Cisco Network Security Little Black Book 🔍
Joe Harris Paraglyph Press, 1, 2002
英语 [en] · DJVU · 2.1MB · 2002 · 📘 非小说类图书 · 🚀/lgli/lgrs · Save
描述
A friend recommended this book to me as a cheap book that covered some of the higher-end issues with Cisco Security. I bought it and while I'm still working through it I'm really happy with it so far. I should probably give this one star off due to some exceedingly long paragraphs (give me a break to catch my breath!) and a few small spelling errors but none of this stuff made me disappointed in the book which has good information, decent organization, and is clearly written by someone who knows his stuff.
备选作者
Harris, Joe
备用出版商
Paraglyph, Incorporated
备用版本
United States, United States of America
备用版本
Phoenix, AZ, Arizona, 2002
备用版本
0, PT, 2002
元数据中的注释
0
元数据中的注释
lg308272
元数据中的注释
Includes index.
备用描述
Cover......Page 1
Table of Contents......Page 3
Cisco Network Security Little Black Book......Page 6
How to Use this Book......Page 9
The Little Black Book Philosophy......Page 11
Enterprise Security Problems......Page 12
Enterprise Security Challenges......Page 13
Enterprise Security Policy......Page 14
Securing the Enterprise......Page 15
Configuring Console Security......Page 19
Configuring Telnet Security......Page 21
Configuring Enable Mode Security......Page 22
Disabling Password Recovery......Page 23
Configuring Privilege Levels for Users......Page 25
Configuring Password Encryption......Page 26
Configuring Banner Messages......Page 27
Configuring SNMP Security......Page 29
Configuring RIP Authentication......Page 30
Configuring EIGRP Authentication......Page 32
Configuring OSPF Authentication......Page 36
Configuring Route Filters......Page 40
Suppressing Route Advertisements......Page 45
Access Control Security......Page 48
AAA Protocols......Page 53
Cisco Secure Access Control Server......Page 58
Configuring TACACS+ Globally......Page 61
Configuring TACACS+ Individually......Page 63
Configuring RADIUS Globally......Page 66
Configuring RADIUS Individually......Page 67
Configuring Authentication......Page 69
Configuring Authorization......Page 77
Configuring Accounting......Page 80
Installing and Configuring Cisco Secure NT......Page 83
Defining Networks......Page 90
Cisco Express Forwarding......Page 91
TCP Intercept......Page 92
Network Address Translation......Page 94
Committed Access Rate......Page 95
Logging......Page 97
Configuring Cisco Express Forwarding......Page 98
Configuring Unicast Reverse Path Forwarding......Page 100
Configuring TCP Intercept......Page 103
Configuring Network Address Translation (NAT)......Page 108
Configuring Committed Access Rate (CAR)......Page 121
Configuring Logging......Page 124
Context-Based Access Control......Page 128
Port Application Mapping......Page 132
IOS Firewall Intrusion Detection......Page 134
Configuring Context-Based Access Control......Page 136
Configuring Port Application Mapping......Page 148
Configuring IOS Firewall Intrusion Detection......Page 154
Cryptography......Page 161
Symmetric and Asymmetric Key Encryption......Page 165
Digital Signature Standard......Page 171
Cisco Encryption Technology Overview......Page 172
Configuring Cisco Encryption Technology......Page 173
In Brief......Page 194
IPSec Packet Types......Page 195
IPSec Modes of Operation......Page 196
Key Management......Page 198
Encryption......Page 201
Immediate Solutions......Page 202
Configuring IPSec Using Pre-Shared Keys......Page 203
Configuring IPSec Using Manual Keys......Page 219
Configuring Tunnel EndPoint Discovery......Page 229
In Brief......Page 236
Wildcard Masks......Page 238
Extended Access Lists......Page 239
Reflexive Access Lists......Page 240
Dynamic Access Lists......Page 241
Additional Access List Features......Page 243
Configuring Standard IP Access Lists......Page 244
Configuring Extended IP Access Lists......Page 247
Configuring Extended TCP Access Lists......Page 252
Configuring Named Access Lists......Page 255
Configuring Commented Access Lists......Page 257
Configuring Dynamic Access Lists......Page 259
Configuring Reflexive Access Lists......Page 265
Configuring Time-Based Access Lists......Page 268
Appendix A: IOS Firewall IDS Signature List......Page 271
Configuring Management Access......Page 277
Configuring Port Security......Page 278
Configuring Permit Lists......Page 280
Configuring AAA Support......Page 281
List of Figures......Page 286
List of Tables......Page 288
List of Listings......Page 289
备用描述
With this concise, problem-solving guide you will learn how to identify network security threats and implement uniform security throughout your network. Step-by-step instructions and immediate solutions will help you implement and update security defenses. Plus, every configuration in this book was completely tested and perfected with actual Cisco routers. No other concise guide provides the security expertise presented in this book. Author- Joe Harris
备用描述
Provides Advice For Internetworking Professionals About Designing, Maintaining, And Implementing Secure Networks Using Cisco Routers, Covering Topics Including Tcp Intercept, Ipsec, And Session Filtering.
开源日期
2010-08-30
更多信息……

❌ 此文件可能有问题,已从源库中隐藏。 有时这是应版权所有者的要求,有时是因为有更好的选择, 但有时是因为文件本身有问题。 下载可能仍然没问题,但我们建议先搜索替代文件。 更多细节:

如果您仍想下载此文件,请确保仅使用受信任的最新软件打开它。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。