The primary purpose of this book is to show you how to use PIX version 7 and ASDM to deploy defense in depth in your network. As explained in Chapter 2, “Principles of Network Defense,” the ASA/PIX Security Appliance does an excellent job of providing security services at the network level and some services at the application level. By following the steps in the previous chapters, you have already mitigated numerous potential attacks, providing examples on how to implement the following:
Public server isolation (DMZ)
Network device hardening
Protocol violation protection
Intrusion prevention and detection
In the Internet of yesterday, one ...