Save up to 30% on Elsevier print and eBooks with free shipping. No promo code needed.
Save up to 30% on print and eBooks.
Managing Cisco Network Security
2nd Edition - May 29, 2002
Author: Syngress
Language: English
Paperback ISBN:9781931836562
9 7 8 - 1 - 9 3 1 8 3 6 - 5 6 - 2
eBook ISBN:9780080479057
9 7 8 - 0 - 0 8 - 0 4 7 9 0 5 - 7
An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world "There's no question that attacks on enterpris…Read more
Purchase options
LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code is needed.
An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world
"There's no question that attacks on enterprise networks are increasing in frequency and sophistication..." -Mike Fuhrman, Cisco Systems Manager, Security Consulting
Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.
Security from a real-world perspective
Key coverage of the new technologies offered by the Cisco including: 500 series of Cisco PIX Firewall, Cisco
Intrusion Detection System, and the Cisco Secure Scanner
Revised edition of a text popular with CCIP (Cisco Certified Internetwork Professional) students
Expanded to include separate chapters on each of the security products offered by Cisco Systems
Chapter 1 Introduction to IP Network Security
Introduction
What Role Does Security Play in a Network?
Goals
Philosophy
What if I Don’t Deploy Security?
The Fundamentals of Networking
Where Does Security Fit in?
Network Access Layer Security
Internetwork Layer Security
Host-to-Host Layer Security?
Process Application Layer Security
Authentication
OSI Model
How the OSI Model Works
Composition of a Data Packet
Security in TCP/IP
Cisco IP Security Hardware and Software
The Cisco Secure PIX Firewall
Cisco Secure Integrated Software
Cisco Secure Integrated VPN Software
The Cisco Secure VPN Client
Cisco Secure Access Control Server
Cisco Secure Scanner
Cisco Secure Intrusion Detection System
Cisco Secure Policy Manager
Cisco Secure Consulting Services
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 2 What are We Trying to Prevent?
Introduction
What Threats Face Your Network?
Loss of Confidentiality
Loss of Integrity
Loss of Availability
Sources of Threats
Malicious Mobile Code
Trojan Horses
Viruses
Worms
Current Malicious Code Threats
Current Malicious Code Impacts
Denial of Service
The Smurf Attack
The SYN Flood Attack
Distributed Denial of Service (DDoS) Attacks
Detecting Breaches
Initial Detection
are Forensics Important?
What are the Key Steps after a Breach
is Detected?
Preventing Attacks
Reducing Vulnerabilities
Providing a Simple Security Network Architecture
Developing a Culture of Security
Developing a Security Policy
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 3 Cisco PIX Firewall
Introduction
Overview of the Security Features
Differences between PIX OS Version 4.x and Version 5.x
Differences between PIX OS Version 6.0 and Version 5.x
Initial Configuration
Installing the PIX Software
The Command-Line Interface
IP Configuration
Configuring NAT and PAT
Permit Traffic Through
Security Policy Configuration
Security Strategies
Identify the Security Services to Implement
Implementing the Network Security Policy
Confidentiality Configuration in PIX
PIX Configuration Examples
Protecting a Private Network
Protecting a Network Connected to the Internet
Protecting Server Access Using Authentication
Protecting Public Servers Connected to the Internet
Securing and Maintaining the PIX
System Journaling
Securing the PIX
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 4 Traffic Filtering in the Cisco Internetwork Operating System
Introduction
Access Lists
Access List Operation
Types of Access Lists
Standard IP Access Lists
Extended IP Access Lists
Named Access Lists
Editing Access Lists
Problems with Access Lists
Lock-and-key Access Lists
Reflexive Access Lists
Building Reflexive Access Lists
Applying Reflexive Access Lists
Context-based Access Control
The Context-based Access Control Process
Configuring Context-based Access Control
Inspection Rules
Applying the Inspection Rule
Configuring Port to Application Mapping
Configuring PAM
Protecting a Private Network
Protecting a Network Connected to the Internet
Protecting Server Access Using Lock-and-key
Protecting Public Servers Connected to the Internet