Foreword |
|
xxvii | |
Introduction |
|
xxx | |
|
|
3 | (44) |
|
Introduction to Network Security |
|
|
5 | (26) |
|
|
5 | (5) |
|
|
5 | (1) |
|
Packet-Filtering Techniques |
|
|
6 | (1) |
|
|
7 | (1) |
|
Network Address Translation |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
Stateful Inspection Firewalls |
|
|
9 | (1) |
|
|
10 | (1) |
|
Intrusion Detection and Prevention Technologies |
|
|
10 | (4) |
|
Network-Based Intrusion Detection and Prevention Systems |
|
|
11 | (1) |
|
Pattern Matching and Stateful Pattern-Matching Recognition |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
Host-Based Intrusion Detection Systems |
|
|
13 | (1) |
|
|
14 | (4) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (11) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (2) |
|
|
22 | (2) |
|
|
24 | (1) |
|
|
24 | (1) |
|
Encapsulation Security Payload |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (2) |
|
|
31 | (6) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
Cisco ASA All-in-One Solution |
|
|
33 | (2) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (2) |
|
|
37 | (10) |
|
|
37 | (4) |
|
|
41 | (2) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
45 | (2) |
|
Part II Firewall Solution |
|
|
47 | (358) |
|
Initial Setup and System Maintenance |
|
|
49 | (68) |
|
Accessing the Cisco ASA Appliances |
|
|
49 | (5) |
|
Establishing a Console Connection |
|
|
49 | (3) |
|
|
52 | (2) |
|
|
54 | (2) |
|
|
56 | (12) |
|
Setting Up the Device Name |
|
|
58 | (1) |
|
|
59 | (4) |
|
Configuring a Subinterface |
|
|
63 | (2) |
|
Configuring a Management Interface |
|
|
65 | (1) |
|
|
65 | (3) |
|
|
68 | (4) |
|
|
68 | (2) |
|
|
70 | (1) |
|
|
70 | (2) |
|
Setting Up the System Clock |
|
|
72 | (3) |
|
Manual Clock Adjustment Using clock set |
|
|
72 | (1) |
|
Automatic Clock Adjustment Using the Network Time Protocol |
|
|
73 | (1) |
|
Time Zones and Daylight Savings Time |
|
|
74 | (1) |
|
|
75 | (7) |
|
|
76 | (3) |
|
|
79 | (1) |
|
Removing the Device Configuration |
|
|
80 | (2) |
|
|
82 | (7) |
|
|
82 | (2) |
|
|
84 | (5) |
|
|
89 | (11) |
|
|
89 | (1) |
|
Image Upgrade via the Cisco ASA CLI |
|
|
89 | (3) |
|
Image Recovery Using ROMMON |
|
|
92 | (1) |
|
Password Recovery Process |
|
|
93 | (4) |
|
Disabling the Password Recovery Process |
|
|
97 | (3) |
|
|
100 | (15) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
103 | (5) |
|
Additional Syslog Parameters |
|
|
108 | (1) |
|
Simple Network Management Protocol |
|
|
109 | (1) |
|
|
110 | (2) |
|
|
112 | (1) |
|
CPU and Memory Monitoring |
|
|
113 | (2) |
|
|
115 | (2) |
|
|
117 | (58) |
|
|
117 | (9) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
Configuring Packet Filtering |
|
|
120 | (1) |
|
|
121 | (3) |
|
Step 2: Apply an ACL to an Interface |
|
|
124 | (1) |
|
Step 3: Set Up an IPv6 ACL (Optional) |
|
|
125 | (1) |
|
|
126 | (11) |
|
|
127 | (1) |
|
|
127 | (3) |
|
|
130 | (3) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
Content and URL Filtering |
|
|
137 | (8) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
Configuring Content Filtering |
|
|
138 | (1) |
