Always Learning

Advanced Search

Cisco ASA

Cisco ASA

All-in-one Next-Generation Firewall, IPS, and VPN Services
3rd Edition

Jazib Frahim, Omar Santos, Andrew Ossipov

eBook, 1248 pages
ISBN13: 9780132954402
ISBN10: 0132954400
Not yet published.
Special online offer - Save 30%
Was 41.99, Now 29.39Save: 12.60
Learn more about our digital formats.
 
This title is available in the following formats:
Format RRPYour Price
Paperback £61.49 £43.04
eBook £41.99 £29.39
  • Print pagePrint page
  • Email this pageEmail page
  • Share

Cisco® ASA

All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition

Identify, mitigate, and respond to today’s highly-sophisticated network attacks.

Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services has been fully updated to cover the newest techniques and Cisco technologies for maximizing end-to-end security in your environment. Three leading Cisco security experts guide you through every step of creating a complete security plan with Cisco ASA, and then deploying, configuring, operating, and troubleshooting your solution.

Fully updated for today’s newest ASA releases, this edition adds new coverage of ASA 5500-X, ASA 5585-X, ASA Services Module, ASA next-generation firewall services, EtherChannel, Global ACLs, clustering, IPv6 improvements, IKEv2, AnyConnect Secure Mobility VPN clients, and more. The authors explain significant recent licensing changes; introduce enhancements to ASA IPS; and walk you through configuring IPsec, SSL VPN, and NAT/PAT.

You’ll learn how to apply Cisco ASA adaptive identification and mitigation services to systematically strengthen security in network environments of all sizes and types. The authors present up-to-date sample configurations, proven design scenarios, and actual debugs–
all designed to help you make the most of Cisco ASA in your rapidly evolving network.

Jazib Frahim, CCIE® No. 5459 (Routing and Switching; Security), Principal Engineer in the Global Security Solutions team, guides top-tier Cisco customers in security-focused network design and implementation. He architects, develops, and launches new security services concepts. His books include Cisco SSL VPN Solutions and Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting.

Omar Santos, CISSP No. 463598, Cisco Product Security Incident Response Team (PSIRT) technical leader, leads and mentors engineers and incident managers in investigating and resolving vulnerabilities in Cisco products and protecting Cisco customers. Through 18 years in IT and cybersecurity, he has designed, implemented, and supported numerous secure networks for Fortune® 500 companies and the U.S. government. He is also the author of several other books and numerous whitepapers and articles.

Andrew Ossipov, CCIE® No. 18483 and CISSP No. 344324, is a Cisco Technical Marketing Engineer focused on firewalls, intrusion prevention, and data center security. Drawing on more than 16 years in networking, he works to solve complex customer technical problems, architect new features and products, and define future directions for Cisco’s product portfolio. He holds several pending patents.

Understand, install, configure, license, maintain, and troubleshoot the newest ASA devices

Efficiently implement Authentication, Authorization, and Accounting (AAA) services

Control and provision network access with packet filtering, context-aware Cisco ASA next-generation firewall services, and new NAT/PAT concepts

Configure IP routing, application inspection, and QoS

Create firewall contexts with unique configurations, interfaces, policies, routing tables, and administration

Enable integrated protection against many types of malware and advanced persistent threats (APTs) via Cisco Cloud Web Security and Cisco Security Intelligence Operations (SIO)

Implement high availability with failover and elastic scalability with clustering

Deploy, troubleshoot, monitor, tune, and manage Intrusion Prevention System (IPS) features

Implement site-to-site IPsec VPNs and all forms of remote-access VPNs (IPsec, clientless SSL, and client-based SSL)

Configure and troubleshoot Public Key Infrastructure (PKI)

Use IKEv2 to more effectively resist attacks against VPNs

Leverage IPv6 support for IPS, packet inspection, transparent firewalls, and site-to-site IPsec VPNs

