Enhanced IP Services for Cisco Networks

Book description

Learn how to manage and deploy the latest IP services in Cisco-centric networks.

  • Understand VPN security concepts: confidentiality, integrity, origin authentication, non-repudiation, anti-replay, perfect forward secrecy

  • Deploy quality of service technologies to protect your mission-critical applications

  • Find out how IPsec technology works and how to configure it in IOS

  • Learn how to set up a router as a firewall and intrusion detection system

  • Gain efficient use of your IP address space with NAT, VLSM, IP unnumbered

  • Solve real-world routing problems with redistribution, route filtering, summarization, policy routing

  • Enable authentication, authorization, and accounting (AAA) security services wih RADIUS and TACACS+ servers

  • Enhanced IP Services for Cisco Networks is a guide to the new enabling and advanced IOS services that build more scalable, intelligent, and secure networks. You will learn the technical details necessary to deploy quality of service and VPN technologies, as well as improved security and advanced routing features. These services will allow you to securely extend the network to new frontiers, protect your network from attacks, and enhance network transport with application-level prioritization.

    This book offers a practical guide to implementing IPsec, the IOS Firewall, and IOS Intrusion Detection System. Also included are advanced routing principles and quality of service features that focus on improving the capability of your network. A good briefing on cryptography fully explains the science that makes VPNs possible. Rather than being another routing book, this is a guide to improving your network's capabilities by understanding and using the sophisticated features available to you in Cisco's IOS software

    Table of contents

    1. Table of Contents (1/2)
    2. Table of Contents (2/2)
    3. Introduction
    4. Part I: Managing Routing
      1. Chapter 1 Managing Your IP Address Space
        1. Review of Traditional IP Addressing
        2. Subnetting a Classful Address Space (1/2)
        3. Subnetting a Classful Address Space (2/2)
        4. Subnetting with Variable Length Subnet Masks (1/2)
        5. Subnetting with Variable Length Subnet Masks (2/2)
        6. Overview of Classless Addressing
        7. Planning for Address Summarization
        8. Conserving Subnets with IP Unnumbered
        9. Scaling the Address Space with Network Address Translation (1/2)
        10. Scaling the Address Space with Network Address Translation (2/2)
        11. Summary
      2. Chapter 2 Deploying Interior Routing Protocols
        1. A Brief Review of Internetworking
        2. Deploying RIP
        3. Deploying IGRP
        4. Deploying Enhanced IGRP
        5. Deploying OSPF (1/2)
        6. Deploying OSPF (2/2)
        7. Summary
      3. Chapter 3 Managing Routing Protocols
        1. Configuring Passive Interfaces
        2. Filtering Routing Updates
        3. Managing Redistribution (1/2)
        4. Managing Redistribution (2/2)
        5. Resolving Issues with VLSM and Classful Routing Protocols
        6. Leveraging Default Routing (1/2)
        7. Leveraging Default Routing (2/2)
        8. Configuring Route Summarization (1/2)
        9. Configuring Route Summarization (2/2)
        10. Deploying Policy Routing with Route Maps (1/3)
        11. Deploying Policy Routing with Route Maps (2/3)
        12. Deploying Policy Routing with Route Maps (3/3)
        13. Summary
    5. Part II: Managing Quality of Service
      1. Chapter 4 Deploying Basic Quality of Service Features
        1. The Case for QoS
        2. Queuing in a Router
        3. Priority Queuing (1/2)
        4. Priority Queuing (2/2)
        5. Custom Queuing (1/2)
        6. Custom Queuing (2/2)
        7. Understanding IP Precedence
        8. Weighted Fair Queuing (1/2)
        9. Weighted Fair Queuing (2/2)
        10. Summary
      2. Chapter 5 Deploying Advanced Quality of Service Features
        1. Resource Reservation Protocol
        2. Random Early Detection (1/2)
        3. Random Early Detection (2/2)
        4. Committed Access Rate
        5. Class-Based WFQ
        6. Summary
    6. Part III: Managing Security
      1. Chapter 6 Deploying Basic Security Services
        1. Controlling Traffic with Access Control Lists
        2. Securing Access to the Router
        3. Deploying Authentication, Authorization, and Accounting (1/3)
        4. Deploying Authentication, Authorization, and Accounting (2/3)
        5. Deploying Authentication, Authorization, and Accounting (3/3)
        6. Other IOS Commands for Basic Security
        7. Summary
      2. Chapter 7 Advanced Security Services, Part I: IPsec
        1. IPsec Enables Virtual Private Networks
        2. Benefits of IPsec's Layer 3 Service
        3. Basic IPsec Security Concepts and Cryptography (1/3)
        4. Basic IPsec Security Concepts and Cryptography (2/3)
        5. Basic IPsec Security Concepts and Cryptography (3/3)
        6. IPsec Concepts
        7. Internet Key Exchange
        8. Tying All of the Pieces Together: A Comprehensive Example with IPsec and IKE
        9. Configuring IKE (1/4)
        10. Configuring IKE (2/4)
        11. Configuring IKE (3/4)
        12. Configuring IKE (4/4)
        13. Configuring IPsec (1/3)
        14. Configuring IPsec (2/3)
        15. Configuring IPsec (3/3)
        16. Troubleshooting IPsec and IKE
        17. Summary
      3. Chapter 8 Advanced Security Services, Part II: IOS Firewall Feature Set
        1. IOS Firewall Fundamentals
        2. Defending the Perimeter Against Attacks
        3. How Context-Based Access Control Works
        4. Configuring CBAC (1/2)
        5. Configuring CBAC (2/2)
        6. Adjusting CBAC Timers and Thresholds
        7. Enabling Auditing of Sessions
        8. CBAC with a Demilitarized Zone
        9. Notes on CBAC Performance
        10. Configuring Java Applet Blocking for Security
        11. The IOS Intrusion Detection System
        12. Summary
    7. Part IV: Appendixes
      1. Appendix A: Obtaining IETF RFCs
        1. Via the World Wide Web
        2. Via FTP
        3. Via E-Mail
        4. Finding Current RFCs
        5. Authoring RFCs
      2. Appendix B: Retrieving Internet Drafts
        1. Via the World Wide Web
        2. Via FTP
        3. Via E-Mail
        4. Authoring Internet Drafts
      3. Appendix C: Common TCP and UDP Ports
      4. Appendix D: Password Recovery
        1. Recovering a Lost Password on Most Router Models
        2. Recovering a Lost Password on Other Router Models
      5. Appendix E: A Crash Course in Cisco IOS
        1. Connecting to the Router
        2. Modes
        3. Context-Based Help, Navigation, and Line Editing
        4. Common IOS Commands
        5. Extended Ping
        6. Extended Traceroute
        7. Common Configuration Tasks (1/2)
        8. Common Configuration Tasks (2/2)
        9. Common Show Commands (1/3)
        10. Common Show Commands (2/3)
        11. Common Show Commands (3/3)
        12. Using the Router as a Terminal Server (Communications Server)
        13. Enabling IOS Web-Based Management
    8. Bibliography
    9. Index
      1. A
      2. B
      3. C
      4. D
      5. E
      6. F
      7. G
      8. H
      9. I
      10. J-K-L
      11. M
      12. N
      13. O
      14. P
      15. Q
      16. R
      17. S
      18. T
      19. U
      20. V
      21. W-Z

    Product information

    • Title: Enhanced IP Services for Cisco Networks
    • Author(s): Donald C. Lee
    • Release date: September 1999
    • Publisher(s): Cisco Press
    • ISBN: None