Chapter 1: Defending against Common Attacks with Basic Security Tools
In This Chapter
Reviewing internal network attacks
Identifying external attack methods
Implementing firewall rules to protect your network
Working with other protection tools
When dealing with security on your Cisco network, you can focus on a number of areas. In this chapter, you look at high-level devices in the form of firewall devices and proxies. In many cases, your firewall device may have proxy components built into it, or the proxy components will operate on a separate device or host. In my discussion on firewalls, I focus on the features found in the Cisco Adaptive Security Appliance (ASA) because they are fairly common when compared with the other devices on the market. (You find out how to manage and configure the ASA in Chapter 2 of this minibook.) You also look at the types of attacks to which you may be susceptible on your network. (For the specific functions of Network Address Translation [NAT] and Access Control Lists [ACLs], see Chapter 3 in this minibook.)
So sit back and review the types of attacks ...