HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Register your product to gain access to bonus material or receive a coupon.
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
PDF The popular standard, used most often with the free Acrobat® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to anticipate and meet tomorrow’s threats, wherever they appear. Now, three Cisco network security experts introduce these products and solutions, and offer expert guidance for planning, deploying, and operating them.
The authors present authoritative coverage of Cisco ASA with FirePOWER Services; Cisco Firepower Threat Defense (FTD); Cisco Next-Generation IPS appliances; the Cisco Web Security Appliance (WSA) with integrated Advanced Malware Protection (AMP); Cisco Email Security Appliance (ESA) with integrated Advanced Malware Protection (AMP); Cisco AMP ThreatGrid Malware Analysis and Threat Intelligence, and the
Cisco Firepower Management Center (FMC).
You’ll find everything you need to succeed: easy-to-follow configurations, application case studies, practical triage and troubleshooting methodologies, and much more.
Download the sample pages (includes Chapter 2 and the Index.)
Introduction
Chapter 1 Fundamentals of Cisco Next-Generation Security
The New Threat Landscape and Attack Continuum
Cisco ASA 5500-X Series Next-Generation Firewalls and the Cisco ASA
with FirePOWER Services
Cisco Firepower Threat Defense (FTD)
Next-Generation Intrusion Prevention Systems (NGIPS)
Firepower Management Center
AMP for Endpoints
AMP for Networks
AMP Threat Grid
Email Security Overview
Web Security Overview
Cisco Identity Services Engine (ISE)
Cisco Meraki Cloud-Managed MDM
Cisco Meraki Cloud-Managed Security Appliances
Cisco VPN Solutions
Summary
Chapter 2 Introduction to and Design of Cisco ASA with FirePOWER Services
Introduction to Cisco ASA FirePOWER Services
Inline versus Promiscuous Mode
Cisco ASA FirePOWER Management Options
Cisco ASA FirePOWER Services Sizing
Cisco ASA FirePOWER Services Licensing
Cisco ASA FirePOWER Compatibility with Other Cisco ASA Features
Cisco ASA FirePOWER Packet Processing Order of Operations
Cisco ASA FirePOWER Services and Failover
Cisco ASA FirePOWER Services and Clustering
Deploying the Cisco ASA FirePOWER Services in the Internet Edge
Deploying the Cisco ASA FirePOWER Services in VPN Scenarios
Deploying Cisco ASA FirePOWER Services in the Data Center
Firepower Threat Defense (FTD)
Summary
Chapter 3 Configuring Cisco ASA with FirePOWER Services
Setting Up the Cisco ASA FirePOWER Module in Cisco ASA 5585-X Appliances
Setting Up the Cisco ASA FirePOWER Module in Cisco ASA 5500-X Appliances
Configuring the Cisco ASA to Redirect Traffic to the Cisco ASA FirePOWER Module
Configuring the Cisco ASA FirePOWER Module for the FMC
Configuring the Cisco ASA FirePOWER Module Using the ASDM
Firepower Threat Defense
Summary
Chapter 4 Troubleshooting Cisco ASA with FirePOWER Services and Firepower Threat Defense (FTD)
Useful show Commands
Useful ASA Debugging Commands
Summary
Chapter 5 Introduction to and Architecture of Cisco AMP
Introduction to Advanced Malware Protection (AMP)
Role of the AMP Cloud
Doing Security Differently
The Cloud
Private Cloud
Installing the Cisco AMP Private Cloud
Summary
Chapter 6 Cisco AMP for Networks
Introduction to Advanced Malware Protection (AMP) for Networks
Summary
Chapter 7 Cisco AMP for Content Security
Introduction to AMP for Content Security
Content Security Connectors
Configuring Cisco AMP for Content Security
AMP Reports
Summary
Chapter 8 Cisco AMP for Endpoints
Introduction to AMP for Endpoints
What Is AMP for Endpoints?
Connections to the AMP Cloud
Outbreak Control
The Many Faces of AMP for Endpoints
AMP for Windows
AMP for Mac
AMP for Linux
AMP for Android
Installing AMP for Endpoints
Proxy Complications
Using the Cloud Console
Summary
Chapter 9 AMP Threat Grid: Malware Analysis and Threat Intelligence
Cisco AMP Threat Grid
Cisco AMP Threat Grid Cloud Solution
Cisco AMP Threat Grid On-Premises Appliance
Summary
Chapter 10 Introduction to and Deployment of Cisco Next-Generation IPS
NGIPS Basics
NGIPS Deployment Design Considerations
NGIPS Deployment Lifecycle
Summary
Chapter 11 Configuring Cisco Next-Generation IPS
Policy
Snort Rules
Performance Settings
Stack/Cluster
Summary
Chapter 12 Reporting and Troubleshooting with Cisco Next-Generation IPS
Analysis
Troubleshooting
Summary
We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.