Đang chuẩn bị liên kết để tải về tài liệu:
Cisco Network Security Little Black Book (Paraglyph Press)
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
This book may not be duplicated in any way without the express written consent of the publisher, except in the form of brief excerpts or quotations for the purposes of review. The information contained herein is for the personal use of the reader and may not be incorporated in any commercial programs, other books, databases, or any kind of software without written consent of the publisher. Making copies of this book or any portion for any purpose other than your own is a violation of United States copyright laws | Security Little Black Book I PABAGLYrJ oe Harrn Cisco Network Cisco Network Security Little Black Book Table of Contents Cisco Network Security Little Black Book.1 Introduction.4 Is this Book for You .4 How to Use this Book.4 The Little Black Book Philosophy.6 Chapter 1 Securing the Infrastructure.7 In Brief.7 Enterprise Security Problems.7 Types of Threats.8 Enterprise Security Challenges.8 Enterprise Security Policy.9 Securing the Enterprise.10 Immediate Solutions.14 Configuring Console Security.14 Configuring Telnet Security.16 Configuring Enable Mode Security.17 Disabling Password Recovery.18 Configuring Privilege Levels for Users.20 Configuring Password Encryption.21 Configuring Banner Messages.22 Configuring SNMP Security.24 Configuring RIP Authentication.25 Configuring EIGRP Authentication.27 Configuring OSPF Authentication.31 Configuring Route Filters.35 Suppressing Route Advertisements.40 Chapter 2 AAA Security Technologies.43 In Brief.43 Access Control Security.43 AAA Protocols.48 Cisco Secure Access Control Server.53 Immediate Solutions.56 Configuring TACACS Globally.56 Configuring TACACS Individually.58 Configuring RADIUS Globally.61 Configuring RADIUS Individually.62 Configuring Authentication.64 Configuring Authorization.72 Configuring Accounting.75 Installing and Configuring Cisco Secure NT.78 Chapter 3 Perimeter Router Security.85 In Brief.85 Defining Networks.85 Cisco Express Forwarding.86 Unicast Reverse Path Forwarding.87 TCP Intercept .87 i Table of Contents Chapter 3 Perimeter Router Security Network Address Translation.89 Committed Access Rate.90 Logging.92 Immediate Solutions.93 Configuring Cisco Express Forwarding.93 Configuring Unicast Reverse Path Forwarding.95 Configuring TCP Intercept.98 Configuring Network Address Translation NAT .103 Configuring Committed Access Rate CAR .116 Configuring Logging.119 Chapter 4 IOS Firewall Feature Set.123 In Brief.123 Context-Based Access Control.123 Port Application Mapping.127 IOS Firewall Intrusion .