larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services, 3rd Edition

eBook (Watermarked)

  • Your Price: $65.59
  • List Price: $81.99
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Also available in other formats.

  • Description
  • Sample Content
  • Updates
  • Copyright 2014
  • Dimensions: 7-3/8" x 9-1/8"
  • Edition: 3rd
  • eBook (Watermarked)
  • ISBN-10: 0-13-295440-0
  • ISBN-13: 978-0-13-295440-2

Cisco® ASA

All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition

Identify, mitigate, and respond to today’s highly-sophisticated network attacks.

Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services has been fully updated to cover the newest techniques and Cisco technologies for maximizing end-to-end security in your environment. Three leading Cisco security experts guide you through every step of creating a complete security plan with Cisco ASA, and then deploying, configuring, operating, and troubleshooting your solution.

Fully updated for today’s newest ASA releases, this edition adds new coverage of ASA 5500-X, ASA 5585-X, ASA Services Module, ASA next-generation firewall services, EtherChannel, Global ACLs, clustering, IPv6 improvements, IKEv2, AnyConnect Secure Mobility VPN clients, and more. The authors explain significant recent licensing changes; introduce enhancements to ASA IPS; and walk you through configuring IPsec, SSL VPN, and NAT/PAT.

You’ll learn how to apply Cisco ASA adaptive identification and mitigation services to systematically strengthen security in network environments of all sizes and types. The authors present up-to-date sample configurations, proven design scenarios, and actual debugs–
all designed to help you make the most of Cisco ASA in your rapidly evolving network.

Jazib Frahim, CCIE® No. 5459 (Routing and Switching; Security), Principal Engineer in the Global Security Solutions team, guides top-tier Cisco customers in security-focused network design and implementation. He architects, develops, and launches new security services concepts. His books include Cisco SSL VPN Solutions and Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting.

Omar Santos, CISSP No. 463598, Cisco Product Security Incident Response Team (PSIRT) technical leader, leads and mentors engineers and incident managers in investigating and resolving vulnerabilities in Cisco products and protecting Cisco customers. Through 18 years in IT and cybersecurity, he has designed, implemented, and supported numerous secure networks for Fortune® 500 companies and the U.S. government. He is also the author of several other books and numerous whitepapers and articles.

Andrew Ossipov, CCIE® No. 18483 and CISSP No. 344324, is a Cisco Technical Marketing Engineer focused on firewalls, intrusion prevention, and data center security. Drawing on more than 16 years in networking, he works to solve complex customer technical problems, architect new features and products, and define future directions for Cisco’s product portfolio. He holds several pending patents.

Understand, install, configure, license, maintain, and troubleshoot the newest ASA devices

Efficiently implement Authentication, Authorization, and Accounting (AAA) services

Control and provision network access with packet filtering, context-aware Cisco ASA next-generation firewall services, and new NAT/PAT concepts

Configure IP routing, application inspection, and QoS

Create firewall contexts with unique configurations, interfaces, policies, routing tables, and administration

Enable integrated protection against many types of malware and advanced persistent threats (APTs) via Cisco Cloud Web Security and Cisco Security Intelligence Operations (SIO)

Implement high availability with failover and elastic scalability with clustering

Deploy, troubleshoot, monitor, tune, and manage Intrusion Prevention System (IPS) features

Implement site-to-site IPsec VPNs and all forms of remote-access VPNs (IPsec, clientless SSL, and client-based SSL)

Configure and troubleshoot Public Key Infrastructure (PKI)

Use IKEv2 to more effectively resist attacks against VPNs

Leverage IPv6 support for IPS, packet inspection, transparent firewalls, and site-to-site IPsec VPNs

