Davis | Securing and Controlling Cisco Routers | E-Book | sack.de
E-Book

E-Book, Englisch, 736 Seiten

Davis Securing and Controlling Cisco Routers

E-Book, Englisch, 736 Seiten

ISBN: 978-1-4200-3145-4
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology.

At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.
Davis Securing and Controlling Cisco Routers jetzt bestellen!

Zielgruppe


Security and Control Professionals, Cisco Engineers, Network Managers


Autoren/Hrsg.


Weitere Infos & Material


THE BASICS
The Need for Security
The New Reality
Designing the Security Infrastructure
Identifying Security Risks and Threats
Practice Session
Security and Audit Checklist
Conclusion
Understanding OSI and TCP/IP
The OSI Model
TCP/IP Overview
Practice Session
Security and Audit Checklist
Conclusion
Routed and Routing Protocols
Routing Activities
Routable Protocols
Routing Protocols
Routing Protocol Basics
Practice Session
Security and Audit Checklist
Conclusion
Understanding Router Basics
Router Overview
Router Modes
Router Components
Router Status
Practice Session
Security and Audit Checklist
Conclusion
Router Management
Router Setup
Updating the IOS
Troubleshooting
Logging
Recording Access List Violations
Log Processing
Simple Network Management Protocol (SNMP)
Cisco Discovery Protocol
Last Word on Management
Practice Session
Security and Audit Checklist
Conclusion

PREVENTING UNAUTHORIZED ACCESS: NETWORKING DEVICE
Implementing Non-AAA Authentication
Authentication
Using Router Passwords
Configuring Line Password Protection
Setting TACACS Passwords for Privileged EXEC Mode
Establishing Username Authentication
Enabling CHAP or PAP Authentication
Configuring TACACS and Extended TACACS Password Protection
General Interactive Access
Warning Banners and Router Identification
Practice Session
Security and Audit Checklist
Conclusion
Implementing AAA Security Services
Accessing the Network
Defining AAA
Selecting Security Servers
Practice Session
Security and Audit Checklist
Conclusion
Implementing AAA Authentication
Using Method Lists
AAA Authentication Methods
Configuring Login Authentication
Configuring PPP Authentication
Configuring ARA Authentication
Configuring NASI Authentication
Specifying the Amount of Time for Login Input
Enabling Password Protection at the Privileged Level
Changing the Text Displayed at the Password Prompt
Configuring Message Banners for AAA Authentication
Practice Session
Security and Audit Checklist
Conclusion
Implementing AAA Authorization
Starting with AAA Authorization
Understanding AAA Authorization
Disabling Authorization for Global Configuration Commands
Authorization for Reverse Telnet
Authorization Attribute-Value Pairs
Practice Session
Security and Audit Checklist
Conclusion
Implementing AAA Accounting
Starting with Accounting
Configuring Accounting
Understanding AAA Accounting Types
Applying a Named List
Suppress Generation of Accounting Records for Null Username Sessions
Generating Interim Accounting Records
Monitoring Accounting
Practice Session
Security and Audit Checklist
Conclusion
Configuring TACACS and Extended TACACS
Breaking Down the Protocols
Understanding the TACACS Protocols
Configuring TACACS and Extended TACACS
Setting TACACS Password Protection at the User Level
Setting TACACS Password Protection at the Privileged Level
Enabling TACACS and XTACACS for Use
Practice Session
Security and Audit Checklist
Conclusion
Configuring TACACS+
Understanding the TACACS+ Protocol
Comparing TACACS+ and RADIUS
Understanding TACACS+ Operation
TACACS+ Configuration Task List
Configuring TACACS+
Practice Session
Security and Audit Checklist
Conclusion
Configuring RADIUS
RADIUS Overview
Understanding RADIUS Operation
RADIUS Configuration Task List
Configuring RADIUS
Practice Session
Security and Audit Checklist
Conclusion
Configuring Kerberos
Kerberos Overview
Supporting Kerberos Client
Configuring the Router to Use the Kerberos Protocol
Telneting to the Router
Monitoring and Maintaining Kerberos
Practice Session
Security and Audit Checklist
Conclusion

PREVENTING UNAUTHORIZED ACCESS: NETWORKING
Basic Traffic Filtering I
Access List Overview
Understanding Access List Configuration
Comparing Basic and Advanced Access Lists
Creating Access Lists
Applying Access Lists to Interfaces
Creating and Editing Access List Statements on a TFTP Server
Practice Session
Security and Audit Checklist
Conclusion
Basic Traffic Filtering II
Extended IP Access Lists
Named Access Lists
Implementing Routing Policies
Monitoring and Verifying Access and Prefix Lists
Practice Session
Security and Audit Checklist
Conclusion
Advanced Traffic Filtering I
Using Time Ranges
Configuring Time-Based Access
Using Lock-and-Key
Configuring Lock-and-Key
Lock-and-Key Configuration Tips
Verifying and Maintaining Lock-and-Key Configuration
Practice Session
Security and Audit Checklist
Conclusion
Advanced Traffic Filtering II
About Reflexive Access Lists
Configuring Reflexive Access Lists
Example Reflexive Access Lists Configurations
About Context-Based Access Control
Understanding CBAC
How CBAC Works
Configuring Context-Based Access Control
Practice Session
Security and Audit Checklist
Conclusion

Preventing Network Dat Interception
Using Encryption and IKE
Code Wars
Cisco Encryption Technology
CA Interoperability Overview
Overview of Certification Authorities
Configuring Certification Authority Interoperability
Understanding Internet Key Exchange
Troubleshooting CA Interoperability and IKE
Practice Session
Security and Audit Checklist
Conclusion
Configuring IPSec
IPSec Network Security
Understanding IPSec
Configuring IPSec
Practice Session
Security and Audit Checklist
Conclusion

PREVENTING DENIAL OF SERVICE
Configuring Denial of Service Security Features
Understanding Denial of Service
Controlling the Hostile Environment
About TCP Intercept
Configuring TCP Intercept
Monitoring and Maintaining TCP Intercept
About Network Address Translation
Configuring and Deploying NAT
Queuing and Traffic Policing
Detecting Unauthorized Configuration Changes
Resolving Names
Practice Session
Security and Audit Checklist
Conclusion

PREVENTING FRAUDULENT ROUTE UPDATES AND OTHER UNAUTHORIZED CHANGES
Configuring Neighbor Authentication and Other Security Features
Using Neighbor Authentication
Understanding Neighbor Authentication
Removing Unnecessary Services
Configuring Secure Shell
Some Final Guidelines for Configuring a Router
Practice Session
Security and Audit Checklist
Conclusion

APPENDICES

Appendix A IP Addressing
Appendix B Subnetting
Appendix C IP Protocol Numbers
Appendix D Well-Known Ports and Services
Appendix E Hacker, Cracker, Malware and Trojan Horse Ports
Appendix F ICMP Types and Codes
Appendix G Determining Wildcard Mask Ranges
Appendix H Logical Operations
Appendix I Helpful Resources
Appendix J Bibliography
Appendix K Acronyms and Abbreviations
Appendix L Glossary


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.