Securing And Controlling Cisco Routers Ology, And Profits

Overview

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and ...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (8) from $1.99   
  • New (5) from $4.99   
  • Used (3) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$4.99
Seller since 2010

Feedback rating:

(133)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Paperback New BRAND NEW. UP31.

Ships from: Sussex, WI

Usually ships in 1-2 business days

  • Canadian
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$35.00
Seller since 2014

Feedback rating:

(18)

Condition: New
New, unread book. May have light shelf wear.

Ships from: North Tonawanda, NY

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Express, 48 States
$98.78
Seller since 2009

Feedback rating:

(9513)

Condition: New
New Book. Shipped from US within 4 to 14 business days. Established seller since 2000

Ships from: Secaucus, NJ

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$109.83
Seller since 2009

Feedback rating:

(9513)

Condition: New
New Book. Shipped from US within 4 to 14 business days. Established seller since 2000

Ships from: Secaucus, NJ

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$113.49
Seller since 2008

Feedback rating:

(4378)

Condition: New
New Book. Shipped from UK within 4 to 14 business days. Established seller since 2000.

Ships from: Horcott Rd, Fairford, United Kingdom

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology.

At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Read More Show Less

Editorial Reviews

From The Critics
Presents the tasks and commands for securing networks with Cisco routers, and for performing a security audit. The author identifies common security risks, and explains how to mitigate those risks, primarily on the network and transport layers. At the end of each chapter, there is a practice session for simulation on a web site. The main topics are authentication, authorization and accounting (AAA) security services, TACACS, RADIUS, Kerbereos, and traffic filtering. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More Show Less

Product Details

  • ISBN-13: 9780849312908
  • Publisher: Taylor & Francis
  • Publication date: 5/1/2002
  • Pages: 736
  • Product dimensions: 7.00 (w) x 10.00 (h) x 1.46 (d)

Table of Contents

THE BASICS
The Need for Security
The New Reality
Designing the Security Infrastructure
Identifying Security Risks and Threats
Practice Session
Security and Audit Checklist
Conclusion
Understanding OSI and TCP/IP
The OSI Model
TCP/IP Overview
Practice Session
Security and Audit Checklist
Conclusion
Routed and Routing Protocols
Routing Activities
Routable Protocols
Routing Protocols
Routing Protocol Basics
Practice Session
Security and Audit Checklist
Conclusion
Understanding Router Basics
Router Overview
Router Modes
Router Components
Router Status
Practice Session
Security and Audit Checklist
Conclusion
Router Management
Router Setup
Updating the IOS
Troubleshooting
Logging
Recording Access List Violations
Log Processing
Simple Network Management Protocol (SNMP)
Cisco Discovery Protocol
Last Word on Management
Practice Session
Security and Audit Checklist
Conclusion

PREVENTING UNAUTHORIZED ACCESS: NETWORKING DEVICE
Implementing Non-AAA Authentication
Authentication
Using Router Passwords
Configuring Line Password Protection
Setting TACACS Passwords for Privileged EXEC Mode
Establishing Username Authentication
Enabling CHAP or PAP Authentication
Configuring TACACS and Extended TACACS Password Protection
General Interactive Access
Warning Banners and Router Identification
Practice Session
Security and Audit Checklist
Conclusion
Implementing AAA Security Services
Accessing the Network
Defining AAA
Selecting Security Servers
Practice Session
Security and Audit Checklist
Conclusion
Implementing AAA Authentication
Using Method Lists
AAA Authentication Methods
Configuring Login Authentication
Configuring PPP Authentication
Configuring ARA Authentication
Configuring NASI Authentication
Specifying the Amount of Time for Login Input
Enabling Password Protection at the Privileged Level
Changing the Text Displayed at the Password Prompt
Configuring Message Banners for AAA Authentication
Practice Session
Security and Audit Checklist
Conclusion
Implementing AAA Authorization
Starting with AAA Authorization
Understanding AAA Authorization
Disabling Authorization for Global Configuration Commands
Authorization for Reverse Telnet
Authorization Attribute-Value Pairs
Practice Session
Security and Audit Checklist
Conclusion
Implementing AAA Accounting
Starting with Accounting
Configuring Accounting
Understanding AAA Accounting Types
Applying a Named List
Suppress Generation of Accounting Records for Null Username Sessions
Generating Interim Accounting Records
Monitoring Accounting
Practice Session
Security and Audit Checklist
Conclusion
Configuring TACACS and Extended TACACS
Breaking Down the Protocols
Understanding the TACACS Protocols
Configuring TACACS and Extended TACACS
Setting TACACS Password Protection at the User Level
Setting TACACS Password Protection at the Privileged Level
Enabling TACACS and XTACACS for Use
Practice Session
Security and Audit Checklist
Conclusion
Configuring TACACS+
Understanding the TACACS+ Protocol
Comparing TACACS+ and RADIUS
Understanding TACACS+ Operation
TACACS+ Configuration Task List
Configuring TACACS+
Practice Session
Security and Audit Checklist
Conclusion
Configuring RADIUS
RADIUS Overview
Understanding RADIUS Operation
RADIUS Configuration Task List
Configuring RADIUS
Practice Session
Security and Audit Checklist
Conclusion
Configuring Kerberos
Kerberos Overview
Supporting Kerberos Client
Configuring the Router to Use the Kerberos Protocol
Telneting to the Router
Monitoring and Maintaining Kerberos
Practice Session
Security and Audit Checklist
Conclusion