|
|
139 | (2) |
|
Configuring URL Filtering |
|
|
141 | (4) |
|
Deployment Scenarios Using ACLs |
|
|
145 | (4) |
|
Using ACLs to Filter Inbound and Outbound Traffic |
|
|
145 | (2) |
|
Enabling Content Filtering Using Websense |
|
|
147 | (2) |
|
Monitoring Network Access Control |
|
|
149 | (4) |
|
|
149 | (3) |
|
Monitoring Content Filtering |
|
|
152 | (1) |
|
Understanding Address Translation |
|
|
153 | (16) |
|
Network Address Translation |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
Configuring Address Translation |
|
|
157 | (1) |
|
|
157 | (3) |
|
Dynamic Network Address Translation |
|
|
160 | (1) |
|
Static Port Address Translation |
|
|
161 | (2) |
|
Dynamic Port Address Translation |
|
|
163 | (1) |
|
|
164 | (1) |
|
Bypassing Address Translation |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (2) |
|
|
169 | (3) |
|
Monitoring Address Translations |
|
|
172 | (1) |
|
|
173 | (2) |
|
|
175 | (38) |
|
Configuring Static Routes |
|
|
175 | (3) |
|
|
178 | (5) |
|
|
179 | (2) |
|
Verifying the Configuration |
|
|
181 | (1) |
|
|
181 | (1) |
|
Scenario 1: RIP Version Mismatch |
|
|
181 | (1) |
|
Scenario 2: RIP Authentication Mismatch |
|
|
182 | (1) |
|
Scenario 3: Multicast or Broadcast Packets Blocked |
|
|
182 | (1) |
|
Scenario 4: Correct Configuration and Behavior |
|
|
183 | (1) |
|
|
183 | (20) |
|
|
185 | (1) |
|
|
185 | (2) |
|
|
187 | (2) |
|
Configuring OSPF Authentication |
|
|
189 | (2) |
|
Configuring the Cisco ASA as an ASBR |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
193 | (2) |
|
OSPF neighbor Command and Dynamic Routing over VPN |
|
|
195 | (1) |
|
|
196 | (1) |
|
Useful Troubleshooting Commands |
|
|
196 | (6) |
|
|
202 | (1) |
|
OSPF Authentication Mismatch |
|
|
202 | (1) |
|
Troubleshooting Virtual Link Problems |
|
|
202 | (1) |
|
|
203 | (6) |
|
|
203 | (1) |
|
|
203 | (1) |
|
Configuring Multicast Routing |
|
|
204 | (1) |
|
Enabling Multicast Routing |
|
|
204 | (1) |
|
Statically Assigning an IGMP Group |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
Defining the IGMP Version |
|
|
205 | (1) |
|
Configuring Rendezvous Points |
|
|
205 | (1) |
|
Configuring Threshold for SPT Switchover |
|
|
206 | (1) |
|
Filtering RP Register Messages |
|
|
206 | (1) |
|
PIM Designated Router Priority |
|
|
206 | (1) |
|
PIM Hello Message Interval |
|
|
206 | (1) |
|
Configuring a Static Multicast Route |
|
|
207 | (1) |
|
Troubleshooting IP Multicast Routing |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
209 | (2) |
|
|
209 | (2) |
|
|
211 | (1) |
|
|
211 | (2) |
|
Authentication, Authorization, and Accounting (AAA) |
|
|
213 | (34) |
|
AAA Protocols and Services Supported by Cisco ASA |
|
|
213 | (7) |
|
|
215 | (2) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
219 | (1) |
|
Active Directory and Kerberos |
|
|
219 | (1) |
|
Lightweight Directory Access Protocol |
|
|
219 | (1) |
|
Defining an Authentication Server |
|
|
220 | (4) |
|
Configuring Authentication of Administrative Sessions |
|
|
224 | (3) |
|
Authenticating Telnet Connections |
|
|
224 | (1) |
|
Authenticating SSH Connections |