Table of Contents

Introduction 

Chapter 1 Introduction to Security Technologies 1

Firewalls 2

    Network Firewalls 2

        Packet-Filtering Techniques 2

        Application Proxies 3

        Network Address Translation 3

        Stateful Inspection Firewalls 6

    Demilitarized Zones (DMZ) 7

    Deep Packet Inspection 8

    Next-Generation Context-Aware Firewalls 8

    Personal Firewalls 9

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) 9

    Pattern Matching and Stateful Pattern-Matching Recognition 11

    Protocol Analysis 12

    Heuristic-Based Analysis 12

    Anomaly-Based Analysis 12

    Global Threat Correlation Capabilities 14

Virtual Private Networks 14

    Technical Overview of IPsec 16

        IKEv1 Phase 1 16

        IKEv1 Phase 2 20

        IKEv2 23

    SSL VPNs 23

Cisco AnyConnect Secure Mobility 25

Cloud and Virtualization Security 26

Chapter 2 Cisco ASA Product and Solution Overview 29

Cisco ASA Model Overview 30

Cisco ASA 5505 Model 31

Cisco ASA 5510 Model 35

Cisco ASA 5512-X Model 38

Cisco ASA 5515-X Model 40

Cisco ASA 5520 Model 41

Cisco ASA 5525-X Model 42

Cisco ASA 5540 Model 43

Cisco ASA 5545-X Model 44

Cisco ASA 5550 Model 45

Cisco ASA 5555-X Model 46

Cisco ASA 5585-X Models 47

Cisco Catalyst 6500 Series ASA Services Module 51

Cisco ASA 1000V Cloud Firewall 52

Cisco ASA Next-Generation Firewall Services (Formerly Cisco ASA CX) 53

Cisco ASA AIP-SSM Module 53

    Cisco ASA AIP-SSM-10 54

    Cisco ASA AIP-SSM-20 54

    Cisco ASA AIP-SSM-40 54

Cisco ASA Gigabit Ethernet Modules 55

    Cisco ASA SSM-4GE 55

    Cisco ASA 5580 Expansion Cards 56

    Cisco ASA 5500-X Series 6-Port GE Interface Cards 57

Chapter 3 Licensing 59

Licensed Features on ASA 59

    Basic Platform Capabilities 61

    Advanced Security Features 63

    Tiered Capacity Features 65

    Displaying License Information 66

Managing Licenses with Activation Keys 68

    Permanent and Time-Based Activation Keys 68

        Combining Keys 69

        Time-Based Key Expiration 70

    Using Activation Keys 71

Combined Licenses in Failover and Clustering 73

    License Aggregation Rules 73

    Aggregated Time-Based License Countdown 75

Shared Premium VPN Licensing 75

    Shared Server and Participants 76

        Shared License 76

        Shared Licensing Operation 76

    Configuring Shared Licensing 78

        Licensing Server 78

        Participants 79

        Backup Licensing Server 79

        Monitoring Shared Licensing Operation 80

Chapter 4 Initial Setup 81

Accessing the Cisco ASA Appliances 81

    Establishing a Console Connection 82

    Command-Line Interface 85

Managing Licenses 87

Initial Setup 90

    Initial Setup via CLI 90

    Initial Setup of ASDM 92

        Uploading ASDM 92

        Setting Up the Appliance 93

        Accessing ASDM 94

        Functional Screens of ASDM 97

Device Setup 100

    Setting Up a Device Name and Passwords 100

    Configuring an Interface 102

        Configuring a Data-Passing Interface 102

        Configuring a Subinterface 106

        Configuring an EtherChannel Interface 109

        Configuring a Management Interface 111

    DHCP Services 112

Setting Up the System Clock 114

    Manual Clock Adjustment 114

        Time Zone 114

        Date 116

        Time 116

