Designing Network Security / Edition 2

Designing Network Security / Edition 2

4.0 4
by Merike Kaeo

View All Available Formats & Editions

ISBN-10: 1587051176

ISBN-13: 9781587051173

Pub. Date: 10/30/2003

Publisher: Cisco Press

A practical guide to creating a secure network infrastructure

  • Understand basic cryptography and security technologies
  • Identify the threats and common attacks to a network infrastructure
  • Learn how to create a security policy
  • Find out how to recover from a security breach
  • Study specific implementation scenarios for securing your network


A practical guide to creating a secure network infrastructure

  • Understand basic cryptography and security technologies
  • Identify the threats and common attacks to a network infrastructure
  • Learn how to create a security policy
  • Find out how to recover from a security breach
  • Study specific implementation scenarios for securing your network environment
  • Learn about advances in security technologies

Designing Network Security, Second Edition, is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy.

You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment.

This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples.

This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Product Details

Cisco Press
Publication date:
Networking Technology Series
Edition description:
Product dimensions:
7.74(w) x 9.48(h) x 2.08(d)

Related Subjects

Table of Contents


1. Basic Cryptography.
2. Security Technologies.
3. Export Controls on Cryptography.


4. Threats in an Enterprise Network.
5. Considerations for a Site Security Policy.
6. Design and Implementation of the Corporate Security Policy.
7. Incident Handling.


8. Securing the Corporate Network Infrastructure.
9. Securing Internet Access.
10. Securing Dial-In Access.


Appendix A: Sources of Technical Information.
Appendix B: Reporting and Prevention Guidelines: Industrial Espionage and Network Intrusions.
Appendix C: Port Numbers.

Customer Reviews

Average Review:

