Cisco security architectures
著者
書誌事項
Cisco security architectures
(Cisco technical expert)
McGraw-Hill, 1999
大学図書館所蔵 件 / 全1件
-
該当する所蔵館はありません
- すべての絞り込み条件を解除する
内容説明・目次
内容説明
A Cisco troubleshooting methodology. It includes coverage of: how to create, operate and use Cisco Access lists; how to secure a network when access occurs via a Cisco Router; and the TCP/IP Protocol and its use with Cisco routers. There are a number of security discussions too, and these include: public network and private network security threats and how to prevent them; how firewalls and proxy servers can be used as a first line of defence; how to configure Cisco Routers to accept only specific recognized incoming packets; using the Cisco PIX Firewall and the Centri firewall; and how to use the special security features built into Cisco routers.
目次
- Part 1 Introduction: the need for security
- public network threats
- private network threats
- the role of routers
- security and access lists
- what's possible
- what's not possible
- other security devices
- firewalls
- proxy servers
- authentication servers
- where the access list fits. Part 2 The TCP/IP protocol suite: the OSI reference model
- functions
- rationale
- the TCP/IP protocol suite
- overview
- applications
- transport layer
- network layer
- multiplexing of applications
- port addresses versus IP addresses. Part 3 The Internet protocol: header format
- IP addressing
- class versus classless addressing
- sub-net masking. Part 4 TCP and UDP: header formats
- port review. Part 5 NetWare overview: IPX
- SPX addressing. Part 6 Router hardware and software overview: basic hardware components
- ROM
- RAM
- I/O
- media converters
- WAN versus LAN connectivity
- the configuration register
- basic software components
- operating system
- configuration data
- data flow
- router operational models
- user
- privileged
- configuration
- EXEC commands
- functions
- examples. Part 7 Working with access lists: access list formats
- IP
- Novell
- DecNet
- Appletalk
- access list construction
- data input
- data modification
- examples. Part 8 The PIX Firewall: overview
- features and functions
- configuration commands
- examples. Part 9 the Centri Firewall.
「Nielsen BookData」 より