Hardening Network Infrastructure

Hardening Network Infrastructure

by Wesley J Noonan
Hardening Network Infrastructure

Hardening Network Infrastructure

by Wesley J Noonan

Paperback

$49.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

Shows network administrators and IT pros how to harden their network infrastructure against hackers.

Product Details

ISBN-13: 9780072255027
Publisher: McGraw-Hill/Osborne Media
Publication date: 05/06/2004
Series: Hardening
Pages: 580
Product dimensions: 7.50(w) x 9.13(h) x 1.24(d)

Table of Contents

Forewordxv
Acknowledgmentsxvii
Introductionxix
Part IDo This Now!
1Do These Six Things Before You Do Anything Else3
Review Your Network Design5
Implement a Firewall9
Application Proxies10
Stateful Packet-Inspecting/Filtering Gateways10
Hybrid Firewalls10
Which Firewall Should You Implement?10
Implement Access Control Lists11
Turn Off Unnecessary Features and Services12
Implement Virus Protection12
Secure Your Wireless Connections14
Summary14
Part IITake It from the Top: The Systematic Hardening Process
2Write a Security Policy19
The Role of a Security Policy20
The Purpose of a Security Policy22
Security Policy Components23
Where to Start?23
The Characteristics of a Good Security Policy27
Security Policy Recommendations30
Encryption Policy30
Analog/ISDN Policy30
Antivirus Policy30
Audit, Vulnerability Assessment, and Risk Assessment Policy31
Dial-in Policy31
DMZ Policy31
Extranet Policy31
Wireless Communications Policy32
VPN Policy32
Firewall Security Policy32
Router and Switch Security Policy33
Remote Access Policy33
Password Policy33
Intrusion Detection/Prevention System Policy34
Content-Filtering/Internet Policy34
Enterprise-Monitoring Policy34
Acceptable-Use Policy35
Network Connection Policy35
Network Documentation Policy35
Why Security Policies Fail and How to Ensure Yours Won't35
Security Is Viewed as a Barrier to Progress36
Security Is a Learned Behavior36
Security Is Rife with Unexpected Events and Occurrences36
Your Security Policy Is Never Finished37
Preventing the Failure37
Summary37
3Hardening Your Firewall39
Hardware-Based and Software-Based Firewalls40
Hardening Remote Administration41
Implementing Authentication and Authorization48
Hardening the Underlying Operating System50
Hardening Firewall Services and Protocols51
Using Redundancy to Harden Your Firewall64
Hardening Routing Protocols66
Summary71
4Hardening Your Network with Intrusion Detection and Prevention73
IDS/IPS Technologies74
Host-Based Intrusion Detection/Prevention75
Network-Based Intrusion Detection/Prevention76
IDS/IPS Components77
IDS/IPS Device Hardening78
Hardening PureSecure on Microsoft Windows78
Hardening Cisco IDS81
IDS/IPS Deployments83
Detection vs. Prevention84
Sensor Placement85
Sensor Placement in a Switched Network Infrastructure86
IDS/IPS Tuning87
Tuning PureSecure Sensors88
Tuning Cisco IDS Sensors90
IDS/IPS Logging, Alerting, and Blocking94
Logging with PureSecure95
Logging with Cisco IDS96
Alerting with PureSecure98
Alerting with Cisco IDS99
Blocking Traffic Using Cisco IDS and Cisco PIX Firewalls103
Summary104
5Hardening VPN and Dial-in Remote Access105
Hardening VPN Connectivity106
Different VPN Connection Types and Technologies107
VPN Device-Hardening Methods110
Hardening IPsec-Based VPNs135
Hardening VPN Clients150
Hardening Dial-in Remote Access151
Summary153
6Hardening Your Routers and Switches155
Hardening Management Access156
Securing Console Access157
Securing VTY Access158
Securing Web-Based Management Access161
Securing Auxiliary Access161
Securing Privileged Mode Access162
Implementing Usernames and AAA163
Implementing Banners164
Hardening Services and Features164
Cisco Discovery Protocol (CDP)165
TCP and UDP Small Servers165
finger166
Network Time Protocol (NTP)166
bootp Server167
Dynamic Host Configuration Protocol (DHCP)167
Configuration Autoloading168
Name Resolution168
Proxy ARP169
Directed Broadcasts169
IP Source Routing169
ICMP Redirects, Unreachables, and Mask Replies170
syslog170
Simple Network Management Protocol (SNMP)171
Implementing Loopback Address173
Disabling Unused Interfaces174
Configuring Core Dumps175
Hardening Router Technologies175
Implementing Redundancy175
Hardening Routing Protocols176
Implementing Traffic Management181
Implementing IPsec191
Hardening Switch Technologies194
Hardening VLANs194
Hardening Services and Features198
Summary204
7Securing the Network with Content Filters205
Internet Content Filtering Architectures207
Client-Based Content Filtering207
Server-Based Content Filtering207
Gateway-Based Content Filtering210
Internet Content Filtering211
Misuse of Resources211
Preserving Network Bandwidth211
Hostile Work Environment211
Hostile Web Code (Java/ActiveX Applets)212
Implementing Content Filtering212
E-mail Content Filtering234
Implementing Virus Protection235
Filtering Attachments236
Implementing Content Filtering237
Implementing Spam Control238
Summary239
8Hardening Wireless LAN Connections241
Banning WLANs Without IT/Management Approval242
Preventing Rogue APs242
Implementing WLAN Discovery Procedures244
Removing Rogue WAPs248
Hardening Wireless Access Points248
Hardening Remote Administration249
Securely Configuring the Service Set Identifier (SSID)252
Configuring Logging255
Hardening Services255
Restricting Wireless Mode258
Using MAC Address Filtering259
Hardening Wireless LAN Connections262
Hardening Wired Equivalent Privacy (WEP)263
Hardening WiFi Protected Access (WPA)266
Hardening WLANS with Virtual Private Networks271
Hardening Windows XP Wireless Clients271
Hardening with WEP272
Hardening with WPA Using Pre-shared Keys273
Hardening with WPA Using RADIUS/802.1x274
Summary276
9Implementing AAA279
AAA Mechanisms280
Remote Authentication Dial-In User Service (RADIUS)281
Terminal Access Controller Access Control System (TACACS+)281
Authentication and Access Control281
AAA Authentication on IOS-Based Equipment282
AAA Authentication on PIX Firewalls292
Hardening Your Network with Authorization295
Authorization on IOS-Based Devices295
Authorization on PIX Firewalls297
Hardening Your Network with Accounting300
AAA Accounting on IOS-Based Equipment300
AAA Accounting on PIX Firewalls301
802.1x Port-Based Authentication302
802.1x Network Device Roles302
Configuring 802.1x Authentication for IOS-Based Switches304
Summary310
10Hardening Your Network with Network Management311
Implementing a Network Management System (NMS)312
Fault Management313
Configuration Management330
Performance Management333
Accounting or Asset Management335
Security Management335
Hardening Your Network Management Protocols335
Configuring IPsec on Microsoft Windows 2000336
Summary345
11Implementing a Secure Perimeter347
DMZ Implementation Methods348
Using a Multi-homed Firewall for Your DMZ349
Using Dual Firewalls for Your DMZ351
VLANs and DMZs353
Internet Access Module354
Traffic Flow Through the Internet Module354
Firewall Implementation356
VPN/Remote Access Module360
Remote Access VPN Termination Segment361
Site-to-Site VPN Termination Segment362
Dial-in Remote User Termination Segment362
NIDS/NIPS Deployment362
WAN Access Module363
Extranet Access Module364
Wireless Access Module365
E-Commerce Access Module366
Web Services DMZ Segment366
Application Services DMZ Segment367
Database Services DMZ Segment367
Summary368
12Implementing a Secure Interior371
Using Virtual LANs (VLANs) to Segment the Network372
Trust Model Enforcement373
Using VLANs to Isolate Systems375
Designing the Enterprise Campus375
Core Module378
Server Module378
Building Distribution Module379
Building Access Module381
Management Module381
Lab Module382
Hardening Branch/Remote Offices383
Summary384
Part IIIOnce Is Never Enough!
13Auditing: Performing a Security Review389
Reviewing Your Security Policy391
Is Your Security Policy Being Adhered To?391
Does Your Security Policy Address All Known Threats to Your Environment?393
Protecting Yourself from Future Exploits393
Do You Have Adequate Prevention Mechanisms and Enforcement of Your Security Policy?396
Reviewing Your Security Posture398
Auditing Your Environment399
Performing an Internal Audit400
Using Nmap and Nessus to Perform a Basic Security Review405
Performing an External Audit422
Summary425
14Managing Changes to Your Environment427
Implementing Change Control428
Defining the Change Management Team428
The Change Planning Proces432
The Change Management Process438
How to Ensure a Successful Change Control Process443
Implementing a Patch and Update Policy445
When to Use a Workaround, Hotfix, Patch, or an Upgrade447
Staying Informed of Workarounds, Hotfixes, Patches, and Upgrades448
Purchasing Maintenance and Support Agreements449
Defining a Change Control Patch Policy450
Writing Patch and Update Procedures451
Changing the System Image452
Changing the System Configuration464
Changing the Application472
Summary472
Part IVHow to Succeed at Hardening Your Network Infrastructure
15Setting Perceptions and Justifying the Cost of Security477
Setting Perceptions and Expectations478
Setting User Perceptions and Expectations479
Setting Management Perceptions and Expectations485
Justifying the Cost of Security488
Risk Analysis488
Summary497
16Addressing Staffing and Training Issues499
Staffing Issues500
Increasing Staff Headcount500
Utilizing Contractors501
O
From the B&N Reads Blog

Customer Reviews