Write a Review

and post it to your social network


Most Helpful Customer Reviews

See all customer reviews >

Designing Network Security 4 out of 5 based on 0 ratings. 4 reviews.
Guest More than 1 year ago
Merike Kaeo's Designing Network Security, second edition, by Cisco Press is an easy to read volume with generous emphasis on the roles of planning and careful design in corporate information security strategy. The book draws its examples from Cisco Security platform appliances and software. Organized into three parts (ignoring the appendix) of four chapters each, the book progresses from description of various security concepts and technologies to security policy and planning, culminating in basic implementation scenarios. Of important consideration are the many case studies and configuration examples spruced throughout the volume. Part I starts with the first chapter on Cryptography, which concentrates on several contemporary cryptographic schemes. This is a good introduction to the topic for newbies and non-cryptographers. It provides clear context for many of the cryptographic schemes in us in many Cisco appliances and used in other parts of the book. Access Control, Public Key and Identity Management where all given diligent attention and their applicability in real networks explored at the end of part I. Part II develops the concepts and issues in corporate information security management from Enterprise Security Threat profiles in chapter 5, through considerations for site security, policy development and implementation and incidence management in chapter 8. I find this section as perhaps the most useful given the dilemma many organizations face today in developing comprehensive and holistic response to the ever growing threats to information and consequently much of their business infrastructure. This Section should also provide succor to security professionals grappling with the idea of developing a security policy and incident response procedure for their organizations. The case study on an educational institution is quit simplistic but in all provides some context for the complex task of policy development. This section like the other two is also well commented with advice and useful example scenarios. The implementation Chapter is a bonus for Information Security Professionals working in predominantly Cisco environment. The section includes many easily adaptable real life configuration examples for many of the current Cisco appliances using IOS version 12.2 and later. Included are example configuration for routers, firewall, access control servers and Cisco IDS modules. Of course, most, if not all Cisco press text have their share of configuration examples using Cisco technologies, but the organization of this material brings much of the critical solutions into clear perspective. I got the book a few weeks after getting my CISSP certification and will recommend it as a good read for CISSP candidates even though it is a vendor specific volume, much of the discussion and theoretical underpinning of the text are relevant for a multi-vendor, homogenous security environment that the CISSP addresses. I have read several CCIE-Security specific texts and reviewed the requirements for the Exam. This volume is a sure buy for CCIE-Security candidates. This is a technical book for intermediate to expert level security and networking professionals, but more importantly it is an excellent desk reference for any information security consultant.
Guest More than 1 year ago
I started reading this book because of the title, i.e., ¿Designing Network Security¿, and of course, the ¿Cisco¿ name. This book needs to be re-vamped and Cisco Press should release a third edition. There are so many typographical errors, errors in the figures and in the configuration examples, that it falls far short of what I¿ve come to expect from Cisco Press. Yet¿, this reader recommends buying the book because it encompasses all of the basic material in designing security into your network. It became evident throughout several of the initial chapters (at least to this reader) that there was more than one author involved in the writing of the book. There was such a difference in writing style and the structure of the material from section to section, that it was oftentimes distracting. It made this reader wish that the same author (of the well-written sections) actually wrote all sections. This reader found it inordinately important that the first chapters be complete, concise, and very explanatory with lots of examples of the discussed topics, e.g., cryptography, hash functions, Data Link Layer protocols, and security protocols. As these topics are very much the basis to understanding why and how security is implemented, it should have behooved the editors to ensure the topics were thoroughly covered. Chapter 1 starts out with the author stating that the intent was to provide the reader ¿with a precursory understanding¿ of basic cryptography. Unfortunately, this reader believes that the ¿precursory understanding¿ left MUCH to be desired. Had the author discussed the different algorithms and hash functions more than just ¿basically¿, the reader would glean the necessary understanding of ¿basic¿ cryptography and how it¿s employed in the security protocols. Only through multiple examples can the author ensure that the reader really understands the ¿basics¿. This reader recommends that future readers go to outside sources to really read up on ¿basic cryptography¿ before continuing with the book. The author does a decent job of discussing the supporting transport protocols (tcp or udp), and she lists of all of the listening ports. Too many books leave it to the reader to find out the port numbers on their own. Having it all in one book gives the reader a great reference manual. I noticed that the author spent a lot of time discussing some subjects, but very little time discussing others. For example, when discussing SHTTP, the author states that ¿In practice, SHTTP has achieved limited use.¿ This reader would have appreciated several examples of how SHTTP, and other briefly discussed subjects/protocols, are/were deployed even though their use was only limited. These types of discussions maintain the reader¿s interest, and improve the likelihood that the book will be read in its entirety. Part of writing for an audience is keeping the audience¿s interest. The author clearly explains the difference between application layer security protocols, transport layer security protocols, and security protocols found in other layers. Finally, this reader understands the difference between SHTTP and HTTPS. The author gave a very good explanation of L2F protocol, but it would have enhanced the reading had the author made comparisons with the PPP protocol. And -- as this reader read each section, the suspicion surfaced that two different people wrote the different Layer 2 Protocol sections. Though the figures were helpful, there were several with errors, and most importantly, the reader could benefit from even more figures. Most of the protocol-implementation descriptions left too much of the physical details out of their descriptions, e.g., the actual physical architecture should have been depicted as well as an example of the frame formats. This reader went to a personal library to re-discover frame formats in order to be able to decipher what the author wanted
Guest More than 1 year ago
I wish I had the benefit of this book when I was first starting out in my career in security. Weighing in at a hefty 745 pages, Designing Network Security 2nd. Ed. By Merike Kaeo (ISBN 1-58705-117-6) is a consise and fairly authoritative guide to the sometimes daunting task of designing secure networks - with a special emphasis placed on Cisco solutions of course. The book is divided into three major sections that break down to basic theory and essentials, policy design and best practices, and implementation with Cisco hardware. In my opinion it is best suited as a reference book for those who already have a firm foundation in security and networking, but could also be of value to beginner level techs with a bit of patience. While the topics that are covered have all pertinent information discussed, some might wish that there were a bit more explanation of the hows and whys.

The first section ¿ ¿Security Fundamentals¿ is an especially valuable part of the book in that it provides a great desk reference to the building blocks of secure networks. The first chapter deals with the basics of encryption technologies ¿ symmetrical/asymmetrical cryptography, digital hashes, public key systems, etc. From there the book moves into what is probably its meatiest chapter which covers the application of encryption into security technologies which range from TACACS+ authorization to TLS encryption. Following the precedent of building on previous chapters, the third chapter deals with the application of these security technologies into protecting real world installations. I was especially impressed with the attention paid to wireless and VOIP technologies in this chapter ¿ this is one of the first discussions of VOIP security I have seen in a general reference book. The first section winds up with a fairly exhaustive discussion on routing protocol security which I also thought was excellent.