|
|
225 | (2) |
|
Authenticating Serial Console Connections |
|
|
227 | (1) |
|
Authenticating Cisco ASDM Connections |
|
|
227 | (1) |
|
Authenticating Firewall Sessions (Cut-Through Proxy Feature) |
|
|
227 | (5) |
|
|
231 | (1) |
|
Customizing Authentication Prompts |
|
|
231 | (1) |
|
Configuring Authorization |
|
|
232 | (3) |
|
|
233 | (1) |
|
Configuring Downloadable ACLs |
|
|
234 | (1) |
|
|
235 | (2) |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
237 | (5) |
|
Deploying Authentication, Command Authorization, and Accounting for Administrative Sessions |
|
|
238 | (2) |
|
Deploying Cut-Through Proxy Authentication |
|
|
240 | (2) |
|
|
242 | (3) |
|
Troubleshooting Administrative Connections to Cisco ASA |
|
|
242 | (3) |
|
Troubleshooting Firewall Sessions (Cut-Through Proxy) |
|
|
245 | (1) |
|
|
245 | (2) |
|
|
247 | (44) |
|
Enabling Application Inspection Using the Modular Policy Framework |
|
|
248 | (2) |
|
|
250 | (2) |
|
Computer Telephony Interface Quick Buffer Encoding Inspection |
|
|
252 | (1) |
|
|
253 | (1) |
|
Extended Simple Mail Transfer Protocol |
|
|
254 | (2) |
|
|
256 | (2) |
|
General Packet Radio Service Tunneling Protocol |
|
|
258 | (5) |
|
|
259 | (1) |
|
|
260 | (2) |
|
Configuring GTP Inspection |
|
|
262 | (1) |
|
|
263 | (5) |
|
|
263 | (3) |
|
H.323 Version Compatibility |
|
|
266 | (1) |
|
Enabling H.323 Inspection |
|
|
267 | (1) |
|
Direct Call Signaling and Gatekeeper Routed Control Signaling |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
268 | (8) |
|
|
269 | (1) |
|
|
270 | (1) |
|
|
270 | (1) |
|
content-type-verification |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
273 | (2) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
277 | (2) |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
282 | (2) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
285 | (4) |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
288 | (1) |
|
|
289 | (2) |
|
|
291 | (30) |
|
|
292 | (7) |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
|
Packet Flow in Multiple Mode |
|
|
295 | (1) |
|
|
295 | (1) |
|
Packet Forwarding Between Contexts |
|
|
296 | (3) |
|
Configuration of Security Contexts |
|
|
299 | (8) |
|
Step 1: Enabling Multiple Security Contexts Globally |
|
|
299 | (2) |
|
Step 2: Setting Up the System Execution Space |
|
|
301 | (1) |
|
Step 3: Specifying a Configuration URL |
|
|
302 | (2) |
|
Step 4: Allocating the Interfaces |
|
|
304 | (1) |
|
Step 5: Configuring an Admin Context |
|
|
305 | (1) |
|
Step 6: Configuring a Customer Context |
|
|
306 | (1) |
|
Step 7: Managing the Security Contexts (Optional) |
|
|
307 | (1) |
|
|
307 | (9) |
|
Virtual Firewall Using Two Customer Contexts |
|
|
308 | (4) |
|
Virtual Firewall Using a Shared Interface |
|
|
312 | (4) |
|
Monitoring and Troubleshooting the Security Contexts |
|
|
316 | (3) |
|
|
316 | (1) |
|
|
317 | (2) |
|
|
319 | (2) |
|
|
321 | (26) |
|
|
323 | (4) |
|
Single-Mode Transparent Firewall |
|
|
323 | (1) |
|
|
323 | (3) |
|
Multimode Transparent Firewall |
|
|
326 | (1) |
|
|
326 | (1) |
|
Transparent Firewalls and VPNs |
