+612 9045 4394
 
CHECKOUT
Managing Cisco Network Security 2E - Syngress

Managing Cisco Network Security 2E

By: Syngress

Paperback

Published: 1st April 2002
Ships: 7 to 10 business days
7 to 10 business days
RRP $170.00
$150.90
11%
OFF
or 4 easy payments of $37.73 with Learn more

An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world
"There's no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security Consulting
Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.

Security from a real-world perspective
Key coverage of the new technologies offered by the Cisco including: 500 series of Cisco PIX Firewall, Cisco Intrusion Detection System, and the Cisco Secure Scanner
Revised edition of a text popular with CCIP (Cisco Certified Internetwork Professional) students
Expanded to include separate chapters on each of the security products offered by Cisco Systems

"There's no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security Consulting

Forewordp. xxxi
Introduction to IP Network Securityp. 1
Introductionp. 2
What Role Does Security Play in a Network?p. 2
Goalsp. 2
Philosophyp. 6
What if I Don't Deploy Security?p. 7
The Fundamentals of Networkingp. 8
Where Does Security Fit in?p. 9
Network Access Layer Securityp. 10
Internetwork Layer Securityp. 11
Host-to-Host Layer Securityp. 14
Process Application Layer Securityp. 17
Authenticationp. 21
OSI Modelp. 25
How the OSI Model Worksp. 34
Composition of a Data Packetp. 44
Security in TCP/IPp. 45
Cisco IP Security Hardware and Softwarep. 46
The Cisco Secure PIX Firewallp. 46
Cisco Secure Integrated Softwarep. 49
Cisco Secure Integrated VPN Softwarep. 50
The Cisco Secure VPN Clientp. 50
Cisco Secure Access Control Serverp. 50
Cisco Secure Scannerp. 51
Cisco Secure Intrusion Detection Systemp. 51
Cisco Secure Policy Managerp. 52
Cisco Secure Consulting Servicesp. 53
Summaryp. 54
Solutions Fast Trackp. 56
Frequently Asked Questionsp. 59
What Are We Trying to Prevent?p. 61
Introductionp. 62
What Threats Face Your Network?p. 64
Loss of Confidentialityp. 65
Loss of Integrityp. 65
Loss of Availabilityp. 65
Sources of Threatsp. 66
Malicious Mobile Codep. 67
Trojan Horsesp. 67
Virusesp. 67
Wormsp. 68
Current Malicious Code Threatsp. 70
Current Malicious Code Impactsp. 70
Denial of Servicep. 71
The Smurf Attackp. 73
The SYN Flood Attackp. 74
Distributed Denial of Service (DDoS) Attacksp. 75
Detecting Breachesp. 76
Initial Detectionp. 77
Are Forensics Important?p. 78
What Are the Key Steps after a Breach Is Detected?p. 79
Preventing Attacksp. 80
Reducing Vulnerabilitiesp. 81
Providing a Simple Security Network Architecturep. 82
Developing a Culture of Securityp. 85
Developing a Security Policyp. 86
Summaryp. 88
Solutions Fast Trackp. 91
Frequently Asked Questionsp. 94
Cisco PIX Firewallp. 97
Introductionp. 98
Overview of the Security Featuresp. 100
Differences between PIX OS Version 4.x and Version 5.xp. 104
Differences between PIX OS Version 6.0 and Version 5.xp. 106
Initial Configurationp. 109
Installing the PIX Softwarep. 109
The Command-Line Interfacep. 115
IP Configurationp. 116
Configuring NAT and PATp. 119
Permit Traffic Throughp. 120
Security Policy Configurationp. 123
Security Strategiesp. 125
Identify the Security Services to Implementp. 129
Implementing the Network Security Policyp. 131
Confidentiality Configuration in PIXp. 138
PIX Configuration Examplesp. 140
Protecting a Private Networkp. 140
Protecting a Network Connected to the Internetp. 142
Protecting Server Access Using Authenticationp. 145
Protecting Public Servers Connected to the Internetp. 146
Securing and Maintaining the PIXp. 152
System Journalingp. 152
Securing the PIXp. 154
Summaryp. 157
