Fundamentals of Network Security Companion Guide (Cisco Networking Academy Program)
- By Cisco Systems, Inc., Cisco Networking Academy Program
- Published Jan 20, 2004 by Cisco Press. Part of the Companion Guide series.
Book
- Sorry, this book is no longer in print.
Features
- Convenient, portable desk reference that is available anytime, anywhere— The book complements the online course and can be used outside the classroom environment and when the online course is not available to the student.
-
Students can study and further the learning beyond the classroom and lab environment.
-
- Maps to online course— Print products will map to the current version of the online curriculum.
-
Provides the student and the instructor with an integrated textbook companion to strengthen classroom learning.
-
- CD-ROM— The book content as well as interactive media activities are included on a CD-ROM to complement the Companion Guide.
-
Additional learning aid, interactive in nature, to build upon the classroom and Web-based learning experience providing the student with additional hands-on electronic activities.
-
- Only Cisco-Approved Study Materials for the Networking Academy Course—Cisco Press is the only publisher endorsed and recommended by Cisco Systems.
-
This provides the instructor and the student with the confidence that the same individuals who developed the web-based curriculum have reviewed and recommended the text from Cisco Press.
-
- Cisco Systems meeting the demand of a security course— Security is a huge topic right now in the academic market and Cisco is prepared to meet the demand with a new course—Cisco Press is prepared with the correlating books.
-
The Fundamentals of Security course will have the same look and feel as the other Networking Academy courses. This will ease the learning curve of instructors adopting the course as well as make it easier for instructors to adopt the online curriculum.
-
- Chapter Objectives and Pedagogy— Each chapter begins with clearly defined objectives. Definitions, descriptions, examples and graphical presentations supports these objectives throughout the chapter.
-
Provides the instructor and the student with an outline of the chapter focus and pedagogy features throughout the chapter to aid in classroom student learning, retention and understanding.
-
- Chapter Structure Designed to Reinforce Concepts— Chapter summaries, review questions, and answers included within each chapter.
-
Designed to reinforce concepts and help the student evaluate their understanding before moving on to new material. Answers to review questions are found in the appendixes, along with a glossary of key terms used throughout the text.
-
- Copyright 2004
- Edition: 1st
- Book
- ISBN-10: 1-58713-122-6
- ISBN-13: 978-1-58713-122-6
The only authorized textbook for the Cisco Networking Academy Program
Cisco Networking Academy Program Fundamentals of Network Security Companion Guide, along with the Fundamentals of Network Security Lab Companion and Workbook and the corresponding online course, provide a thorough introduction to network security.
This portable desk reference focuses on the overall security processes based on a security policy with an emphasis in the areas of secure perimeter, secure connectivity, security management, identity services, and intrusion detection. Along with the Cisco Networking Academy Program online course, this Companion Guide covers the installation, configuration, monitoring, and maintenance using Cisco command-line interface (CLI) and web-based device managers on both the Cisco IOS Firewall and the PIX Security Appliance. It also covers how to
- Configure Network Address Translation, access lists, stateful traffic inspection, and application filtering
- Implement signature-based intrusion detection
- Configure identity management using authentication, authorization, and accounting
- Configure virtual private networks using industry-standard IPSec for both site-to-site and remote access connectivity
This Companion Guide also includes security appendixes that cover several installation tutorials for various hardware and software products.
This book and the course align with the new Cisco Firewall Specialist certification objectives. The Cisco Firewall Specialist encompasses the SECUR (formerly known as MCNS) and Cisco Secure PIX Firewall Advanced (CSPFA) exams. You can use this book and the course to begin certification preparation.
Companion CD-ROM
The CD-ROM contains 11 hi-res PhotoZoom Activities, 200+ exam- preparation questions in a practice Test Engine, more than 50 hands-on e-Lab Activities, 48 Demonstration Activities, plus 10 professional network security utilities, command references, and other resources for an enhanced learning experience.
This book is part of the Cisco Networking Academy Program Series from Cisco Press. The products in this series support and complement the Cisco Networking Academy Program.
Table of Contents
Introduction.
I. IOS ROUTER SECURITY.
1. Overview of Network Security.Rationale, Trends, and Goals of Network Security. Security Threats and Vulnerabilities. Security Framework and Policy. Security Products and Solutions. Summary. Key Terms. Check Your Understanding.
