Managing Cisco Network Security
Par :Formats :
- Nombre de pages789
- PrésentationRelié
- Poids1.57 kg
- Dimensions19,7 cm × 24,0 cm × 5,3 cm
- ISBN1-57870-103-1
- EAN9781578701032
- Date de parution23/02/2001
- ÉditeurMacmillan Technical Publishing
Résumé
While the benefits of the information revolution are enormous, so too are the risks you take when offering products, services, and information to your customers, employees, and business partners via your network. Now more than ever, taking the proper steps to ensure the integrity of your network is critical for protecting your most valuable asset : your data. Even so, most corporate and government networks are vulnerable to attack. Managing Cisco Network Security teaches you how to install, configure, operate, manage, and verify Cisco network security products and Cisco IOS Software security features. Based on the content of the Internet Learning Solutions Group's MCNS instructor-led class, Managing Cisco Network Security focuses on implementing IP network security. Each chapter in the book presents a practical, task-based approach to implementing the security features discussed through a running case study of a hypothetical company that builds a network security architecture from the ground up. Divided into six parts, the book begins with an overview of network security threats and helps you identify the causes of network security problems. Part I also contains information that teaches you how to establish network security policies and secure the network infrastructure. Part II describes methods for securing remote dial-in access using CiscoSecure ACS and Cisco IOS Software AAA security features. Part III focuses on protecting Internet access by identifying the basic components of a perimeter security system and configuring perimeter routers and the Cisco Firewall Feature set. Part IV introduces you to the features and components of the PIXT Firewall, presenting details on how to configure essential PIX Firewall features. Part V examines Cisco Encryption Technology (CET), and shows you how to configure CET to ensure data privacy. In Part VI, you will learn how to implement a secure virtual private network (VPN) solution using IPSecurity features as well as how to use intrusion detection and network auditing tools. In addition to the running case study, Managing Cisco Network Security contains a wealth of configuration examples, command summaries, helpful tables and diagrams, and chapter-ending review questions, making this the most comprehensive guide to understanding the tools and protocols upon which your network security depends.
While the benefits of the information revolution are enormous, so too are the risks you take when offering products, services, and information to your customers, employees, and business partners via your network. Now more than ever, taking the proper steps to ensure the integrity of your network is critical for protecting your most valuable asset : your data. Even so, most corporate and government networks are vulnerable to attack. Managing Cisco Network Security teaches you how to install, configure, operate, manage, and verify Cisco network security products and Cisco IOS Software security features. Based on the content of the Internet Learning Solutions Group's MCNS instructor-led class, Managing Cisco Network Security focuses on implementing IP network security. Each chapter in the book presents a practical, task-based approach to implementing the security features discussed through a running case study of a hypothetical company that builds a network security architecture from the ground up. Divided into six parts, the book begins with an overview of network security threats and helps you identify the causes of network security problems. Part I also contains information that teaches you how to establish network security policies and secure the network infrastructure. Part II describes methods for securing remote dial-in access using CiscoSecure ACS and Cisco IOS Software AAA security features. Part III focuses on protecting Internet access by identifying the basic components of a perimeter security system and configuring perimeter routers and the Cisco Firewall Feature set. Part IV introduces you to the features and components of the PIXT Firewall, presenting details on how to configure essential PIX Firewall features. Part V examines Cisco Encryption Technology (CET), and shows you how to configure CET to ensure data privacy. In Part VI, you will learn how to implement a secure virtual private network (VPN) solution using IPSecurity features as well as how to use intrusion detection and network auditing tools. In addition to the running case study, Managing Cisco Network Security contains a wealth of configuration examples, command summaries, helpful tables and diagrams, and chapter-ending review questions, making this the most comprehensive guide to understanding the tools and protocols upon which your network security depends.