44%
Managing Cisco Network Security

Managing Cisco Network Security

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world "There's no question that attacks on enterprise networks are increasing in frequency and sophistication..." -Mike Fuhrman, Cisco Systems Manager, Security Consulting Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.

Table of Contents:
Chapter 1 Introduction to IP Network Security Introduction What Role Does Security Play in a Network? Goals Philosophy What if I Don’t Deploy Security? The Fundamentals of Networking Where Does Security Fit in? Network Access Layer Security Internetwork Layer Security Host-to-Host Layer Security? Process Application Layer Security Authentication OSI Model How the OSI Model Works Composition of a Data Packet Security in TCP/IP Cisco IP Security Hardware and Software The Cisco Secure PIX Firewall Cisco Secure Integrated Software Cisco Secure Integrated VPN Software The Cisco Secure VPN Client Cisco Secure Access Control Server Cisco Secure Scanner Cisco Secure Intrusion Detection System Cisco Secure Policy Manager Cisco Secure Consulting Services Summary Solutions Fast Track Frequently Asked Questions Chapter 2 What are We Trying to Prevent? Introduction What Threats Face Your Network? Loss of Confidentiality Loss of Integrity Loss of Availability Sources of Threats Malicious Mobile Code Trojan Horses Viruses Worms Current Malicious Code Threats Current Malicious Code Impacts Denial of Service The Smurf Attack The SYN Flood Attack Distributed Denial of Service (DDoS) Attacks Detecting Breaches Initial Detection are Forensics Important? What are the Key Steps after a Breach is Detected? Preventing Attacks Reducing Vulnerabilities Providing a Simple Security Network Architecture Developing a Culture of Security Developing a Security Policy Summary Solutions Fast Track Frequently Asked Questions Chapter 3 Cisco PIX Firewall Introduction Overview of the Security Features Differences between PIX OS Version 4.x and Version 5.x Differences between PIX OS Version 6.0 and Version 5.x Initial Configuration Installing the PIX Software The Command-Line Interface IP Configuration Configuring NAT and PAT Permit Traffic Through Security Policy Configuration Security Strategies Identify the Security Services to Implement Implementing the Network Security Policy Confidentiality Configuration in PIX PIX Configuration Examples Protecting a Private Network Protecting a Network Connected to the Internet Protecting Server Access Using Authentication Protecting Public Servers Connected to the Internet Securing and Maintaining the PIX System Journaling Securing the PIX Summary Solutions Fast Track Frequently Asked Questions Chapter 4 Traffic Filtering in the Cisco Internetwork Operating System Introduction Access Lists Access List Operation Types of Access Lists Standard IP Access Lists Extended IP Access Lists Named Access Lists Editing Access Lists Problems with Access Lists Lock-and-key Access Lists Reflexive Access Lists Building Reflexive Access Lists Applying Reflexive Access Lists Context-based Access Control The Context-based Access Control Process Configuring Context-based Access Control Inspection Rules Applying the Inspection Rule Configuring Port to Application Mapping Configuring PAM Protecting a Private Network Protecting a Network Connected to the Internet Protecting Server Access Using Lock-and-key Protecting Public Servers Connected to the Internet Summary Solutions Fast Track Frequently Asked Questions Chapter 5 Network Address Translation/Port Address Translation Introduction NAT Overview Address Realm RFC 1918 Private Addressing NAT Transparent Address Assignment Transparent Routing Public, Global, and External Networks Private and Local Networks Application Level Gateways NAT Architectures Traditional NAT or Outbound NAT Port Address Translation Static NAT Twice NAT Guidelines for Deploying NAT and PAT IOS NAT Support for IP Telephony H.323 v2 Support CallManager Support Session Initiation Protocol Configuring NAT on Cisco IOS Configuration Commands Verification Commands Configuring NAT between a Private Network and the Internet Configuring NAT in a Network with DMZ Considerations on NAT and PAT IP Address Information