- Amazon Student members save an additional 10% on Textbooks with promo code TEXTBOOK10. Enter code TEXTBOOK10 at checkout. Here's how (restrictions apply)
Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (2nd Edition) Paperback – Dec 29 2009
|New from||Used from|
There is a newer edition of this item:
Special Offers and Product Promotions
Customers Who Bought This Item Also Bought
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
About the Author
Jazib Frahim CCIE # 5459, is Technical Leader in the Worldwide Security Services Practice of Cisco's Advanced Services for Network Security. He was previously Technical Lead for Cisco's TAC Security team, leading twenty engineers in resolving complicated security and VPN technologies. He is author of Cisco Network Admission Control, Volume II and Cisco SSL VPN Solutions. Omar Santos Senior Network Security Engineer and Incident Manager at Cisco's Product Security Incident Response Team, has designed, implemented, and supported secure networks for Fortune 500 companies and the U.S. government, including the Marine Corps and DOD.
Inside This Book(Learn More)
Most Helpful Customer Reviews on Amazon.com (beta)
There is some documentation on the updated version available online, but especially when it comes to examples, I think they are not written well. Would be happy to purchase an updated copy of this book to add to my bookshelf that would cover version 8.4.
The book is filled with configuration examples for both CLI and ASDM GUI. It covers ASA 8.2 code and hence the content is extremely current, fresh and relevant. The book explains firewall theory, implementation, tuning and troubleshooting in great detail, making it an excellent resource for Cisco ASA administrators and CCIE Security candidates as the lab test ASA firewall in great detail.
I bought this book to learn more about firewall virtualization and transparent firewalls. The book spends over 100 pages on these two technologies and cover them with great detail. Virtualization is configured step by step using both CLI and ASDM and then important troubleshooting commands are also covered. Transparent firewalls are clearly explained with detailed configuration examples. Also the chapter contains a table showing readers how routed mode firewalls differ from transparent firewalls and what features are not supported when ASA is running in transparent mode.
Only minor complaint I have is the book should dedicate one more chapter for a detailed case study and showcase all technologies like Site to Site VPNs, Remote Access VPNs, SSL VPNs, IPS, AntiX, Tranparent Firewalls and Virtual Firewalls at the same time by showing a enterprise network with one head office and two branch offices. This will help readers to see all technologies in action at the same time and further clarify things.
Overall I am extremely satisfied with this product and strongly endorse it for CCIE Security candidates and Cisco ASA administrators as their one stop resource for Cisco ASA firewalls.
I liked many aspects of this book, but when I initially cracked it open and saw the product overview alone, I knew that this was the type of book that I needed if I wanted to maintain this type of solution. Why? Well, this particular section walked you through the different models of the ASA product line, complete with pictures of each and diagrams of where and what all the different features are. This is the type of information that you don't need every day, but when you need it you typically end up scrounging for it on the web, taking considerable time and effort away from your troubleshooting efforts.
The rest of the book is equally detailed, providing the step by step information that you need to set up the important features of this product. Throughout the sections that explain the features, you find notes about default settings and other limitations that the feature may encounter. Architecture diagrams and screen shots also help the reader to understand what they are actually doing rather than just barking out orders and having the setup be dictated.
Lastly, to clear up one mystery that puzzled me from the start: Anti-X isn't a new fangled threat that we need to worry about. It appears that description covers the anti-spam, anti-virus and anti-spyware configurations of the features that the box provides.
If you have an ASA appliance, then this book will be invaluable in your support of this device.
We are now in the process of deploying AnyConnect clients and wanted to get some guidance around it. I bought this book last week and I already feel very comfortable about deploying AnyConnect in our environment.
Each chapter starts off with an in-depth architectural overview of the features to be discussed. It then provides full step-by-step configuration examples using both ASDM and CLI. There are a number of deployment scenarios in each chapter. It even covers many troubleshooting and monitoring examples that helped me a lot when I started deploying it in my lab network
A must have if you have a Cisco ASA or if you are planning to deploy a new ASA in your environment !!!!
Look for similar items by category
- Books > Business & Investing > Industries & Professions > E-commerce
- Books > Computers & Technology > Certification Central > Exams > Security+
- Books > Computers & Technology > Certification Central > Publisher > Cisco
- Books > Computers & Technology > History & Culture > Privacy
- Books > Computers & Technology > Internet & Social Media
- Books > Computers & Technology > Networking & Cloud Computing > Internet, Groupware, & Telecommunications
- Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs > Bridges & Routers
- Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs > Networks
- Books > Computers & Technology > Security & Encryption > Firewalls
- Books > Textbooks > Computer Science & Information Systems > Networking