Summary

So far in Part II, “Securing Network Infrastructures with ASDM” (the deployment section of this book), the following has been covered:

  • Chapter 5 , “Deploying Secure Internet Connectivity”— The initial configuration of your security appliance and connection of the security appliance to the Internet

  • Chapter 6 , “Deploying Web and Mail Services”— The addition of a web and a mail server

  • Chapter 7 , “Deploying Authentication”— The deployment of authentication to the device and the how to deploy authentication to web services

  • Chapter 8 , “Deploying Perimeter Protection”— The deployment of perimeter prevention

In this chapter, you deployed intrusion prevention (IPS and IP Audit) on your ASA/PIX Security Appliance, and you examined the advanced ...

Get Securing Your Business with Cisco ASA and PIX Firewalls now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.