Securing Your Business with Cisco ASA and PIX Firewalls

 

Index

[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W]

day-zero attacks 2nd

default gateway address

defense in depth

     deploying         at authentication layer 2nd

         at host intrusion prevention layer 2nd

         at perimeter layer         NIPSs

         security best practices 2nd

defense-in-depth    AAA

         implementing 2nd    perimeter security

         implementing 2nd 3rd 4th

defining

     private network address for DMZ interface 2nd

     private network address for web servers

     public address for web servers

deploying

     defense in depth

         at authentication layer 2nd

         at host intrusion prevention layer 2nd

         at perimeter layer

         NIPSs

         security best practices 2nd

     intrusion prevention on ASA/PIX Security Appliance 2nddevices

    ASA/PIX Security Appliance         hardening    hosts

         hardening 2nd

     limiting access to 2nd

     network device hardening    routers

         hardening 2nd    switches         hardening         security best practices 2nd

DHCP (Dynamic Host Configuration Protocol)

DMZ

DMZ (demilitarized zone) interfaces

DMZ interfaceDMZ interfaces     private network address, defining 2nd DNS (Domain Name Service)

DNS command filtering DNSGuardDoS attacks

     mitigating 2nd

     protecting against 2nd

         Anti-Spoofing configuration (ASA/PIX Security Appliance)

    resource-intensive         protecting against 2nd 3rd

downloading

     ASA/PIX version 7 operating system from TFTP 2nd 3rd 4th 5th 6th

 

Категории