Skip to content

Cisco Security Architectures

Best in textbook rentals since 2012!

ISBN-10: 007212833X

ISBN-13: 9780072128338

Edition: N/A

Authors: Gilbert Held, Kent Hundley

List price: $55.00
Blue ribbon 30 day, 100% satisfaction guarantee!
Out of stock
We're sorry. This item is currently unavailable.
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Customers also bought

Book details

List price: $55.00
Publisher: McGraw-Hill Professional Publishing
Binding: E-Book 
Language: English

Kent Hundley (Alcatel-Lucent NRS I No. 1558) is a professional services IT consultant with more than 17 years of experience in the networking field. Kent has been a consultant for more than 12 years and has worked with numerous Fortune 100 enterprise clients and service provider customers in the areas of network architecture design, network operations, network management solutions, application analysis, and the design of security solutions. He is the author of several books on security and IPrelated technologies and currently works as a consultant for a leading provider of solutions for managing networks and applications.

Prefacep. xv
Acknowledgmentsp. xvii
Introductionp. 1
The Need for Securityp. 2
Public Network Threatsp. 2
Private Network Threatsp. 4
The Role of Routersp. 5
Other Security Devicesp. 6
Firewall Featuresp. 6
Packet Filteringp. 6
Network Address Translationp. 7
Authentication Servicesp. 7
Encryptionp. 7
Alarm Generationp. 8
Proxy Servicesp. 8
Book Previewp. 8
The TCP/IP Protocol Suitep. 8
The Internet Protocolp. 9
TCP and UDPp. 9
NetWarep. 9
Router Hardware and Softwarep. 9
Working with Access Listsp. 10
The PIX Firewallp. 10
The TCP/IP Protocol Suitep. 11
The ISO Open Systems Interconnection Reference Modelp. 12
Layers of the OSI Reference Modelp. 12
The Physical Layerp. 13
The Data Link Layerp. 13
The Network Layerp. 14
The Transport Layerp. 14
The Session Layerp. 15
The Presentation Layerp. 15
The Application Layerp. 15
Data Flowp. 16
Layer Subdivisionp. 17
The TCP/IP Protocol Suitep. 18
Comparison to the ISO Reference Modelp. 18
Internet Protocol (IP)p. 19
Internet Control Message Protocol (ICMP)p. 20
TCP and User Datagram Protcol (UDP)p. 20
Data Deliveryp. 20
The Internet Protocolp. 23
The IP Headerp. 24
Vers Fieldp. 24
Hlen and Total Length Fieldsp. 24
Service Type Fieldp. 24
Identification and Fragment Offset Fieldsp. 25
Time to Live Fieldp. 25
Flags Fieldp. 25
Protocol Fieldp. 26
Source and Destination Address Fieldsp. 30
Overviewp. 31
IPv4p. 32
The Basic Addressing Schemep. 33
Address Classesp. 33
Class Ap. 34
Class Bp. 34
Class Cp. 35
Class Dp. 36
Class Ep. 36
Dotted-Decimal Notationp. 37
Reserved Addressesp. 38
Networking Basicsp. 39
Subnettingp. 40
Host Addresses on Subnetsp. 44
The Subnet Maskp. 45
Configuration Examplesp. 47
Classless Networkingp. 50
IPv6p. 51
Address Architecturep. 51
Address Typesp. 51
Address Notationp. 52
Address Allocationp. 52
Provider-Based Addressesp. 54
Special Addressesp. 54
Address Resolutionp. 55
Operationp. 56
ICMPp. 59
TCP and UDPp. 65
The TCP Headerp. 66
Source and Destination Port Fieldsp. 67
Port Numbersp. 67
Sequence and Acknowledgment Number Fieldsp. 70
Hlen Fieldp. 71
Code Bits Fieldp. 71
Window Fieldp. 72
Checksum Fieldp. 72
Options and Padding Fieldsp. 73
The UDP Headerp. 74
The Source and Destination Port Fieldsp. 75
Length Fieldp. 75
Checksum Fieldp. 76
Firewall and Router Access
List Considerationsp. 76
NetWarep. 77
Overviewp. 78
General Structurep. 78
Network Layer Operationp. 78
Transport Layer Operationp. 79
SAPs, RIPs, and the NCPp. 79
NetWare Addressingp. 80
Network Addressp. 80
Node Addressp. 80
Socket Numberp. 81
IPXp. 81
Packet Structurep. 82
Checksum Fieldp. 82
Length Fieldp. 83
Transport Control Fieldp. 83
Packet Type Fieldp. 83
Destination Network Address Fieldp. 84
Destination Node Address Fieldp. 84
Destination Socket Fieldp. 84
Source Network Fieldp. 85
Source Node Fieldp. 85
Source Socket Fieldp. 85
SPXp. 85
Packet Structurep. 86
Comparison to IPXp. 87
Connection Control Fieldp. 87
Datastream Type Fieldp. 88
Source Connection ID Fieldp. 88
Destination Connection ID Fieldp. 88
Sequence Number Fieldp. 89
Acknowledgment Number Fieldp. 89
Allocation Number Fieldp. 89
SAP, RIP, and NCPp. 89
Router Hardware and Software Overviewp. 91
Basic Hardware Componentsp. 92
Central Processing Unit (CPU)p. 93
Flash Memoryp. 93
ROMp. 93
RAMp. 93
Nonvolatile RAMp. 94
I/O Ports and Media-Specific Convertersp. 94
