Managing Cisco Network Security, 2nd Edition

Book description

An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world

"There's no question that attacks on enterprise networks are increasing in frequency and sophistication..." -Mike Fuhrman, Cisco Systems Manager, Security Consulting

Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.

  • Security from a real-world perspective
  • Key coverage of the new technologies offered by the Cisco including: 500 series of Cisco PIX Firewall, Cisco
  • Intrusion Detection System, and the Cisco Secure Scanner
  • Revised edition of a text popular with CCIP (Cisco Certified Internetwork Professional) students
  • Expanded to include separate chapters on each of the security products offered by Cisco Systems

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright page
  5. Acknowledgments
  6. Contributors
  7. Technical Reviewer
  8. Technical Editor
  9. Foreword
    1. Today’s Security Environment
    2. About This Book
    3. About Callisma
  10. Chapter 1: Introduction to IP Network Security
    1. Introduction
    2. What Role Does Security Play in a Network?
    3. The Fundamentals of Networking
    4. Where Does Security Fit in?
    5. Cisco IP Security Hardware and Software
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  11. Chapter 2: What Are We Trying to Prevent?
    1. Introduction
    2. What Threats Face Your Network?
    3. Malicious Mobile Code
    4. Denial of Service
    5. Detecting Breaches
    6. Preventing Attacks
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  12. Chapter 3: Cisco PIX Firewall
    1. Introduction
    2. Overview of the Security Features
    3. Initial Configuration
    4. The Command-Line Interface
    5. Configuring NAT and PAT
    6. Security Policy Configuration
    7. PIX Configuration Examples
    8. Securing and Maintaining the PIX
    9. Summary
    10. Solutions Fast Track
    11. Frequently Asked Questions
  13. Chapter 4: Traffic Filtering in the Cisco Internetwork Operating System
    1. Introduction
    2. Access Lists
    3. Lock-and-key Access Lists
    4. Reflexive Access Lists
    5. Context-based Access Control
    6. Configuring Port to Application Mapping
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  14. Chapter 5: Network Address Translation/Port Address Translation
    1. Introduction
    2. NAT Overview
    3. NAT Architectures
    4. Guidelines for Deploying NAT and PAT
    5. IOS NAT Support for IP Telephony
    6. Configuring NAT on Cisco IOS
    7. Considerations on NAT and PAT
    8. Summary
    9. Solutions Fast Track
    10. Frequently Asked Questions
  15. Chapter 6: Cryptography
    1. Introduction
    2. Understanding Cryptography Concepts
    3. Learning about Standard Cryptographic Algorithms
    4. Understanding Brute Force
    5. Knowing When Real Algorithms Are Being Used Improperly
    6. Understanding Amateur Cryptography Attempts
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  16. Chapter 7: Cisco LocalDirector and DistributedDirector
    1. Introduction
    2. Improving Security Using Cisco LocalDirector
    3. LocalDirector Security Features
    4. Securing Geographically Dispersed Server Farms Using Cisco DistributedDirector
    5. DistributedDirector Security Features
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  17. Chapter 8: Virtual Private Networks and Remote Access
    1. Introduction
    2. Overview of the Different VPN Technologies
    3. Layer 2 Transport Protocol
    4. IPSec
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  18. Chapter 9: Cisco Authentication, Authorization, and Accounting Mechanisms
    1. Introduction
    2. Cisco AAA Overview
    3. Cisco AAA Mechanisms
    4. Authentication Proxy
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  19. Chapter 10: Cisco Content Services Switch
    1. Introduction
    2. Overview of Cisco Content Services Switch
    3. Cisco Content Services Switch Product Information
    4. Security Features of Cisco Content Services Switch
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  20. Chapter 11: Cisco Secure Scanner
    1. Introduction
    2. Minimum System Specifications for Secure Scanner
    3. Searching the Network for Vulnerabilities
    4. Viewing the Results
    5. Keeping the System Up-to-Date
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  21. Chapter 12: Cisco Secure Policy Manager
    1. Introduction
    2. Overview of the Cisco Secure Policy Manager
    3. Features of the Cisco Secure Policy Manager
    4. Using the Cisco Secure Policy Manager
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  22. Chapter 13: Intrusion Detection
    1. Introduction
    2. What Is Intrusion Detection?
    3. IDS Tuning
    4. Network Attacks and Intrusions
    5. The Cisco Secure Network Intrusion Detection System
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  23. Chapter 14: Network Security Management
    1. Introduction
    2. PIX Device Manager
    3. CiscoWorks2000 Access Control List Manager
    4. Cisco Secure Policy Manager
    5. Cisco Secure Access Control Server
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  24. Chapter 15: Looking Ahead: Cisco Wireless Security
    1. Introduction
    2. Understanding Security Fundamentals and Principles of Protection
    3. MAC Filtering
    4. Reviewing the Role of Policy
    5. Implementing WEP
    6. Addressing Common Risks and Threats
    7. Sniffing, Interception, and Eavesdropping
    8. Spoofing and Unauthorized Access
    9. Network Hijacking and Modification
    10. Denial of Service and Flooding Attacks
    11. Summary
    12. Solutions Fast Track
    13. Frequently Asked Questions
  25. Index

Product information

  • Title: Managing Cisco Network Security, 2nd Edition
  • Author(s): Syngress
  • Release date: May 2002
  • Publisher(s): Syngress
  • ISBN: 9780080479057