    Automatic Clock Adjustment Using the Network Time Protocol 116

Chapter 5 System Maintenance 119

Configuration Management 119

    Running Configuration 119

    Startup Configuration 123

    Removing the Device Configuration 124

Remote System Management 126

    Telnet 126

    Secure Shell (SSH) 129

System Maintenance 132

    Software Installation 132

        Image Upgrade via Cisco ASDM 132

        Image Upgrade via the Cisco ASA CLI 133

        Image Upload Using ROMMON 136

    Password Recovery Process 137

    Disabling the Password Recovery Process 141

System Monitoring 144

    System Logging 144

        Enabling Logging 146

        Defining Event List 147

        Logging Types 149

        Defining a Syslog Server 153

        Defining an Email Server 154

        Storing Logs Internally and Externally 154

        Syslog Message ID Tuning 156

    NetFlow Secure Event Logging (NSEL) 156

        Step 1: Define a NetFlow Collector 157

        Step 2: Define a NetFlow Export Policy 159

    Simple Network Management Protocol (SNMP) 160

        Configuring SNMP 161

        SNMP Monitoring 164

Device Monitoring and Troubleshooting 165

    CPU and Memory Monitoring 165

    Troubleshooting Device Issues 168

        Troubleshooting Packet Issues 168

        Troubleshooting CPU Issues 172

Chapter 6 Cisco ASA Services Module 173

Cisco ASA Services Module Overview 173

    Hardware Architecture 174

    Host Chassis Integration 175

Managing Host Chassis 176

    Assigning VLAN Interfaces 177

    Monitoring Traffic Flow 178

Common Deployment Scenarios 180

    Internal Segment Firewalling 181

    Edge Protection 182

Trusted Flow Bypass with Policy Based Routing 183

    Traffic Flow 185

    Sample PBR Configuration 185

Chapter 7 Authentication, Authorization, and Accounting (AAA) Services 191

AAA Protocols and Services Supported by Cisco ASA 192

    RADIUS 194

    TACACS+ 195

    RSA SecurID 196

    Microsoft Windows NTLM 197

    Active Directory and Kerberos 197

    Lightweight Directory Access Protocol 197

Defining an Authentication Server 198

Configuring Authentication of Administrative Sessions 204

    Authenticating Telnet Connections 204

    Authenticating SSH Connections 206

    Authenticating Serial Console Connections 207

    Authenticating Cisco ASDM Connections 208

Authenticating Firewall Sessions (Cut-Through Proxy Feature) 209

    Authentication Timeouts 214

Customizing Authentication Prompts 214

Configuring Authorization 215

    Command Authorization 217

    Configuring Downloadable ACLs 218

Configuring Accounting 219

    RADIUS Accounting 220

    TACACS+ Accounting 221

Troubleshooting Administrative Connections to Cisco ASA 222

    Troubleshooting Firewall Sessions (Cut-Through Proxy) 225

    ASDM and CLI AAA Test Utility 226

Chapter 8 Controlling Network Access: The Traditional Way 229

Packet Filtering 229

    Types of ACLs 232

        Standard ACLs 233

        Extended ACLs 233

        EtherType ACLs 233

        Webtype ACLs 234

    Comparing ACL Features 234

    Through-the-Box-Traffic Filtering 235

    To-the-Box-Traffic Filtering 240

Advanced ACL Features 243

    Object Grouping 243

        Object Types 243

        Configuration of Object Types 245

        Object Grouping and ACLs 248

    Standard ACLs 250

    Time-Based ACLs 251

    Downloadable ACLs 254