The second section ¿ ¿The Corporate Security Policy¿ is a good reference to infosec management. Many topics covered in this section are applicable to the CISSP exam, so if that is a career goal for you this can act as one of your study guides. The section begins with a discussion of threats in the enterprise environment. Types of threats as well as common protocol vulnerabilites are discussed. I felt that some of the material in this chapter was a bit dated, in particular the sections on TCP sequence number attacks (most recent OS¿s have improved their sequence generation routines to make it nearly impossible to do this) and the ping of death (which I don¿t remember working on anything after Windows 95 or Linux 2.0.23). The next chapter is a bit more valuable in its discussion of the basics of risk assessment and management. This leads into a discussion of actual design and implementation of security policy. Sample topics include physical/logical controls, data confidentiality, and policies/procedures for staff. And finally this section concludes with a good chapter on incident handling and response.

The final section ¿ ¿Practical Implementation¿ is the Cisco-centric third of the book. Many parts of this section are a good reference to points covered on the CCSP exams, especially the SECUR test. The first chapter deals with configuring access controls and audit on Cisco devices from the PIX to switches and routers. A brief discussion of intrusion detection implementations is also included. The next chapter consists of primarily information dealing with firewall/screening router construction ¿ content filtering, packet screening, and the various types of IOS filters. Several implementation examples are included to walk you through the process of configuring CBAC (content-based access control) and the Cisco PIX. From there the section moves to remote access security, with good sections on all Cisco based AAA (authentication, authorization, and accounting) features including lock-and-key and accounting-based b

Guest More than 1 year ago
I recently read the book titled ¿Designing Network Security¿ by Merike Kaeo. ISBN: 1587051176. This book happens to be the second edition of the title. This book is an excellent source of information regarding network security and security in general. The book covers a broad scope of technologies and areas relating to security. Probably the single best source for security topics in one book that I¿ve read. It¿s an A-Z book on security. The fading lines of responsibility in the realm of security is pretty much forcing every Information Technology (IT) professional to play a role in today¿s security strategy. With the boundaries being sketch well with in most every facet of Information Technology, it leave a big gap as to what the everyday IT professional can understand and contribute to a successful security architecture. This book, in my opinion, does an excellent job of bridging that wide gap for most networking professionals. I think every networking professional should have a copy of this book on their desk. This book is best suited for professionals with a beginner to intermediate level of understanding of security principles, concepts and technologies. This book is essential for professionals looking to keep up with the ever-changing world of IT. Having this book will allow you to understand some of the more challenging and complex concepts that face each and every IT professional regarding security. Persons that are interested in achieving the popular Certified Information Systems Security Professional (CISSP) certification would find this title very helpful, not just as a resource to pass the exam, but also as a valuable reference to continue to learn from even after becoming certified. There are great supporting figures and diagrams that assist in grasping some of the complex ideas and technologies. Most are very basic and stick to the principle concepts, which is great when getting your feet wet with a technology that¿s new to you. It provides a good foundation to build upon. Compared to the first version of this title, the second version offers information regarding leading edge technologies such as Voice over IP (VoIP) and wireless networks. Another topic covered in the second version is Virtual Private Networks (VPN). Making the second version of this title a very well rounded resource. Another new chapter in the second addition is on Routing Protocol Security. The Routing Protocol Security chapter has some good information on several of the widely deployed Interior Gateway Protocols such as RIP, EIGRP and OSPF. The chapter covers information mostly on the authentication pieces and fundamental rules of each routing protocol and not much more. I found the small section on BGP in the chapter to be a little sparse and expected BGP to be covered in a bit more detail. Nonetheless, is does mention briefly, some of the challenges with BGP and a few of the proposed successors of the BGP protocol such as S-BGP and SoBGP. This is an all-a-round good reference for network security.