Author(s): Harris J
Publisher: Coriolis Group
Language: English
Pages: 293
Cover......Page 2
Table of Contents......Page 3
Cisco Network Security Little Black Book......Page 6
How to Use this Book......Page 9
The Little Black Book Philosophy......Page 11
Enterprise Security Problems......Page 12
Enterprise Security Challenges......Page 13
Enterprise Security Policy......Page 14
Securing the Enterprise......Page 15
Configuring Console Security......Page 19
Configuring Telnet Security......Page 21
Configuring Enable Mode Security......Page 22
Disabling Password Recovery......Page 23
Configuring Privilege Levels for Users......Page 25
Configuring Password Encryption......Page 26
Configuring Banner Messages......Page 27
Configuring SNMP Security......Page 29
Configuring RIP Authentication......Page 30
Configuring EIGRP Authentication......Page 32
Configuring OSPF Authentication......Page 36
Configuring Route Filters......Page 40
Suppressing Route Advertisements......Page 45
Access Control Security......Page 48
AAA Protocols......Page 53
Cisco Secure Access Control Server......Page 58
Configuring TACACS+ Globally......Page 61
Configuring TACACS+ Individually......Page 63
Configuring RADIUS Globally......Page 66
Configuring RADIUS Individually......Page 67
Configuring Authentication......Page 69
Configuring Authorization......Page 77
Configuring Accounting......Page 80
Installing and Configuring Cisco Secure NT......Page 83
Defining Networks......Page 90
Cisco Express Forwarding......Page 91
TCP Intercept......Page 92
Network Address Translation......Page 94
Committed Access Rate......Page 95
Logging......Page 97
Configuring Cisco Express Forwarding......Page 98
Configuring Unicast Reverse Path Forwarding......Page 100
Configuring TCP Intercept......Page 103
Configuring Network Address Translation (NAT)......Page 108
Configuring Committed Access Rate (CAR)......Page 121
Configuring Logging......Page 124
Context-Based Access Control......Page 128
Port Application Mapping......Page 132
IOS Firewall Intrusion Detection......Page 134
Configuring Context-Based Access Control......Page 136
Configuring Port Application Mapping......Page 148
Configuring IOS Firewall Intrusion Detection......Page 154
Cryptography......Page 161
Symmetric and Asymmetric Key Encryption......Page 165
Digital Signature Standard......Page 171
Cisco Encryption Technology Overview......Page 172
Configuring Cisco Encryption Technology......Page 173
In Brief......Page 194
IPSec Packet Types......Page 195
IPSec Modes of Operation......Page 196
Key Management......Page 198
Encryption......Page 201
Immediate Solutions......Page 202
Configuring IPSec Using Pre-Shared Keys......Page 203
Configuring IPSec Using Manual Keys......Page 219
Configuring Tunnel EndPoint Discovery......Page 229
In Brief......Page 236
Wildcard Masks......Page 238
Extended Access Lists......Page 239
Reflexive Access Lists......Page 240
Dynamic Access Lists......Page 241
Additional Access List Features......Page 243
Configuring Standard IP Access Lists......Page 244
Configuring Extended IP Access Lists......Page 247
Configuring Extended TCP Access Lists......Page 252
Configuring Named Access Lists......Page 255
Configuring Commented Access Lists......Page 257
Configuring Dynamic Access Lists......Page 259
Configuring Reflexive Access Lists......Page 265
Configuring Time-Based Access Lists......Page 268
Appendix A: IOS Firewall IDS Signature List......Page 271
Configuring Management Access......Page 277
Configuring Port Security......Page 278
Configuring Permit Lists......Page 280
Configuring AAA Support......Page 281
List of Figures......Page 286
List of Tables......Page 288
List of Listings......Page 289
Local Disk......Page 0
All the helpful information you will need is here!......Page 1