Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
What is included with this book?
Preparing for the latest CCNA Security exam? Here are all the CCNA Security (210-260) commands you need in one condensed, portable resource. Filled with valuable, easy-to-access information, the CCNA Security Portable Command Guide, is portable enough for you to use whether you’re in the server room or the equipment closet.
Completely updated to reflect the new CCNA Security 210-260 exam, this quick reference summarizes relevant Cisco IOS® Software commands, keywords, command arguments, and associated prompts, and offers tips and examples for applying these commands to real-world security challenges. Configuration examples, throughout, provide an even deeper understanding of how to use IOS to protect networks.
Topics covered include
Access all CCNA Security commands: use as a quick, offline resource for research and solutions
Bob Vachon is a professor in the Computer Systems Technology program at Cambrian College in Sudbury, Ontario, Canada, where he teaches networking infrastructure courses. He has worked and taught in the computer networking and information technology field since 1984. He has collaborated on various CCNA, CCNA Security, and CCNP projects for the Cisco Networking Academy as team lead, lead author, and subject matter expert. He enjoys playing the guitar and being outdoors.
Table of Contents from First Edition
Part I: Networking Security Fundamentals
CHAPTER 1 Networking Security Concepts
CHAPTER 2 Implementing Security Policies Using a Lifecycle Approach
CHAPTER 3 Building a Security Strategy for Borderless Networks
Part II: Protecting the Network Infrastructure
CHAPTER 4 Network Foundation Protection
CHAPTER 5 Protecting the Network Infrastructure Using CCP
CHAPTER 6 Securing the Management Plane
CHAPTER 7 Securing Management Access with AAA
CHAPTER 8 Securing the Data Plane on Catalyst Switches
CHAPTER 9 Securing the Data Plane in IPv6 Environments
Part III: Threat Control and Containment
CHAPTER 10 Planning a Threat Control Strategy
CHAPTER 11 Configuring ACLs for Threat Mitigation
CHAPTER 12 Configuring Zone-Based Firewalls
CHAPTER 13 Configuring Cisco IOS IPS
Part IV: Secure Connectivity
CHAPTER 14 VPNs and Cryptology
CHAPTER 15 Asymmetric Encryption and PKI
CHAPTER 16 IPsec VPNs
CHAPTER 17 Configuring Site-to-Site VPNs
Part V: Securing the Network Using the ASA
CHAPTER 18 Introduction to the ASA
CHAPTER 19 Introduction to ASDM
CHAPTER 20 Configuring Cisco ASA Basic Settings
CHAPTER 21 Configuring Cisco ASA Advanced Settings
CHAPTER 22 Configuring Cisco ASA SSL VPNs
APPENDIX Create Your Own Journal Here
TOC, 9781587204487, 5/1/2012