in Data Bundled Session Applications Summary Solutions Fast Track Frequently Asked Questions Chapter 6 Cryptography Introduction Understanding Cryptography Concepts History Encryption Key Types Learning about Standard Cryptographic Algorithms Understanding Symmetric Algorithms Understanding Asymmetric Algorithms Understanding Brute Force Brute Force Basics Using Brute Force to Obtain Passwords Knowing When Real Algorithms are Being Used Improperly Bad Key Exchanges Hashing Pieces Separately Using a Short Password to Generate a Long Key Improperly Stored Private or Secret Keys Understanding Amateur Cryptography Attempts Classifying the Ciphertext Monoalphabetic Ciphers Other Ways to Hide Information Summary Solutions Fast Track Frequently Asked Questions Chapter 7 Cisco LocalDirector and DistributedDirector Introduction Improving Security Using Cisco LocalDirector LocalDirector Technology Overview LocalDirector Product Overview LocalDirector Security Features Filtering of Access Traffic Using synguard to Protect against SYN Flood Attacks Using NAT to Hide Real Addresses Restricting Who is Authorized to Have Telnet Access to LocalDirector Password Protection Syslog Logging Securing Geographically Dispersed Server Farms Using Cisco DistributedDirector DistributedDirector Technology Overview DistributedDirector Product Overview DistributedDirector Security Features Limiting the Source of DRP Queries Authentication between DistributedDirector and DRP Agents Password Protection Syslog Logging Summary Solutions Fast Track Frequently Asked Questions Chapter 8 Virtual Private Networks and Remote Access Introduction Overview of the Different VPN Technologies The Peer Model The Overlay Model Link Layer VPNs Network Layer VPNs Transport and Application Layer VPNs Intranet VPNs Extranet VPNs Access VPNs Layer 2 Transport Protocol Configuring Cisco L2TP IPSec IPSec Architecture IPSec and Cisco Encryption Technology Configuring Cisco IPSec Connecting IPSec Clients to Cisco IPSec Summary Solutions Fast Track Frequently Asked Questions Chapter 9 Cisco Authentication, Authorization, and Accounting Mechanisms Introduction Cisco AAA Overview AAA Authentication AAA Authorization AAA Accounting AAA Benefits Cisco AAA Mechanisms Supported AAA Security Protocols Configuring AAA Authentication Authorization Accounting Typical RAS Configuration Using AAA Typical Firewall Configuration Using AAA Authentication Proxy How the Authentication Proxy Works Comparison with the Lock-and-key Feature Benefits of Authentication Proxy Restrictions of Authentication Proxy Configuring Authentication Proxy Summary Solutions Fast Track Frequently Asked Questions Chapter 10 Cisco Content Services Switch Introduction Overview of Cisco Content Services Switch Cisco Content Services Switch Technology Overview Cisco Content Services Switch Product Information Security Features of Cisco Content Services Switch FlowWall Security? Using Network Address Translation to Hide Real Addresses Firewall Load Balancing Password Protection Disabling Telnet Access Syslog Logging Known Security Vulnerabilities Summary Solutions Fast Track Frequently Asked Questions Chapter 11 Cisco Secure Scanner Introduction Minimum System Specifications for Secure Scanner Searching the Network for Vulnerabilities Identifying Network Addresses Identifying Vulnerabilities Scheduling the Session Viewing the Results Changing Axis Views Drilling into Data Pivoting Data Zooming In and Out Creating Charts Saving Grid Views and Charts Reports and Wizards Keeping the System Up-to-Date Summary Solutions Fast Track Frequently Asked Questions Chapter 12 Cisco Secure Policy Manager Introduction Overview of the Cisco Secure Policy Manager The Benefits of Using Cisco Secure Policy Manager Installation Requirements for the Cisco Secure Policy Manager Features of the Cisco Secure Policy Manager Cisco Firewall Management VPN and IPSec Security Management Security Policy Management Network Security Deployment Options Cisco Secure Policy Manager Device and Software Support Using the Cisco Secure Policy Manager Configuration Summary Solutions Fast Track Frequently Asked Questions Chapter 13 Intrusion Detection Introduction What is Intrusion Detection? Types of IDSs IDS