Introduction

Chapter 1 Introduction to Security Technologies 1

Firewalls 2

Network Firewalls 2

Packet-Filtering Techniques 2

Application Proxies 3

Network Address Translation 3

Stateful Inspection Firewalls 6

Demilitarized Zones (DMZ) 7

Deep Packet Inspection 8

Next-Generation Context-Aware Firewalls 8

Personal Firewalls 9

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) 9

Pattern Matching and Stateful Pattern-Matching Recognition 11

Protocol Analysis 12

Heuristic-Based Analysis 12

Anomaly-Based Analysis 12

Global Threat Correlation Capabilities 14

Virtual Private Networks 14

Technical Overview of IPsec 16

IKEv1 Phase 1 16

IKEv1 Phase 2 20

IKEv2 23

SSL VPNs 23

Cisco AnyConnect Secure Mobility 25

Cloud and Virtualization Security 26

Chapter 2 Cisco ASA Product and Solution Overview 29

Cisco ASA Model Overview 30

Cisco ASA 5505 Model 31

Cisco ASA 5510 Model 35

Cisco ASA 5512-X Model 38

Cisco ASA 5515-X Model 40

Cisco ASA 5520 Model 41

Cisco ASA 5525-X Model 42

Cisco ASA 5540 Model 43

Cisco ASA 5545-X Model 44

Cisco ASA 5550 Model 45

Cisco ASA 5555-X Model 46

Cisco ASA 5585-X Models 47

Cisco Catalyst 6500 Series ASA Services Module 51

Cisco ASA 1000V Cloud Firewall 52

Cisco ASA Next-Generation Firewall Services (Formerly Cisco ASA CX) 53

Cisco ASA AIP-SSM Module 53

Cisco ASA AIP-SSM-10 54

Cisco ASA AIP-SSM-20 54

Cisco ASA AIP-SSM-40 54

Cisco ASA Gigabit Ethernet Modules 55

Cisco ASA SSM-4GE 55

Cisco ASA 5580 Expansion Cards 56

Cisco ASA 5500-X Series 6-Port GE Interface Cards 57

Chapter 3 Licensing 59

Licensed Features on ASA 59

Basic Platform Capabilities 61

Advanced Security Features 63

Tiered Capacity Features 65

Displaying License Information 66

Managing Licenses with Activation Keys 68

Permanent and Time-Based Activation Keys 68

Combining Keys 69

Time-Based Key Expiration 70

Using Activation Keys 71

Combined Licenses in Failover and Clustering 73

License Aggregation Rules 73

Aggregated Time-Based License Countdown 75

Shared Premium VPN Licensing 75

Shared Server and Participants 76

Shared License 76

Shared Licensing Operation 76

Configuring Shared Licensing 78

Licensing Server 78

Participants 79

Backup Licensing Server 79

Monitoring Shared Licensing Operation 80

Chapter 4 Initial Setup 81

Accessing the Cisco ASA Appliances 81

Establishing a Console Connection 82

Command-Line Interface 85

Managing Licenses 87

Initial Setup 90

Initial Setup via CLI 90

Initial Setup of ASDM 92

Uploading ASDM 92

Setting Up the Appliance 93

Accessing ASDM 94

Functional Screens of ASDM 97

Device Setup 100

Setting Up a Device Name and Passwords 100

Configuring an Interface 102

Configuring a Data-Passing Interface 102

Configuring a Subinterface 106

Configuring an EtherChannel Interface 109

Configuring a Management Interface 111

DHCP Services 112

Setting Up the System Clock 114

Manual Clock Adjustment 114

Time Zone 114

Date 116

Time 116

Automatic Clock Adjustment Using the Network Time Protocol 116

Chapter 5 System Maintenance 119

Configuration Management 119

Running Configuration 119

Startup Configuration 123

Removing the Device Configuration 124

Remote System Management 126

Telnet 126

Secure Shell (SSH) 129

System Maintenance 132

Software Installation 132

Image Upgrade via Cisco ASDM 132

Image Upgrade via the Cisco ASA CLI 133

Image Upload Using ROMMON 136

Password Recovery Process 137

Disabling the Password Recovery Process 141

System Monitoring 144

System Logging 144

Enabling Logging 146

Defining Event List 147

Logging Types 149

Defining a Syslog Server 153

Defining an Email Server 154

Storing Logs Internally and Externally 154

Syslog Message ID Tuning 156

NetFlow Secure Event Logging (NSEL) 156

Step 1: Define a NetFlow Collector 157

Step 2: Define a NetFlow Export Policy 159

Simple Network Management Protocol (SNMP) 160

Configuring SNMP 161

SNMP Monitoring 164

Device Monitoring and Troubleshooting 165

CPU and Memory Monitoring 165

Troubleshooting Device Issues 168

Troubleshooting Packet Issues 168

Troubleshooting CPU Issues 172

Chapter 6 Cisco ASA Services Module 173

Cisco ASA Services Module Overview 173

Hardware Architecture 174

Host Chassis Integration 175

Managing Host Chassis 176

Assigning VLAN Interfaces 177

Monitoring Traffic Flow 178

Common Deployment Scenarios 180

Internal Segment Firewalling 181

Edge Protection 182

Trusted Flow Bypass with Policy Based Routing 183

Traffic Flow 185

