Chapter 7. Deploying Authentication

In this chapter, you learn how to deploy authentication, the first layer of defense in depth, as described in Chapter 2, “Principles of Network Defense.”

This chapter addresses the following topics:

  • Defining Authentication— This section provides a brief description of authentication.

  • Purpose of Authentication— This section explains why you need authentication in your network.

  • Deploying Authentication— This section explains how you can use ASDM to deploy authentication at different levels in your network.

Now that you have completed the initial configuration of the ASA/PIX, you must start securing the security appliance so that an attacker cannot compromise the device. You can do this with the first layer of ...

Get Securing Your Business with Cisco ASA and PIX Firewalls now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.