Cisco Networking Academy Program : fundamentals of network security companion guide (Record no. 10885)

MARC details
000 -LEADER
fixed length control field 05071nam a2200205 a 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1587131226
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781587131226
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9788129706478
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 8129706474
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number CIS
245 ## - TITLE STATEMENT
Title Cisco Networking Academy Program : fundamentals of network security companion guide
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Delhi :
Name of publisher Pearson Education.,
Year of publication 2004.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xxxii, 870 p. :
Other physical details illustrations ;
Accompanying material 1 CD-ROM (4 3/4 in.).
500 ## - GENERAL NOTE
General note Included Index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Introduction. I. IOS ROUTER SECURITY. 1. Overview of Network Security. Rationale, Trends, and Goals of Network Security. Security Threats and Vulnerabilities. Security Framework and Policy. Security Products and Solutions. Summary. Key Terms. Check Your Understanding. 2. Basic Router and Switch Security. General Router and Switch Security. Disabling Unneeded Services. Securing the Perimeter Router. Router Management. Securing Switches and LAN Access. Summary. Key Terms. Check Your Understanding. 3. Router ACLs and CBAC. Access Control Lists. Types of IP ACLs. Content-Based Access Control. Summary. Key Terms. Check Your Understanding. 4. Router AAA Security. AAA Secures Network Access. Network Access Server (NAS) AAA Authentication Process. Cisco Secure ACS. AAA Servers Overview and Configuration. The Cisco IOS Firewall Authentication Proxy. Summary. Key Terms. Check Your Understanding. 5. Router Intrusion Detection, Monitoring, and Management IOS Firewall IDS. Setting up the Cisco IOS Firewall IDS. Monitoring with Logging and Syslog. SNMP. Managing the Router. Security Device Manager (SDM). Summary. Key Terms. Check Your Understanding. 6. Router Site-to-Site VPNs Virtual Private Networks. IOS Cryptosystem. Symmetric Encryption. IPSec. Site-to-Site IPSec VPN Using Preshared Keys. Digital Certificates. Configuring Site-to-Site IPSec VPN Using Digital Certificates. Summary. Key Terms. Check Your Understanding. 7 Router Remote Access VPNs Remote Access VPN. VPN Enterprise Management. Summary. Key Terms. Check Your Understanding. II. PIX SECURITY APPLIANCE SECURITY. 8. PIX Security Appliance. Introduction to Firewalls. Cisco PIX Security Appliance. Getting Started with the PIX Security Appliance. Routing and Multicast Configuration. PIX Dynamic Host Control Configuration. Summary. Key Terms. Check Your Understanding. 9. PIX Security Appliance Translations and Connections. Transport Protocols. Network Address Translation. DNS Doctoring, Destination NAT, and DNS Record Translation on the PIX. Connections. Port Address Translation. Multiple Interfaces on a PIX Security Appliance. Summary. Key Terms. Check Your Understanding. 10. PIX Security Appliance ACLs. ACLs and the PIX Security Appliance. Using ACLs. Filtering. Object Grouping. Nested Object Groups. Summary. Key Terms. Check Your Understanding. 11. PIX Security Appliance AAA AAA. Authentication Configuration on the PIX. Authorization Configuration on the PIX Security Appliance. Accounting Configuration on the PIX Security Appliance. Defining Traffic to Utilize AAA Services. Monitoring the AAA Configuration. PPPoE and the PIX Security Appliance. Appendix 11-A: How to Add Users to CSACS-NT. Appendix 11-B: CSACS and Authorization. Appendix 11-C: CSACS and ACLs. Appendix 11-D: How to View Accounting Information in CSACS......... Summary. Key Terms. Check Your Understanding. 12. PIX Advanced Protocols and Intrusion. Detection. Advanced Protocol Handling. Multimedia Support and the PIX Security Appliance. Attack Guards. Intrusion Detection and the PIX Security Appliance. Shunning. PIX Security Appliance Syslog Logging. SNMP. Summary. Key Terms. Check Your Understanding. 13. PIX Failover and System Maintenance. Understanding PIX Security Appliance Failover. Serial Cable Failover Configuration. LAN-Based Failover Configuration. System Maintenance via Remote Access. Command Authorization. PIX Security Appliance Password Recovery. Upgrading the PIX Security Appliance Image and the Activation Key. Summary. Key Terms. Check Your Understanding. 14. PIX Security Appliance VPNs. PIX Security Appliance Enables a Secure VPN. Tasks to Configure VPN. Cisco VPN Client. Scaling PIX VPNs Using CAs. Summary. Key Terms. Check Your Understanding. 15. PIX Security Appliance Management. PIX Management Tools. Cisco PIX Device Manager. Enterprise PIX Management. Summary. Check Your Understanding. III. APPENDIXES. Appendix A. Glossary of Key Terms. Appendix B. Check Your Understanding Answer Key. Appendix C. Physical Layer Security. Appendix D. Operating System Security. Index.
520 ## - SUMMARY, ETC.
Summary, etc Covers the installation, configuration, monitoring, and maintenance using Cisco command-line interface (CLI) and web-based device managers on both the Cisco IOS Firewall and the PIX Security Appliance. Including a companion CD, this book contains security appendixes that cover installation tutorials for various hardware and software products.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer networks -- Security measures -- Textbooks.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer networks -- Security measures -- Problems, exercises.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Reference Books
Holdings
Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Full call number Accession Number Koha item type
Reference Main Library Main Library Reference 18/03/2005 Purchased 1650.00 004.6 CIS 009557 Reference Books

© University of Vavuniya

---