PREVENTING UNAUTHORIZED ACCESS: NETWORKING
Basic Traffic Filtering I
Access List Overview
Understanding Access List Configuration
Comparing Basic and Advanced Access Lists
Creating Access Lists
Applying Access Lists to Interfaces
Creating and Editing Access List Statements on a TFTP Server
Practice Session
Security and Audit Checklist
Conclusion
Basic Traffic Filtering II
Extended IP Access Lists
Named Access Lists
Implementing Routing Policies
Monitoring and Verifying Access and Prefix Lists
Practice Session
Security and Audit Checklist
Conclusion
Advanced Traffic Filtering I
Using Time Ranges
Configuring Time-Based Access
Using Lock-and-Key
Configuring Lock-and-Key
Lock-and-Key Configuration Tips
Verifying and Maintaining Lock-and-Key Configuration
Practice Session
Security and Audit Checklist
Conclusion
Advanced Traffic Filtering II
About Reflexive Access Lists
Configuring Reflexive Access Lists
Example Reflexive Access Lists Configurations
About Context-Based Access Control
Understanding CBAC
How CBAC Works
Configuring Context-Based Access Control
Practice Session
Security and Audit Checklist
Conclusion

Preventing Network Dat Interception
Using Encryption and IKE
Code Wars
Cisco Encryption Technology
CA Interoperability Overview
Overview of Certification Authorities
Configuring Certification Authority Interoperability
Understanding Internet Key Exchange
Troubleshooting CA Interoperability and IKE
Practice Session
Security and Audit Checklist
Conclusion
Configuring IPSec
IPSec Network Security
Understanding IPSec
Configuring IPSec
Practice Session
Security and Audit Checklist
Conclusion

PREVENTING DENIAL OF SERVICE
Configuring Denial of Service Security Features
Understanding Denial of Service
Controlling the Hostile Environment
About TCP Intercept
Configuring TCP Intercept
Monitoring and Maintaining TCP Intercept
About Network Address Translation
Configuring and Deploying NAT
Queuing and Traffic Policing
Detecting Unauthorized Configuration Changes
Resolving Names
Practice Session
Security and Audit Checklist
Conclusion

PREVENTING FRAUDULENT ROUTE UPDATES AND OTHER UNAUTHORIZED CHANGES
Configuring Neighbor Authentication and Other Security Features
Using Neighbor Authentication
Understanding Neighbor Authentication
Removing Unnecessary Services
Configuring Secure Shell
Some Final Guidelines for Configuring a Router
Practice Session
Security and Audit Checklist
Conclusion

APPENDICES

Appendix A IP Addressing
Appendix B Subnetting
Appendix C IP Protocol Numbers
Appendix D Well-Known Ports and Services
Appendix E Hacker, Cracker, Malware and Trojan Horse Ports
Appendix F ICMP Types and Codes
Appendix G Determining Wildcard Mask Ranges
Appendix H Logical Operations
Appendix I Helpful Resources
Appendix J Bibliography
Appendix K Acronyms and Abbreviations
Appendix L Glossary

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)