
Managing Cisco Network Security
Everything you need to secure your Cisco Network
Résumé
Information security has become an extremely important topic over the past few years. In today's environment the number of touch points between an organization's information assets and the outside world has drastically increased. Millions of customers interact via Web sites, employees and partners connect via Virtual Private Networks, applications are outsourced to Application Service Providers (ASPs) and wireless LANs are regularly deployed. A critical strategy for reducing security risks is to practice defense-in-depth, and Cisco Systems has placed a high priority on security and offers a wide range of security products. Managing Cisco Network Security, Second Edition is important to anyone involved with Cisco networks, as it provides practical information on using a broad spectrum of Cisco's security products.
1. Learn the Key Steps to Take When a Breach Is Detected Review the five steps of identification and classification, containment, eradication, recovery, and follow-up.2. Master the PIX Firewall Series of Products Learn about the Cisco PIX 535, Cisco PIX 525, Cisco PIX 515E, Cisco PIX, and Cisco PIX 501.
3. Place Access Lists Review the options you have in applying access lists and achieving the same affect on traffic flowing through the router.
4. Understand the Three Phases of Transparent Routing Review the guidelines for deploying Network Address Translation (NAT).
5. Understand the LocalDirector Security Features Secure Geographically Dispersed Server Farms Using DistributedDirector.
6. Find an Overview of the Different VPN Technologies Use a Cisco VPN Concentrator and IPSec to securely send information to and from both sides of the VPN.
7.Cover Cisco Authentication, Authorization, and Accounting (AAA) Configure Cisco devices, including routers, access servers, firewalls, and VPN gateways to act as an AAA client.
8. Configure the Features of the Content Services Switch (CSS) Review the security features of CSS, including health checks for each new flow, Access Control Lists, and NAT.
9. Perform Dynamic Intrusion Detection Use the Cisco Secure Network Intrusion Detection System to perform real-time intrusion detection.
10. Look Ahead to Cisco Wireless Security Review the four steps of Wireless Equivalency Privacy (WEP) authorization.
11. Register for Your 1 Year Upgrade The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!
Contents
- 1 Introduction to IP Network Security
- 2 What Are We Trying to Prevent?
- 3 Cisco PIX Firewall
- 4 Traffic Filtering in the Cisco Internetwork Operating System
- 5 Network Address Translation/Port Address Translation
- 6 Cryptography
- 7 Cisco LocalDirector and DistributedDirector
- 8 Virtual Private Networks and Remote Access
- 9 Cisco Authentication, Authorization, and Accounting Mechanisms
- 10 Cisco Content Services Switch
- 11 Cisco Secure Scanner
- 12 Cisco Secure Policy Manager
- 13 Intrusion Detection
- 14 Network Security Management
- 15 Looking Ahead: Cisco Wireless Security
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Syngress |
Parution | 07/06/2002 |
Édition | 2eme édition |
Nb. de pages | 752 |
Format | 18,5 x 23,5 |
Couverture | Broché |
Poids | 1292g |
Intérieur | Noir et Blanc |
EAN13 | 9781931836562 |
ISBN13 | 978-1-931836-56-2 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse