Cover image for CCSP : Cisco certified security professional certification exam guide
Title:
CCSP : Cisco certified security professional certification exam guide
Personal Author:
Series:
All-in-one
Publication Information:
New York : McGraw-Hill, 2003
Physical Description:
1v + 1 CD-ROM
ISBN:
9780072226911
General Note:
Also available in compact disc version : CP 4258
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010053858 QA76.3 L37 2003 Open Access Book Book
Searching...
Searching...
30000010060077 QA76.3 L37 2003 Open Access Book Book
Searching...

On Order

Summary

Summary

Offers coverage of the material on CCSP exams SECUR (Exam 642-501), CSPFA (Exam 642-511), CSVPN (Exam 642-511), CSIDS (Exam 642-531), and CSI (Exam 642-541). This title contains exam objectives at the beginning of each chapter, exam tips, end-of-chapter practice questions, and photographs and illustrations. The CD-ROM contains a testing engine.


Table of Contents

Introductionp. xxi
Part I Introduction to Network Securityp. 1
Chapter 1 Understanding Network Security Threatsp. 3
Identify the Need for Network Securityp. 4
Identify the Causes of Network Security Problemsp. 5
The Four Primary Types of Network Threatsp. 8
The Four Primary Types of Network Attackp. 11
Cisco AVVID and SAFE Strategiesp. 22
Cisco Security Wheelp. 23
Network Security Policyp. 25
Improving Network Securityp. 38
Chapter Reviewp. 39
Chapter 2 Securing the Networkp. 47
Secure Network Design Examplep. 48
Securing Network Devicesp. 50
Using Access Control Lists to Secure the Networkp. 57
Chapter Reviewp. 71
Part II Securing the Network Perimeterp. 75
Chapter 3 Cisco AAA Security Technologyp. 77
The Cisco AAA Modelp. 78
AAA System Componentsp. 88
Testing AAA Configurationp. 103
Chapter Reviewp. 104
Chapter 4 Cisco Secure ACS and TACACS+/RADIUS Technologiesp. 109
Describe Cisco Secure ACSp. 110
Features and Architecture of Cisco Secure ACS for Windowsp. 111
Features of CiscoSecure ACS for UNIXp. 118
Installing Cisco Secure ACS 3.0 for Windowsp. 119
Administering and Troubleshooting Cisco Secure ACS for Windowsp. 122
TACACS+ Overviewp. 132
Configuring Cisco Secure ACS and TACACS+p. 133
Verifying TACACS+p. 136
Chapter Reviewp. 138
Chapter 5 Securing Cisco Perimeter Routersp. 143
Perimeter Router Terms and Conceptsp. 143
Eavesdroppingp. 147
Limit Unneeded TCP/IP and Other Servicesp. 150
Denial of Service Attacksp. 150
Unauthorized Accessp. 152
Lack of Legal IP Addressesp. 161
Rerouting Attacksp. 169
Event Logging on Perimeter Routersp. 170
Chapter Reviewp. 171
Chapter 6 IOS Firewall Feature Set--CBACp. 175
Introduction to Cisco IOS Firewallp. 175
Context-Based Access Control (CBAC)p. 179
IOS Firewall Managementp. 198
Chapter Reviewp. 200
Chapter 7 IOS Firewall--Intrusion Detection Systemp. 205
Intrusion Detection System (IDS)p. 205
Cisco IOS Firewall IDS Configuration Task Listp. 211
Initializing the IOS Firewall IDSp. 212
Initializing the Post Officep. 212
Creating and Applying Audit Rulesp. 216
Verifying the IDS Configurationp. 222
Chapter Reviewp. 224
Chapter 8 IOS Firewall--Authentication Proxyp. 229
Cisco IOS Firewall Authentication Proxyp. 229
AAA Server Configurationp. 238
AAA Router Configurationp. 244
Configuring the HTTP Serverp. 253
Authentication Proxy Configuration on the Routerp. 254
Verify Authentication Proxy Configurationp. 257
Chapter Reviewp. 260
Part III Virtual Private Networks (VPNs)p. 265
Chapter 9 Cisco IOS IPSec Introductionp. 267
Virtual Private Networksp. 268
Tunneling Protocolsp. 275
How IPSec Worksp. 276
Cisco IOS IPSec Technologiesp. 277
Cisco IOS Cryptosystem Componentsp. 288
Security Association (SA)p. 294
Five Steps of IPSec Revisitedp. 296
IPSec Support in Cisco Systems Productsp. 301
Chapter Reviewp. 302
Chapter 10 Cisco IOS IPSec for Preshared Keysp. 307
Configure IPSec Encryption Tasksp. 307
Configuring IPSec Manuallyp. 333
Chapter Reviewp. 335
Chapter 11 Cisco IOS IPSec Certificate Authority Supportp. 341
CA Support Overviewp. 341
Configure CA Support Tasksp. 348
RSA Encrypted Nonces Overviewp. 372
Chapter Reviewp. 374
Chapter 12 Cisco IOS Remote Access Using Cisco Easy VPNp. 381
Introduction to Cisco Easy VPNp. 381
Cisco Easy VPN Serverp. 382
Cisco Easy VPN Remotep. 383
Cisco VPN 3.6 Clientp. 385
Easy VPN Server Configuration Tasksp. 386
Preconfiguring the Cisco VPN 3.6 Clientp. 386
Management Center for VPN Routersp. 392
Easy VPN Remote Phase Twop. 396
