買這商品的人也買了...
-
$580$458 -
$680$537 -
$680$537 -
$650$553 -
$500$450 -
$2,520$2,394 -
$1,670$1,587 -
$2,450$2,328 -
$2,010$1,910 -
$920$727 -
$590$531 -
$1,274Computer Architecture: A Quantitative Approach, 3/e(精裝本)
-
$490$417 -
$860$731 -
$600$474 -
$760$600 -
$580$522 -
$139$118 -
$680$537 -
$690$538 -
$680$537 -
$600$540 -
$860$731 -
$980$774 -
$600$480
相關主題
商品描述
- The importance of router security and where routers fit into
an overall security plan
- Different router configurations for various versions of
Cisco?s IOS
- Standard ways to access a Cisco router and the security
implications of each
- Password and privilege levels in Cisco routers
- Authentication, Authorization, and Accounting (AAA) control
- Router warning banner use (as recommended by the FBI)
- Unnecessary protocols and services commonly run on Cisco
routers
- SNMP security
- Anti-spoofing
- Protocol security for RIP, OSPF, EIGRP, NTP, and BGP
- Logging violations
- Incident response
- Physical security
Written by Thomas Akin, an experienced Certified Information Systems
Security Professional (CISSP) and Certified Cisco Academic Instructor (CCAI),
the book is well organized, emphasizing practicality and a hands-on approach. At
the end of each chapter, Akin includes a Checklist that summarizes the hardening
techniques discussed in the chapter. The Checklists help you double-check the
configurations you have been instructed to make, and serve as quick references
for future security procedures.
Concise and to the point, Hardening
Cisco Routers supplies you with all the tools necessary to turn a potential
vulnerability into a strength. In an area that is otherwise poorly documented,
this is the one book that will help you make your Cisco routers rock solid.
Table of Contents
Preface
1. Router Security
2. IOS Version Security
3. Basic Access Control
4. Passwords and Privilege Levels
5. AAA Access Control
6. Warning Banners
7. Unnecessary Protocols and Services
8. SNMP Security
9. Secure Routing and Antispoofing
10. NTP
11. Logging
A. Checklist Quick Reference
B. Physical Security
C. Incident Response
D. Configuration Examples
E. Resources
Index