
In addition, some models offer an integrated intrusion prevention system (IPS) module or an integrated content security and control (CSC) module.

These topics highlight specific critical areas of network operations and are not comprehensive.Ĭisco firewalls provide advanced stateful firewall and VPN concentrator functionality in one device. These topics contain operational recommendations that administrators and engineers are advised to implement. The operational procedures in use on the network contribute as much to security as the configuration of the underlying devices. Although most of this document is devoted to the secure configuration of a Cisco firewall device, configurations alone do not completely secure a network. Secure network operations are a substantial topic. Some command line examples in this document are wrapped to enhance readability. Refer to Cisco Technical Tips Conventions for more information on document conventions.
CISCO ANYCONNECT LOGS SOFTWARE
Not all encryption algorithms may be available in all releases of Cisco firewall device software in all countries because of U.S. Note: Some of the features referenced in this document may refer to, or show, examples of options that use strong encryption algorithms. Security practitioners who are using any Cisco firewall devices or ASA versions other than 8.x are advised to consult the release notes and documentation for the respective release regarding details and supported features. Earlier releases of Cisco ASA Software may not include all features or capabilities outlined. This document addresses the capabilities of Cisco ASA versions 8.x and later.

The feature will be explained in a manner that allows the security practitioner and decision makers to determine whether the feature is required in a certain environment.Įngineers and administrators should possess a conceptual understanding of Cisco firewall product software and the basic configuration options available. Therefore, security concepts will be recommended, although the exact configuration details may not be provided.

In addition to providing configuration details, this document serves primarily as a best practices guide. The data plane does not include traffic that is sent to the local Cisco firewall device.

The functions of network devices are structured around three planes: management, control, and data. This document provides administrators and engineers guidance on securing Cisco firewall appliances, which increases the overall security of an end-to end architecture. Limiting the CPU Impact of Data Plane Traffic Using Authentication, Authorization, and Accounting.įortifying the Simple Network Management Protocolĭisable Logging to Monitor Sessions and the Consoleįiltering Transit Traffic with Transit ACLsĮnable Inspection for Nondefault ApplicationsĪCLs to Block Private and Bogon Addresses Leverage Authentication, Authorization, and Accounting.Ĭontrol Management Sessions for Security Services Modules Monitor Cisco Security Advisories and Responses
