|
|
Part 1: Getting Started and General Information
|
Chapter 1, "Introduction to the Security Appliance" |
Provides a high-level overview of the security appliance. |
Chapter 2, "Getting Started" |
Describes how to access the command-line interface, configure the firewall mode, and work with the configuration. |
Chapter 3, "Enabling Multiple Context Mode" |
Describes how to use security contexts and enable multiple context mode. |
Chapter 4, "Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance" |
Describes how to configure switch ports and VLAN interfaces for the ASA 5505 adaptive security appliance. |
Chapter 5, "Configuring Ethernet Settings and Subinterfaces" |
Describes how to configure Ethernet settings for physical interfaces and add subinterfaces. |
Chapter 6, "Adding and Managing Security Contexts" |
Describes how to configure multiple security contexts on the security appliance. |
Chapter 7, "Configuring Interface Parameters" |
Describes how to configure each interface and subinterface for a name, security, level, and IP address. |
Chapter 8, "Configuring Basic Settings" |
Describes how to configure basic settings that are typically required for a functioning configuration. |
Chapter 9, "Configuring IP Routing" |
Describes how to configure IP routing. |
Chapter 10, "Configuring DHCP, DDNS, and WCCP Services" |
Describes how to configure the DHCP server and DHCP relay. |
Chapter 11, "Configuring Multicast Routing" |
Describes how to configure multicast routing. |
Chapter 12, "Configuring IPv6" |
Describes how to enable and configure IPv6. |
Chapter 13, "Configuring AAA Servers and the Local Database" |
Describes how to configure AAA servers and the local database. |
Chapter 14, "Configuring Failover" |
Describes the failover feature, which lets you configure two security appliances so that one will take over operation if the other one fails. |
Part 2: Configuring the Firewall
|
Chapter 15, "Firewall Mode Overview" |
Describes in detail the two operation modes of the security appliance, routed and transparent mode, and how data is handled differently with each mode. |
Chapter 16, "Identifying Traffic with Access Lists" |
Describes how to identify traffic with access lists. |
Chapter 17, "Applying NAT" |
Describes how address translation is performed. |
Chapter 18, "Permitting or Denying Network Access" |
Describes how to control network access through the security appliance using access lists. |
Chapter 19, "Applying AAA for Network Access" |
Describes how to enable AAA for network access. |
Chapter 20, "Applying Filtering Services" |
Describes ways to filter web traffic to reduce security risks or prevent inappropriate use. |
Chapter 21, "Using Modular Policy Framework" |
Describes how to use the Modular Policy Framework to create security policies for TCP, general connection settings, inspection, and QoS. |
Chapter 22, "Managing AIP SSM and CSC SSM" |
Describes how to configure the security appliance to send traffic to an AIP SSM or a CSC SSM, how to check the status of an SSM, and how to update the software image on an intelligent SSM. |
Chapter 23, "Preventing Network Attacks" |
Describes how to configure protection features to intercept and respond to network attacks. |
Chapter 24, "Configuring QoS" |
Describes how to configure the network to provide better service to selected network traffic over various technologies, including Frame Relay, Asynchronous Transfer Mode (ATM), Ethernet and 802.1 networks, SONET, and IP routed networks. |
Chapter 25, "Configuring Application Layer Protocol Inspection" |
Describes how to use and configure application inspection. |
Chapter 26, "Configuring ARP Inspection and Bridging Parameters" |
Describes how to enable ARP inspection and how to customize bridging operations. |
|
Chapter 27, "Configuring IPsec and ISAKMP" |
Describes how to configure ISAKMP and IPSec tunneling to build and manage VPN "tunnels," or secure connections between remote users and a private corporate network. |
Chapter 28, "Configuring L2TP over IPSec" |
Describes how to configure IPSec over L2TP on the security appliance. |
Chapter 29, "Setting General IPSec/SSL VPN Parameters" |
Describes miscellaneous VPN configuration procedures. |
Chapter 30, "Configuring Tunnel Groups, Group Policies, and Users" |
Describes how to configure VPN tunnel groups, group policies, and users. |
Chapter 31, "Configuring IP Addresses for VPNs" |
Describes how to configure IP addresses in your private network addressing scheme, which let the client function as a tunnel endpoint. |
Chapter 32, "Configuring Remote Access IPSec VPNs" |
Describes how to configure a remote access VPN connection. |
Chapter 33, "Configuring Network Admission Control" |
Describes how to configure Network Admission Control (NAC). |
Chapter 34, "Configuring Easy VPN Services on the ASA 5505" |
Describes how to configure Easy VPN on the ASA 5505 adaptive security appliance. |
Chapter 35, "Configuring the PPPoE Client" |
Describes how to configure the PPPoE client provided with the security appliance. |
Chapter 36, "Configuring LAN-to-LAN IPsec VPNs" |
Describes how to build a LAN-to-LAN VPN connection. |
Chapter 37, "Configuring WebVPN" |
Describes how to establish a secure, remote-access VPN tunnel to a security appliance using a web browser. |
Chapter 38, "Configuring SSL VPN Client" |
Describes how to install and configure the SSL VPN Client. |
Chapter 39, "Configuring Certificates" |
Describes how to configure a digital certificates, which contains information that identifies a user or device. Such information can include a name, serial number, company, department, or IP address. A digital certificate also contains a copy of the public key for the user or device. |
Part 4: System Administration
|
Chapter 40, "Managing System Access" |
Describes how to access the security appliance for system management through Telnet, SSH, and HTTPS. |
Chapter 41, "Managing Software, Licenses, and Configurations" |
Describes how to enter license keys and download software and configurations files. |
Chapter 42, "Monitoring the Security Appliance" |
Describes how to monitor the security appliance. |
Chapter 43, "Troubleshooting the Security Appliance" |
Describes how to troubleshoot the security appliance. |
|
Appendix A, "Feature Licenses and Specifications" |
Describes the feature licenses and specifications. |
Appendix B, "Sample Configurations" |
Describes a number of common ways to implement the security appliance. |
Appendix C, "Using the Command-Line Interface" |
Describes how to use the CLI to configure the the security appliance. |
Appendix D, "Addresses, Protocols, and Ports" |
Provides a quick reference for IP addresses, protocols, and applications. |
Appendix E, "Configuring an External Server for Authorization and Authentication" |
Provides information about configuring LDAP and RADIUS authorization servers. |
"Glossary" |
Provides a handy reference for commonly-used terms and acronyms. |
"Index" |
Provides an index for the guide. |