Register your product to gain access to bonus material or receive a coupon.
Protect your network with self-regulating network security solutions that combat both internal and external threats.
Self-Defending Networks: The Next Generation of Network Security helps networking professionals understand how to deploy an end-to-end, integrated network security solution. It presents a clear view of the various components that can be used throughout the network to not only monitor traffic but to allow the network itself to become more proactive in preventing and mitigating network attacks. This security primer provides unique insight into the entire range of Cisco security solutions, showing what each element is capable of doing and how all of the pieces work together to form an end-to-end Self-Defending Network. While other books tend to focus on individual security components, providing in-depth configuration guidelines for various devices and technologies, Self-Defending Networks instead presents a high-level overview of the entire range of technologies and techniques that comprise the latest thinking in proactive network security defenses. This book arms network security professionals with the latest information on the comprehensive suite of Cisco security tools and techniques. Network Admission Control, Network Infection Containment, Dynamic Attack Mitigation, DDoS Mitigation, Host Intrusion Prevention, and Integrated Security Management are all covered, providing the most complete overview of various security systems. It focuses on leveraging integrated management, rather than including a device-by-device manual to implement self-defending networks.
|
4 of 4 people found the following review helpful
By
This review is from: Self-Defending Networks: The Next Generation of Network Security (Paperback)
Remember when networks used to be a thick copper cable that you had to tap to add a workstation. Each year we get further and further from a dumb network to a very smart network and this book shows you what is possible.I liked the last line in the forward by Ullal, "the reality of securing information assets, applications, and networks." If you have worked in the field of security you know what a hard task that is. The book says it is designed for CSOs, network engineers and architects and I agree, it does a good job of showing what might be possible with modern technology. Let's take a look at some of the highlights of the book. Page 13 introduces the incident control service in partnership with Trend Micro. This is to help you identify a worm running in your net and minimize its ability to spread. This first reference is fully supported in chapter 4 where they go into depth on the technology. Page 25's Caution is appreciated! A self-defending... Read more
1 of 4 people found the following review helpful
By
This review is from: Self-Defending Networks: The Next Generation of Network Security (Paperback)
Cisco has been leading the industry in solutions to the security problems facing the Internet. They have built solutions such as routers and firewalls that are as advanced as any on the market from the security standpoint. Unfortunately that is not enough. The threats being faced today are changing so fast that Cisco has developed new products with the capability to provide some amount of automatic network protection in the event of an attack.These systems monitor the incoming data stream constantly looking for general classes of problems rather than specific viruses or other malware. In today's world the discovery of a virus is usually accomplished when a virus is spreading fast. Finding a virus at that time is too late, you could all of a sudden have several thousand infected machines in your network. This book describes the advanced technques and systems that have been developed by Cisco to stop such attacks before they are known. It is not a large book, but... Read more |
Download - 63.6 KB -- Index
Download - 30.4 KB -- Book Foreword
By Jayshree Ullal
Senior Vice President, Security, Switching and Datacenter Technologies
Cisco Systems
Foreword
Introduction
Chapter 1 Understanding Types of Network Attacks and Defenses
Categorizing Network Attacks
Virus
Worm
Trojan Horse
Denial-of-Service
Distributed Denial-of-Service
Spyware
Phishing
Understanding Traditional Network Defenses
Router Access Lists
Firewalls
Intrusion Detection Systems
Virtual Private Networks
Antivirus Programs
Introducing Cisco Self-Defending Networks
DDoS Mitigation
Intrusion Prevention Systems
Adaptive Security Appliance
Incident Control Service
Network Admission Control
IEEE 802.1x
Host Intrusion Prevention: CSA
Cisco Security Centralized Management
Summary
References
Chapter 2 Mitigating Distributed Denial-of-Service Attacks
Understanding Types of DDoS Attacks
DDoS Mitigation Overview
Using Cisco Traffic Anomaly Detector
