Cisco Network Security

Скачать в pdf «Cisco Network Security»



Cisco Network Security Little Black Book


Cisco Network Security Little Black Book…………………………………………………………………………..1


Introduction………………………………………………………………………………………………………………………4


Is this Book for You?………………………………………………………………………………………………….4


How to Use this Book………………………………………………………………………………………………..4


The Little Black Book Philosophy…………………………………………………………………………………6


Chapter 1: Securing the Infrastructure………………………………………………………………………………..7


In Brief…………………………………………………………………………………………………………………….7


Enterprise Security Problems………………………………………………………………………………..7


Types of Threats………………………………………………………………………………………………….8


Enterprise Security Challenges……………………………………………………………………………..8


Enterprise Security Policy……………………………………………………………………………………..9


Securing the Enterprise………………………………………………………………………………………10


Immediate Solutions………………………………………………………………………………………………..14


Configuring Console Security……………………………………………………………………………….14


Configuring Telnet Security………………………………………………………………………………….16


Configuring Enable Mode Security………………………………………………………………………..17


Disabling Password Recovery……………………………………………………………………………..18


Configuring Privilege Levels for Users…………………………………………………………………..20


Configuring Password Encryption…………………………………………………………………………21


Configuring Banner Messages…………………………………………………………………………….22


Configuring SNMP Security…………………………………………………………………………………24


Configuring RIP Authentication…………………………………………………………………………….25


Configuring EIGRP Authentication………………………………………………………………………..27


Configuring OSPF Authentication…………………………………………………………………………31


Configuring Route Filters…………………………………………………………………………………….35


Suppressing Route Advertisements……………………………………………………………………..40


Chapter 2: AAA Security Technologies…………………………………………………………………………….43


In Brief…………………………………………………………………………………………………………………..43


Access Control Security………………………………………………………………………………………43


AAA Protocols……………………………………………………………………………………………………48


Cisco Secure Access Control Server…………………………………………………………………….53


Immediate Solutions………………………………………………………………………………………………..56


Configuring TACACS+ Globally……………………………………………………………………………56


Configuring TACACS+ Individually……………………………………………………………………….58


Configuring RADIUS Globally………………………………………………………………………………61


Configuring RADIUS Individually………………………………………………………………………….62


Configuring Authentication…………………………………………………………………………………..64


Configuring Authorization…………………………………………………………………………………….72


Configuring Accounting……………………………………………………………………………………….75


Installing and Configuring Cisco Secure NT…………………………………………………………..78


Chapter 3: Perimeter Router Security………………………………………………………………………………..85


In Brief……………………………………………………………………………………………………………………85


Defining Networks………………………………………………………………………………………………85


Cisco Express Forwarding…………………………………………………………………………………..86


Unicast Reverse Path Forwarding………………………………………………………………………..87


TCP Intercept……………………………………………………………………………………………………87


Chapter 3: Perimeter Router Security


Network Address Translation………………………………………………………………………………89


Committed Access Rate……………………………………………………………………………………..90


Logging…………………………………………………………………………………………………………….92


Immediate Solutions………………………………………………………………………………………………..93


Configuring Cisco Express Forwarding………………………………………………………………….93


Configuring Unicast Reverse Path Forwarding……………………………………………………….95


Configuring TCP Intercept…………………………………………………………………………………..98


Configuring Network Address Translation (NAT)…………………………………………………..103


Configuring Committed Access Rate (CAR)…………………………………………………………116

Скачать в pdf «Cisco Network Security»