Architecture Why Should You Have an IDS? Benefits of an IDS in a Network Deploying an IDS in a Network Difficulties in Deploying an IDS IDS Tuning Tuning Network Attacks and Intrusions Poor Network Perimeter/Device Security Poor Physical Security Application and Operating Software Weaknesses Human Failure Weaknesses in the IP Suite of Protocols The Cisco Secure Network Intrusion Detection System What is the Cisco Secure Network Intrusion Detection System? Before You Install Director and Probe Setup General Operation nrConfigure The Data Management Package Cisco IOS Intrusion Detection Systems Summary Solutions Fast Track Frequently Asked Questions Chapter 14 Network Security Management Introduction PIX Device Manager PIX Device Manager Overview Supported PIX Firewall Versions Using PIX Device Manager Configuration Examples CiscoWorks2000 Access Control List Manager ACL Manager Overview Installation Requirements for ACL Manager ACL Manager Features The Basic Operation of ACL Manager Using ACL Manager Configuration Example: Creating ACLs with ACLM Cisco Secure Policy Manager Cisco Secure Access Control Server Overview of the Cisco Secure Access Control Server Benefits of the Cisco Secure Access Control Server Features of Cisco Secure ACS Cisco Secure ACS Device and Software Support Using Cisco Secure ACS Configuration Example: Adding and Configuring a AAA Client Summary Solutions Fast Track Frequently Asked Questions Chapter 15 Looking Ahead: Cisco Wireless Security Introduction Understanding Security Fundamentals and Principles of Protection Ensuring Confidentiality Ensuring Integrity Ensuring Availability Ensuring Privacy Ensuring Authentication Benefits of the Cisco Secure Access Features of Cisco Secure ACS Cisco Secure ACS Device and Software Support Using Cisco Secure ACS Configuration Example: Adding and Configuring a AAA Client Summary Solutions Fast Track Frequently Asked Questions Chapter 15 Looking Ahead: Cisco Wireless Security Introduction Understanding Security Fundamentals and Principles of Protection Ensuring Confidentiality Ensuring Integrity Ensuring Availability Ensuring Privacy Ensuring Authentication Ensuring Authorization MAC Filtering What is a MAC Address? Where in the Authentication/Association Process Does MAC Filtering Occur? Determining MAC Filtering is Enabled MAC Spoofing Ensuring Non-Repudiation Accounting and Audit Trails Using Encryption Reviewing the Role of Policy Identifying Resources Understanding Classification Criteria Implementing Policy Addressing the Issues with Policy Implementing WEP Defining WEP Creating Privacy with WEP The WEP Authentication Process WEP Benefits and Advantages WEP Disadvantages Implementing WEP on the Cisco Aironet AP 340 Exploiting WEP Security of 64-Bit versus 128-Bit Keys Acquiring a WEP Key Addressing Common Risks and Threats Finding a Target Finding Weaknesses in a Target Exploiting Those Weaknesses Sniffing, Interception, and Eavesdropping Defining Sniffing Sample Sniffing Tool Sniffing Case Scenario Protecting against Sniffing and Eavesdropping Spoofing and Unauthorized Access Defining Spoofing Sample Spoofing Tools Protecting against Spoofing and Unauthorized Attacks Network Hijacking and Modification Defining Hijacking Sample Hijacking Tools Hijacking Case Scenario Protection against Network Hijacking and Modification Denial of Service and Flooding Attacks Defining DoS and Flooding Sample DoS Tools DoS and Flooding Case Scenario Protecting against DoS and Flooding Attacks Summary Solutions Fast Track Frequently Asked Questions Index


Best Sellers


Product Details
  • ISBN-13: 9781931836562
  • Publisher: Syngress Media,U.S.
  • Publisher Imprint: Syngress Media,U.S.
  • Edition: 2 Rev ed
  • Language: English
  • Returnable: N
  • Spine Width: 42 mm
  • Width: 189 mm
  • ISBN-10: 1931836566
  • Publisher Date: 29 May 2002
  • Binding: Paperback
  • Height: 246 mm
  • No of Pages: 752
  • Series Title: English
  • Weight: 1290 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Managing Cisco Network Security
Syngress Media,U.S. -
Managing Cisco Network Security
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Managing Cisco Network Security

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA