Résumé
notation Securing and Controlling Cisco Routers
demonstrates proven techniques for strengthening network
security. The book begins with an introduction to Cisco
technology and the TCP/IP protocol suite. Subsequent
chapters cover subjects such as routing, routing protocols,
IP addressing, and Cisco Authentication, Authorization, and
Accounting services (AAA). The text then addresses
standard, extended, time-based, dynamic, and reflexive
access lists, as well as context-based control and Cisco
Encryption Technology.
At the end of most chapters, readers will find the unique
opportunity to practice what they have learned. Readers
will be able to log on to a real router, practice commands,
and gather information as shown in the chapter.
To further round out this understanding of routers,
Securing and Controlling Cisco Routers reviews Trojan Ports
and Services and provides additional resources such as Web
sites, mailing lists, bibliographies, glossaries, acronyms,
and abbreviations.
- 1 The Need for Security
- 2 Understanding OSI and TCP/IP
- 3 Routed and Routing Protocols
- 4 Understanding Router Basics
- 5 Router Management
- 6 Implementing Non-AAA Authentication
- 7 Implementing AAA Security Services
- 8 Implementing AAA Authentication
- 9 Implementing AAA Authorization
- 10 Implementing AAA Accounting
- 11 Configuring TACACS and Extended TACACS
- 12 Configuring TACACS+
- 13 Configuring RADIUS
- 14 Configuring Kerberos
- 15 Basic Traffic Filtering, Part 1
- 16 Basic Traffic Filtering, Part 2
- 17 Advanced Traffic Filtering, Part 1
- 18 Advanced Traffic Filtering, Part 2
- 19 Using Encryption and IKE
- 20 Configuring IPSec
- 21 Configuring Denial-of-Service Security Features
- 22 Configuring Neighbor Authentication and Other Security Features
- App. A IP Addressing
- App. B Subnetting
- App. C IP Protocol Numbers
- App. D Well-Known Ports and Services
- App. E Hacker, Cracker, Malware, and Trojan Horse Ports
- App. F ICMP Types and Codes
- App. G Determining Wildcard Mask Ranges
- App. H Logical Operations
- App. I: Helpful Resources
- App. J: Bibliography
- App. K: Acronyms and Abbreviations
- App. L: Glossary
- About the Author
L'auteur - Peter T. Davis
is principal of Peter Davis & Associates, a training and consulting firm specializing in the security, auditing and control of information systems. He holds numerous certifications including Certified Information Systems Security Professional (CISSP), Certified Novell Administrator 0.11 (CNA). and Certified Management Consultant (CMC). Peter is an internationally known speaker on quality, security, auditing and control, frequently speaking at user and professional conferences and meetings. He is the author or coauthor of five other books, including Sams Teach Yourself NetWare® in 14 Days.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Auerbach |
Auteur(s) | Peter T. Davis |
Parution | 29/11/2002 |
Nb. de pages | 700 |
Format | 18 x 25,5 |
Couverture | Broché |
Poids | 1270g |
Intérieur | Noir et Blanc |
EAN13 | 9780849312908 |
ISBN13 | 978-0-8493-1290-8 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse