logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Securing and Controlling Cisco Routers

Securing and Controlling Cisco Routers (Paperback)

Peter T. Davis (지은이)
Auerbach Pub
283,180원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
232,200원 -18% 0원
11,610원
220,590원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Securing and Controlling Cisco Routers
eBook 미리보기

책 정보

· 제목 : Securing and Controlling Cisco Routers (Paperback) 
· 분류 : 외국도서 > 컴퓨터 > 하드웨어 > 네트워크 하드웨어
· ISBN : 9780849312908
· 쪽수 : 736쪽
· 출판일 : 2002-05-15

목차

THE BASICS The Need for Security The New Reality Designing the Security Infrastructure Identifying Security Risks and Threats Practice Session Security and Audit Checklist Conclusion Understanding OSI and TCP/IP The OSI Model TCP/IP Overview Practice Session Security and Audit Checklist Conclusion Routed and Routing Protocols Routing Activities Routable Protocols Routing Protocols Routing Protocol Basics Practice Session Security and Audit Checklist Conclusion Understanding Router Basics Router Overview Router Modes Router Components Router Status Practice Session Security and Audit Checklist Conclusion Router Management Router Setup Updating the IOS Troubleshooting Logging Recording Access List Violations Log Processing Simple Network Management Protocol (SNMP) Cisco Discovery Protocol Last Word on Management Practice Session Security and Audit Checklist ConclusionPREVENTING UNAUTHORIZED ACCESS: NETWORKING DEVICE Implementing Non-AAA Authentication Authentication Using Router Passwords Configuring Line Password Protection Setting TACACS Passwords for Privileged EXEC Mode Establishing Username Authentication Enabling CHAP or PAP Authentication Configuring TACACS and Extended TACACS Password Protection General Interactive Access Warning Banners and Router Identification Practice Session Security and Audit Checklist Conclusion Implementing AAA Security Services Accessing the Network Defining AAA Selecting Security Servers Practice Session Security and Audit Checklist Conclusion Implementing AAA Authentication Using Method Lists AAA Authentication Methods Configuring Login Authentication Configuring PPP Authentication Configuring ARA Authentication Configuring NASI Authentication Specifying the Amount of Time for Login Input Enabling Password Protection at the Privileged Level Changing the Text Displayed at the Password Prompt Configuring Message Banners for AAA Authentication Practice Session Security and Audit Checklist Conclusion Implementing AAA Authorization Starting with AAA Authorization Understanding AAA Authorization Disabling Authorization for Global Configuration Commands Authorization for Reverse Telnet Authorization Attribute-Value Pairs Practice Session Security and Audit Checklist Conclusion Implementing AAA Accounting Starting with Accounting Configuring Accounting Understanding AAA Accounting Types Applying a Named List Suppress Generation of Accounting Records for Null Username Sessions Generating Interim Accounting Records Monitoring Accounting Practice Session Security and Audit Checklist Conclusion Configuring TACACS and Extended TACACS Breaking Down the Protocols Understanding the TACACS Protocols Configuring TACACS and Extended TACACS Setting TACACS Password Protection at the User Level Setting TACACS Password Protection at the Privileged Level Enabling TACACS and XTACACS for Use Practice Session Security and Audit Checklist Conclusion Configuring TACACS+ Understanding the TACACS+ Protocol Comparing TACACS+ and RADIUS Understanding TACACS+ Operation TACACS+ Configuration Task List Configuring TACACS+ Practice Session Security and Audit Checklist Conclusion Configuring RADIUS RADIUS Overview Understanding RADIUS Operation RADIUS Configuration Task List Configuring RADIUS Practice Session Security and Audit Checklist Conclusion Configuring Kerberos Kerberos Overview Supporting Kerberos Client Configuring the Router to Use the Kerberos Protocol Telneting to the Router Monitoring and Maintaining Kerberos Practice Session Security and Audit Checklist ConclusionPREVENTING UNAUTHORIZED ACCESS: NETWORKING Basic Traffic Filtering I Access List Overview Understanding Access List Configuration Comparing Basic and Advanced Access Lists Creating Access Lists Applying Access Lists to Interfaces Creating and Editing Access List Statements on a TFTP Server Practice Session Security and Audit Checklist Conclusion Basic Traffic Filtering II Extended IP Access Lists Named Access Lists Implementing Routing Policies Monitoring and Verifying Access and Prefix Lists Practice Session Security and Audit Checklist Conclusion Advanced Traffic Filtering I Using Time Ranges Configuring Time-Based Access Using Lock-and-Key Configuring Lock-and-Key Lock-and-Key Configuration Tips Verifying and Maintaining Lock-and-Key Configuration Practice Session Security and Audit Checklist Conclusion Advanced Traffic Filtering II About Reflexive Access Lists Configuring Reflexive Access Lists Example Reflexive Access Lists Configurations About Context-Based Access Control Understanding CBAC How CBAC Works Configuring Context-Based Access Control Practice Session Security and Audit Checklist ConclusionPreventing Network Dat Interception Using Encryption and IKE Code Wars Cisco Encryption Technology CA Interoperability Overview Overview of Certification Authorities Configuring Certification Authority Interoperability Understanding Internet Key Exchange Troubleshooting CA Interoperability and IKE Practice Session Security and Audit Checklist Conclusion Configuring IPSec IPSec Network Security Understanding IPSec Configuring IPSec Practice Session Security and Audit Checklist ConclusionPREVENTING DENIAL OF SERVICE Configuring Denial of Service Security Features Understanding Denial of Service Controlling the Hostile Environment About TCP Intercept Configuring TCP Intercept Monitoring and Maintaining TCP Intercept About Network Address Translation Configuring and Deploying NAT Queuing and Traffic Policing Detecting Unauthorized Configuration Changes Resolving Names Practice Session Security and Audit Checklist ConclusionPREVENTING FRAUDULENT ROUTE UPDATES AND OTHER UNAUTHORIZED CHANGES Configuring Neighbor Authentication and Other Security Features Using Neighbor Authentication Understanding Neighbor Authentication Removing Unnecessary Services Configuring Secure Shell Some Final Guidelines for Configuring a Router Practice Session Security and Audit Checklist ConclusionAPPENDICESAppendix A IP AddressingAppendix B SubnettingAppendix C IP Protocol NumbersAppendix D Well-Known Ports and ServicesAppendix E Hacker, Cracker, Malware and Trojan Horse PortsAppendix F ICMP Types and CodesAppendix G Determining Wildcard Mask RangesAppendix H Logical OperationsAppendix I Helpful ResourcesAppendix J BibliographyAppendix K Acronyms and AbbreviationsAppendix L Glossary

저자소개

Peter T. Davis (지은이)    정보 더보기
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책