Securing and Controlling Cisco Routers

by ;
Format: Nonspecific Binding
Pub. Date: 2002-05-15
Publisher(s): Auerbach Public
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $136.50

Buy New

Arriving Soon. Will ship when available.
$130.00

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:180 Days access
Downloadable:180 Days
$99.00
Online:365 Days access
Downloadable:365 Days
$117.00
Online:1825 Days access
Downloadable:Lifetime Access
$180.00
$99.00

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite, and the subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. In order to practice the material taught, the reader can log on to a real router and perform the commands.

Table of Contents

SECTION I: THE BASICS
The Need for Security
3(20)
Understanding OSI and TCP/IP
23(30)
Routed and Routing Protocols
53(18)
Understanding Router Basics
71(20)
Router Management
91(32)
SECTION II: PREVENTING UNAUTHORIZED ACCESS: NETWORKING DEVICE
Implementing Non-AAA Authentication
123(32)
Implementing AAA Security Services
155(18)
Implementing AAA Authentication
173(26)
Implementing AAA Authorization
199(16)
Implementing AAA Accounting
215(22)
Configuring TACACS and Extended TACACS
237(18)
Configuring TACACS+
255(18)
Configuring RADIUS
273(24)
Configuring Kerberos
297(18)
SECTION III: PREVENTING UNAUTHORIZED ACCESS: NETWORKING
Basic Traffic Filtering, Part 1
315(32)
Basic Traffic Filtering, Part 2
347(26)
Advanced Traffic Filtering, Part 1
373(24)
Advanced Traffic Filtering, Part 2
397(40)
SECTION IV: PREVENTING NETWORK DATA INTERCEPTION
Using Encryption and IKE
437(36)
Configuring IPsec
473(36)
SECTION V: PREVENTING DENIAL-OF-SERVICE
Configuring Denial-of Service Security Features
509(34)
SECTION VI: PREVENTING FRAUDULENT ROUTE UPDATES AND OTHER UNAUTHORIZED CHANGES
Configuring Neighbor Authentication and Other Security Features
543(138)
APPENDICES
Appendix A: IP Addressing
569(8)
Appendix B: Subnetting
577(10)
Appendix C: IP Protocol Numbers
587(4)
Appendix D: Well-Known Ports and Services
591(20)
Appendix E: Hacker, Cracker, Malware, and Trojan Horse Ports
611(14)
Appendix F: ICMP Types and Codes
625(4)
Appendix G: Determining Wildcard Mask Ranges
629(6)
Appendix H: Logical Operations
635(2)
Appendix I: Helpful Resources
637(6)
Appendix J: Bibliography
643(6)
Appendix K: Acronyms and Abbreviations
649(8)
Appendix L: Glossary
657(24)
Index 681

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.