Hardening Cisco Routers

Author: Thomas Akin
Publisher: "O'Reilly Media, Inc."
ISBN: 0596551908
Release Date: 2002-02-21
Genre: Computers

As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors. Included are the following topics: The importance of router security and where routers fit into an overall security plan Different router configurations for various versions of Cisco?s IOS Standard ways to access a Cisco router and the security implications of each Password and privilege levels in Cisco routers Authentication, Authorization, and Accounting (AAA) control Router warning banner use (as recommended by the FBI) Unnecessary protocols and services commonly run on Cisco routers SNMP security Anti-spoofing Protocol security for RIP, OSPF, EIGRP, NTP, and BGP Logging violations Incident response Physical security Written by Thomas Akin, an experienced Certified Information Systems Security Professional (CISSP) and Certified Cisco Academic Instructor (CCAI), the book is well organized, emphasizing practicality and a hands-on approach. At the end of each chapter, Akin includes a Checklist that summarizes the hardening techniques discussed in the chapter. The Checklists help you double-check the configurations you have been instructed to make, and serve as quick references for future security procedures.Concise and to the point, Hardening Cisco Routers supplies you with all the tools necessary to turn a potential vulnerability into a strength. In an area that is otherwise poorly documented, this is the one book that will help you make your Cisco routers rock solid.

Hardening Cisco Routers and Switches

Author: Steven Dangerfield
Publisher: Prentice Hall
ISBN: 0131118307
Release Date: 2002
Genre: Computers

The best security systems are designed in layers (perimeter security, application security, network device/hardware security etc.) This book was designed to cover the security of network infrastructure devices--namely, routers, and switches.

Network Defense Securing and Troubleshooting Network Operating Systems

Author: EC-Council
Publisher: Cengage Learning
ISBN: 9781133007753
Release Date: 2010-04-14
Genre: Computers

The Network Defense Series from EC-Council | Press is comprised of 5 books designed to educate learners from a vendor-neutral standpoint how to defend the networks they manage. This series covers the fundamental skills in evaluating internal and external threats to network security and design, how to enforce network level security policies, and how to ultimately protect an organization's information. The books in the series cover a broad range of topics from secure network fundamentals, protocols & analysis, standards and policy, hardening infrastructure, to configuring IPS, IDS, firewalls, bastion host and honeypots. Learners completing this series will have a full understanding of defensive measures taken to secure their organization's information, and along with the proper experience these books will prepare readers for the EC-Council Network Security Administrator (E|NSA) certification. Un-patched software on network operating systems and hardware can be a common point of attack for an intruder. Vulnerability analysis will often identify outdated software and exploitation is soon to follow. This book, the fourth in the series, prepares the practitioner to create and administer effective policies and best practices in patch management, OS configuration and analysis to identify potential Network Security Weaknesses. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

Cisco CallManager Best Practices

Author: Salvatore Collora
Publisher: Cisco Press
ISBN: 9780133481150
Release Date: 2013-05-15
Genre: Computers

Delivers the proven solutions that make a difference in your Cisco IP Telephony deployment Learn dial plan best practices that help you configure features such as intercom, group speed dials, music on hold, extension mobility, and more Understand how to manage and monitor your system proactively for maximum uptime Use dial plan components to reduce your exposure to toll fraud Take advantage of call detail records for call tracing and accounting, as well as troubleshooting Utilize the many Cisco IP Telephony features to enable branch site deployments Discover the best ways to install, upgrade, patch, and back up CallManager Learn how backing up to remote media provides both configuration recovery and failure survivability IP telephony represents the future of telecommunications: a converged data and voice infrastructure boasting greater flexibility and more cost-effective scalability than traditional telephony. Having access to proven best practices, developed in the field by Cisco® IP Telephony experts, helps you ensure a solid, successful deployment. Cisco CallManager Best Practices offers best practice solutions for CallManager and related IP telephony components such as IP phones, gateways, and applications. Written in short, to-the-point sections, this book lets you explore the tips, tricks, and lessons learned that will help you plan, install, configure, back up, restore, upgrade, patch, and secure Cisco CallManager, the core call processing component in a Cisco IP Telephony deployment. You’ll also discover the best ways to use services and parameters, directory integration, call detail records, management and monitoring applications, and more. Customers inspired this book by asking the same questions time after time: How do I configure intercom? What’s the best way to use partitions and calling search spaces? How do I deploy CallManager regionally on my WAN? What do all those services really do? How do I know how many calls are active? How do I integrate CallManager with Active Directory? Years of expert experiences condensed for you in this book enable you to run a top-notch system while enhancing the performance and functionality of your IP telephony deployment.

Cisco IOS in a Nutshell

Author: James Boney
Publisher: "O'Reilly Media, Inc."
ISBN: 0596553110
Release Date: 2005-08-22
Genre: Computers

Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offices to equipment costing well over $100,000 and capable of routing at gigabit speeds. A fixture in today's networks, Cisco claims roughly 70% of the router market, producing high-end switches, hubs, and other network hardware. One unifying thread runs through the product line: virtually all of Cisco's products run the Internetwork Operating System, or IOS. If you work with Cisco routers, it's likely that you deal with Cisco's IOS software--an extremely powerful and complex operating system, with an equally complex configuration language. With a cryptic command-line interface and thousands of commands--some of which mean different things in different situations--it doesn't have a reputation for being user-friendly. Fortunately, there's help. This second edition of Cisco IOS in a Nutshell consolidates the most important commands and features of IOS into a single, well-organized volume that you'll find refreshingly user-friendly. This handy, two-part reference covers IOS configuration for the TCP/IP protocol family. The first section includes chapters on the user interface, configuring lines and interfaces, access lists, routing protocols, and dial-on-demand routing and security. A brief, example-filled tutorial shows you how to accomplish common tasks. The second part is a classic O'Reilly quick reference to all the commands for working with TCP/IP and the lower-level protocols on which it relies. Brief descriptions and lists of options help you zero in on the commands you for the task at hand. Updated to cover Cisco IOS Software Major Release 12.3, this second edition includes lots of examples of the most common configuration steps for the routers themselves. It's a timely guide that any network administrator will come to rely on.