    ICMP Filtering 254

Deployment Scenario for Traffic Filtering 255

    Using ACLs to Filter Inbound Traffic 255

        Configuration Steps with ASDM 257

        Configuration Steps with CLI 259

Monitoring Network Access Control 260

    Monitoring ACLs 260

Chapter 9 Implementing Next-Generation Firewall Services with ASA CX 267

CX Integration Overview 268

    Logical Architecture 269

    Hardware Modules 270

    Software Modules 271

    High Availability 272

ASA CX Architecture 273

    Data Plane 274

    Eventing and Reporting 275

    User Identity 275

    TLS Decryption Proxy 276

    HTTP Inspection Engine 276

    Application Inspection Engine 276

    Management Plane 276

    Control Plane 276

Preparing ASA CX for Configuration 277

Managing ASA CX with PRSM 282

    Using PRSM 283

    Configuring User Accounts 286

    CX Licensing 288

    Component and Software Updates 290

        Signatures and Engines 290

        System Software 291

    Configuration Database Backup 292

Defining CX Policy Elements 293

    Network Groups 295

    Identity Objects 296

    URL Objects 298

    User Agent Objects 299

    Application Objects 299

    Secure Mobility Objects 300

    Interface Roles 301

    Service Objects 302

    Application-Service Objects 303

    Source Object Groups 304

    Destination Object Groups 305

    File Filtering Profiles 306

    Web Reputation Profiles 306

    NG IPS Profiles 307

Enabling User Identity Services 309

    Configuring Directory Servers 310

    Connecting to AD Agent or CDA 312

    Tuning Authentication Settings 313

    Defining User Identity Discovery Policy 314

Enabling TLS Decryption 316

    Configuring Decryption Settings 318

    Defining a Decryption Policy 320

Enabling NG IPS 323

Defining Context-Aware Access Policies 324

Configuring ASA for CX Traffic Redirection 327

Monitoring ASA CX 329

    Dashboard Reports 329

    Connection and System Events 331

    Packet Captures 332

Chapter 10 Network Address Translation 337

Types of Address Translation 338

    Network Address Translation 338

    Port Address Translation 340

Address Translation Methods 341

    Static NAT/PAT 341

    Dynamic NAT/PAT 343

    Policy NAT/PAT 344

    Identity NAT 344

Security Protection Mechanisms Within Address Translation 345

    Randomization of Sequence Numbers 345

    TCP Intercept 346

Understanding Address Translation Behavior 346

    Address Translation Behavior Prior to Version 8.3 346

        Packet Flow Sequence in Pre-8.3 Version 347

        NAT Order of Operation for Pre-8.3 Versions 348

    Redesigning Address Translation (Version 8.3 and Later) 349

        NAT Modes in Version 8.3 and Later 349

        NAT Order of Operation for Version 8.3 and Later 350

Configuring Address Translation 350

    Auto NAT Configuration 351

        Available Auto NAT Settings 351

        Auto NAT Configuration Example 353

    Manual NAT Configuration 356

        Available Manual NAT Settings 356

        Manual NAT Configuration Example 357

    Integrating ACLs and NAT 359

        Pre-8.3 Behavior for NAT and ACL Integration 359

        Behavior of NAT and ACL Integration in Version 8.3 and Later 361

    Configuration Use Cases 362

        Use Case 1: Dynamic PAT for Inside Network with Static NAT for a DMZ Web Server 363

