Book description
As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors. Included are the following topics:
- The importance of router security and where routers fit into an overall security plan
- Different router configurations for various versions of Cisco?s IOS
- Standard ways to access a Cisco router and the security implications of each
- Password and privilege levels in Cisco routers
- Authentication, Authorization, and Accounting (AAA) control
- Router warning banner use (as recommended by the FBI)
- Unnecessary protocols and services commonly run on Cisco routers
- SNMP security
- Anti-spoofing
- Protocol security for RIP, OSPF, EIGRP, NTP, and BGP
- Logging violations
- Incident response
- Physical security
Publisher resources
Table of contents
- Preface
- 1. Router Security
- 2. IOS Version Security
- 3. Basic Access Control
- 4. Passwords and Privilege Levels
- 5. AAA Access Control
- 6. Warning Banners
- 7. Unnecessary Protocols and Services
-
8. SNMP Security
- 8.1. SNMP Versions
- 8.2. Securing SNMP v1 and v2c
- 8.3. Securing SNMP v3
- 8.4. SNMP Management Servers
- 8.5. SNMP Security Checklist
- 9. Secure Routing and Antispoofing
- 10. NTP
- 11. Logging
-
A. Checklist Quick Reference
- A.1. Hardening Your Routers
- A.2. Auditing Your Routers
-
A.3. Cisco Router Security Checklist
- A.3.1. IOS Security (Chapter 2)
- A.3.2. Basic Access Control (Chapter 3)
- A.3.3. Password Security (Chapter 4)
- A.3.4. AAA Security (Chapter 5)
- A.3.5. Warning Banners (Chapter 6)
- A.3.6. Unnecessary Protocols and Services (Chapter 7)
- A.3.7. SNMP Security (Chapter 8)
- A.3.8. Routing Protocol and Antispoofing (Chapter 9)
- A.3.9. NTP Security (Chapter 10)
- A.3.10. Logging (Chapter 11)
- A.3.11. Physical Security (Appendix B)
- A.3.12. Incident Reponse (Appendix C)
- B. Physical Security
- C. Incident Response
- D. Configuration Examples
- E. Resources
- About the Author
- Colophon
- Copyright
Product information
- Title: Hardening Cisco Routers
- Author(s):
- Release date: February 2002
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596001667
You might also like
video
CCNA Security 210-260
More than 13 hours of video training covering all of the objectives in the CCNA Security …
book
Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this …
video
Cisco Firepower and Advanced Malware Protection LiveLessons
Overview More than 6 hours of video training covering everything you need to know to design, …
video
Understanding the Cisco ASA Firewall
This is a best practices course on how to set-up, manage, and troubleshoot firewalls and VPNs …