Implementing Cisco IP Routing ROUTE Foundation Learning Guide

Author: Diane Teare
Publisher: Cisco Press
ISBN: 9780133965865
Release Date: 2014-12-29
Genre: Computers

Now updated for Cisco’s new ROUTE 300-101 exam, Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide is your Cisco® authorized learning tool for CCNP® or CCDP® preparation. Part of the Cisco Press Foundation Learning Series, it teaches you how to plan, configure, maintain, and scale a modern routed network. Focusing on Cisco routers connected in LANs and WANs at medium-to-large network sites, the authors show how to select and implement Cisco IOS services for building scalable, routed networks. They examine basic network and routing protocol principles in detail; introduce both IPv4 and IPv6; fully review EIGRP, OSPF, and BGP; explore enterprise Internet connectivity; cover routing updates and path control; and present today’s router security best practices. Each chapter opens with a list of topics that clearly identifies its focus. Each chapter ends with a summary of key concepts for quick study, as well as review questions to assess and reinforce your understanding. Throughout, configuration and verification output examples illustrate critical issues in network operation and troubleshooting. This guide is ideal for all certification candidates who want to master all the topics covered on the ROUTE 300-101 exam. Serves as the official book for the newest version of the Cisco Networking Academy CCNP ROUTE course Includes all the content from the newest [email protected] ROUTE course and information on each of the ROUTE exam topics Compares basic routing protocol features and limitations Examines RIPv2 and RIPng Covers EIGRP operation and implementation for both IPv4 and IPv6 Explores OSPFv2 implementation, and OSPFv3 for both IPv4 and IPv6 Discusses network performance optimization via routing updates Introduces path control with Cisco Express Forwarding (CEF) switching, policy-based routing (PBR), and service level agreements (SLAs) Addresses enterprise Internet connectivity via single or redundant ISP connections Explains BGP terminology, concepts, operation, configuration, verification, and troubleshooting Covers securing the management plane of Cisco routers using authentication and other recommended practices Presents self-assessment review questions, chapter objectives, and summaries to facilitate effective studying

Information Security Management Handbook Sixth Edition

Author: Harold F. Tipton
Publisher: CRC Press
ISBN: 9780849374951
Release Date: 2007-05-14
Genre: Business & Economics

Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the CISSP Common Body of Knowledge domains and has been updated yearly. Each annual update, the latest is Volume 6, reflects the changes to the CBK in response to new laws and evolving technology.

Building DMZs For Enterprise Networks

Author: Syngress
Publisher: Elsevier
ISBN: 0080476260
Release Date: 2003-08-04
Genre: Computers

This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system that is offering services to the Internet creates the opportunity to leapfrog to other hosts in the soft interior of your network. In this scenario your internal network is fair game for any attacker who manages to penetrate your so-called hard perimeter. - There are currently no books written specifically on DMZs - This book will be unique in that it will be the only book that teaches readers how to build a DMZ using all of these products: ISA Server, Check Point NG, Cisco Routers, Sun Servers, and Nokia Security Appliances. - Dr. Thomas W. Shinder is the author of the best-selling book on Microsoft's ISA, Configuring ISA Server 2000. Customers of the first book will certainly buy this book.

Hardening Network Security

Author: John Mallery
Publisher: McGraw Hill Professional
ISBN: 0072257032
Release Date: 2005
Genre: Computers

Provides insights on maintaining security of computer networks, covering such topics as identity management systems, Web services, mobile devices, data encryption, and security patching.

DNS und BIND

Author: Paul Albitz
Publisher: O'Reilly Germany
ISBN: 3897212900
Release Date: 2002
Genre: BIND server


Deploying Cisco Wide Area Application Services

Author: Zach Seils
Publisher: Cisco Press
ISBN: 9781587054945
Release Date: 2008-01-01
Genre: Computers

A comprehensive guide to designing and deploying Cisco WAN services for scalable, transparent application acceleration and WAN optimization.

Network Security 1 and 2 Companion Guide

Author: Antoon W. Rufi
Publisher: Cisco Systems
ISBN: PSU:000059068884
Release Date: 2006-10
Genre: Computers

The completely revised, updated and only authorized textbook for the Cisco Networking Academy Program Network Security 1 and 2 course.

Handbook of Digital and Multimedia Forensic Evidence

Author: John J. Barbara
Publisher: Springer Science & Business Media
ISBN: 9781597455770
Release Date: 2007-12-28
Genre: Social Science

This volume presents an overview of computer forensics perfect for beginners. A distinguished group of specialist authors have crafted chapters rich with detail yet accessible for readers who are not experts in the field. Tying together topics as diverse as applicable laws on search and seizure, investigating cybercrime, and preparation for courtroom testimony, Handbook of Digital and Multimedia Evidence is an ideal overall reference for this multi-faceted discipline.