        Use Case 2: Static PAT for a Web Server Located on the DMZ Network 364

        Use Case 3: Static NAT for Overlapping Subnets Using Twice NAT 366

        Use Case 4: Identity NAT for Site-to-Site VPN Tunnel 367

        Use Case 5: Dynamic PAT for Remote-Access VPN Clients 369

DNS Doctoring 372

Monitoring Address Translations 375

Chapter 11 IPv6 Support 379

IP Version 6 Introduction 379

    IPv6 Header 380

    Supported IPv6 Address Types 381

        Global Unicast Address 382

        Site-Local Address 382

        Link-Local Address 382

Configuring IPv6 382

    IP Address Assignment 383

    IPv6 DHCP Relay 384

    Optional IPv6 Parameters 385

        Neighbor Solicitation Messages 385

        Neighbor Reachable Time 385

        Router Advertisement Transmission Interval 385

    Setting Up an IPv6 ACL 386

    IPv6 Address Translation 389

Chapter 12 IP Routing 391

Configuring Static Routes 392

    Static Route Monitoring 395

    Displaying the Routing Table 399

RIP 400

    Configuring RIP 401

    RIP Authentication 403

    RIP Route Filtering 406

    Configuring RIP Redistribution 409

    Troubleshooting RIP 409

        Scenario 1: RIP Version Mismatch 410

        Scenario 2: RIP Authentication Mismatch 411

        Scenario 3: Multicast or Broadcast Packets Blocked 411

OSPF 412

    Configuring OSPF 413

        Enabling OSPF 414

    OSPF Virtual Links 419

    Configuring OSPF Authentication 422

    Configuring OSPF Redistribution 426

    Stub Areas and NSSAs 428

    OSPF Type 3 LSA Filtering 429

    OSPF neighbor Command and Dynamic Routing over a VPN Tunnel 431

    OSPFv3 433

    Troubleshooting OSPF 433

        Useful Troubleshooting Commands 433

        Mismatched Areas 440

        OSPF Authentication Mismatch 440

        Troubleshooting Virtual Link Problems 440

EIGRP 441

    Configuring EIGRP 441

        Enabling EIGRP 441

        Configuring Route Filtering for EIGRP 445

        EIGRP Authentication 447

        Defining Static EIGRP Neighbors 448

        Route Summarization in EIGRP 448

        Split Horizon 450

        Route Redistribution in EIGRP 450

        Controlling Default Information 453

    Troubleshooting EIGRP 454

        Useful Troubleshooting Commands 454

        Scenario 1: Link Failures 458

        Scenario 2: Misconfigured Hello and Hold Intervals 459

        Scenario 3: Misconfigured Authentication Parameters 462

Chapter 13 Application Inspection 465

Enabling Application Inspection 468

Selective Inspection 469

CTIQBE Inspection 473

DCERPC Inspection 476

DNS Inspection 476

ESMTP Inspection 481

File Transfer Protocol 484

General Packet Radio Service Tunneling Protocol 486

    GTPv0 487

    GTPv1 489

    Configuring GTP Inspection 490

H.323 492

    H.323 Protocol Suite 493

    H.323 Version Compatibility 495

    Enabling H.323 Inspection 496

    Direct Call Signaling and Gatekeeper Routed Control Signaling 499

    T.38 499

Cisco Unified Communications Advanced Support 499

    Phone Proxy 500

    TLS Proxy 505

    Mobility Proxy 506

    Presence Federation Proxy 506

HTTP 507

    Enabling HTTP Inspection 507

        strict-http Command 510

        content-length Command 510

        content-type-verification Command 511

        max-header-length Command 511

        max-uri-length Command 512

        port-misuse Command 512

        request-method Command 513

        transfer-encoding type Command 515

ICMP 515

ILS 516

Instant Messenger (IM) 517

IPsec Pass-Through 518

MGCP 519

NetBIOS 521

PPTP 522

Sun RPC 522

RSH 523

RTSP 523

SIP 524

Skinny (SCCP) 525

SNMP 527

SQL*Net 528

TFTP 528

WAAS 528

XDMCP 529

Chapter 14 Virtualization 531

Architectural Overview 533

    System Execution Space 533

    Admin Context 535

    User Context 535

    Packet Classification 538

        Packet Classification Criteria 538

        Destination IP Address 539

        Unique MAC Address 540

    Packet Flow in Multiple Mode 541

        Forwarding Without a Shared Interface 541

        Forwarding with a Shared Interface 542

Configuration of Security Contexts 544

    Step 1: Enable Multiple Security Contexts Globally 544

    Step 2: Set Up the System Execution Space 547

    Step 3: Configure Interfaces 549

    Step 4: Specify a Configuration URL 550

    Step 5: Configure an Admin Context 552

    Step 6: Configure a User Context 553

    Step 7: Manage the Security Contexts (Optional) 554

    Step 8: Resource Management (Optional) 555

        Step 1: Define a Resource Class 556

        Step 2: Map the Resource Class to a Context 558

Deployment Scenarios 559

    Virtual Firewall with Non-Shared Interfaces 559

        Configuration Steps with ASDM 561

        Configuration Steps with CLI 569

    Virtual Firewall with a Shared Interface 572

        Configuration Steps with ASDM 574

        Configuration Steps Using CLI 582

Monitoring and Troubleshooting the Security Contexts 586

    Monitoring 586

    Troubleshooting 588

        Security Contexts Are Not Added 588

        Security Contexts Are Not Saved on the Local Disk 588

        Security Contexts Are Not Saved on the FTP Server 589

