CCIE Security Exam Certification Guide

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book will be a valuable asset to potential CCIE Security candidates. I am positive individuals will gain
extensive security network knowledge during their preparation for the CCIE Security written exam using
this book. The book’s main focus is providing an in-depth description of the various security features and
an understanding of, and ability to navigate, the subtleties, intricacies, and potential pitfalls inherent to networking
security. This book and accompanying CD-ROM contain many tools to strongly supplement your
preparation for CCIE Security certification.

Author(s): Henry Benjamin
Series: CCIE self-study
Publisher: Cisco; Pearson Education
Year: 2003

Language: German
Pages: 524
City: Indianapolis, Ind. :, London

Conclusion......Page 22
Using This Book to Prepare for the CCIE Security Written Exam......Page 26
CCIE Security Written Exam Blueprint......Page 27
How to Prepare for the CCIE Security Written Exam UsingThis Book......Page 30
General Networking Topics......Page 34
“Do I Know This Already?” Quiz......Page 35
Networking Basics—The OSI Reference Model......Page 44
Ethernet Overview......Page 50
Internet Protocol......Page 56
Variable-Length Subnet Masks......Page 61
Classless Interdomain Routing......Page 62
Transmission Control Protocol......Page 63
TCP Services......Page 68
Routing Protocols......Page 76
ISDN......Page 102
IP Multicast......Page 106
Asynchronous Communications and Access Devices......Page 107
Foundation Summary......Page 110
Requirements for FastEther Channel......Page 112
Q & A......Page 116
Scenario 2-1: Routing IP on Cisco Routers......Page 122
Scenario 2-1 Answers: Routing IP on Cisco Routers......Page 124
“Do I Know This Already?” Quiz......Page 126
Domain Name System......Page 133
Trivial File Transfer Protocol......Page 136
File Transfer Protocol......Page 138
Hypertext Transfer Protocol......Page 141
Secure Socket Layer......Page 143
Simple Network Management Protocol......Page 144
Simple Mail Transfer Protocol......Page 150
Network Time Protocol......Page 151
Secure Shell......Page 155
Foundation Summary......Page 157
Q & A......Page 159
Scenario 3-1: Configuring DNS, TFTP, NTP, and SNMP......Page 163
Scenario 3-1 Solutions......Page 165
“Do I Know This Already?” Quiz......Page 168
Cisco Hardware......Page 173
show and debug Commands......Page 182
Password Recovery......Page 197
Basic Security on Cisco Routers......Page 202
IP Access Lists......Page 205
Foundation Summary......Page 214
Q & A......Page 216
Scenario 4-1: Configuring Cisco Routers for Passwords andAccess Lists......Page 218
Scenario Answers......Page 220
“Do I Know This Already?” Quiz......Page 222
Authentication, Authorization, and Accounting (AAA)......Page 231
Remote Authentication Dial-In User Service (RADIUS)......Page 235
Terminal Access Controller Access Control System Plus(TACACS+)......Page 241
Kerberos......Page 248
Virtual Private Dial-Up Networks (VPDN)......Page 252
Encryption Technology Overview......Page 258
Internet Key Exchange (IKE)......Page 269
Certificate Enrollment Protocol (CEP)......Page 282
Foundation Summary......Page 283
Q & A......Page 288
Scenario 5-1: Configuring Cisco Routers for IPSec......Page 294
Scenario 5-1 Solutions......Page 298
“Do I Know This Already?” Quiz......Page 302
UNIX......Page 307
Microsoft NT Systems......Page 313
Common Windows DOS Commands......Page 318
Cisco Secure for Windows and UNIX......Page 320
Cisco Secure Intrusion Detection System and Cisco Secure Scanner......Page 322
Cisco Security Wheel......Page 327
Foundation Summary......Page 328
Q & A......Page 331
Scenario 6-2: UNIX File Permissions......Page 334
Scenario 6-2 Solution......Page 335
“Do I Know This Already?” Quiz......Page 338
Advanced Security Concepts......Page 343
Network Address Translation and Port Address Translation......Page 347
Cisco Private Internet Exchange (PIX)......Page 351
Cisco IOS Firewall Security Feature Set......Page 367
Public Key Infrastructure......Page 371
Virtual Private Networks......Page 372
Foundation Summary......Page 375
Q & A......Page 378
Scenario 7-1: Configuring a Cisco PIX for NAT......Page 381
Scenario 7-1 Solution......Page 382
“Do I Know This Already?” Quiz......Page 384
Network Security Policies......Page 388
Standards Bodies and Incident Response Teams......Page 389
Vulnerabilities, Attacks, and Common Exploits......Page 392
Intrusion Detection System......Page 395
Protecting Cisco IOS from Intrusion......Page 398
Foundation Summary......Page 404
Q & A......Page 407
Scenario 8-1: Defining IOS Commands to View DoS Attacks in Real Time......Page 410
Scenario 8-1 Solution......Page 411
Study Tips for CCIE Security Examinations......Page 0