Cisco VPN Firewall Feature for VPN Clientp. 402
Chapter Reviewp. 408
Chapter 13 Cisco VPN Hardware Overviewp. 413
Cisco Products Enable a Secure VPNp. 413
Cisco VPN 3002 Client Devicesp. 414
Cisco VPN 3000 Concentrator Devicesp. 419
Chapter Reviewp. 429
Chapter 14 Cisco VPN 3000 Remote Access Networksp. 435
VPN Concentrator User Interfaces and Startupp. 436
VPN Concentrators in IPSec VPN Implementationsp. 450
Remote Access VPNs with Preshared Keysp. 452
Digital Certificatesp. 477
Configure Cisco VPN Client Supportp. 486
VPN Client Autoinitiation Featurep. 487
Administer and Monitor Remote Access Networksp. 489
Chapter Reviewp. 495
Chapter 15 Configuring Cisco VPN 3002 Remote Clientsp. 501
The VPN 3002 in the Networkp. 502
Configuring the 3002 Devicep. 506
Common Configuration Tasksp. 515
Basic Configuration for the VPN 3002p. 521
Other VPN 3002 Software Featuresp. 532
Auto-Update Featurep. 546
Chapter Reviewp. 547
Chapter 16 Cisco VPN 3000 LAN-to-LAN Networksp. 553
The VPN Concentrators in LAN-to-LAN VPNsp. 553
LAN-to-LAN Networks with Preshared Keysp. 555
LAN-to-LAN Networks with Digital Certificatesp. 566
NAT Issuesp. 567
NAT Transparencyp. 568
LAN-to-LAN VPN with Overlapping Network Addressesp. 572
LAN-to-LAN Routingp. 575
Chapter Reviewp. 581
Part IV PIX Firewallsp. 585
Chapter 17 CiscoSecure PIX Firewallsp. 587
Firewall and Firewall Security Systemsp. 587
CiscoSecure PIX Firewall Technologyp. 589
Basic PIX Firewall Configurationp. 597
Chapter Reviewp. 604
Chapter 18 Getting Started with the Cisco PIX Firewallp. 609
Basic PIX Firewall Configurationp. 609
ICMP Traffic to the Firewallp. 612
Time Setting and NTP Supportp. 614
Syslog Configurationp. 617
DHCP Server Configurationp. 625
Chapter Reviewp. 633
Chapter 19 Access Through the PIX Firewallp. 639
Adaptive Security Algorithmp. 639
Translations and Connectionsp. 644
Access Control Lists (ACLs)p. 661
Content Filteringp. 668
Object Groupingp. 673
Conduit Statementsp. 676
PIX Routing Configurationp. 678
Chapter Reviewp. 682
Chapter 20 Advanced PIX Firewall Featuresp. 687
Remote Accessp. 687
AAA on the PIX Firewallp. 691
Advanced Protocol Handlingp. 702
Attack Guardsp. 710
Intrusion Detectionp. 715
Shunningp. 718
Managing SNMP Servicesp. 719
Chapter Reviewp. 723
Chapter 21 Firewalls and VPN Featuresp. 729
Pix Firewall Enables a Secure VPNp. 729
IPSec Configuration Tasksp. 732
Cisco VPN Clientp. 748
Scale PIX Firewall VPNsp. 750
PPPoE and the PIX Firewallp. 752
Chapter Reviewp. 754
Chapter 22 Managing and Maintaining the PIX Firewallp. 765
PDM Overviewp. 765
PDM Operating Requirementsp. 767
Prepare for PDMp. 771
Using PDM to Configure the PIX Firewallp. 775
Using PDM to Create a Site-to-Site VPNp. 776
Using PDM to Create a Remote Access VPNp. 780
CiscoWorks Management Center for PIX Firewalls (PIX MC)p. 783
PIX Failover Featurep. 784
Password Recoveryp. 794
Upgrading the PIX OSp. 797
Chapter Reviewp. 800
Part V Intrusion Detection Systems (IDS)p. 805
Chapter 23 Intrusion Detection System Overviewp. 807
Security Threatsp. 807
The Attack Types and Phasesp. 809
Intrusion Detection Systems Overviewp. 816
Summaryp. 827
Chapter 24 Cisco Secure Intrusion Detection Systemp. 835
CIDS Operations and Functionalityp. 836
CIDS Architecturep. 850
Chapter Reviewp. 866
Chapter 25 Sensor Installation and Configurationp. 873
Sensor Deployment Considerationsp. 873
Sensor Installationp. 878
IDS Device Managerp. 885
Chapter Reviewp. 917
Chapter 26 Signature and Alarm Managementp. 921
CIDS Signaturesp. 922
Event Viewerp. 930
Chapter Reviewp. 940
Part VI Cisco SAFE Implementationp. 945
Chapter 27 Cisco SAFE Implementationp. 947
Preparation Documentsp. 947
Exam Topicsp. 948
Skills Required for the Examp. 950
Chapter Reviewp. 950
Appendix A Access Control Listsp. 955
Access List Basicsp. 955
Two-Step Processp. 956
Numbered ACL Common Characteristicsp. 957
The Numbers Matterp. 957
Standard Access Listsp. 958
Building a Standard ACLp. 958
Verifying ACLsp. 963
Show Run Commandp. 963
Show Access-Lists Commandp. 964
Show IP Interfaces Commandp. 964
Extended Access Listsp. 965
Creating an Extended Access Listp. 965
Named Access Listsp. 971
Appendix B About the CDp. 975
System Requirementsp. 975
LearnKey Online Trainingp. 975
Installing and Running MasterExamp. 976
MasterExamp. 976
Electronic Bookp. 976
Lab Exercisesp. 976
Helpp. 976
Removing Installation(s)p. 977
Technical Supportp. 977
LearnKey Technical Supportp. 977
Indexp. 979