|
|
327 | (1) |
|
Configuration of Transparent Firewall |
|
|
328 | (6) |
|
|
328 | (1) |
|
|
329 | (1) |
|
Step 1: Enabling Transparent Firewalls |
|
|
329 | (1) |
|
Step 2: Setting Up Interfaces |
|
|
330 | (1) |
|
Step 3: Configuring an IP Address |
|
|
330 | (1) |
|
Step 4: Configuring Interface ACLs |
|
|
331 | (2) |
|
Step 5: Adding Static L2F Table Entries (Optional) |
|
|
333 | (1) |
|
Step 6: Enabling ARP Inspection (Optional) |
|
|
333 | (1) |
|
Step 7: Modifying L2F Table Parameters (optional) |
|
|
334 | (1) |
|
|
334 | (7) |
|
|
335 | (1) |
|
MMTF Deployment with Security Contexts |
|
|
336 | (5) |
|
Monitoring and Troubleshooting the Transparent Firewall |
|
|
341 | (4) |
|
|
341 | (1) |
|
|
342 | (3) |
|
|
345 | (2) |
|
|
347 | (34) |
|
|
347 | (8) |
|
Conditions that Trigger Failover |
|
|
348 | (1) |
|
|
349 | (1) |
|
|
350 | (1) |
|
Hardware and Software Requirements |
|
|
351 | (1) |
|
|
351 | (1) |
|
|
351 | (1) |
|
|
352 | (1) |
|
|
353 | (2) |
|
|
355 | (14) |
|
Active/Standby Failover Configuration |
|
|
355 | (1) |
|
Step 1: Select the Failover Link |
|
|
355 | (1) |
|
Step 2: Assign Failover IP Addresses |
|
|
356 | (1) |
|
Step 3: Set the Failover Key (Optional) |
|
|
357 | (1) |
|
Step 4: Designating the Primary Cisco ASA |
|
|
357 | (1) |
|
Step 5: Enable Stateful Failover (Optional) |
|
|
358 | (1) |
|
Step 6: Enable Failover Globally |
|
|
358 | (1) |
|
Step 7: Configure Failover on the Secondary Cisco ASA |
|
|
359 | (1) |
|
Active/Active Failover Configuration |
|
|
359 | (1) |
|
Step 1: Select the Failover Link |
|
|
360 | (1) |
|
Step 2: Assign Failover Interface IP Addresses |
|
|
360 | (1) |
|
|
360 | (1) |
|
Step 4: Designate the Primary Cisco ASA |
|
|
360 | (1) |
|
Step 5: Enable Stateful Failover |
|
|
361 | (1) |
|
Step 6: Set Up Failover Groups |
|
|
361 | (1) |
|
Step 7: Assign Failover Group Membership |
|
|
362 | (1) |
|
Step 8: Assign Interface IP Addresses |
|
|
363 | (1) |
|
Step 9: Set Up Asymmetric Routing (Optional) |
|
|
363 | (1) |
|
Step 10: Enable Failover Globally |
|
|
363 | (1) |
|
Step 11: Configure Failover on the Secondary Cisco ASA |
|
|
364 | (1) |
|
Optional Failover Commands |
|
|
364 | (1) |
|
Specifying Failover MAC Addresses |
|
|
364 | (1) |
|
Configuring Interface Policy |
|
|
365 | (1) |
|
|
366 | (1) |
|
Monitoring Failover Interfaces |
|
|
366 | (1) |
|
Zero-Downtime Software Upgrade |
|
|
367 | (2) |
|
|
369 | (5) |
|
Active/Standby Failover in Single Mode |
|
|
369 | (2) |
|
Active/Active Failover in Multiple Security Contexts |
|
|
371 | (3) |
|
Monitoring and Troubleshooting Failovers |
|
|
374 | (5) |
|
|
374 | (3) |
|
|
377 | (2) |
|
|
379 | (2) |
|
|
381 | (24) |
|
|
382 | (7) |
|
|
382 | (1) |
|
|
383 | (1) |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
385 | (1) |
|
|
386 | (2) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
389 | (1) |
|
Configuring Quality of Service |
|
|
389 | (6) |
|
Step 1: Set Up a Class Map |
|
|
390 | (3) |
|
Step 2: Configure a Policy Map |
|
|
393 | (1) |
|
Step 3: Apply the Policy Map on the Interface |
|
|
394 | (1) |
|
