Cisco ASA Configuration

Have a Promotion Code?

Please enter it here:

Great deals and more!

Sign up for special offers, exclusive discounts, and new product announcements from McGraw-Hill Professional.



August 24, 2009


Electronic book text, 736 pages

Other Formats


0071622683 / 9780071622684

Adobe Digital Editions® is required to view your downloaded eBooks.
Click here to get Adobe Digital Editions
To learn more about eBooks please see our eBook FAQ.

If you're having problems installing due to firewall issues please go here:


Your Price



Main description

"Richard Deal's gift of making difficult technology concepts understandable has remained constant. Whether it is presenting to a room of information technology professionals or writing books, Richard's communication skills are unsurpassed. As information technology professionals we are faced with overcoming challenges every day...Cisco ASA Configuration is a great reference and tool for answering our challenges." --From the Foreword by Steve Marcinek (CCIE 7225), Systems Engineer, Cisco Systems

A hands-on guide to implementing Cisco ASA

Configure and maintain a Cisco ASA platform to meet the requirements of your security policy. Cisco ASA Configuration shows you how to control traffic in the corporate network and protect it from internal and external threats. This comprehensive resource covers the latest features available in Cisco ASA version 8.0, and includes detailed examples of complex configurations and troubleshooting. Implement and manage Cisco's powerful, multifunction network adaptive security appliance with help from this definitive guide.

  • Configure Cisco ASA using the command-line interface (CLI) and Adaptive Security Device Manager (ASDM)
  • Control traffic through the appliance with access control lists (ACLs) and object groups
  • Filter Java, ActiveX, and web content
  • Authenticate and authorize connections using Cut-through Proxy (CTP)
  • Use Modular Policy Framework (MPF) to configure security appliance features
  • Perform protocol and application inspection
  • Enable IPSec site-to-site and remote access connections
  • Configure WebVPN components for SSL VPN access
  • Implement advanced features, including the transparent firewall, security contexts, and failover
  • Detect and prevent network attacks
  • Prepare and manage the AIP-SSM and CSC-SSM cards

Table of contents

Part I: Introduction to Firewalls and the ASAs

Chapter 1: Firewall Basics

Chapter 2: ASA Product Family Part II: ASA Basic Configuration Tasks

Chapter 3: CLI Basics

Chapter 4: Basic ASA Configuration

Chapter 5: Routing and Multicasting Part III: Controlling Traffic Through the ASA

Chapter 6: Address Translation

Chapter 7: Access Control

Chapter 8: Web Content

Chapter 9: Cut-Through Proxy

Chapter 10: IPv6 Part IV: Policy Implementation

Chapter 11: Modular Policy Framework

Chapter 12: Protocols and Policies

Chapter 13: Data Applications and Policies

Chapter 14: Voice and Policies

Chapter 15: Multimedia and Policies Part V: VPNs

Chapter 16: ASA as a Certificate Authority

Chapter 17: IPSec Site-to-Site

Chapter 18: IPSec Remote Access Server

Chapter 19: IPSec Remote Access Client

Chapter 20: SSL VPNs: Clientless

Chapter 21: SSL VPNs: AnyConnect Client Part VI: Advanced Features of the ASA

Chapter 22: Transparent Firewall

Chapter 23: Contexts

Chapter 24: Failover

Chapter 25: Network Attack Prevention

Chapter 26: SSM Cards Part VII: Management of the ASA

Chapter 27: Basic Management

Chapter 28: ASDM

Author comments

Richard Deal, CCNA, CCNP, CCDA, CCDP is a certified Cisco instructor, a Cisco certification test writer, consultant, and trainer. He is the author of Cisco PIX Firewalls and CCNA Cisco Certified Network Associate Study Guide

Copyright 2014 McGraw-Hill Global Education Holdings, LLC


Before you can enjoy free downloads from McGraw-Hill Professional, we ask that you please provide your email address and country.

Yes, I want to receive other special offer.