StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Adaptive Security Appliances - Essay Example

Cite this document
Summary
The paper "Adaptive Security Appliances" describes that there are two copies of the system configuration; the running system configuration and the backup system configuration. The backup copy is used for backup in case the device fails and a reconfiguration is required…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Adaptive Security Appliances
Read Text Preview

Extract of sample "Adaptive Security Appliances"

ASA provides three main security levels including:
Security Level 100 (Trusted network)
This is the highest trust level assigned to a network, mostly the internal network, by the ASA. The assignment is done by default to the trusted network by the ASA given its high network level as compared to the external network and the middle networks. ASA automatically allows the flow of packets from this high level to the lower un-trusted level without the need for an ACL explicitly allowing for the packet flow. (Santos, 2010)
Security Level 0 (Un-trusted network)
The un-trusted network, usually an outside network is allocated the lowest security level, 0, given its low network level besides the fact that it is the least trusted of all the network zones. ASA by default assigns the outside network security level of zero and automatically limits the flow of network packets from this level to the higher levels.
Security Level 1–99 (DMZ network)
This security zone falls between the higher level and the lower level and is automatically assigned an even number between 0 and 100 given that it is somewhat trusted and un-trusted at the same time. (Graham, 2010)


2. Briefly describe the 4 modes of CLI.
User EXEC Mode
User exec is the first level of access in the command line interface used for changing terminal settings, listing system information, and performing basic tasks. It uses AP> or Router > to prompt and log out of the command to exit.
Privileged EXEC Mode
This CLI mode should be password protected to prevent unauthorized use. It is accessed from the user exec mode by issuing the enable command. This model has a privileged command set which includes those at the user exec mode. To exit the mode, disable command is used. (Graham, 2010)
Global configuration Mode
This mode has commands that apply to features that affect the device as a whole. To access the global configuration mode, configure command is entered from the Privileged EXEC mode. Exit or end commands can be used to exit the global configuration mode.
Interface configuration Mode
This configuration mode is used to modify the configuration of the interface. The commands used in this mode usually follow the global configuration command used to define the interface type. To configure the interface using this mode, the terminal is specified from the global configuration mode followed by the specification of the interface through the interface command followed by the interface number and type. (Santos, 2010)
3. As an ASA admin, how would you choose to locally manage your ASA device and why?
Local management of the ASA device calls for the connection of the Serial console cable to the console port of the ASA. Console connection is the only available option for local management of ASA devices through the command line interface for those devices that are physically accessible without the need for encryption.

4. As an ASA admin, how would you remotely manage your device and why?
Remote management of ASA devices involves the transmission of crucial data such as the login details like usernames and passwords over the connecting media. As the ASA admin, I would choose to use an ASA device manager such as ASDM that encrypts the transmission channel ensuring communication security. It has a GUI that represents the data, unlike a command line interface such as telnet. (Graham, 2010)
5. How many copies of the system configuration are available on an ASA? What is the purpose of the different copies? Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“ASA Questions Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
ASA Questions Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1600018-asa-questions
(ASA Questions Essay Example | Topics and Well Written Essays - 500 Words)
ASA Questions Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1600018-asa-questions.
“ASA Questions Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1600018-asa-questions.
  • Cited: 0 times

CHECK THESE SAMPLES OF Adaptive Security Appliances

Information and Communication Technology ICT

In addition, for addressing network security, Cisco ASA 5500 Series Adaptive Security Appliances (For Wired Network), AIP-SSM Intrusion Prevention Module and Wireless Intrusion Prevention System (W IPS) (For Wireless Networks) is operational.... For addressing, network security, again Cisco firewalls are implemented to protect the network from viruses, worms and probes.... Moreover, network security is addressed efficiently, as monitoring of each system or service is carried out...
13 Pages (3250 words) Essay

Implementation of Network Management System in the Surrey University Network

Moreover, the university that is categorized into two sites needs to cope up with the new technological trends, in order to avoid network security threats and vulnerabilities.... The paper "Implementation of Network Management System in the Surrey University Network" explores in detail the wired network, wireless connectivity of Wembley and Harrow SITES, wireless LAN design for Camden, network management system design, and network monitoring system of the named project....
30 Pages (7500 words) Term Paper

Wireless Network for The Athletes Shack

However, security is a primary concern, as data channels will be established in the environment.... For addressing the security issue, Cisco provides rich features and adds an extra layer of security on the wireless networks.... The embedded security technologies on a wireless architecture are now standardized, as they are available by default in all vendor manufactured wireless devices.... However, there is no guarantee of the network security, if the iPads are misused and stolen or snatched from one of the employees of TAS....
12 Pages (3000 words) Business Plan

The Plan of Implementing a B2B E-Commerce System

I have studied the comparison between Oracle and MySQL from the perspective of main DBMS features - Data Types, Tables, Indexing, views, synonyms, sequences, Data Definition & Modification language, stored procedures, triggers, functions, XML compatibility, transactional capabilities, security, auditing, replication, and clustering.... However, few critical features, like two-way replications, high availability clustering, hot backups, role-based security (grouping of users into roles before assigning privileges) and partial rollback (partial backing out of erroneous transactions) are not supported by MySQL....
9 Pages (2250 words) Term Paper

Unified Threat Management: A Defensive Suite for the 21st Century

UTM solutions vary, but in essence, UTM solutions are appliances or software packages that try to provide comprehensive threat management.... Unified Threat Management is a new wave in cyber-security.... he problem that many IT security professionals see with UTM is that focused programs are likely to have functionalities and specializations that a general solution might not (SC Magazine, 2007).... It also creates a bit of a dilemma for security architects....
13 Pages (3250 words) Essay

Strategy of B2B E-Commerce System

I have studied the comparison between Oracle and MySQL from the perspective of main DBMS features – Data Types, Tables, Indexing, views, synonyms, sequences, Data Definition & Modification language, stored procedures, triggers, functions, XML compatibility, transactional capabilities, security, auditing, replication and clustering....
9 Pages (2250 words) Case Study

Designing Networks in Waxlow Private School

This paper, Designing Networks in Waxlow Private School, declares that the Internet is the fastest rising technology and has produced endless opportunities.... At the same time serving students to navigate through the dominant and greatest growing world of information is a challenge.... .... ... ...
28 Pages (7000 words) Research Paper

The Athletes Shack Wireless Upgrade

security is a primary concern, as data channels will be established in the environment.... For addressing the security issue, Cisco provides rich features and adds an extra layer of security on the wireless networks.... The embedded security technologies on a wireless architecture are now standardized, as they are available by default in all vendor manufactured wireless devices.... However, there is no guarantee of the network security, if the iPads are misused and stolen or snatched from one of the employees of TAS....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us