Book description
Expert solutions for securing network infrastructures and VPNs
Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments
Understand the inner workings of the Cisco PIX Firewall and analyze in-depth Cisco PIX Firewall and Cisco IOS Firewall features and concepts
Understand what VPNs are and how they are implemented with protocols such as GRE, L2TP, and IPSec
Gain a packet-level understanding of the IPSec suite of protocols, its associated encryption and hashing functions, and authentication techniques
Learn how network attacks can be categorized and how the Cisco IDS is designed and can be set upto protect against them
Control network access by learning how AAA fits into the Cisco security model and by implementing RADIUS and TACACS+ protocols
Provision service provider security using ACLs, NBAR, and CAR to identify and control attacks
Identify and resolve common implementation failures by evaluating real-world troubleshooting scenarios
As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile workers via virtual private networks (VPNs), network security becomes more and more critical. In today's networked era, information is an organization's most valuable resource. Lack of customer, partner, and employee access to e-commerce and data servers can impact both revenue and productivity. Even so, most networks do not have the proper degree of security. Network Security Principles and Practices provides an in-depth understanding of the policies, products, and expertise that brings organization to this extremely complex topic and boosts your confidence in the performance and integrity of your network systems and services. Written by a CCIE engineer who participated in the development of the CCIE Security exams, Network Security Principles and Practices is the first book that provides a comprehensive review of topics important to achieving CCIE Security certification.
Network Security Principles and Practices is a comprehensive guide to network security threats and the policies and tools developed specifically to combat those threats. Taking a practical, applied approach to building security into networks, the book shows you how to build secure network architectures from the ground up. Security aspects of routing protocols, Layer 2 threats, and switch security features are all analyzed. A comprehensive treatment of VPNs and IPSec is presented in extensive packet-by-packet detail. The book takes a behind-the-scenes look at how the Cisco PIX(r) Firewall actually works, presenting many difficult-to-understand and new Cisco PIX Firewall and Cisco IOS® Firewall concepts. The book launches into a discussion of intrusion detection systems (IDS) by analyzing and breaking down modern-day network attacks, describing how an IDS deals with those threats in general, and elaborating on the Cisco implementation of IDS. The book also discusses AAA, RADIUS, and TACACS+ and their usage with some of the newer security implementations such as VPNs and proxy authentication. A complete section devoted to service provider techniques for enhancing customer security and providing support in the event of an attack is also included. Finally, the book concludes with a section dedicated to discussing tried-and-tested troubleshooting tools and techniques that are not only invaluable to candidates working toward their CCIE Security lab exam but also to the security network administrator running the operations of a network on a daily basis.
Table of contents
- Copyright
- About the Author
- Acknowledgments
- Foreword
- Introduction
- Introduction to Network Security
- Building Security into the Network
- Firewalls
-
Virtual Private Networks
- The Concept of VPNs
- GRE
- L2TP
-
IPsec
- Types of IPsec VPNs
- Composition of IPsec
- Introduction to IKE
- IPsec Negotiation Using the IKE Protocol
- IKE Authentication Mechanisms
- Encryption and Integrity-Checking Mechanisms in IPsec
- Packet Encapsulation in IPsec
- IKE Enhancements for Remote-Access Client IPsec
- IPsec Dead Peer Discovery Mechanism
- Case Studies
- Summary
- Review Questions
-
Intrusion Detection
-
What Is Intrusion Detection?
- The Need for Intrusion Detection
- Types of Network Attacks Based on Mode of Attack
- Types of Network Attacks Based on the Attack's Perpetrator
- Common Network Attacks
- The Process of Detecting Intrusions
- Case Study: Kevin Metnick's Attack on Tsutomu Shimomura's Computers and How IDS Could Have Saved the Day
- Summary
- Cisco Secure Intrusion Detection
-
What Is Intrusion Detection?
- Network Access Control
- Service Provider Security
- Troubleshooting
-
Appendixes
- Answers to Review Questions
-
SAFE: A Security Blueprint for Enterprise Networks White Paper
- Authors
- Abstract
- Audience
- Caveats
- Architecture Overview
- SAFE Axioms
- Enterprise Module
- Expected Threats
- Enterprise Campus
- Management Module
- Design Guidelines
- Core Module
- Building Distribution Module
- Building Module
- Server Module
- Edge Distribution Module
- Corporate Internet Module
- VPN and Remote Access Module
- WAN Module
- E-Commerce Module
- Enterprise Options
- Migration Strategies
- Overall Guidelines
- Bibliography
- Index
Product information
- Title: Network Security Principles and Practices
- Author(s):
- Release date: November 2002
- Publisher(s): Cisco Press
- ISBN: 9781587050251
You might also like
book
Computer Network Security
Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an …
book
Network Security Strategies
Build a resilient network and prevent advanced cyber attacks and breaches Key Features Explore modern cybersecurity …
book
Cyber Security and Network Security
CYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, …
book
Network Defense and Countermeasures: Principles and Practices, 3rd Edition
All you need to know about defending networks, in one book · Clearly explains concepts, terminology, …