Perimeter Defense-in-Depth with Cisco ASA

No matter how tightly locked down one keeps one's internal systems, how religiously the system administrators apply patches, and how well educated about network threats the user base becomes, a weak perimeter security system turns an otherwise secure system into a castle with an empty moat.
By
Michael Simone
February 9, 2009

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg