Cisco Networking Academy Program : fundamentals of network security companion guide

Material type: TextTextPublication details: Delhi : Pearson Education., 2004Description: xxxii, 870 p. : illustrations ; 1 CD-ROM (4 3/4 in.)ISBN: 1587131226 ; 9781587131226; 9788129706478 ; 8129706474Subject(s): Computer networks -- Security measures -- Textbooks | Computer networks -- Security measures -- Problems, exercisesDDC classification: 005.8
Contents:
Introduction. I. IOS ROUTER SECURITY. 1. Overview of Network Security. Rationale, Trends, and Goals of Network Security. Security Threats and Vulnerabilities. Security Framework and Policy. Security Products and Solutions. Summary. Key Terms. Check Your Understanding. 2. Basic Router and Switch Security. General Router and Switch Security. Disabling Unneeded Services. Securing the Perimeter Router. Router Management. Securing Switches and LAN Access. Summary. Key Terms. Check Your Understanding. 3. Router ACLs and CBAC. Access Control Lists. Types of IP ACLs. Content-Based Access Control. Summary. Key Terms. Check Your Understanding. 4. Router AAA Security. AAA Secures Network Access. Network Access Server (NAS) AAA Authentication Process. Cisco Secure ACS. AAA Servers Overview and Configuration. The Cisco IOS Firewall Authentication Proxy. Summary. Key Terms. Check Your Understanding. 5. Router Intrusion Detection, Monitoring, and Management IOS Firewall IDS. Setting up the Cisco IOS Firewall IDS. Monitoring with Logging and Syslog. SNMP. Managing the Router. Security Device Manager (SDM). Summary. Key Terms. Check Your Understanding. 6. Router Site-to-Site VPNs Virtual Private Networks. IOS Cryptosystem. Symmetric Encryption. IPSec. Site-to-Site IPSec VPN Using Preshared Keys. Digital Certificates. Configuring Site-to-Site IPSec VPN Using Digital Certificates. Summary. Key Terms. Check Your Understanding. 7 Router Remote Access VPNs Remote Access VPN. VPN Enterprise Management. Summary. Key Terms. Check Your Understanding. II. PIX SECURITY APPLIANCE SECURITY. 8. PIX Security Appliance. Introduction to Firewalls. Cisco PIX Security Appliance. Getting Started with the PIX Security Appliance. Routing and Multicast Configuration. PIX Dynamic Host Control Configuration. Summary. Key Terms. Check Your Understanding. 9. PIX Security Appliance Translations and Connections. Transport Protocols. Network Address Translation. DNS Doctoring, Destination NAT, and DNS Record Translation on the PIX. Connections. Port Address Translation. Multiple Interfaces on a PIX Security Appliance. Summary. Key Terms. Check Your Understanding. 10. PIX Security Appliance ACLs. ACLs and the PIX Security Appliance. Using ACLs. Filtering. Object Grouping. Nested Object Groups. Summary. Key Terms. Check Your Understanding. 11. PIX Security Appliance AAA AAA. Authentication Configuration on the PIX. Authorization Configuration on the PIX Security Appliance. Accounting Configuration on the PIX Security Appliance. Defining Traffic to Utilize AAA Services. Monitoring the AAA Configuration. PPPoE and the PIX Security Appliance. Appendix 11-A: How to Add Users to CSACS-NT. Appendix 11-B: CSACS and Authorization. Appendix 11-C: CSACS and ACLs. Appendix 11-D: How to View Accounting Information in CSACS......... Summary. Key Terms. Check Your Understanding. 12. PIX Advanced Protocols and Intrusion. Detection. Advanced Protocol Handling. Multimedia Support and the PIX Security Appliance. Attack Guards. Intrusion Detection and the PIX Security Appliance. Shunning. PIX Security Appliance Syslog Logging. SNMP. Summary. Key Terms. Check Your Understanding. 13. PIX Failover and System Maintenance. Understanding PIX Security Appliance Failover. Serial Cable Failover Configuration. LAN-Based Failover Configuration. System Maintenance via Remote Access. Command Authorization. PIX Security Appliance Password Recovery. Upgrading the PIX Security Appliance Image and the Activation Key. Summary. Key Terms. Check Your Understanding. 14. PIX Security Appliance VPNs. PIX Security Appliance Enables a Secure VPN. Tasks to Configure VPN. Cisco VPN Client. Scaling PIX VPNs Using CAs. Summary. Key Terms. Check Your Understanding. 15. PIX Security Appliance Management. PIX Management Tools. Cisco PIX Device Manager. Enterprise PIX Management. Summary. Check Your Understanding. III. APPENDIXES. Appendix A. Glossary of Key Terms. Appendix B. Check Your Understanding Answer Key. Appendix C. Physical Layer Security. Appendix D. Operating System Security. Index.
Summary: Covers the installation, configuration, monitoring, and maintenance using Cisco command-line interface (CLI) and web-based device managers on both the Cisco IOS Firewall and the PIX Security Appliance. Including a companion CD, this book contains security appendixes that cover installation tutorials for various hardware and software products.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Reference Books Reference Books Main Library
Reference
Reference 004.6 CIS (Browse shelf(Opens below)) Available 009557
Total holds: 0

Included Index.

