End-to-End Network Security Defense-in-Depth

  • ISBN13:


  • ISBN10:


  • Edition: 1st
  • Format: Paperback
  • Copyright: 2007-08-24
  • Publisher: Cisco Press
  • Purchase Benefits
  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $64.99 Save up to $2.60
  • eBook
    Add to Cart


Supplemental Materials

What is included with this book?

  • The eBook copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.


Master the popular techniques of this comprehensive security program that ensures network safety at all layers and in all devices.

Author Biography

Omar Santos is a senior network security engineer and Incident Manager within the Product Security Incident Response Team (PSIRT) at Cisco. Omar has designed, implemented, and supported numerous secure networks for Fortune 500 companies and the U.S. government, including the United States Marine Corps (USMC) and the U.S. Department of Defense (DoD). He is also the author of many Cisco online technical documents and configuration guidelines. Before his current role, Omar was a technical leader within the World Wide Security Practice and Cisco Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within both organizations. He is an active member of the InfraGard organization. InfraGard is a cooperative undertaking that involves the Federal Bureau of Investigation and an association of businesses, academic institutions, state and local law enforcement agencies, and other participants. InfraGard is dedicated to increasing the security of the critical infrastructures of the United States of America. Omar has also delivered numerous technical presentations to Cisco customers and partners, as well as executive presentations to CEOs, CIOs, and CSOs of many organizations. He is also the author of the Cisco Press books:Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting, and Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance.


Table of Contents

Forewordp. xix
Introductionp. xx
Introduction to Network Security Solutionsp. 3
p. 5
Firewallsp. 5
Network Firewallsp. 6
Network Address Translation (NAT)p. 7
Stateful Firewallsp. 9
Deep Packet Inspectionp. 10
Demilitarized Zonesp. 10
Personal Firewallsp. 11
Virtual Private Networks (VPN)p. 12
Technical Overview of IPsecp. 14
Phase 1p. 14
Phase 2p. 16
SSL VPNsp. 18
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)p. 19
Pattern Matchingp. 20
Protocol Analysisp. 21
Heuristic-Based Analysisp. 21
Anomaly-Based Analysisp. 21
Anomaly Detection Systemsp. 22
Authentication, Authorization, and Accounting (AAA) and Identity Managementp. 23
TACACS+p. 25
Identity Management Conceptsp. 26
Network Admission Controlp. 27
NAC Appliancep. 27
NAC Frameworkp. 33
Routing Mechanisms as Security Toolsp. 36
Summaryp. 39
Security Lifestyle: Frameworks and Methodologiesp. 41
Preparation Phasep. 43
Risk Analysisp. 43
Threat Modelingp. 44
Penetration Testingp. 46
Social Engineeringp. 49
Security Intelligencep. 50
Common Vulnerability Scoring Systemp. 50
Base Metricsp. 51
Temporal Metricsp. 51
Environmental Metricsp. 52
Creating a Computer Security Incident Response Team (CSIRT)p. 52
Who Should Be Part of the CSIRT?p. 53
Incident Response Collaborative Teamsp. 54
Tasks and Responsibilities of the CSIRTp. 54
Building Strong Security Policiesp. 54
Infrastructure Protectionp. 57
Strong Device Access Controlp. 59
SSH Versus Telnetp. 59
Local Password Managementp. 61
Configuring Authentication Bannersp. 62
Interactive Access Controlp. 62
Role-Based Command-Line Interface (CLI) Access in Cisco IOSp. 64
Controlling SNMP Accessp. 66
Securing Routing Protocolsp. 66
Configuring Static Routing Peersp. 68
Authenticationp. 68
Route Filteringp. 69
Time-to-Live (TTL) Security Checkp. 70
Disabling Unnecessary Services on Network Componentsp. 70
Cisco Discovery Protocol (CDP)p. 71
Fingerp. 72
Table of Contents provided by Publisher. All Rights Reserved.


= 0) {slash = '\\';} else {slash = '/';}openLoc = figLoc.substring(0, figLoc.lastIndexOf(slash) + 1);while (pPage.substring(0,3) == '../') {openLoc = openLoc.substring(0, openLoc.lastIndexOf(slash, openLoc.length - 2)+ 1);pPage = pPage.substring(3, pPage.length + 1);}popUpWin =window.open('','popWin','resizable=1,scrollbars=1,location=0,toolbar=0,width=525,height=394');figDoc = popUpWin.document;zhtm= ' ' + pPage + ' ';zhtm += ' ';zhtm += ' ';zhtm += ' ';zhtm += '' + pPage.substring(pPage.lastIndexOf('/') + 1, pPage.length) + '';zhtm += ' ';figDoc.write(zhtm);figDoc.close();}// modified 3.1.99 RWE v4.1 --> End-to-End Network Security Defense-in-Depth End-to-End Network Security Defense-in-Depth IntroductionThe network security lifecycle requires specialized support and a commitment to best practice standards. In this book, you will learn best practices that draw upon disciplined processes, frameworks, expert advice, and proven technologies that will help you protect your infrastructure and organization. You will learn end-to-end security best practices, from strategy development to operations and optimization.This book covers the six-step methodology of incident readiness and response. You must take a proactive approach to security; an approach that starts with assessment to identify and categorize your risks. In addition, you need to understand the network security technical details in relation to security policy and incident response procedures. This book covers numerous best practices that will help you orchestrate a long-term strategy for your organization. Who Should Read This Book?The answer to this question is simple--everyone. The principles and best practices covered in this book apply to every organization. Anyone interested in network security should become familiar with the information included in this book--from network and security engineers to management and executives. This book covers not only numerous technical topics and scenarios, but also covers a wide range of operational best practices in addition to risk analysis and threat modeling. How This Book Is OrganizedPart I of this book includes Chapter 1 which covers an introduction to security technologies and products. In Part II, which encompasses Chapters 2 through 7, you will learn the six-step methodology of incident readiness and response. Part III includes Chapters 8 through 11 which cover strategies used to protect wireless networks, IP telephony implementations, data centers, and IPv6 networks. Real-life case studies are covered in Part IV which contains Chapter 12.The following is a chapter-by-chapter summary of the contents of the book.Part I, "

Rewards Program

Write a Review