days

    Downloadable: Lifetime Access

    $59.40

"Richard Deal's gift of making difficult technology concepts understandable has remained constant. Whether it is presenting to a room of information technology professionals or writing books, Richard's communication skills are unsurpassed. As information technology professionals we are faced with overcoming challenges every day... Cisco ASA Configuration is a great reference and tool for answering our challenges." --From the Foreword by Steve Marcinek (CCIE 7225), Systems Engineer, Cisco SystemsA hands-on guide to implementing Cisco ASAConfigure and maintain a Cisco ASA platform to meet the requirements of your security policy. Cisco ASA Configuration shows you how to control traffic in the corporate network and protect it from internal and external threats. This comprehensive resource covers the latest features available in Cisco ASA version 8.0, and includes detailed examples of complex configurations and troubleshooting. Implement and manage Cisco's powerful, multifunction network adaptive security appliance with help from this definitive guide. Configure Cisco ASA using the command-line interface (CLI) and Adaptive Security Device Manager (ASDM) Control traffic through the appliance with access control lists (ACLs) and object groups Filter Java, ActiveX, and web content Authenticate and authorize connections using Cut-through Proxy (CTP) Use Modular Policy Framework (MPF) to configure security appliance features Perform protocol and application inspection Enable IPSec site-to-site and remote access connections Configure WebVPN components for SSL VPN access Implement advanced features, including the transparent firewall, security contexts, and failover Detect and prevent network attacks Prepare and manage the AIP-SSM and CSC-SSM cards

You might also enjoy...

Loading Icon

Please wait while the item is added to your bag...
Continue Shopping Button
Checkout Button
Loading Icon
Continue Shopping Button