Step 4: Tune the Priority Queue (Optional) |
|
|
394 | (1) |
|
|
395 | (6) |
|
|
395 | (3) |
|
QoS for the Remote-Access VPN Tunnels |
|
|
398 | (3) |
|
|
401 | (2) |
|
|
403 | (2) |
|
Part III Intrusion Prevention System (IPS) Solution |
|
|
405 | (60) |
|
Intrusion Prevention System Integration |
|
|
407 | (14) |
|
Adaptive Inspection Prevention Security Services Module Overview (AIP-SSM) |
|
|
407 | (6) |
|
|
408 | (1) |
|
Inline Versus Promiscuous Mode |
|
|
409 | (4) |
|
Directing Traffic to the AIP-SSM |
|
|
413 | (1) |
|
AIP-SSM Module Software Recovery |
|
|
414 | (2) |
|
|
416 | (3) |
|
|
416 | (1) |
|
|
417 | (2) |
|
|
419 | (2) |
|
Configuring and Troubleshooting Cisco IPS Software via CLI |
|
|
421 | (44) |
|
Cisco IPS Software Architecture |
|
|
421 | (6) |
|
|
422 | (1) |
|
|
423 | (1) |
|
Network Access Controller |
|
|
424 | (1) |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
426 | (1) |
|
|
426 | (1) |
|
|
427 | (1) |
|
Introduction to the CIPS 5.x Command-Line Interface |
|
|
427 | (6) |
|
Logging In to the AIP-SSM via the CLI |
|
|
427 | (1) |
|
|
428 | (1) |
|
|
429 | (4) |
|
|
433 | (3) |
|
User Account Roles and Levels |
|
|
433 | (1) |
|
|
433 | (1) |
|
|
434 | (1) |
|
|
434 | (1) |
|
|
434 | (1) |
|
Adding and Deleting Users by Using the CLI |
|
|
434 | (1) |
|
|
435 | (1) |
|
|
435 | (1) |
|
|
435 | (1) |
|
|
436 | (14) |
|
|
436 | (1) |
|
|
437 | (1) |
|
|
437 | (1) |
|
Upgrading the CIPS Software and Signatures via the CLI |
|
|
437 | (1) |
|
|
438 | (1) |
|
|
439 | (2) |
|
Displaying Software Version and Configuration Information |
|
|
441 | (3) |
|
Backing Up Your Configuration |
|
|
444 | (1) |
|
Displaying and Clearing Events |
|
|
445 | (1) |
|
Displaying and Clearing Statistics |
|
|
446 | (4) |
|
Advanced Features and Configuration |
|
|
450 | (13) |
|
|
450 | (2) |
|
Disabling and Retiring IPS Signatures |
|
|
452 | (1) |
|
|
453 | (4) |
|
|
457 | (1) |
|
|
457 | (1) |
|
Manual Logging of Specific Host Traffic |
|
|
458 | (2) |
|
Configuring Blocking (Shunning) |
|
|
460 | (3) |
|
|
463 | (2) |
|
Part IV Virtual Private Network (VPN) Solution |
|
|
465 | (144) |
|
|
467 | (32) |
|
Preconfiguration Checklist |
|
|
467 | (2) |
|
|
469 | (10) |
|
|
470 | (1) |
|
Step 2: Create the ISAKMP Policy |
|
|
471 | (1) |
|
Step 3: Set the Tunnel Type |
|
|
471 | (1) |
|
Step 4: Configure ISAKMP Preshared Keys |
|
|
472 | (1) |
|
Step 5: Define the IPSec Policy |
|
|
473 | (1) |
|
Step 6: Specify Interesting Traffic |
|
|
474 | (1) |
|
Step 7: Configure a Crypto Map |
|
|
475 | (1) |
|
Step 8: Apply the Crypto Map to an Interface |
|
|
476 | (1) |
|
Step 9: Configuring Traffic Filtering |
|
|
477 | (1) |
|
Step 10: Bypassing NAT (Optional) |
|
|
478 | (1) |
|
|
479 | (3) |
|
|
479 | (1) |
|
|
479 | (2) |
|
|
481 | (1) |
|
|
481 | (1) |
|
|
482 | (3) |
|
|
482 | (1) |
|
Security Association Lifetimes |
|
|
483 | (1) |
|
|
483 | (1) |
|
|
483 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
485 | (7) |
|
Single Site-to-Site Tunnel Configuration Using NAT-T |
|
|
485 | (3) |
|
Fully Meshed Topology with RRI |
|
|
488 | (4) |
|
