You are previewing Cisco® Secure Internet Security Solutions.
O'Reilly logo
Cisco® Secure Internet Security Solutions

Book Description

Must-have security strategies using Cisco's complete solution to network security

  • The only book to cover interoperability among the Cisco Secure product family to provide the holistic approach to Internet security

  • The first book to provide Cisco proactive solutions to common Internet threats

  • A source of industry-ready pre-built configurations for the Cisco Secure product range

  • Cisco Secure Internet Security Solutions covers the basics of Internet security, and then concentrates on each member of the Cisco Secure product family, providing a detailed explanation with examples of the preferred configurations required for securing Internet connections. The Cisco Secure PIX Firewall is covered in depth from an architectural point of view, and a reference of the PIX commands explains their use in the real world. Although Cisco Secure Internet Security Solutions is primarily concerned with Internet security, the information inside is also applicable to many general network security scenarios

    Table of Contents

    1. Copyright
    2. About the Authors
    3. Acknowledgments
    4. Introduction
    5. Internet Security Fundamentals
      1. Internet Security
        1. Internet Threats
        2. Network Services
        3. Security in the TCP/IP Suite
        4. Denial of Service (DoS) Attacks
        5. Creating a Corporate Security Policy
        6. Summary
        7. Frequently Asked Questions
        8. Glossary
          1. Glossary
      2. Basic Cisco Router Security
        1. Basic Management Security
        2. Access Lists
        3. Password Management
        4. Physical Security
        5. Out-of-Band Management Security
        6. Cisco Discovery Protocol (CDP)
        7. Hypertext Transfer Protocol (HTTP) Configuration Services
        8. Simple Network Management Protocol (SNMP)
        9. Network Time Protocol (NTP)
        10. Banners
        11. Recommended Minimum IOS Security Settings
        12. TCP Intercept
        13. Summary
    6. Cisco Secure Product Family
      1. Overview of the Cisco Security Solution and the Cisco Secure Product Family
        1. Cisco Security Solution
        2. Cisco Secure Product Family
        3. Summary
        4. Frequently Asked Questions
        5. Glossary
          1. Glossary
        6. Bibliography
        7. URLs
      2. Cisco Secure PIX Firewall
        1. PIX Models
        2. PIX Features
        3. PIX Configuration
        4. VPN with Point-to-Point Tunneling Protocol (PPTP)
        5. VPN with IPSec and Manual Keys
        6. VPN with Preshared Keys
        7. Obtaining Certificate Authorities (CAs)
        8. PIX-to-PIX Configuration
        9. Summary
      3. Cisco IOS Firewall
        1. Access Lists
        2. Dynamic Access Lists
        3. Time-Based Access Lists
        4. Reflexive Access Lists
        5. Cisco IOS Firewall Features
        6. How Context-Based Access Control (CBAC) Works
        7. Configuring CBAC
        8. Summary
      4. Intrusion Detection Systems
        1. Overview of Intrusion Detection
        2. Intrusion Detection Systems
        3. Cisco Secure Intrusion Detection System (CSIDS)
        4. Cisco IOS Firewall IDS
        5. Cisco Secure PIX Firewall IDS
        6. Cisco IDS Configuration
        7. Summary
        8. Frequently Asked Questions
        9. Glossary
          1. Glossary
      5. Cisco Secure Scanner
        1. Cisco Secure Scanner Features
        2. Cisco Secure Scanner Installation
        3. Cisco Secure Scanner Configuration
        4. Summary
        5. Frequently Asked Questions
        6. Glossary
          1. Glossary
        7. URLs
      6. Cisco Secure Policy Manager (CSPM)
        1. CSPM Features
        2. CSPM Installation
        3. Configuration Example
        4. Summary
        5. Frequently Asked Questions
        6. Glossary
          1. Glossary
        7. URLs
      7. Cisco Secure Access Control Server (ACS)
        1. Cisco Secure ACS Features
        2. Overview of Authentication, Authorization, and Accounting (AAA)
        3. RADIUS and TACACS+
        4. Cisco Secure ACS Installation
        5. Cisco Secure ACS Configuration
        6. Network Access Server Configuration
        7. Configuration Example
        8. Summary
        9. Frequently Asked Questions
        10. Glossary
          1. Glossary
        11. Bibliography
        12. URLs
    7. Internet Security Situations
      1. Securing the Corporate Network
        1. Dial-In Security
        2. Dial-In User Authentication, Authorization, and Accounting (AAA)
        3. AAA Authentication Setup with TACACS+ and RADIUS
        4. AAA Authorization Setup
        5. AAA Accounting Setup
        6. Using All AAA Services Simultaneously
        7. Virtual Private Networks (VPNs)
        8. Summary
      2. Providing Secure Access to Internet Services
        1. Internet Services
        2. Common Internet Security Threats
        3. Internet Service Security Example
        4. Web Servers
        5. File Transfer Protocol (FTP) Servers
        6. Internet e-Mail Servers (SMTP/POP3/IMAP4)
        7. Domain Name System (DNS) Servers
        8. Back-End Servers
        9. Summary
        10. Frequently Asked Questions
        11. Glossary
          1. Glossary
    8. Appendix
      1. Cisco SAFE: A Security Blueprint for Enterprise Networks
        1. Authors of This Appendix
        2. Abstract
        3. Audience
        4. Caveats
        5. Architecture Overview
        6. Enterprise Module
        7. Enterprise Campus
        8. Enterprise Edge
        9. Migration Strategies
        10. Annex A: Validation Lab
        11. Annex B: Network Security Primer
        12. Annex C: Architecture Taxonomy
        13. References
        14. Acknowledgments
    9. Index