Sample PBR Configuration 185

Chapter 7 Authentication, Authorization, and Accounting (AAA) Services 191

AAA Protocols and Services Supported by Cisco ASA 192

RADIUS 194

TACACS+ 195

RSA SecurID 196

Microsoft Windows NTLM 197

Active Directory and Kerberos 197

Lightweight Directory Access Protocol 197

Defining an Authentication Server 198

Configuring Authentication of Administrative Sessions 204

Authenticating Telnet Connections 204

Authenticating SSH Connections 206

Authenticating Serial Console Connections 207

Authenticating Cisco ASDM Connections 208

Authenticating Firewall Sessions (Cut-Through Proxy Feature) 209

Authentication Timeouts 214

Customizing Authentication Prompts 214

Configuring Authorization 215

Command Authorization 217

Configuring Downloadable ACLs 218

Configuring Accounting 219

RADIUS Accounting 220

TACACS+ Accounting 221

Troubleshooting Administrative Connections to Cisco ASA 222

Troubleshooting Firewall Sessions (Cut-Through Proxy) 225

ASDM and CLI AAA Test Utility 226

Chapter 8 Controlling Network Access: The Traditional Way 229

Packet Filtering 229

Types of ACLs 232

Standard ACLs 233

Extended ACLs 233

EtherType ACLs 233

Webtype ACLs 234

Comparing ACL Features 234

Through-the-Box-Traffic Filtering 235

To-the-Box-Traffic Filtering 240

Advanced ACL Features 243

Object Grouping 243

Object Types 243

Configuration of Object Types 245

Object Grouping and ACLs 248

Standard ACLs 250

Time-Based ACLs 251

Downloadable ACLs 254

ICMP Filtering 254

Deployment Scenario for Traffic Filtering 255

Using ACLs to Filter Inbound Traffic 255

Configuration Steps with ASDM 257

Configuration Steps with CLI 259

Monitoring Network Access Control 260

Monitoring ACLs 260

Chapter 9 Implementing Next-Generation Firewall Services with ASA CX 267

CX Integration Overview 268

Logical Architecture 269

Hardware Modules 270

Software Modules 271

High Availability 272

ASA CX Architecture 273

Data Plane 274

Eventing and Reporting 275

User Identity 275

TLS Decryption Proxy 276

HTTP Inspection Engine 276

Application Inspection Engine 276

Management Plane 276

Control Plane 276

Preparing ASA CX for Configuration 277

Managing ASA CX with PRSM 282

Using PRSM 283

Configuring User Accounts 286

CX Licensing 288

Component and Software Updates 290

Signatures and Engines 290

System Software 291

Configuration Database Backup 292

Defining CX Policy Elements 293

Network Groups 295

Identity Objects 296

URL Objects 298

User Agent Objects 299

Application Objects 299

Secure Mobility Objects 300

Interface Roles 301

Service Objects 302

Application-Service Objects 303

Source Object Groups 304

Destination Object Groups 305

File Filtering Profiles 306

Web Reputation Profiles 306

NG IPS Profiles 307

Enabling User Identity Services 309

Configuring Directory Servers 310

Connecting to AD Agent or CDA 312

Tuning Authentication Settings 313

Defining User Identity Discovery Policy 314

Enabling TLS Decryption 316

Configuring Decryption Settings 318

Defining a Decryption Policy 320

Enabling NG IPS 323

Defining Context-Aware Access Policies 324

Configuring ASA for CX Traffic Redirection 327

Monitoring ASA CX 329

Dashboard Reports 329

Connection and System Events 331

Packet Captures 332

Chapter 10 Network Address Translation 337

Types of Address Translation 338

Network Address Translation 338

Port Address Translation 340

Address Translation Methods 341

Static NAT/PAT 341

Dynamic NAT/PAT 343

Policy NAT/PAT 344

Identity NAT 344

Security Protection Mechanisms Within Address Translation 345

Randomization of Sequence Numbers 345

TCP Intercept 346

Understanding Address Translation Behavior 346

Address Translation Behavior Prior to Version 8.3 346

Packet Flow Sequence in Pre-8.3 Version 347

NAT Order of Operation for Pre-8.3 Versions 348

Redesigning Address Translation (Version 8.3 and Later) 349

NAT Modes in Version 8.3 and Later 349

NAT Order of Operation for Version 8.3 and Later 350

Configuring Address Translation 350

Auto NAT Configuration 351

Available Auto NAT Settings 351

Auto NAT Configuration Example 353

Manual NAT Configuration 356

Available Manual NAT Settings 356

Manual NAT Configuration Example 357

Integrating ACLs and NAT 359

Pre-8.3 Behavior for NAT and ACL Integration 359

Behavior of NAT and ACL Integration in Version 8.3 and Later 361

Configuration Use Cases 362

Use Case 1: Dynamic PAT for Inside Network with Static NAT for a DMZ Web Server 363

