

Security practitioners who are using any Cisco firewall devices or ASA versions other than 8.x are advised to consult the release notes and documentation for the respective release regarding details and supported features.
#Cisco asa 5505 login software
Earlier releases of Cisco ASA Software may not include all features or capabilities outlined. This document addresses the capabilities of Cisco ASA versions 8.x and later. The feature will be explained in a manner that allows the security practitioner and decision makers to determine whether the feature is required in a certain environment.Įngineers and administrators should possess a conceptual understanding of Cisco firewall product software and the basic configuration options available. Therefore, security concepts will be recommended, although the exact configuration details may not be provided. In addition to providing configuration details, this document serves primarily as a best practices guide. The data plane does not include traffic that is sent to the local Cisco firewall device.

In addition, this document provides an overview of each included feature and references to related documentation. This document is structured around security operations (best practices) and the three functional planes of a network. The functions of network devices are structured around three planes: management, control, and data. This document provides administrators and engineers guidance on securing Cisco firewall appliances, which increases the overall security of an end-to end architecture. Limiting the CPU Impact of Data Plane Traffic Using Authentication, Authorization, and Accounting.įortifying the Simple Network Management Protocolĭisable Logging to Monitor Sessions and the Consoleįiltering Transit Traffic with Transit ACLsĮnable Inspection for Nondefault ApplicationsĪCLs to Block Private and Bogon Addresses Leverage Authentication, Authorization, and Accounting.Ĭontrol Management Sessions for Security Services Modules Monitor Cisco Security Advisories and Responses