Solutions Fast Trackp. 157
Frequently Asked Questionsp. 160
Traffic Filtering in the Cisco Internetwork Operating Systemp. 163
Introductionp. 164
Access Listsp. 164
Access List Operationp. 166
Types of Access Listsp. 167
Standard IP Access Listsp. 169
Extended IP Access Listsp. 176
Named Access Listsp. 189
Editing Access Listsp. 190
Problems with Access Listsp. 192
Lock-and-key Access Listsp. 193
Reflexive Access Listsp. 199
Building Reflexive Access Listsp. 202
Applying Reflexive Access Listsp. 205
Context-based Access Controlp. 205
The Context-based Access Control Processp. 208
Configuring Context-based Access Controlp. 208
Inspection Rulesp. 211
Applying the Inspection Rulep. 212
Configuring Port to Application Mappingp. 213
Configuring PAMp. 213
Protecting a Private Networkp. 214
Protecting a Network Connected to the Internetp. 217
Protecting Server Access Using Lock-and-keyp. 219
Protecting Public Servers Connected to the Internetp. 221
Summaryp. 227
Solutions Fast Trackp. 227
Frequently Asked Questionsp. 230
Network Address Translation/Port Address Translationp. 233
Introductionp. 234
NAT Overviewp. 234
Address Realmp. 235
RFC 1918 Private Addressingp. 235
NATp. 237
Transparent Address Assignmentp. 237
Transparent Routingp. 238
Public, Global, and External Networksp. 240
Private and Local Networksp. 240
Application Level Gatewaysp. 240
NAT Architecturesp. 241
Traditional NAT or Outbound NATp. 241
Port Address Translationp. 243
Static NATp. 245
Twice NATp. 246
Guidelines for Deploying NAT and PATp. 248
IOS NAT Support for IP Telephonyp. 251
H.323 v2 Supportp. 251
CallManager Supportp. 252
Session Initiation Protocolp. 252
Configuring NAT on Cisco IOSp. 252
Configuration Commandsp. 253
Verification Commandsp. 258
Configuring NAT between a Private Network and the Internetp. 259
Configuring NAT in a Network with DMZp. 261
Considerations on NAT and PATp. 263
IP Address Information in Datap. 263
Bundled Session Applicationsp. 264
Summaryp. 266
Solutions Fast Trackp. 268
Frequently Asked Questionsp. 271
Cryptographyp. 273
Introductionp. 274
Understanding Cryptography Conceptsp. 274
Historyp. 275
Encryption Key Typesp. 275
Learning about Standard Cryptographic Algorithmsp. 277
Understanding Symmetric Algorithmsp. 278
Understanding Asymmetric Algorithmsp. 282
Understanding Brute Forcep. 285
Brute Force Basicsp. 285
Using Brute Force to Obtain Passwordsp. 286
Knowing When Real Algorithms Are Being Used Improperlyp. 291
Bad Key Exchangesp. 291
Hashing Pieces Separatelyp. 292
Using a Short Password to Generate a Long Keyp. 293
Improperly Stored Private or Secret Keysp. 294
Understanding Amateur Cryptography Attemptsp. 296
Classifying the Ciphertextp. 297
Monoalphabetic Ciphersp. 299
Other Ways to Hide Informationp. 299
Summaryp. 307
Solutions Fast Trackp. 308
Frequently Asked Questionsp. 310
Cisco LocalDirector and DistributedDirectorp. 313
Introductionp. 314
Improving Security Using Cisco LocalDirectorp. 314
LocalDirector Technology Overviewp. 315
LocalDirector Product Overviewp. 315
LocalDirector Security Featuresp. 316
Filtering of Access Trafficp. 316
Using synguard to Protect Against SYN Flood Attacksp. 318
Using NAT to Hide Real Addressesp. 320
Restricting Who Is Authorized to Have Telnet Access to LocalDirectorp. 321
Password Protectionp. 321
Syslog Loggingp. 322
Securing Geographically Dispersed Server Farms Using Cisco DistributedDirectorp. 323
DistributedDirector Technology Overviewp. 323
DistributedDirector Product Overviewp. 326
DistributedDirector Security Featuresp. 326
Limiting the Source of DRP Queriesp. 326
Authentication between DistributedDirector and DRP Agentsp. 327
Password Protectionp. 329
Syslog Loggingp. 330
