Cisco Network Security Little Black Book 🔍
Unknown Paraglyph Press, 2003
英语 [en] · PDF · 3.0MB · 2003 · 📘 非小说类图书 · 🚀/lgli/upload/zlib · Save
描述
With this concise, problem-solving guide you will learn how to identify network security threats and implement uniform security throughout your network. Step-by-step instructions and immediate solutions will help you implement and update security defenses. Plus, every configuration in this book was completely tested and perfected with actual Cisco routers. No other concise guide provides the security expertise presented in this book. Author- Joe Harris
About the Author Harris is a Senior Network Engineer at AIM Management.
备用文件名
motw/Cisco Network Security Little Black Book - Joe Harris.pdf
备用文件名
lgli/Unknown - Cisco Network Security Little Black Book (2003, ).pdf
备用文件名
zlib/Computers/Networking/Unknown/Cisco Network Security Little Black Book_21505603.pdf
备选作者
Microsoft FrontPage 5.0
备选作者
Harris, Joe
备选作者
Joe Harris
备用出版商
Paraglyph, Incorporated
备用版本
United States, United States of America
备用版本
Phoenix, AZ, Arizona, 2002
备用版本
0, PT, 2002
元数据中的注释
producers:
htmldoc 1.8.23 Copyright 1997-2002 Easy Software Products, All Rights Reserved.
元数据中的注释
Memory of the World Librarian: Quintus
元数据中的注释
Includes index.
备用描述
Cover 1
Table of Contents 3
Cisco Network Security Little Black Book 6
Introduction 9
Is this Book for You? 9
How to Use this Book 9
The Little Black Book Philosophy 11
Chapter 1: Securing the Infrastructure 12
In Brief 12
Enterprise Security Problems 12
Types of Threats 13
Enterprise Security Challenges 13
Enterprise Security Policy 14
Securing the Enterprise 15
Immediate Solutions 19
Configuring Console Security 19
Configuring Telnet Security 21
Configuring Enable Mode Security 22
Disabling Password Recovery 23
Configuring Privilege Levels for Users 25
Configuring Password Encryption 26
Configuring Banner Messages 27
Configuring SNMP Security 29
Configuring RIP Authentication 30
Configuring EIGRP Authentication 32
Configuring OSPF Authentication 36
Configuring Route Filters 40
Suppressing Route Advertisements 45
Chapter 2: AAA Security Technologies 48
In Brief 48
Access Control Security 48
AAA Protocols 53
Cisco Secure Access Control Server 58
Immediate Solutions 61
Configuring TACACS+ Globally 61
Configuring TACACS+ Individually 63
Configuring RADIUS Globally 66
Configuring RADIUS Individually 67
Configuring Authentication 69
Configuring Authorization 77
Configuring Accounting 80
Installing and Configuring Cisco Secure NT 83
Chapter 3: Perimeter Router Security 90
In Brief 90
Defining Networks 90
Cisco Express Forwarding 91
Unicast Reverse Path Forwarding 92
TCP Intercept 92
Network Address Translation 94
Committed Access Rate 95
Logging 97
Immediate Solutions 98
Configuring Cisco Express Forwarding 98
Configuring Unicast Reverse Path Forwarding 100
Configuring TCP Intercept 103
Configuring Network Address Translation (NAT) 108
Configuring Committed Access Rate (CAR) 121
Configuring Logging 124
Chapter 4: IOS Firewall Feature Set 128
In Brief 128
Context-Based Access Control 128
Port Application Mapping 132
IOS Firewall Intrusion Detection 134
Immediate Solutions 136
Configuring Context-Based Access Control 136
Configuring Port Application Mapping 148
Configuring IOS Firewall Intrusion Detection 154
Chapter 5: Cisco Encryption Technology 161
In Brief 161
Cryptography 161
Benefits of Encryption 165
Symmetric and Asymmetric Key Encryption 165
Digital Signature Standard 171
Cisco Encryption Technology Overview 172
Immediate Solutions 173
Configuring Cisco Encryption Technology 173
Chapter 6: Internet Protocol Security 194
In Brief 194
IPSec Packet Types 195
IPSec Modes of Operation 196
Key Management 198
Encryption 201
IPSec Implementations 202
Immediate Solutions 202
Configuring IPSec Using Pre-Shared Keys 203
Configuring IPSec Using Manual Keys 219
Configuring Tunnel EndPoint Discovery 229
Chapter 7: Additional Access List Features 236
In Brief 236
Wildcard Masks 238
Standard Access Lists 239
Extended Access Lists 239
Reflexive Access Lists 240
Dynamic Access Lists 241
Additional Access List Features 243
Immediate Solutions 244
Configuring Standard IP Access Lists 244
Configuring Extended IP Access Lists 247
Configuring Extended TCP Access Lists 252
Configuring Named Access Lists 255
Configuring Commented Access Lists 257
Configuring Dynamic Access Lists 259
Configuring Reflexive Access Lists 265
Configuring Time-Based Access Lists 268
Appendix A: IOS Firewall IDS Signature List 271
Appendix B: Securing Ethernet Switches 277
Configuring Management Access 277
Configuring Port Security 278
Configuring Permit Lists 280
Configuring AAA Support 281
List of Figures 286
List of Tables 288
List of Listings 289
Blogging.pdf 1
Local Disk -1
file:///C|/Documents and Settings/me/デスクトップ/pictures/getpedia.html 1
备用描述
Provides Advice For Internetworking Professionals About Designing, Maintaining, And Implementing Secure Networks Using Cisco Routers, Covering Topics Including Tcp Intercept, Ipsec, And Session Filtering.
开源日期
2022-05-07
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。