Cisco Network Security Little Black Book

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

A friend recommended this book to me as a cheap book that covered some of the higher-end issues with Cisco Security. I bought it and while I'm still working through it I'm really happy with it so far.

I should probably give this one star off due to some exceedingly long paragraphs (give me a break to catch my breath!) and a few small spelling errors but none of this stuff made me disappointed in the book which has good information, decent organization, and is clearly written by someone who knows his stuff.

Author(s): Joe Harris
Edition: 1
Publisher: Paraglyph Press
Year: 2002

Language: English
Commentary: +OCR
Pages: 293

Cover......Page 1
Table of Contents......Page 3
Cisco Network Security Little Black Book......Page 6
How to Use this Book......Page 9
The Little Black Book Philosophy......Page 11
Enterprise Security Problems......Page 12
Enterprise Security Challenges......Page 13
Enterprise Security Policy......Page 14
Securing the Enterprise......Page 15
Configuring Console Security......Page 19
Configuring Telnet Security......Page 21
Configuring Enable Mode Security......Page 22
Disabling Password Recovery......Page 23
Configuring Privilege Levels for Users......Page 25
Configuring Password Encryption......Page 26
Configuring Banner Messages......Page 27
Configuring SNMP Security......Page 29
Configuring RIP Authentication......Page 30
Configuring EIGRP Authentication......Page 32
Configuring OSPF Authentication......Page 36
Configuring Route Filters......Page 40
Suppressing Route Advertisements......Page 45
Access Control Security......Page 48
AAA Protocols......Page 53
Cisco Secure Access Control Server......Page 58
Configuring TACACS+ Globally......Page 61
Configuring TACACS+ Individually......Page 63
Configuring RADIUS Globally......Page 66
Configuring RADIUS Individually......Page 67
Configuring Authentication......Page 69
Configuring Authorization......Page 77
Configuring Accounting......Page 80
Installing and Configuring Cisco Secure NT......Page 83
Defining Networks......Page 90
Cisco Express Forwarding......Page 91
TCP Intercept......Page 92
Network Address Translation......Page 94
Committed Access Rate......Page 95
Logging......Page 97
Configuring Cisco Express Forwarding......Page 98
Configuring Unicast Reverse Path Forwarding......Page 100
Configuring TCP Intercept......Page 103
Configuring Network Address Translation (NAT)......Page 108
Configuring Committed Access Rate (CAR)......Page 121
Configuring Logging......Page 124
Context-Based Access Control......Page 128
Port Application Mapping......Page 132
IOS Firewall Intrusion Detection......Page 134
Configuring Context-Based Access Control......Page 136
Configuring Port Application Mapping......Page 148
Configuring IOS Firewall Intrusion Detection......Page 154
Cryptography......Page 161
Symmetric and Asymmetric Key Encryption......Page 165
Digital Signature Standard......Page 171
Cisco Encryption Technology Overview......Page 172
Configuring Cisco Encryption Technology......Page 173
In Brief......Page 194
IPSec Packet Types......Page 195
IPSec Modes of Operation......Page 196
Key Management......Page 198
Encryption......Page 201
Immediate Solutions......Page 202
Configuring IPSec Using Pre-Shared Keys......Page 203
Configuring IPSec Using Manual Keys......Page 219
Configuring Tunnel EndPoint Discovery......Page 229
In Brief......Page 236
Wildcard Masks......Page 238
Extended Access Lists......Page 239
Reflexive Access Lists......Page 240
Dynamic Access Lists......Page 241
Additional Access List Features......Page 243
Configuring Standard IP Access Lists......Page 244
Configuring Extended IP Access Lists......Page 247
Configuring Extended TCP Access Lists......Page 252
Configuring Named Access Lists......Page 255
Configuring Commented Access Lists......Page 257
Configuring Dynamic Access Lists......Page 259
Configuring Reflexive Access Lists......Page 265
Configuring Time-Based Access Lists......Page 268
Appendix A: IOS Firewall IDS Signature List......Page 271
Configuring Management Access......Page 277
Configuring Port Security......Page 278
Configuring Permit Lists......Page 280
Configuring AAA Support......Page 281
List of Figures......Page 286
List of Tables......Page 288
List of Listings......Page 289