Managing Cisco Network Security

2nd Edition

Authors: Syngress
Paperback ISBN: 9781931836562
eBook ISBN: 9780080479057
Imprint: Syngress
Published Date: 29th May 2002
Page Count: 752
Tax/VAT will be calculated at check-out
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world "There's no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security Consulting Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.

Key Features

Security from a real-world perspective Key coverage of the new technologies offered by the Cisco including: 500 series of Cisco PIX Firewall, Cisco Intrusion Detection System, and the Cisco Secure Scanner Revised edition of a text popular with CCIP (Cisco Certified Internetwork Professional) students Expanded to include separate chapters on each of the security products offered by Cisco Systems

Table of Contents

Foreword Chapter 1 Introduction to IP Network Security Introduction What Role Does Security Play in a Network? Goals Philosophy What if I Don’t Deploy Security? The Fundamentals of Networking Where Does Security Fit in? Network Access Layer Security Internetwork Layer Security Host-to-Host Layer Security? Process Application Layer Security Authentication OSI Model How the OSI Model Works Composition of a Data Packet Security in TCP/IP Cisco IP Security Hardware and Software The Cisco Secure PIX Firewall Cisco Secure Integrated Software Cisco Secure Integrated VPN Software The Cisco Secure VPN Client Cisco Secure Access Control Server Cisco Secure Scanner Cisco Secure Intrusion Detection System Cisco Secure Policy Manager Cisco Secure Consulting Services Summary Solutions Fast Track Frequently Asked Questions Chapter 2 What are We Trying to Prevent? Introduction What Threats Face Your Network? Loss of Confidentiality Loss of Integrity Loss of Availability Sources of Threats Malicious Mobile Code Trojan Horses Viruses Worms Current Malicious Code Threats Current Malicious Code Impacts Denial of Service The Smurf Attack The SYN Flood Attack Distributed Denial of Service (DDoS) Attacks Detecting Breaches Initial Detection are Forensics Important? What are the Key Steps after a Breach is Detected? Preventing Attacks Reducing Vulnerabilities Providing a Simple Security Network Architecture Developing a Culture of Security Developing a Security P


No. of pages:
© Syngress 2002
eBook ISBN:
Paperback ISBN:

About the Author