Use Case 2: Static PAT for a Web Server Located on the DMZ Network 364

Use Case 3: Static NAT for Overlapping Subnets Using Twice NAT 366

Use Case 4: Identity NAT for Site-to-Site VPN Tunnel 367

Use Case 5: Dynamic PAT for Remote-Access VPN Clients 369

DNS Doctoring 372

Monitoring Address Translations 375

Chapter 11 IPv6 Support 379

IP Version 6 Introduction 379

IPv6 Header 380

Supported IPv6 Address Types 381

Global Unicast Address 382

Site-Local Address 382

Link-Local Address 382

Configuring IPv6 382

IP Address Assignment 383

IPv6 DHCP Relay 384

Optional IPv6 Parameters 385

Neighbor Solicitation Messages 385

Neighbor Reachable Time 385

Router Advertisement Transmission Interval 385

Setting Up an IPv6 ACL 386

IPv6 Address Translation 389

Chapter 12 IP Routing 391

Configuring Static Routes 392

Static Route Monitoring 395

Displaying the Routing Table 399

RIP 400

Configuring RIP 401

RIP Authentication 403

RIP Route Filtering 406

Configuring RIP Redistribution 409

Troubleshooting RIP 409

Scenario 1: RIP Version Mismatch 410

Scenario 2: RIP Authentication Mismatch 411

Scenario 3: Multicast or Broadcast Packets Blocked 411

OSPF 412

Configuring OSPF 413

Enabling OSPF 414

OSPF Virtual Links 419

Configuring OSPF Authentication 422

Configuring OSPF Redistribution 426

Stub Areas and NSSAs 428

OSPF Type 3 LSA Filtering 429

OSPF neighbor Command and Dynamic Routing over a VPN Tunnel 431

OSPFv3 433

Troubleshooting OSPF 433

Useful Troubleshooting Commands 433

Mismatched Areas 440

OSPF Authentication Mismatch 440

Troubleshooting Virtual Link Problems 440

EIGRP 441

Configuring EIGRP 441

Enabling EIGRP 441

Configuring Route Filtering for EIGRP 445

EIGRP Authentication 447

Defining Static EIGRP Neighbors 448

Route Summarization in EIGRP 448

Split Horizon 450

Route Redistribution in EIGRP 450

Controlling Default Information 453

Troubleshooting EIGRP 454

Useful Troubleshooting Commands 454

Scenario 1: Link Failures 458

Scenario 2: Misconfigured Hello and Hold Intervals 459

Scenario 3: Misconfigured Authentication Parameters 462

Chapter 13 Application Inspection 465

Enabling Application Inspection 468

Selective Inspection 469

CTIQBE Inspection 473

DCERPC Inspection 476

DNS Inspection 476

ESMTP Inspection 481

File Transfer Protocol 484

General Packet Radio Service Tunneling Protocol 486

GTPv0 487

GTPv1 489

Configuring GTP Inspection 490

H.323 492

H.323 Protocol Suite 493

H.323 Version Compatibility 495

Enabling H.323 Inspection 496

Direct Call Signaling and Gatekeeper Routed Control Signaling 499

T.38 499

Cisco Unified Communications Advanced Support 499

Phone Proxy 500

TLS Proxy 505

Mobility Proxy 506

Presence Federation Proxy 506

HTTP 507

Enabling HTTP Inspection 507

strict-http Command 510

content-length Command 510

content-type-verification Command 511

max-header-length Command 511

max-uri-length Command 512

port-misuse Command 512

request-method Command 513

transfer-encoding type Command 515

ICMP 515

ILS 516

Instant Messenger (IM) 517

IPsec Pass-Through 518

MGCP 519

NetBIOS 521

PPTP 522

Sun RPC 522

RSH 523

RTSP 523

SIP 524

Skinny (SCCP) 525

SNMP 527

SQL*Net 528

TFTP 528

WAAS 528

XDMCP 529

Chapter 14 Virtualization 531

Architectural Overview 533

System Execution Space 533

Admin Context 535

User Context 535

Packet Classification 538

Packet Classification Criteria 538

Destination IP Address 539

Unique MAC Address 540

Packet Flow in Multiple Mode 541

Forwarding Without a Shared Interface 541

Forwarding with a Shared Interface 542

Configuration of Security Contexts 544

Step 1: Enable Multiple Security Contexts Globally 544

Step 2: Set Up the System Execution Space 547

Step 3: Configure Interfaces 549

Step 4: Specify a Configuration URL 550

Step 5: Configure an Admin Context 552

Step 6: Configure a User Context 553

Step 7: Manage the Security Contexts (Optional) 554

Step 8: Resource Management (Optional) 555

Step 1: Define a Resource Class 556

