Déjà client ? Identifiez-vous

Nouveau client ?

CRÉER VOTRE COMPTE
Votre panier contient 0 article
0,00 €
Hardening Cisco Routers

Librairie Eyrolles - Paris 5e
Indisponible

Hardening Cisco Routers

Hardening Cisco Routers

Help for Network Administrators

174 pages, parution le 02/04/2002

Résumé

As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network.

The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors.The following topics are included:

  • IOS version security, including different router configurations for different versions
  • Console, VTY, AUX, and HTTP acces controls
  • Password and privolege levels in Cisco routers and how to modify default settings
  • Authentication, authorization and accounting configurations via RADIUS and TACACS+
  • Securing against DOS attacks
  • SNMP security procedures
  • Routing protocol security for RIP, EIGRP, and BGP
  • NTP security
  • Disabling insecure protocols and services commonly running on Cisco routers, including finger, CDP, echo, and chargen
  • Antispoofing filters
  • Physical security
  • Incident response
  • Warning banners and theirs lega implications

Written by Thomas Akin, an experienced Certified Information Systems Security Professional (CISSP) and Certified Cisco Academic Instructor (CCAI), the book is well organized, emphasizing practicality and a hands-on approach. At the end of each chapter, Akin includes a Checklist that summarizesthe hardening techniques discussed in the chapter. The Checklists help you double-check the configurations you have been instructed to make, and serve as quick references for future security procedures.

Concise and to the point, Hardening Cisco Routers supplies you with all the tools necessary to turn a potential vulnerability into a strength. In an area that is otherwise poorly documented, this is the one book that will help you make your Cisco routers rock solid.

L'auteur Thomas Akin

Thomas Akin, an experienced Certified Information Systems Security Professional (CISSP) and Certified Cisco Academic Instructor (CCAI).

Sommaire

  • Preface
  • 1. Router Security
    • Router Security?
    • Routers: The Foundation of the Internet
    • What Can Go Wrong
    • What Routers Are at Risk?
    • Moving Forward
  • 2. IOS Version Security
    • The Need for a Current IOS
    • Determining the IOS Version
    • IOS Versions and Vulnerabilities
    • IOS Security Checklist
  • 3. Basic Access Control
    • Authentication Versus Authorization
    • Points of Access
    • Basic Access Control
    • Remote Administration
    • Protection with IPSec
    • Basic Access Control Security Checklist
  • 4. Passwords and Privilege Levels
    • Password Encryption
    • Clear-Text Passwords
    • service password-encryption
    • Enable Security
    • Strong Passwords
    • Keeping Configuration Files Secure
    • Privilege Levels
    • Password Checklist
  • 5. AAA Access Control
    • Enabling AAA
    • Local Authentication
    • TACACS+ Authentication
    • RADIUS Authentication
    • Kerberos Authentication
    • Token-Based Access Control
    • AAA Security Checklist
  • 6. Warning Banners
    • Legal Issues
    • Example Banner
    • Adding Login Banners
    • Warning Banner Checklist
  • 7. Unnecessary Protocols and Services
    • ICMP
    • Source Routing
    • Small Services
    • Finger
    • HTTP
    • CDP
    • Proxy ARP
    • Miscellaneous
    • SNMP
    • Unnecessary Protocols and Services Checklist
  • 8. SNMP Security
    • SNMP Versions
    • Securing SNMP v1 and v2c
    • Securing SNMP v3
    • SNMP Management Servers
    • SNMP Security Checklist
  • 9. Secure Routing and Antispoofing
    • Antispoofing
    • Routing Protocol Security
    • Routing Protocol and Antispoofing Checklist
  • 10. NTP
    • NTP Overview
    • Configuring NTP
    • NTP Checklist
  • 11. Logging
    • Logging in General
    • Router Logging
    • ACL Violation Logging
    • AAA Accounting
    • Logging Checklist
  • A. Checklist Quick Reference
  • B. Physical Security
  • C. Incident Response
  • D. Configuration Examples
  • E. Resources
  • Index
Voir tout
Replier

Avis des lecteurs du livre "Hardening Cisco Routers"

Commentaire de Vincent P.
publié le 09/07/2006
Acheteur vérifié

Très très bon livre

Livre très clair et conçis sur la sécurisation de routeur CISCO. Si on a déjà le CCNA, on monte d'un cran sur les aspects avancés de sécurité. Comprendre les commandes et les décortiquer permet de mieux les retenir quand elles sont toutes en vrac dans une config. On voit déjà comment sécuriser un simple routeur passerelle de VLAN vers l'internet. Si on prend le temps de surligner et annoter au crayon papier, ce qui est compris, on en fait un outil parfait pour la configuration sécurisée.

Caractéristiques techniques du livre "Hardening Cisco Routers"

  PAPIER
Éditeur(s) O'Reilly
Auteur(s) Thomas Akin
Parution 02/04/2002
Nb. de pages 174
Format 17,8 x 23,4
Couverture Broché
Poids 318g
Intérieur Noir et Blanc
EAN13 9780596001667
ISBN13 978-0-596-00166-7

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine (1)

Paiement en ligne SÉCURISÉ

Livraison dans le monde

Retour sous 15 jours

+ de 700 000 livres disponibles

satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients 0 321 79 56 75 sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925