The Router Initialization Processp. 96
Basic Software Componentsp. 99
Operating System Imagep. 99
Configuration Filep. 100
Data Flowp. 100
The Router Configuration Processp. 102
Cabling Considerationsp. 102
Console Accessp. 103
Setup Considerationsp. 104
The Command Interpreterp. 107
User Mode Operationsp. 107
Privileged Mode of Operationp. 109
Configuration Command Categoriesp. 111
Global Configuration Commandsp. 112
Interface Commandsp. 113
Line Commandsp. 113
Router Commandsp. 114
Abbreviating Commandsp. 115
Security Management Considerationsp. 116
Password Managementp. 116
Access Listsp. 117
Cisco Router Access Listsp. 119
Cisco Access List Technologyp. 120
Access Lists Definedp. 121
Creating Access Listsp. 122
Access List Detailsp. 125
Applying Access Listsp. 127
Named Access Listsp. 131
Editing Access Listsp. 133
Access List Processing Revisitedp. 135
Placement of Entries in an Access Listp. 136
Representing Address Ranges -- Using Wildcard Masksp. 137
Wildcard Mask Examplesp. 140
Additional Wildcard Mask Examplep. 144
Wildcard Mask Shortcutsp. 145
Wildcard Masks Concludedp. 145
Packet Filtering Technologyp. 146
The Role of Packet Filtersp. 146
Packet Filters Definedp. 147
Stateless and Stateful Packet Filteringp. 148
Packet Filter Limitationsp. 149
IP Address Spoofingp. 150
Stateless Packet Inspectionp. 151
Limited Informationp. 151
Human Errorp. 151
Configuration Principlesp. 152
Traditional IP Access Listsp. 153
Standard Access Listsp. 153
Extended IP Access Listsp. 158
Filtering the TCP Protocolp. 161
HTTP Servicesp. 162
Inbound Trafficp. 162
FTP Servicesp. 163
Filtering the UDP Protocolp. 165
Filtering the ICMP Protocolp. 166
Filtering IP Packetsp. 168
Other Protocolsp. 171
Discovering Protocolsp. 171
Advanced Cisco Router Security Featuresp. 173
Next Generation Access Listsp. 174
Dynamic Access Listsp. 174
Limitationsp. 177
Time-Based Access Listsp. 178
Limitationsp. 179
Reflexive Access Listsp. 180
Limitationsp. 181
Examplesp. 182
Context Based Access Control (CBAC)p. 186
Overviewp. 186
The Processp. 187
Caveatsp. 188
Configurationp. 188
Choose an Interfacep. 189
Configure Access Listsp. 190
Configure Timeouts and Thresholdsp. 191
Define Inspection Rulesp. 191
Apply the Inspection Rulesp. 193
Additional Detailsp. 193
Example Configurationp. 194
Other IP Security Featuresp. 199
Hardening the Routerp. 199
Secure Router Accessp. 200
Disable Unnecessary Servicesp. 201
Commandsp. 201
TCP Intercept -- Preventing SYN Floodingp. 202
Enabling TCP Interceptp. 203
Setting the Modep. 203
Aggressive Thresholdsp. 204
Sample Configurationp. 204
Network Address Translationp. 204
Caveatsp. 205
NAT Termsp. 205
Sample Configurationsp. 206
Translating Source Addressesp. 206
Translating Source and Destination Addressesp. 209
TCP Load Distributionp. 210
Useful Commandsp. 211
Non-IP Access Listsp. 213
IPX Access Listsp. 214
Filtering IPX Data Packetsp. 215
Filtering IPX SAP Updatesp. 218
Filtering IPX RIP Updatesp. 219
Layer 2 Access Listsp. 220
Filtering by Layer 2 Addressp. 220
Filtering by LSAP or Typep. 222
Filtering by Byte Offsetp. 223
Using Access Expressionsp. 224
The Cisco PIXp. 225
Cisco PIX Basicsp. 226
Models and Specificationsp. 229
Special Features of the PIXp. 231
Limitations of the PIXp. 234
Closed Implementationp. 234
Limited Routing Supportp. 235
Limited VPN Supportp. 235
Limited Client Authenticationp. 235
Configuring the Cisco PIXp. 236
Default Configurationp. 236
Naming Interfacesp. 236
Interface Settingsp. 240
Passwordsp. 240
Hostnamep. 241
Fixup Commandsp. 241
Namesp. 242
Failoverp. 243
Pager Linesp. 243
Loggingp. 243
IP Addressingp. 243
ARPp. 244
Routing Commandsp. 244
Translation Timeoutsp. 245
SNMP Commandsp. 246
Maximum Transmission Unit (MTU) Commandsp. 246
Floodguardp. 246
Getting the PIX Up and Runningp. 247
Defining NAT and Global Poolsp. 248
Using Static NAT and Conduitsp. 254
Dual NAT -- Using the Alias Commandp. 258
PIX Access Listsp. 260
Handling Multi-Channel Protocolsp. 263
Setting Passwordsp. 266
Managing the PIXp. 266
Advanced Configuration Topicsp. 268
User Authenticationp. 268
Virtual Private Networksp. 270
Redundant PIX Designp. 271
Filtering Web Trafficp. 273
The PIX Managerp. 274
Determining Wildcard Mask Rangesp. 279
Creating Access Listsp. 291
Standard Access Listsp. 295
Extended IP Access Listsp. 297
Glossaryp. 299
Acronyms and Abbreviationsp. 309
Indexp. 315
Table of Contents provided by Syndetics. All Rights Reserved.