Monitoring and Troubleshooting Site-to-Site IPSec VPNs |
|
|
492 | (5) |
|
Monitoring Site-to-Site VPNs |
|
|
492 | (2) |
|
Troubleshooting Site-to-Site VPNs |
|
|
494 | (2) |
|
ISAKMP Proposal Unacceptable |
|
|
496 | (1) |
|
Mismatched Preshared keys |
|
|
496 | (1) |
|
Incompatible IPSec Transform Set |
|
|
496 | (1) |
|
Mismatched Proxy Identities |
|
|
497 | (1) |
|
|
497 | (2) |
|
|
499 | (76) |
|
Cisco IPSec Remote Access VPN Solution |
|
|
499 | (20) |
|
|
500 | (1) |
|
|
501 | (1) |
|
Step 2: Create the ISAKMP Policy |
|
|
502 | (1) |
|
Step 3: Configure Remote-Access Attributes |
|
|
502 | (3) |
|
Step 4: Define the Tunnel Type |
|
|
505 | (1) |
|
Step 5: Configure ISAKMP Preshared Keys |
|
|
506 | (1) |
|
Step 6: Configure User Authentication |
|
|
506 | (1) |
|
Step 7: Assign an IP Address |
|
|
507 | (2) |
|
Step 8: Define the IPSec Policy |
|
|
509 | (1) |
|
Step 9: Set Up a Dynamic Crypto Map |
|
|
509 | (1) |
|
Step 10: Configure the Crypto Map |
|
|
510 | (1) |
|
Step 11: Apply the Crypto Map to an Interface |
|
|
510 | (1) |
|
Step 12: Configure Traffic Filtering |
|
|
510 | (1) |
|
Step 13: Set Up a Tunnel Default Gateway (Optional) |
|
|
511 | (1) |
|
Step 14: Bypass NAT (Optional) |
|
|
511 | (1) |
|
Step 15: Set Up Split Tunneling (Optional) |
|
|
512 | (1) |
|
Cisco VPN Client Configuration |
|
|
513 | (1) |
|
Software-Based VPN Clients |
|
|
514 | (3) |
|
Hardware-Based VPN Clients |
|
|
517 | (2) |
|
Advanced Cisco IPSec VPN Features |
|
|
519 | (12) |
|
|
519 | (1) |
|
|
519 | (1) |
|
|
520 | (1) |
|
|
521 | (1) |
|
|
521 | (1) |
|
|
522 | (3) |
|
|
525 | (2) |
|
|
527 | (1) |
|
|
527 | (1) |
|
Central Protection Policy |
|
|
528 | (1) |
|
Hardware based Easy VPN Client Features |
|
|
529 | (1) |
|
Interactive Hardware Client Authentication |
|
|
529 | (1) |
|
Individual User Authentication |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
530 | (1) |
|
Hardware Client Network Extension Mode |
|
|
531 | (1) |
|
Deployment Scenarios of Cisco IPSec VPN |
|
|
531 | (6) |
|
IPSec Hairpinning with Easy VPN and Firewalling |
|
|
531 | (3) |
|
Load-Balancing and Site-to-Site Integration |
|
|
534 | (3) |
|
Monitoring and Troubleshooting Cisco Remote Access VPN |
|
|
537 | (4) |
|
Monitoring Cisco Remote Access IPSec VPNs |
|
|
537 | (2) |
|
Troubleshooting Cisco IPSec VPN Clients |
|
|
539 | (2) |
|
|
541 | (7) |
|
|
543 | (1) |
|
Step 1: Enable the HTTP Service |
|
|
544 | (1) |
|
Step 2: Enable WebVPN on the Interface |
|
|
544 | (1) |
|
Step 3: Configure WebVPN Look and Feel |
|
|
545 | (1) |
|
Step 4: Configure WebVPN Group Attributes |
|
|
546 | (2) |
|
Step 5: Configure User Authentication |
|
|
548 | (1) |
|
|
548 | (16) |
|
|
549 | (2) |
|
|
551 | (3) |
|
|
554 | (1) |
|
Authentication Methods for E-Mail Proxy |
|
|
555 | (2) |
|
Identifying E-Mail Servers for E-Mail Proxies |
|
|
557 | (1) |
|
|
557 | (2) |
|
|
559 | (2) |
|
|
561 | (3) |
|
Deployment Scenarios of WebVPN |
|
|
564 | (5) |
|
WebVPN with External Authentication |
|
|
565 | (2) |
|
WebVPN with E-Mail Proxies |
|
|
567 | (2) |
|
Monitoring and Troubleshooting WebVPN |
|
|
569 | (4) |
