You are previewing Managing Cisco Network Security 2E, 2nd Edition.
O'Reilly logo
Managing Cisco Network Security 2E, 2nd Edition

Book Description

An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright page
  5. Acknowledgments
  6. Contributors
  7. Technical Reviewer
  8. Technical Editor
  9. Foreword
    1. Today’s Security Environment
    2. About This Book
    3. About Callisma
  10. Chapter 1: Introduction to IP Network Security
    1. Introduction
    2. What Role Does Security Play in a Network?
    3. The Fundamentals of Networking
    4. Where Does Security Fit in?
    5. Cisco IP Security Hardware and Software
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  11. Chapter 2: What Are We Trying to Prevent?
    1. Introduction
    2. What Threats Face Your Network?
    3. Malicious Mobile Code
    4. Denial of Service
    5. Detecting Breaches
    6. Preventing Attacks
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  12. Chapter 3: Cisco PIX Firewall
    1. Introduction
    2. Overview of the Security Features
    3. Initial Configuration
    4. The Command-Line Interface
    5. Configuring NAT and PAT
    6. Security Policy Configuration
    7. PIX Configuration Examples
    8. Securing and Maintaining the PIX
    9. Summary
    10. Solutions Fast Track
    11. Frequently Asked Questions
  13. Chapter 4: Traffic Filtering in the Cisco Internetwork Operating System
    1. Introduction
    2. Access Lists
    3. Lock-and-key Access Lists
    4. Reflexive Access Lists
    5. Context-based Access Control
    6. Configuring Port to Application Mapping
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  14. Chapter 5: Network Address Translation/Port Address Translation
    1. Introduction
    2. NAT Overview
    3. NAT Architectures
    4. Guidelines for Deploying NAT and PAT
    5. IOS NAT Support for IP Telephony
    6. Configuring NAT on Cisco IOS
    7. Considerations on NAT and PAT
    8. Summary
    9. Solutions Fast Track
    10. Frequently Asked Questions
  15. Chapter 6: Cryptography
    1. Introduction
    2. Understanding Cryptography Concepts
    3. Learning about Standard Cryptographic Algorithms
    4. Understanding Brute Force
    5. Knowing When Real Algorithms Are Being Used Improperly
    6. Understanding Amateur Cryptography Attempts
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  16. Chapter 7: Cisco LocalDirector and DistributedDirector
    1. Introduction
    2. Improving Security Using Cisco LocalDirector
    3. LocalDirector Security Features
    4. Securing Geographically Dispersed Server Farms Using Cisco DistributedDirector
    5. DistributedDirector Security Features
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  17. Chapter 8: Virtual Private Networks and Remote Access
    1. Introduction
    2. Overview of the Different VPN Technologies
    3. Layer 2 Transport Protocol
    4. IPSec
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  18. Chapter 9: Cisco Authentication, Authorization, and Accounting Mechanisms
    1. Introduction
    2. Cisco AAA Overview
    3. Cisco AAA Mechanisms
    4. Authentication Proxy
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  19. Chapter 10: Cisco Content Services Switch
    1. Introduction
    2. Overview of Cisco Content Services Switch
    3. Cisco Content Services Switch Product Information
    4. Security Features of Cisco Content Services Switch
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  20. Chapter 11: Cisco Secure Scanner
    1. Introduction
    2. Minimum System Specifications for Secure Scanner
    3. Searching the Network for Vulnerabilities
    4. Viewing the Results
    5. Keeping the System Up-to-Date
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  21. Chapter 12: Cisco Secure Policy Manager
    1. Introduction
    2. Overview of the Cisco Secure Policy Manager
    3. Features of the Cisco Secure Policy Manager
    4. Using the Cisco Secure Policy Manager
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  22. Chapter 13: Intrusion Detection
    1. Introduction
    2. What Is Intrusion Detection?
    3. IDS Tuning
    4. Network Attacks and Intrusions
    5. The Cisco Secure Network Intrusion Detection System
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  23. Chapter 14: Network Security Management
    1. Introduction
    2. PIX Device Manager
    3. CiscoWorks2000 Access Control List Manager
    4. Cisco Secure Policy Manager
    5. Cisco Secure Access Control Server
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  24. Chapter 15: Looking Ahead: Cisco Wireless Security
    1. Introduction
    2. Understanding Security Fundamentals and Principles of Protection
    3. MAC Filtering
    4. Reviewing the Role of Policy
    5. Implementing WEP
    6. Addressing Common Risks and Threats
    7. Sniffing, Interception, and Eavesdropping
    8. Spoofing and Unauthorized Access
    9. Network Hijacking and Modification
    10. Denial of Service and Flooding Attacks
    11. Summary
    12. Solutions Fast Track
    13. Frequently Asked Questions
  25. Index