Managing Cisco Network Security

Front Cover
Elsevier, May 29, 2002 - Computers - 752 pages
An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world
"There's no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security Consulting
Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.


Security from a real-world perspective
Key coverage of the new technologies offered by the Cisco including: 500 series of Cisco PIX Firewall, Cisco Intrusion Detection System, and the Cisco Secure Scanner
Revised edition of a text popular with CCIP (Cisco Certified Internetwork Professional) students
Expanded to include separate chapters on each of the security products offered by Cisco Systems
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Chapter 2 What Are We Trying to Prevent?
61
Chapter 3 Cisco PIX Firewall
97
Chapter 4 Traffic Filtering in the Cisco Internetwork Operating System
163
Chapter 5 Network Address TranslationPort Address Translation
233
Chapter 6 Cryptography
273
Chapter 7 Cisco LocalDirector and DistributedDirector
313
Chapter 8 Virtual Private Networks and Remote Access
335
Chapter 9 Cisco Authentication Authorization and Accounting Mechanisms
379
Chapter 11 Cisco Secure Scanner
479
Chapter 12 Cisco Secure Policy Manager
513
Chapter 13 Intrusion Detection
541
Chapter 14 Network Security Management
593
Cisco Wireless Security
649
Index
721
Related Titles
752
Copyright

Chapter 10 Cisco Content Services Switch
455

Common terms and phrases

Popular passages

Page v - Miller, Jane Mackay, and Marie Skelly at Jackie Gross & Associates for all their help and enthusiasm representing our product in Canada. Lois Fraser, Connie McMenemy, Shannon Russell, and the rest of the great folks at Jaguar Book Group for their help with distribution of Syngress books in Canada.
Page i - — c solutionsasyngress. com With more than 1,500,000 copies of our MCSE, MCSD, CompTIA, and Cisco study guides in print, we continue to look for ways we can better serve the information needs of our readers. One way we do that is by listening. Readers like yourself have been telling us they want an Internet-based service that would extend and enhance the value of our books. Based on reader feedback and our own strategic plan, we have created a Web site that we hope will exceed your expectations....
Page 41 - Version IHL Type of Service Total Length Identification Flags Fragment Offset Time to Live Protocol Header Checksum Source Address Destination Address Options + Padding • Destination address (32 bits).
Page v - Publishers for the enthusiasm with which they receive our books. Kwon Sung June at Acorn Publishing for his support. Ethan Atkin at Cranbury International for his help in expanding the Syngress program. Jackie Gross, Gayle Voycey, Alexia Penny, Anik Robitaille, Craig Siddall, Darlene Morrow...

About the author (2002)

Knipp is a Consultant with Callisma. He is currently engaged in a broadband optimization project for a major US backbone service provider. He specializes in IP telephony and convergence, Cisco routers, LAN switches, as well as Microsoft NT, and network design and implementation.

Bibliographic information