2. Basic Router and Switch Security.General Router and Switch Security. Disabling Unneeded Services. Securing the Perimeter Router. Router Management. Securing Switches and LAN Access. Summary. Key Terms. Check Your Understanding.
3. Router ACLs and CBAC.Access Control Lists. Types of IP ACLs. Content-Based Access Control. Summary. Key Terms. Check Your Understanding.
4. Router AAA Security.AAA Secures Network Access. Network Access Server (NAS) AAA Authentication Process. Cisco Secure ACS. AAA Servers Overview and Configuration. The Cisco IOS Firewall Authentication Proxy. Summary. Key Terms. Check Your Understanding.
5. Router Intrusion Detection, Monitoring, and ManagementIOS Firewall IDS. Setting up the Cisco IOS Firewall IDS. Monitoring with Logging and Syslog. SNMP. Managing the Router. Security Device Manager (SDM). Summary. Key Terms. Check Your Understanding.
6. Router Site-to-Site VPNsVirtual Private Networks. IOS Cryptosystem. Symmetric Encryption. IPSec. Site-to-Site IPSec VPN Using Preshared Keys. Digital Certificates. Configuring Site-to-Site IPSec VPN Using Digital Certificates. Summary. Key Terms. Check Your Understanding.
7 Router Remote Access VPNsRemote Access VPN. VPN Enterprise Management. Summary. Key Terms. Check Your Understanding.
II. PIX SECURITY APPLIANCE SECURITY.
8. PIX Security Appliance.Introduction to Firewalls. Cisco PIX Security Appliance. Getting Started with the PIX Security Appliance. Routing and Multicast Configuration. PIX Dynamic Host Control Configuration. Summary. Key Terms. Check Your Understanding.
9. PIX Security Appliance Translations and Connections.Transport Protocols. Network Address Translation. DNS Doctoring, Destination NAT, and DNS Record Translation on the PIX. Connections. Port Address Translation. Multiple Interfaces on a PIX Security Appliance. Summary. Key Terms. Check Your Understanding.
10. PIX Security Appliance ACLs.ACLs and the PIX Security Appliance. Using ACLs. Filtering. Object Grouping. Nested Object Groups. Summary. Key Terms. Check Your Understanding.
11. PIX Security Appliance AAAAAA. Authentication Configuration on the PIX. Authorization Configuration on the PIX Security Appliance. Accounting Configuration on the PIX Security Appliance. Defining Traffic to Utilize AAA Services. Monitoring the AAA Configuration. PPPoE and the PIX Security Appliance. Appendix 11-A: How to Add Users to CSACS-NT. Appendix 11-B: CSACS and Authorization. Appendix 11-C: CSACS and ACLs. Appendix 11-D: How to View Accounting Information in CSACS......... Summary. Key Terms. Check Your Understanding.
12. PIX Advanced Protocols and Intrusion.Detection. Advanced Protocol Handling. Multimedia Support and the PIX Security Appliance. Attack Guards. Intrusion Detection and the PIX Security Appliance. Shunning. PIX Security Appliance Syslog Logging. SNMP. Summary. Key Terms. Check Your Understanding.
13. PIX Failover and System Maintenance.Understanding PIX Security Appliance Failover. Serial Cable Failover Configuration. LAN-Based Failover Configuration. System Maintenance via Remote Access. Command Authorization. PIX Security Appliance Password Recovery. Upgrading the PIX Security Appliance Image and the Activation Key. Summary. Key Terms. Check Your Understanding.
14. PIX Security Appliance VPNs.PIX Security Appliance Enables a Secure VPN. Tasks to Configure VPN. Cisco VPN Client. Scaling PIX VPNs Using CAs. Summary. Key Terms. Check Your Understanding.
15. PIX Security Appliance Management.PIX Management Tools. Cisco PIX Device Manager. Enterprise PIX Management. Summary. Check Your Understanding.
III. APPENDIXES.
Appendix A. Glossary of Key Terms.Appendix B. Check Your Understanding Answer Key.
Appendix C. Physical Layer Security.
Appendix D. Operating System Security.
Index.