Summaryp. 331
Solutions Fast Trackp. 331
Frequently Asked Questionsp. 333
Virtual Private Networks and Remote Accessp. 335
Introductionp. 336
Overview of the Different VPN Technologiesp. 336
The Peer Modelp. 336
The Overlay Modelp. 338
Link Layer VPNsp. 338
Network Layer VPNsp. 339
Transport and Application Layer VPNsp. 340
Intranet VPNsp. 340
Extranet VPNsp. 341
Access VPNsp. 341
Layer 2 Transport Protocolp. 342
Configuring Cisco L2TPp. 343
IPSecp. 345
IPSec Architecturep. 346
IPSec and Cisco Encryption Technologyp. 357
Configuring Cisco IPSecp. 358
Connecting IPSec Clients to Cisco IPSecp. 373
Summaryp. 376
Solutions Fast Trackp. 376
Frequently Asked Questionsp. 377
Cisco Authentication, Authorization, and Accounting Mechanismsp. 379
Introductionp. 380
Cisco AAA Overviewp. 381
AAA Authenticationp. 382
AAA Authorizationp. 385
AAA Accountingp. 385
AAA Benefitsp. 385
Cisco AAA Mechanismsp. 386
Supported AAA Security Protocolsp. 387
Configuring AAA Authenticationp. 407
Authorizationp. 417
Accountingp. 424
Typical RAS Configuration Using AAAp. 431
Typical Firewall Configuration Using AAAp. 435
Authentication Proxyp. 439
How the Authentication Proxy Worksp. 439
Comparison with the Lock-and-key Featurep. 440
Benefits of Authentication Proxyp. 441
Restrictions of Authentication Proxyp. 442
Configuring Authentication Proxyp. 442
Summaryp. 448
Solutions Fast Trackp. 449
Frequently Asked Questionsp. 451
Cisco Content Services Switchp. 455
Introductionp. 456
Overview of Cisco Content Services Switchp. 456
Cisco Content Services Switch Technology Overviewp. 457
Cisco Content Services Switch Product Informationp. 457
Security Features of Cisco Content Services Switchp. 459
Flow Wall Securityp. 459
Using Network Address Translation to Hide Real Addressesp. 464
Firewall Load Balancingp. 465
Password Protectionp. 468
Disabling Telnet Accessp. 470
Syslog Loggingp. 471
Known Security Vulnerabilitiesp. 471
Summaryp. 474
Solutions Fast Trackp. 475
Frequently Asked Questionsp. 476
Cisco Secure Scannerp. 479
Introductionp. 480
Minimum System Specifications for Secure Scannerp. 481
Searching the Network for Vulnerabilitiesp. 483
Identifying Network Addressesp. 485
Identifying Vulnerabilitiesp. 487
Scheduling the Sessionp. 491
Viewing the Resultsp. 493
Changing Axis Viewsp. 495
Drilling into Datap. 497
Pivoting Datap. 498
Zooming In and Outp. 500
Creating Chartsp. 501
Saving Grid Views and Chartsp. 502
Reports and Wizardsp. 503
Keeping the System Up-to-Datep. 504
Summaryp. 508
Solutions Fast Trackp. 508
Frequently Asked Questionsp. 510
Cisco Secure Policy Managerp. 513
Introductionp. 514
Overview of the Cisco Secure Policy Managerp. 514
The Benefits of Using Cisco Secure Policy Managerp. 515
Installation Requirements for the Cisco Secure Policy Managerp. 516
Features of the Cisco Secure Policy Managerp. 518
Cisco Firewall Managementp. 519
VPN and IPSec Security Managementp. 520
Security Policy Managementp. 522
Network Security Deployment Optionsp. 526
Cisco Secure Policy Manager Device and Software Supportp. 526
Using the Cisco Secure Policy Managerp. 528
Configurationp. 528
Summaryp. 535
Solutions Fast Trackp. 535
Frequently Asked Questionsp. 538
Intrusion Detectionp. 541
Introductionp. 542
What Is Intrusion Detection?p. 542
Types of IDSsp. 543
IDS Architecturep. 543
Why Should You Have an IDS?p. 544
Benefits of an IDS in a Networkp. 545
Deploying an IDS in a Networkp. 547
Difficulties in Deploying an IDSp. 548
IDS Tuningp. 549
Tuningp. 551
Network Attacks and Intrusionsp. 552
Poor Network Perimeter/Device Securityp. 553
Poor Physical Securityp. 556
Application and Operating Software Weaknessesp. 556
Human Failurep. 557