|
|
569 | (1) |
|
|
570 | (1) |
|
|
570 | (1) |
|
|
571 | (1) |
|
|
572 | (1) |
|
|
573 | (2) |
|
Public Key Infrastructure (PKI) |
|
|
575 | (34) |
|
|
575 | (4) |
|
|
576 | (1) |
|
|
577 | (1) |
|
Certificate Revocation List |
|
|
578 | (1) |
|
Simple Certificate Enrollment Protocol |
|
|
579 | (1) |
|
Enrolling the Cisco ASA to a CA Using SCEP |
|
|
579 | (6) |
|
Generating the RSA Key Pair |
|
|
579 | (1) |
|
|
580 | (5) |
|
Manual (Cut-and-Paste) Enrollment |
|
|
585 | (3) |
|
Configuration for Manual Enrollment |
|
|
585 | (1) |
|
Obtaining the CA Certificate |
|
|
586 | (1) |
|
Generating the ID Certificate Request and Importing the ID Certificate |
|
|
587 | (1) |
|
|
588 | (3) |
|
Configuring IPSec Site-to-Site Tunnels Using Certificates |
|
|
591 | (5) |
|
Configuring the Cisco ASA to Accept Remote-Access VPN Clients Using Certificates |
|
|
596 | (6) |
|
Enrolling the Cisco VPN Client |
|
|
596 | (4) |
|
Configuring the Cisco ASA |
|
|
600 | (2) |
|
|
602 | (5) |
|
|
602 | (3) |
|
|
605 | (1) |
|
|
606 | (1) |
|
|
607 | (2) |
|
Part V Adaptive Security Device Manager |
|
|
609 | (168) |
|
|
611 | (34) |
|
|
611 | (4) |
|
|
611 | (1) |
|
|
612 | (1) |
|
|
613 | (2) |
|
|
615 | (7) |
|
|
616 | (6) |
|
|
622 | (3) |
|
|
622 | (2) |
|
|
624 | (1) |
|
|
625 | (2) |
|
|
627 | (1) |
|
|
628 | (2) |
|
|
630 | (3) |
|
|
630 | (1) |
|
|
631 | (1) |
|
|
632 | (1) |
|
|
633 | (2) |
|
|
633 | (1) |
|
|
634 | (1) |
|
|
635 | (8) |
|
|
635 | (6) |
|
|
641 | (2) |
|
|
643 | (2) |
|
Firewall Management Using ASDM |
|
|
645 | (34) |
|
|
645 | (4) |
|
|
649 | (4) |
|
|
653 | (4) |
|
|
654 | (1) |
|
|
654 | (2) |
|
|
656 | (1) |
|
|
657 | (3) |
|
|
660 | (5) |
|
|
665 | (1) |
|
|
666 | (1) |
|
|
667 | (4) |
|
|
671 | (6) |
|
|
677 | (2) |
|
IPS Management Using ASDM |
|
|
679 | (26) |
|
Accessing the IPS Device Management Console from ASDM |
|
|
679 | (2) |
|
Configuring Basic AIP-SSM Settings |
|
|
681 | (5) |
|
|
681 | (1) |
|
Verifying Network Settings |
|
|
682 | (1) |
|
|
683 | (1) |
|
|
684 | (1) |
|
|
684 | (2) |
|
Advanced IPS Configuration and Monitoring Using ASDM |
|
|
686 | (17) |
|
Disabling and Enabling Signatures |
|
|
687 | (4) |
|
|
691 | (3) |
|
Creating Custom Signatures |
|
|
694 | (5) |
|
Creating Event Action Filters |
|
|
699 | (2) |
|
Installing Signature Updates and Software Service Packs |
|
|
701 | (1) |
|
|
702 | (1) |
|
|
703 | (2) |
|
VPN Management Using ASDM |
|
|
705 | (46) |
|
Site-to-Site VPN Setup Using Preshared Keys |
|
|
706 | (7) |
|
Site-to-Site VPN Setup Using PKI |
|
|
713 | (8) |
|
Cisco Remote-Access IPSec VPN Setup |
|
|
721 | (10) |
|
|
731 | (14) |
|
|
745 | (4) |
|
|
749 | (2) |
|
|
751 | (26) |
|
Case Study 1: Deploying the Cisco ASA at Branch Offices and Small Businesses |
|
|
751 | (6) |
|
|
751 | (4) |
|
|
755 | (2) |
|
Case Study 2: Large Enterprise Firewall, VPN, and IPS Deployment |
|
|
757 | (12) |
|
|
759 | (3) |
|
|
762 | (1) |
|
Remote Access VPN Cluster |
|
|
763 | (4) |
|
|
767 | (1) |
|
|
768 | (1) |
|
Case Study 3: Data Center Security with Cisco ASA |
|
|
769 | (6) |
|
|
775 | (2) |
Index |
|
777 | |