Step 2: Map the Resource Class to a Context 558

Deployment Scenarios 559

Virtual Firewall with Non-Shared Interfaces 559

Configuration Steps with ASDM 561

Configuration Steps with CLI 569

Virtual Firewall with a Shared Interface 572

Configuration Steps with ASDM 574

Configuration Steps Using CLI 582

Monitoring and Troubleshooting the Security Contexts 586

Monitoring 586

Troubleshooting 588

Security Contexts Are Not Added 588

Security Contexts Are Not Saved on the Local Disk 588

Security Contexts Are Not Saved on the FTP Server 589

User Having Connectivity Issues When Shared Security Contexts Are Used 590

Chapter 15 Transparent Firewalls 591

Architectural Overview 594

Single-Mode Transparent Firewalls 594

Packet Flow in an SMTF 595

Multimode Transparent Firewalls 597

Packet Flow in an MMTF 597

Restrictions When Using Transparent Firewalls 599

Transparent Firewalls and VPNs 599

Transparent Firewalls and NAT 600

Configuration of Transparent Firewalls 602

Configuration Guidelines 602

Configuration Steps 603

Step 1: Enable Transparent Firewalls 603

Step 2: Set Up Interfaces 604

Step 3: Configure an IP Address 605

Step 4: Set Up Routes 606

Step 5: Configure Interface ACLs 608

Step 6: Configure NAT (Optional) 611

Step 7: Add Static L2F Table Entries (Optional) 612

Step 8: Enable ARP Inspection (Optional) 613

Step 9: Modify L2F Table Parameters (Optional) 615

Deployment Scenarios 616

SMTF Deployment 617

Configuration Steps Using ASDM 618

Configuration Steps Using CLI 622

MMTF Deployment with Security Contexts 623

Configuration Steps Using ASDM 625

Configuration Steps Using CLI 632

Monitoring and Troubleshooting Transparent Firewalls 636

Monitoring 636

Troubleshooting 637

Hosts Are Not Able to Communicate 637

Moved Host Is Not Able to Communicate 639

General Syslogging 640

Chapter 16 High Availability 641

Redundant Interfaces 642

Using Redundant Interfaces 642

Deployment Scenarios 643

Configuration and Monitoring 644

Static Route Tracking 646

Configuring Static Routes with an SLA Monitor 647

Floating Connection Timeout 649

Sample Backup ISP Deployment 649

Failover 652

Unit Roles and Functions in Failover 652

Stateful Failover 653

Active/Standby and Active/Active Failover 654

Failover Hardware and Software Requirements 656

Zero Downtime Upgrade in Failover 657

Failover Licensing 658

Failover Interfaces 658

Stateful Link 659

Failover Link Security 659

Data Interface Addressing 660

Asymmetric Routing Groups 662

Failover Health Monitoring 664

State and Role Transition 666

Configuring Failover 667

Basic Failover Settings 668

Data Interface Configuration 671

Failover Policies and Timers 673

Active/Active Failover 674

Monitoring and Troubleshooting Failover 678

Active/Standby Failover Deployment Scenario 680

Clustering 685

Unit Roles and Functions in Clustering 685

Master and Slave Units 685

Flow Owner 686

Flow Director 686

Flow Forwarder 687

Clustering Hardware and Software Requirements 687

Zero Downtime Upgrade in Clustering 688

Unsupported Features 689

Cluster Licensing 690

Control and Data Interfaces 690

Spanned EtherChannel Mode 693

Individual Mode 695

Cluster Management 697

Cluster Health Monitoring 697

Network Address Translation 698

Performance 700

Centralized Features 701

Scaling Factors 701

Packet Flow 702

TCP Connection Processing 702

UDP Connection Processing 703

Centralized Connection Processing 705

State Transition 705

Configuring Clustering 706

Setting Interface Mode 707

Management Access for ASDM Deployment 708

Building a Cluster 710

Data Interface Configuration 714

Monitoring and Troubleshooting Clustering 717

Spanned EtherChannel Cluster Deployment Scenario 720

Chapter 17 Implementing Cisco ASA Intrusion Prevention System (IPS) 733

IPS Integration Overview 733

IPS Logical Architecture 735

IPS Hardware Modules 735

IPS Software Modules 736

Inline and Promiscuous Modes 737

IPS High Availability 739

Cisco IPS Software Architecture 739

MainApp 741

AuthenticationApp 741