Weaknesses in the IP Suite of Protocolsp. 558
The Cisco Secure Network Intrusion Detection Systemp. 565
What Is the Cisco Secure Network Intrusion Detection System?p. 566
Before You Installp. 569
Director and Probe Setupp. 570
General Operationp. 573
nrConfigurep. 574
The Data Management Packagep. 576
Cisco IOS Intrusion Detection Systemsp. 577
Summaryp. 583
Solutions Fast Trackp. 587
Frequently Asked Questionsp. 589
Network Security Managementp. 593
Introductionp. 594
PIX Device Managerp. 594
PIX Device Manager Overviewp. 595
Supported PIX Firewall Versionsp. 596
Using PIX Device Managerp. 598
Configuration Examplesp. 606
Cisco Works2000 Access Control List Managerp. 617
ACL Manager Overviewp. 617
Installation Requirements for ACL Managerp. 619
ACL Manager Featuresp. 620
The Basic Operation of ACL Managerp. 623
Using ACL Managerp. 626
Configuration Example: Creating ACLs with ACLMp. 628
Cisco Secure Policy Managerp. 632
Cisco Secure Access Control Serverp. 633
Overview of the Cisco Secure Access Control Serverp. 633
Benefits of the Cisco Secure Access Control Serverp. 634
Features of Cisco Secure ACSp. 637
Cisco Secure ACS Device and Software Supportp. 639
Using Cisco Secure ACSp. 641
Configuration Example: Adding and Configuring a AAA Clientp. 643
Summaryp. 646
Solutions Fast Trackp. 646
Frequently Asked Questionsp. 648
Looking Ahead: Cisco Wireless Securityp. 649
Introductionp. 650
Understanding Security Fundamentals and Principles of Protectionp. 651
Ensuring Confidentialityp. 651
Ensuring Integrityp. 653
Ensuring Availabilityp. 654
Ensuring Privacyp. 655
Ensuring Authenticationp. 655
Ensuring Authorizationp. 670
MAC Filteringp. 672
What Is a MAC Address?p. 672
Where in the Authentication/Association Process Does MAC Filtering Occur?p. 673
Determining MAC Filtering Is Enabledp. 674
MAC Spoofingp. 674
Ensuring Non-Repudiationp. 675
Accounting and Audit Trailsp. 678
Using Encryptionp. 679
Reviewing the Role of Policyp. 681
Identifying Resourcesp. 683
Understanding Classification Criteriap. 685
Implementing Policyp. 686
Addressing the Issues with Policyp. 689
Implementing WEPp. 691
Defining WEPp. 691
Creating Privacy with WEPp. 692
The WEP Authentication Processp. 693
WEP Benefits and Advantagesp. 693
WEP Disadvantagesp. 694
Implementing WEP on the Cisco Aironet AP 340p. 694
Exploiting WEPp. 695
Security of 64-Bit versus 128-Bit Keysp. 696
Acquiring a WEP Keyp. 696
Addressing Common Risks and Threatsp. 697
Finding a Targetp. 698
Finding Weaknesses in a Targetp. 698
Exploiting Those Weaknessesp. 700
Sniffing, Interception, and Eavesdroppingp. 701
Defining Sniffingp. 701
Sample Sniffing Toolsp. 701
Sniffing Case Scenariop. 702
Protecting Against Sniffing and Eavesdroppingp. 704
Spoofing and Unauthorized Accessp. 704
Defining Spoofingp. 704
Sample Spoofing Toolsp. 705
Protecting Against Spoofing and Unauthorized Attacksp. 706
Network Hijacking and Modificationp. 706
Defining Hijackingp. 707
Sample Hijacking Toolsp. 708
Hijacking Case Scenariop. 708
Protection against Network Hijacking and Modificationp. 708
Denial of Service and Flooding Attacksp. 709
Defining DoS and Floodingp. 709
Sample DoS Toolsp. 710
DoS and Flooding Case Scenariop. 710
Protecting Against DoS and Flooding Attacksp. 711
Summaryp. 712
Solutions Fast Trackp. 713
Frequently Asked Questionsp. 718
Indexp. 721
Table of Contents provided by Syndetics. All Rights Reserved.

ISBN: 9781931836562
ISBN-10: 1931836566
Audience: Professional
Format: Paperback
Language: English
Number Of Pages: 752
Published: 1st April 2002
Publisher: Syngress Media,U.S.
Country of Publication: US
Dimensions (cm): 23.42 x 18.9  x 4.19
Weight (kg): 1.29
Edition Number: 2
Edition Type: Revised