Introduction. I. IOS ROUTER SECURITY. 1. Overview of Network Security. Rationale, Trends, and Goals of Network Security. Security Threats and Vulnerabilities. Security Framework and Policy. Security Products and Solutions. Summary. Key Terms. Check Your Understanding. 2. Basic Router and Switch Security. General Router and Switch Security. Disabling Unneeded Services. Securing the Perimeter Router. Router Management. Securing Switches and LAN Access. Summary. Key Terms. Check Your Understanding. 3. Router ACLs and CBAC. Access Control Lists. Types of IP ACLs. Content-Based Access Control. Summary. Key Terms. Check Your Understanding. 4. Router AAA Security. AAA Secures Network Access. Network Access Server (NAS) AAA Authentication Process. Cisco Secure ACS. AAA Servers Overview and Configuration. The Cisco IOS Firewall Authentication Proxy. Summary. Key Terms. Check Your Understanding. 5. Router Intrusion Detection, Monitoring, and Management IOS Firewall IDS. Setting up the Cisco IOS Firewall IDS. Monitoring with Logging and Syslog. SNMP. Managing the Router. Security Device Manager (SDM). Summary. Key Terms. Check Your Understanding. 6. Router Site-to-Site VPNs Virtual Private Networks. IOS Cryptosystem. Symmetric Encryption. IPSec. Site-to-Site IPSec VPN Using Preshared Keys. Digital Certificates. Configuring Site-to-Site IPSec VPN Using Digital Certificates. Summary. Key Terms. Check Your Understanding. 7 Router Remote Access VPNs Remote Access VPN. VPN Enterprise Management. Summary. Key Terms. Check Your Understanding. II. PIX SECURITY APPLIANCE SECURITY. 8. PIX Security Appliance. Introduction to Firewalls. Cisco PIX Security Appliance. Getting Started with the PIX Security Appliance. Routing and Multicast Configuration. PIX Dynamic Host Control Configuration. Summary. Key Terms. Check Your Understanding. 9. PIX Security Appliance Translations and Connections. Transport Protocols. Network Address Translation. DNS Doctoring, Destination NAT, and DNS Record Translation on the PIX. Connections. Port Address Translation. Multiple Interfaces on a PIX Security Appliance. Summary. Key Terms. Check Your Understanding. 10. PIX Security Appliance ACLs. ACLs and the PIX Security Appliance. Using ACLs. Filtering. Object Grouping. Nested Object Groups. Summary. Key Terms. Check Your Understanding. 11. PIX Security Appliance AAA AAA. Authentication Configuration on the PIX. Authorization Configuration on the PIX Security Appliance. Accounting Configuration on the PIX Security Appliance. Defining Traffic to Utilize AAA Services. Monitoring the AAA Configuration. PPPoE and the PIX Security Appliance. Appendix 11-A: How to Add Users to CSACS-NT. Appendix 11-B: CSACS and Authorization. Appendix 11-C: CSACS and ACLs. Appendix 11-D: How to View Accounting Information in CSACS......... Summary. Key Terms. Check Your Understanding. 12. PIX Advanced Protocols and Intrusion. Detection. Advanced Protocol Handling. Multimedia Support and the PIX Security Appliance. Attack Guards. Intrusion Detection and the PIX Security Appliance. Shunning. PIX Security Appliance Syslog Logging. SNMP. Summary. Key Terms. Check Your Understanding. 13. PIX Failover and System Maintenance. Understanding PIX Security Appliance Failover. Serial Cable Failover Configuration. LAN-Based Failover Configuration. System Maintenance via Remote Access. Command Authorization. PIX Security Appliance Password Recovery. Upgrading the PIX Security Appliance Image and the Activation Key. Summary. Key Terms. Check Your Understanding. 14. PIX Security Appliance VPNs. PIX Security Appliance Enables a Secure VPN. Tasks to Configure VPN. Cisco VPN Client. Scaling PIX VPNs Using CAs. Summary. Key Terms. Check Your Understanding. 15. PIX Security Appliance Management. PIX Management Tools. Cisco PIX Device Manager. Enterprise PIX Management. Summary. Check Your Understanding. III. APPENDIXES. Appendix A. Glossary of Key Terms. Appendix B. Check Your Understanding Answer Key. Appendix C. Physical Layer Security. Appendix D. Operating System Security. Index.

Covers the installation, configuration, monitoring, and maintenance using Cisco command-line interface (CLI) and web-based device managers on both the Cisco IOS Firewall and the PIX Security Appliance. Including a companion CD, this book contains security appendixes that cover installation tutorials for various hardware and software products.

There are no comments on this title.

to post a comment.

© University of Vavuniya

---