Securing and Controlling Cisco Routers

Front Cover
CRC Press, May 15, 2002 - Computers - 736 pages
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology.

At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Acknowledgments
Introduction
THE BASICS
Chapter 1 The Need for Security
Chapter 2 Understanding OSI and TCPIP
Chapter 3 Routed and Routing Protocols
Chapter 4 Understanding Router Basics
Chapter 5 Router Management
PREVENTING NETWORK DATA INTERCEPTION
Chapter 19 Using Encryption and IKE
Chapter 20 Configuring IPSec
PREVENTING DENIALOFSERVICE
Chapter 21 Configuring DenialofService Security Features
PREVENTING FRAUDLENT ROUTE UPDATES AND OTHER UNAUTHORIZED CHANGES
Chapter 22 Configuring Neighbor Authentication and Other Security Features
IP Addressing

PREVENTING UNAUTHORIZED ACCESS NETWORKING DEVICE
Chapter 6 Implementing NonAAA Authentication
Chapter 7 Implementing AAA Security Services
Chapter 8 Implementing AAA Authentication
Chapter 9 Implementing AAA Authorization
Chapter 10 Implementing AAA Accounting
Chapter 11 Configuring TACACS and Exended TACACS
Chapter 12 Configuring TACACS+
Chapter 13 Configuring RADIUS
Chapter 14 Configuring Kerberos
PREVENTING UNAUTHORIZED ACCESS NETWORKING
Chapter 15 Basic Traffic Filtering Part 1
Chapter 16 Basic Trafffic Filtering Part 2
Chapter 17 Advanced Traffic Filtering Part 1
Chapter 18 Advanced Traffic Filtering Part 2
Subnetting
IP Protocol Numbers
WellKnown Ports and Services
Hacker Cracker Malware and Trojan Horse Ports
ICMP Types and Codes
Determining Wildcard Mask Ranges
Logical Operations
Helpful Resources
Bibliography
Acronyms and Abbreviations
Glossary
About the Author
Back cover
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information