|
The Complete Guide to Cisco SecurityInformation security has become an extremely important topic over the past few years. In today`s environment the number of touch points between an organization`s information assets and the outside world has drastically increased. Millions of customers interact via Web sites, employees and partners connect via Virtual Private Networks, applications are outsourced to Application Service Providers (ASPs) and wireless LANs are regularly deployed. A critical strategy for reducing security risks is to practice defenseindepth, and Cisco Systems has placed a high priority on security and offers a wide range of security products. Managing Cisco Network Security, Second Edition is important to anyone involved with Cisco networks, as it provides practical information on using a broad spectrum of Cisco`s security products.Learn the Key Steps to Take When a Breach Is DetectedReview the five steps of identification and classification, containment, eradication, recovery, and followup.Master the PIX Firewall Series of ProductsLearn about the Cisco PIX 535, Cisco PIX 525, Cisco PIX 515E, Cisco PIX, and Cisco PIX 501.Place Access ListsReview the options you have in applying access lists and achieving the same affect on traffic flowing through the router.Understand the Three Phases of Transparent RoutingReview the guidelines for deploying Network Address Translation (NAT).Understand the LocalDirector Security FeaturesSecure Geographically Dispersed Server Farms Using DistributedDirector.Find an Overview of the Different VPN TechnologiesUse a Cisco VPN Concentrator and IPSec to securely send information to and from both sides of the VPN.Cover Cisco Authentication, Authorization, and Accounting (AAA)Configure Cisco devices, including routers, access servers, firewalls, and VPN gateways to act as an AAA client.Configure the Features of the Content Services Switch (CSS)Review the security features of CSS, including health checks for each new flow, Access Control Lists, and NAT.Perform Dynamic Intrusion DetectionUse the Cisco Secure Network Intrusion Detection System to perform realtime intrusion detection.Look Ahead to Cisco Wireless SecurityReview the four steps of Wireless Equivalency Privacy (WEP) authorization.Register for Your 1 Year UpgradeThe Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more! Authors:Edgar Danielyan (CCNP Security, CCDP, CSE, SCNA)Robert "Woody" Weaver (CISSP)Larry Chaffin (CCNA, CCDA, CCNAWAN, CCDPWAN, CSS1, NNCDS, JNCIS)Eric Knipp (CCNP, CCDP, CCNA, CCDA, MCSE, MCP+I)Jamie Caesar (CCNP)Vitaly Osipov (CISSP, CCSA, CCSE)C. Tate Baumrucker (CISSP, CCNP, Sun Enterprise Engineer, MCSE)Brian Browne (CISSP)Sean Thurston (CCDP, CCNP, MCSE, MCP+I)
|