Attack Response Controller 742

cipsWebserver 742

Logger 742

CtlTransSource 743

NotificationApp 743

SensorApp 743

CollaborationApp 744

EventStore 744

Preparing ASA IPS for Configuration 744

Installing CIPS System Software 744

Accessing CIPS from the ASA CLI 747

Configuring Basic Management Settings 748

Setting Up ASDM for IPS Management 752

Installing the CIPS License Key 752

<

Jazib Frahim, CCIE No. 5459, is a Principal Engineer in the Global Security Services Practice at Cisco. He has been with Cisco for over 15 years, with a focus on cyber-security and emerging security technologies. Jazib is also responsible for guiding customers in

the design and implementation of security solutions and technologies in their networks with a focus on network security. He leads a team of solutions architects to guide them through the lifecycle of services and solutions development. Jazib has also been engaged

in the development of a number of customer-focused services, such as managed threat defense, network-based identity, bring-your-own-device (BYOD), and many others. Jazib holds a bachelor’s degree in computer engineering from Illinois Institute of

Technology and a master’s degree in business administration (MBA) from North Carolina State University. In addition to CISSP, Jazib also holds two CCIEs, one in routing and switching and the other in security. He has presented at many industry events, such as Cisco Live, Interop, and ISSA, on multiple occasions. He has also authored and coauthored numerous technical documents, whitepapers, and books, including the following Cisco Press titles:

¿ Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

¿ Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance, Second Edition

¿ Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting

¿ SSL Remote Access VPNs

Omar Santos, CISSP No. 463598 is a Senior Incident Manager of Cisco’s Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of security vulnerabilities in all Cisco products. Omar has designed, implemented, and supported numerous secure networks for Fortune 500 companies and the U.S. government. Prior to his current role, he was a technical leader within the World Wide Security Practice and Cisco’s Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within both organizations. Omar is an active member of the security community, where he leads several industrywide initiatives and standards bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants that are dedicated to increasing the security of the critical infrastructure. Omar has delivered numerous technical presentations at conferences and to Cisco customers and partners, as well as many C-level executive presentations to many organizations. He has authored numerous whitepapers, articles, and security configuration guidelines and best practices, and has also authored or coauthored the following Cisco Press books:

¿ Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance ¿ Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security ¿ Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting

¿ End-to-End Network Security: Defense-in-Depth

Andrew Ossipov, CCIE No. 18483 and CISSP No. 344324, is currently a Technical Marketing Engineer at Cisco with primary concentration on firewall, intrusion prevention, and other Cisco Data Center Security solutions. With over 15 years of networking

experience, Andrew previously worked with LAN switching, routing protocol, and network data storage technologies and performed academic research in the area of VoIP. At Cisco, Andrew is involved in a broad range of activities that include solving customers’ technical problems of the highest complexity, architecting features and products, and defining the future direction of the product portfolio. He is an inventor and co-inventor of multiple pending cross-technology patents. Andrew received his bachelor of science in computer engineering and master of science in electrical engineering degrees from Wichita State University.