ABSTRACT

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA)

part |1 pages

SECTION I: THE BASICS

chapter 1|19 pages

The Need for Security

chapter 2|29 pages

Understanding OSI and TCP/IP

chapter 3|18 pages

Routed and Routing Protocols

chapter 4|19 pages

Understanding Router Basics

chapter 5|30 pages

Router Management

part |1 pages

SECTION II: PREVENTING UNAUTHORIZED ACCESS: NETWORKING DEVICE

chapter 6|31 pages

Implementing Non-AAA Authentication

chapter 7|17 pages

Implementing AAA Security Services

chapter 8|25 pages

Implementing AAA Authentication

chapter 9|15 pages

Implementing AAA Authorization

chapter 10|22 pages

Implementing AAA Accounting

chapter 11|17 pages

Configuring TACACS and Extended TACACS

chapter 12|17 pages

Configuring TACACS+

chapter 13|24 pages

Configuring RADIUS

chapter 14|16 pages

Configuring Kerberos

part |1 pages

SECTION III: PREVENTING UNAUTHORIZED ACCESS: NETWORKING

chapter 15|31 pages

Basic Traffic Filtering, Part 1

chapter 16|25 pages

Basic Trafffic Filtering, Part 2

chapter 17|24 pages

Advanced Traffic Filtering, Part 1

chapter 18|38 pages

Advanced Traffic Filtering, Part 2

part |1 pages

SECTION IV: PREVENTING NETWORK DATA INTERCEPTION

chapter 19|36 pages

Using Encryption and IKE

chapter 20|34 pages

Configuring IPSec

part |1 pages

SECTION V: PREVENTING DENIAL-OF-SERVICE

part |1 pages

SECTION VI: PREVENTING FRAUDLENT ROUTE UPDATES AND OTHER UNAUTHORIZED CHANGES

part |2 pages

Appendix H: Logical Operations

chapter |5 pages

Appendix I: Helpful Resources

chapter |6 pages

Appendix J: Bibliography

chapter |8 pages

Appendix K: Acronyms and Abbreviations

chapter |22 pages

Appendix L: Glossary

chapter |1 pages

About the Author