O'Reilly logo

Cisco® Networking All-in-One For Dummies® by Edward Tetz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1: Defending against Common Attacks with Basic Security Tools

In This Chapter

check.png Reviewing internal network attacks

check.png Identifying external attack methods

check.png Implementing firewall rules to protect your network

check.png Working with other protection tools

When dealing with security on your Cisco network, you can focus on a number of areas. In this chapter, you look at high-level devices in the form of firewall devices and proxies. In many cases, your firewall device may have proxy components built into it, or the proxy components will operate on a separate device or host. In my discussion on firewalls, I focus on the features found in the Cisco Adaptive Security Appliance (ASA) because they are fairly common when compared with the other devices on the market. (You find out how to manage and configure the ASA in Chapter 2 of this minibook.) You also look at the types of attacks to which you may be susceptible on your network. (For the specific functions of Network Address Translation [NAT] and Access Control Lists [ACLs], see Chapter 3 in this minibook.)

So sit back and review the types of attacks ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required