Cisco security architectures

Author(s)

Bibliographic Information

Cisco security architectures

Gilbert Held, Kent Hundley

(Cisco technical expert)

McGraw-Hill, 1999

Available at  / 1 libraries

Search this Book/Journal

Description and Table of Contents

Description

A Cisco troubleshooting methodology. It includes coverage of: how to create, operate and use Cisco Access lists; how to secure a network when access occurs via a Cisco Router; and the TCP/IP Protocol and its use with Cisco routers. There are a number of security discussions too, and these include: public network and private network security threats and how to prevent them; how firewalls and proxy servers can be used as a first line of defence; how to configure Cisco Routers to accept only specific recognized incoming packets; using the Cisco PIX Firewall and the Centri firewall; and how to use the special security features built into Cisco routers.

Table of Contents

  • Part 1 Introduction: the need for security
  • public network threats
  • private network threats
  • the role of routers
  • security and access lists
  • what's possible
  • what's not possible
  • other security devices
  • firewalls
  • proxy servers
  • authentication servers
  • where the access list fits. Part 2 The TCP/IP protocol suite: the OSI reference model
  • functions
  • rationale
  • the TCP/IP protocol suite
  • overview
  • applications
  • transport layer
  • network layer
  • multiplexing of applications
  • port addresses versus IP addresses. Part 3 The Internet protocol: header format
  • IP addressing
  • class versus classless addressing
  • sub-net masking. Part 4 TCP and UDP: header formats
  • port review. Part 5 NetWare overview: IPX
  • SPX addressing. Part 6 Router hardware and software overview: basic hardware components
  • ROM
  • RAM
  • I/O
  • media converters
  • WAN versus LAN connectivity
  • the configuration register
  • basic software components
  • operating system
  • configuration data
  • data flow
  • router operational models
  • user
  • privileged
  • configuration
  • EXEC commands
  • functions
  • examples. Part 7 Working with access lists: access list formats
  • IP
  • Novell
  • DecNet
  • Appletalk
  • access list construction
  • data input
  • data modification
  • examples. Part 8 The PIX Firewall: overview
  • features and functions
  • configuration commands
  • examples. Part 9 the Centri Firewall.

by "Nielsen BookData"

Related Books: 1-1 of 1

Details

Page Top