Cisco Secure Internet Security SolutionsCisco Press, 2001 - 499 pagina's Annotation nbsp; Essential security strategies using Cisco's complete solution to network security! The only book to cover interoperability among the Cisco Secure product family to provide the holistic approach to Internet security. The first book to provide Cisco proactive solutions to common Internet threats. A source of industry-ready pre-built configurations for the Cisco Secure product range. Cisco Systems strives to help customers build secure internetworks through network design featuring its Cisco Secure product family. At present, no available publication deals with Internet security from a Cisco perspective. Cisco Secure Internet Security Solutions covers the basics of Internet security and then concentrates on each member of the Cisco Secure product family, providing a rich explanation with examples of the preferred configurations required for securing Internet connections. The Cisco Secure PIX Firewall is covered in depth from an architectural point of view to provide a reference of the PIX commands and their use in the real world. Although Cisco Secure Internet Security Solutions is concerned with Internet security, it is also viable to use in general network security scenarios. nbsp; Andrew Mason is the CEO of Mason Technologies Limited, a Cisco Premier Partner in the U.K. whose main business is delivered through Cisco consultancy focusing on Internet security. Andrew has hands-on experience of the Cisco Secure product family with numerous clients ranging from ISPs to large financial organizations. Currently, Andrew is leading a project to design and implement the most secure ISP network in Europe. Andrew holds the Cisco CCNP and CCDP certifications. nbsp; Mark Newcomb is currently a consulting engineer at Aurora Consulting Group in Spokane, Washington. Mark holds CCNP and CCDP certifications. Mark has 4 years experience working with network security issues and a total of over 20 years experience within the networking industry. Mark is a frequent contributor and reviewer for books by Cisco Press, McGraw-Hill, Coriolis, New Riders, and Macmillan Technical Publishing. |
Inhoudsopgave
Contents | xviii |
Introduction | xix |
Chapter | 3 |
Internet Security | 5 |
Chapter | 8 |
Security in the TCPIP Suite | 12 |
Summary | 31 |
Chapter 2 | 35 |
Cisco Secure Scanner | 225 |
Cisco Secure Scanner Installation | 241 |
Chapter 8 | 253 |
Configure the Network Topology | 270 |
Configure the Security Policy | 291 |
Chapter 9 | 294 |
Summary | 299 |
RADIUS and TACACS+ | 307 |
OutofBand Management Security | 49 |
Part II | 53 |
Network Time Protocol NTP | 55 |
TCP Intercept | 64 |
Cisco Secure Product Family | 71 |
Index 477 | 74 |
Chapter 4 | 93 |
Chapter 9 | 132 |
Chapter 5 | 138 |
Obtaining Certificate Authorities CAs | 147 |
Chapter 5 | 155 |
Chapter 6 | 165 |
Configuring CBAC | 173 |
Summary | 182 |
Intrusion Detection Systems | 185 |
Chapter 7 | 202 |
Cisco IOS Firewall IDS | 209 |
Cisco IDS Configuration | 215 |
Summary | 222 |
Cisco Secure ACS Configuration | 313 |
Online Documentation | 333 |
Configuration Example | 340 |
Summary | 348 |
Part III | 351 |
Virtual Private Networks VPNs | 368 |
Internet Services | 374 |
Chapter 11 | 379 |
Web Servers | 386 |
Domain Name System DNS Servers | 392 |
Glossary | 395 |
Part IV | 397 |
Enterprise Module | 410 |
Enterprise Edge | 425 |
Validation Lab | 445 |
Network Security Primer | 461 |
References | 472 |
477 | |
Veelvoorkomende woorden en zinsdelen
Access Control access list access-group administrator allow applied attack CBAC chapter Cisco IOS Firewall Cisco Secure Cisco Secure ACS Cisco Secure PIX Cisco Secure Policy Cisco Secure Scanner Cisco Systems command configuration connection corporate network crypto map mymap CSIDS Sensor CSPM database default deny ip device Director e-mail enable encryption Ethernet example extended access lists failover Figure filtering fixup protocol global inbound inside interface Internet Intrusion Detection System IP address ip inspect IP packet IPSec isakmp keyword layer module monitoring nameif option OSI model outbound password perimeter router permit ip permit tcp host PIX Firewall port PPTP provides RADIUS Reflexive access lists remote request route router scan Secure PIX Firewall Secure Policy Manager security level server session signatures SMTP SNMP snmp-server source address specified static subnet mask syslog TACACS+ Telnet timeout traffic Triggered vulnerabilities Windows NT