        User Having Connectivity Issues When Shared Security Contexts Are Used 590

Chapter 15 Transparent Firewalls 591

Architectural Overview 594

    Single-Mode Transparent Firewalls 594

        Packet Flow in an SMTF 595

    Multimode Transparent Firewalls 597

        Packet Flow in an MMTF 597

Restrictions When Using Transparent Firewalls 599

    Transparent Firewalls and VPNs 599

    Transparent Firewalls and NAT 600

Configuration of Transparent Firewalls 602

    Configuration Guidelines 602

    Configuration Steps 603

        Step 1: Enable Transparent Firewalls 603

        Step 2: Set Up Interfaces 604

        Step 3: Configure an IP Address 605

        Step 4: Set Up Routes 606

        Step 5: Configure Interface ACLs 608

        Step 6: Configure NAT (Optional) 611

        Step 7: Add Static L2F Table Entries (Optional) 612

        Step 8: Enable ARP Inspection (Optional) 613

        Step 9: Modify L2F Table Parameters (Optional) 615

Deployment Scenarios 616

    SMTF Deployment 617

        Configuration Steps Using ASDM 618

        Configuration Steps Using CLI 622

    MMTF Deployment with Security Contexts 623

        Configuration Steps Using ASDM 625

        Configuration Steps Using CLI 632

Monitoring and Troubleshooting Transparent Firewalls 636

    Monitoring 636

    Troubleshooting 637

Hosts Are Not Able to Communicate 637

Moved Host Is Not Able to Communicate 639

General Syslogging 640

Chapter 16 High Availability 641

Redundant Interfaces 642

    Using Redundant Interfaces 642

    Deployment Scenarios 643

    Configuration and Monitoring 644

Static Route Tracking 646

    Configuring Static Routes with an SLA Monitor 647

    Floating Connection Timeout 649

    Sample Backup ISP Deployment 649

Failover 652

    Unit Roles and Functions in Failover 652

    Stateful Failover 653

    Active/Standby and Active/Active Failover 654

    Failover Hardware and Software Requirements 656

        Zero Downtime Upgrade in Failover 657

        Failover Licensing 658

    Failover Interfaces 658

        Stateful Link 659

        Failover Link Security 659

        Data Interface Addressing 660

        Asymmetric Routing Groups 662

    Failover Health Monitoring 664

    State and Role Transition 666

    Configuring Failover 667

        Basic Failover Settings 668

        Data Interface Configuration 671

        Failover Policies and Timers 673

        Active/Active Failover 674

    Monitoring and Troubleshooting Failover 678

    Active/Standby Failover Deployment Scenario 680

Clustering 685

    Unit Roles and Functions in Clustering 685

        Master and Slave Units 685

        Flow Owner 686

        Flow Director 686

        Flow Forwarder 687

    Clustering Hardware and Software Requirements 687

        Zero Downtime Upgrade in Clustering 688

        Unsupported Features 689

        Cluster Licensing 690

    Control and Data Interfaces 690

        Spanned EtherChannel Mode 693

        Individual Mode 695

        Cluster Management 697

    Cluster Health Monitoring 697

    Network Address Translation 698

    Performance 700

        Centralized Features 701

        Scaling Factors 701

    Packet Flow 702

        TCP Connection Processing 702

        UDP Connection Processing 703

        Centralized Connection Processing 705

    State Transition 705

    Configuring Clustering 706

        Setting Interface Mode 707

        Management Access for ASDM Deployment 708

        Building a Cluster 710

        Data Interface Configuration 714

    Monitoring and Troubleshooting Clustering 717

    Spanned EtherChannel Cluster Deployment Scenario 720

Chapter 17 Implementing Cisco ASA Intrusion Prevention System (IPS) 733

IPS Integration Overview 733

    IPS Logical Architecture 735

    IPS Hardware Modules 735

    IPS Software Modules 736

    Inline and Promiscuous Modes 737

    IPS High Availability 739

Cisco IPS Software Architecture 739

    MainApp 741

        AuthenticationApp 741

        Attack Response Controller 742

        cipsWebserver 742

        Logger 742

        CtlTransSource 743

        NotificationApp 743

    SensorApp 743

    CollaborationApp 744

    EventStore 744

Preparing ASA IPS for Configuration 744

    Installing CIPS System Software 744

    Accessing CIPS from the ASA CLI 747

    Configuring Basic Management Settings 748

    Setting Up ASDM for IPS Management 752

    Installing the CIPS License Key 752

<

Errata

We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.

Download the errata from the main title

Submit Errata

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.

Overview

Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@ciscopress.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security

Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children

This site is not directed to children under the age of 13.

Marketing

Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out

Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.ciscopress.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links

This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020