Securing And Controlling Cisco Routers

E-Book Overview

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

E-Book Content

SECURING AND CONTROLLING CISCO ROUTERS © 2002 by CRC Press LLC OTHER AUERBACH PUBLICATIONS ABCs of IP Addressing Gilbert Held ISBN: 0-8493-1144-6 Information Security Risk Analysis Thomas Peltier ISBN: 0-8493-0880-1 Application Servers for E-Business Lisa M. Lindgren ISBN: 0-8493-0827-5 Information Technology Control and Audit Frederick Gallegos, Sandra Allen-Senft, and Daniel P. Manson ISBN: 0-8493-9994-7 Architectures for E-Business Systems Sanjiv Purba, Editor ISBN: 0-8493-1161-6 A Technical Guide to IPSec Virtual Private Networks James S. Tiller ISBN: 0-8493-0876-3 Building an Information Security Awareness Program Mark B. Desman ISBN: 0-8493-0116-5 Computer Telephony Integration William Yarberry, Jr. ISBN: 0-8493-9995-5 Cyber Crime Investigator’s Field Guide Bruce Middleton ISBN: 0-8493-1192-6 Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes Albert J. Marcella and Robert S. Greenfield, Editors ISBN: 0-8493-0955-7 Information Security Architecture Jan Killmeyer Tudor ISBN: 0-8493-9988-2 Information Security Management Handbook, 4th Edition, Volume 1 Harold F. Tipton and Micki Krause, Editors ISBN: 0-8493-9829-0 Information Security Management Handbook, 4th Edition, Volume 2 Harold F. Tipton and Micki Krause, Editors ISBN: 0-8493-0800-3 Information Security Management Handbook, 4th Edition, Volume 3 Harold F. Tipton and Micki Krause, Editors ISBN: 0-8493-1127-6 Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management Thomas Peltier ISBN: 0-8493-1137-3 New Directions in Internet Management Sanjiv Purba, Editor ISBN: 0-8493-1160-8 New Directions in Project Management Paul C. Tinnirello, Editor ISBN: 0-8493-1190-X A Practical Guide to Security Engineering and Information Assurance Debra Herrmann ISBN: 0-8493-1163-2 The Privacy Papers: Managing Technology and Consumers, Employee, and Legislative Action Rebecca Herold ISBN: 0-8493-1248-5 Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age Patrick McBride, Joday Patilla, Craig Robinson, Peter Thermos, and Edward P. Moser ISBN: 0-8493-1239-6 Securing and Controlling Cisco Routers Peter T. Davis ISBN: 0-8493-1290-6 Securing E-Business Applications and Communications Jonathan S. Held and John R. Bowers ISBN: 0-8493-0963-8 Securing Windows NT/2000: From Policies to Firewalls Michael A. Simonyi ISBN: 0-8493-1261-2 TCP/IP Professional Reference Guide Gilbert Held ISBN: 0-8493-0824-0 The Complete Book of Middleware Judith Myerson ISBN: 0-8493-1272-8 AUERBACH PUBLICATIONS www.auerbach-publications.com To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401 E-mail: [email pr
You might also like

Network Analysis: Methodological Foundations
Authors: Ulrik Brandes , Thomas Erlebach (auth.) , Ulrik Brandes , Thomas Erlebach (eds.)    170    0



Mri: Basic Principles And Applications
Authors: Mark A. Brown , Richard C. Semelka    139    0


From Gestalt Theory To Image Analysis: A Probabilistic Approach
Authors: Agnés Desolneux , Lionel Moisan , Jean-Michel Morel (auth.)    126    0


Fortran 90: A Conversion Course For Fortran 77 Programmers
Authors: Walter S. Brainerd , Charles H. Goldberg , Jeanne C. Adams    128    0


Encyclopedia Of Physical Science And Technology - Computer Software
Authors: Robert A. Meyers (Editor-in-Chief)    187    0


Algorithms For Computational Linguistics
Authors: Striegnitz K. , et al.    178    0


Introduction To Scientific Computing: Twelve Projects With Matlab
Authors: Ionut Danaila , Pascal Joly , Sidi Mahmoud Kaber , Marie Postel    142    0


Introduction To Robust Estimation And Hypothesis Testing
Authors: Rand R. Wilcox    105    0


Molecular Evolution: Computer Analysis Of Protein And Nucleic Acid Sequences
Authors: Abelson J.N. , Simon M.I. , Doolittle R.F. (eds.)    138    0