A classic story about Cisco router Firewall

Source: Internet
Author: User

For some experts studying Cisco router firewall, this book is very good for everyone. We believe that we can provide a different technical experience for Cisco router firewall fans. Original Title: Cisco Router Firewall Security, former Press, Cisco Press, author, US) Richard. deal, translator, Chen kezhong [same translator's work] Press, people's post and telecommunications Press book number, 7-115-13695-5, start book, 16 open pages, 668, publication date,-1-1, 1-1 content Introduction:

Cisco IOS Firewall provides a wide range of features, including address translation, authentication, encryption, stateful filtering, failed switching, URL content filtering, ACL, NBAR, and other features. This book explains how to use the Cisco IOS Firewall to enhance the security of the border mountain and use the flexibility and scalability of the Cisco IOS software package in this process. Each chapter of this book is an important component of Border Router Security. The author explains all the concerns and disadvantages of these key security features to help us understand when to use these features. The book provides many examples from the author's actual experience to describe key issues and security defects. This book ends with a detailed case study describing best practices and related information on how to implement the security features of Cisco routers.

Whether you are learning about firewall security or looking for a technical guide to enhance the security of the Cisco router firewall, this book provides a complete reference for network border protection. This book comprehensively and systematically introduces various firewall features based on the Cisco IOS software operating system. Using these features, we can reinforce Cisco border routers and other routers to protect our networks from various security threats and attacks while protecting existing investments. This book consists of 21 chapters, which are divided into 9 parts. The first part is an overview of security issues and firewalls. The second part is to protect the access security of the router through basic access settings, disable unnecessary services, and implement AAA. The third part introduces Cisco's stateless traffic filtering technology, including basic, extended, named, timed, ordered, and compiled ACLs.

The fourth section describes Cisco stateful traffic filtering technology, including reflection ACL, CBAC, URL filtering, and NBAR features. The fifth part describes the problems caused by address translation and the corresponding solutions. The sixth part introduces the lock and key ACL, Authentication Proxy, and protection of the routing protocol, locks, keys, and authentication proxies are used to authenticate users before allowing them to access resources. Part 7 describes the intrusion detection system, DoS protection, and logging events. The eighth section describes the IPSec connections to the site and remote access to IPSec connections. The ninth part introduces a comprehensive case study, and describes how to protect network security in a real environment based on the important security components introduced in this book.

This book is a book on "How to do it". It is a reference book on Cisco router firewall security. Richard is an expert with many years of experience in the computer network industry. This book integrates many experiences and tips from the author's network security practices, enabling readers to better master important features and key issues. Many examples provided in this book are typical and can be easily applied to our network environment. This book is a must-have book for the majority of network security practitioners and network management personnel. This book can also effectively help you pass the Cisco ccsp secur certification exam.

Chapter 4 Security Threats
1.1 Security Plan.
1.2 causes of security issues
1.3 types of security threats
1.4 classification of threats
1.5 Security Solution
Conclusion 1.6

Chapter 2 firewall Overview
2.1 firewall Introduction
2.2 Traffic Control and OSI reference model
2.3 firewall types
2.4 firewall Design
2.5 Cisco IOS Security
Conclusion 2.6

Chapter 4 access a vro3.1 Authentication Type
3.2 user-level EXEC access method
3.3 Privileged EXEC access (Cisco router firewall books)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.