Configuring the Traffic Anomaly Detector
Zone Creation
Traffic Anomaly Detector Zone Filters
Policy Template
Learning Phase
Detecting and Reporting Traffic Anomalies
Configuring Cisco Guard
Bootstrapping
Zone Creation and Synchronization
Cisco Guard Zone Filters
Zone Traffic Diversion
Learning Phase
Activating Zone Protection
Generating Attack Reports
Summary
References
Chapter 3 Cisco Adaptive Security Appliance Overview
Antispoofing
Intrusion Prevention Service
Launch ASDM for IPS Configuration
Configure Service Policy Rules
Define IPS Signatures
Protocol Inspection Services
HTTP Inspection Engine
TCP Map
HTTP Map
Configuring Content Security and Control Security
Content Security and Control Services Module (CSC-SSM) Setup
Web
URL Blocking
URL Filtering
Scanning
File Blocking
Scanning
Antispam
Content Filtering
File Transfer
Summary
References
Chapter 4 Cisco Incident Control Service
Implementing Outbreak Management with Cisco ICS
Outbreak Management Summary
Information and Statistics on Network Threats from Trend Micro
New Outbreak Management Task
Outbreak Settings
Displaying Outbreak Reports
OPACL Settings
Exception List
Report Settings
Watch List Settings
Automatic Outbreak Management Task
Displaying Devices
Device List
Add Device
Viewing Logs
Incident Log Query
Event Log Query
Outbreak Log Query
Log Maintenance
Summary
References
Chapter 5 Demystifying 802.1x
Fundamentals of 802.1x
Introducing Cisco Identity-Based Networking Services
Machine Authentication
802.1x and NAC
Using EAP Types
EAP MD5
EAP TLS
LEAP
PEAP
EAP FAST
VPN and 802.1x
Summary
References
Chapter 6 Implementing Network Admission Control
Network Admission Control Overview
NAC Framework Benefits
NAC Framework Components
Endpoint Security Application
Posture Agent
Network Access Devices
Policy Server
Management and Reporting Tools
Operational Overview
Network Admission for NAC-enabled Endpoints
Endpoint Attempts to Access the Network
NAD Notifies Policy Server
Cisco Secure ACS Compares Endpoint to NAC Policy
Cisco Secure ACS Forwards Information to Partner Policy Servers
Cisco Secure ACS Makes a Decision
Cisco Secure ACS Sends Enforcement Actions
NAD Enforces Actions
Posture Agent Actions
Endpoint Polled for Change of Compliance
Revalidation Process
Network Admission for NAC Agentless Hosts
Deployment Models
LAN Access Compliance
WAN Access Compliance
Remote Access Compliance
Summary
References
Chapter 7 Network Admission Control Appliance
NAC Appliance Features
NAC Appliance Manager
Device Management
CCA Servers
Filters
Clean Access
Switch Management
User Management
Monitoring
Administration
Summary
References
Chapter 8 Managing the Cisco Security Agent
Management Center for Cisco Security Agents
Deploying Cisco Secure Agent Kits
Displaying the End-Station Hostname in the Device Groups
Reviewing Policies
Attaching Rules to a Policy
Generating and Deploying Rules
Using Event Monitor
Running Cisco Security Agent Analysis
Cisco Security Agent
Status
System Security
Summary
References
Chapter 9 Cisco Security Manager
Getting Started
Device View
Add Device
Configure Access Conrol Lists (ACLs) from Device View
Configuring Interface Roles
Apply Access Control List (ACL) Rules to Multiple Devices
Invoking the Policy Query
Using Analysis and Hit Count Functions
Map View
Showing Devices on the Topology Map
Adding Cloud Networks and Hosts to the Topology Map
Configuring Firewall Access Control List (ACLs) Rules from Topology Map
Policy View
Access Control List (ACL) Rules Security Policy
Policy Inheritance and Mandatory Security Policies
IPS Management
Object Manager
Value Override Per Device
Summary
References
Chapter 10 Cisco Security Monitoring, Analysis, and Response System
Understanding Cisco Security MARS Features
Summary Dashboard
Incidents
Displaying Path of Incident and Mitigating the Attack
Hotspot Graph and Attack Diagram
Rules
Query/Reports
Management
Admin
Cisco Security Manager Linkages
Summary
References
1587052539, TOC, 8/14/2006
Download - 145 KB -- Chapter 6: Implementing Network Admission Control

This book includes free shipping!
This book includes free shipping!
eBook (Watermarked)
$36.00
$28.80
This PDF will be accessible from your Account page after purchase and requires the free Adobe® Reader® software to read it.
The eBook requires no passwords or activation to read. We customize your eBook by discretely watermarking it with your name, making it uniquely yours.
Get access to thousands of books and training videos about technology, professional development and digital media from more than 40 leading publishers, including Addison-Wesley, Prentice Hall, Cisco Press, IBM Press, O'Reilly Media, Wrox, Apress, and many more. If you continue your subscription after your 30-day trial, you can receive 30% off a monthly subscription to the Safari Library for up to 12 months. That's a total savings of $199.