Este sitio utiliza cookies propias y de terceros. Si continúa navegando consideramos que acepta el uso de cookies. OK Más Información.

[LIBRO] Cisco Network Security Little Black

  • 0 Respuestas
  • 1173 Vistas

0 Usuarios y 1 Visitante están viendo este tema.

Desconectado ZanGetsu

  • *
  • Underc0der
  • Mensajes: 325
  • Actividad:
    0%
  • Reputación 0
  • I ZanGetsu
    • Ver Perfil
  • Skype: thenicox
  • Twitter: black_zangetsu
« en: Noviembre 22, 2016, 03:28:11 pm »

Contenido:

Código: [Seleccionar]
Cisco Network Security Little Black Book......................................................................................1
Introduction...4
Is this Book for You?...4
How to Use this Book...4
The Little Black Book Philosophy.............................................................................................6
Chapter 1: Securing the Infrastructure............................................................................................7
In Brief...7
Enterprise Security Problems.............................................................................................7
Types of Threats...8
Enterprise Security Challenges..........................................................................................8
Enterprise Security Policy..................................................................................................9
Securing the Enterprise...10
Immediate Solutions...14
Configuring Console Security...........................................................................................14
Configuring Telnet Security..............................................................................................16
Configuring Enable Mode Security...................................................................................17
Disabling Password Recovery.........................................................................................18
Configuring Privilege Levels for Users.............................................................................20
Configuring Password Encryption....................................................................................21
Configuring Banner Messages.........................................................................................22
Configuring SNMP Security.............................................................................................24
Configuring RIP Authentication........................................................................................25
Configuring EIGRP Authentication...................................................................................27
Configuring OSPF Authentication....................................................................................31
Configuring Route Filters.................................................................................................35
Suppressing Route Advertisements.................................................................................40
Chapter 2: AAA Security Technologies.........................................................................................43
In Brief...43
Access Control Security...................................................................................................43
AAA Protocols...48
Cisco Secure Access Control Server...............................................................................53
Immediate Solutions...56
Configuring TACACS+ Globally.......................................................................................56
Configuring TACACS+ Individually..................................................................................58
Configuring RADIUS Globally..........................................................................................61
Configuring RADIUS Individually.....................................................................................62
Configuring Authentication...............................................................................................64
Configuring Authorization.................................................................................................72
Configuring Accounting...75
Installing and Configuring Cisco Secure NT....................................................................78
Chapter 3: Perimeter Router Security............................................................................................85
In Brief...85
Defining Networks...85
Cisco Express Forwarding...............................................................................................86
Unicast Reverse Path Forwarding...................................................................................87
TCP Intercept...87
Chapter 3: Perimeter Router Security
Network Address Translation...........................................................................................89
Committed Access Rate...................................................................................................90
Logging...92
Immediate Solutions...93
Configuring Cisco Express Forwarding............................................................................93
Configuring Unicast Reverse Path Forwarding................................................................95
Configuring TCP Intercept................................................................................................98
Configuring Network Address Translation (NAT)...........................................................103
Configuring Committed Access Rate (CAR)..................................................................116
Configuring Logging...119
Chapter 4: IOS Firewall Feature Set.............................................................................................123
In Brief...123
Context−Based Access Control.....................................................................................123
Port Application Mapping...............................................................................................127
IOS Firewall Intrusion Detection.....................................................................................129
Immediate Solutions...131
Configuring Context−Based Access Control..................................................................131
Configuring Port Application Mapping............................................................................143
Configuring IOS Firewall Intrusion Detection.................................................................149
Chapter 5: Cisco Encryption Technology...................................................................................156
In Brief...156
Cryptography...156
Benefits of Encryption...160
Symmetric and Asymmetric Key Encryption..................................................................160
Digital Signature Standard.............................................................................................166
Cisco Encryption Technology Overview.........................................................................167
Immediate Solutions...168
Configuring Cisco Encryption Technology.....................................................................168
Chapter 6: Internet Protocol Security..........................................................................................189
In Brief...189
IPSec Packet Types...190
IPSec Modes of Operation.............................................................................................191
Key Management...193
Encryption...196
IPSec Implementations..................................................................................................197
Immediate Solutions...197
Configuring IPSec Using Pre−Shared Keys...................................................................198
Configuring IPSec Using Manual Keys..........................................................................214
Configuring Tunnel EndPoint Discovery........................................................................224
Chapter 7: Additional Access List Features...............................................................................231
In Brief...231
Wildcard Masks...233
Standard Access Lists...234
Extended Access Lists...................................................................................................234
Reflexive Access Lists...................................................................................................235
Chapter 7: Additional Access List Features
Dynamic Access Lists...236
Additional Access List Features.....................................................................................238
Immediate Solutions...239
Configuring Standard IP Access Lists............................................................................239
Configuring Extended IP Access Lists...........................................................................242
Configuring Extended TCP Access Lists.......................................................................247
Configuring Named Access Lists...................................................................................250
Configuring Commented Access Lists...........................................................................252
Configuring Dynamic Access Lists.................................................................................254
Configuring Reflexive Access Lists................................................................................260
Configuring Time−Based Access Lists..........................................................................263
Appendix A: IOS Firewall IDS Signature List..............................................................................266
Appendix B: Securing Ethernet Switches...................................................................................272
Configuring Management Access........................................................................................272
Configuring Port Security...273
Configuring Permit Lists...275
Configuring AAA Support...276

« Última modificación: Noviembre 22, 2016, 03:31:01 pm por ZanGetsu »

 

¿Te gustó el post? COMPARTILO!



Libro "HACKERS 6" Español

Iniciado por Aryenal.Bt

Respuestas: 13
Vistas: 12851
Último mensaje Marzo 26, 2018, 08:12:45 am
por vieitez
Libro: "Fundamentos en la inseguridad de la informacion"

Iniciado por Rootkit_Pentester

Respuestas: 0
Vistas: 1724
Último mensaje Mayo 21, 2018, 11:42:53 pm
por Rootkit_Pentester
Libro completo de la certificacion "CEH V10 EC-COUNCIL"

Iniciado por Rootkit_Pentester

Respuestas: 2
Vistas: 6046
Último mensaje Abril 26, 2019, 03:16:35 pm
por zorlak_23
[LIBRO] Uso de Setoolkit para la ingeniería social y Ettercap para sniffing

Iniciado por Lautaro Villarreal Culic'

Respuestas: 1
Vistas: 3231
Último mensaje Agosto 21, 2018, 02:03:53 pm
por MandrakeCrimson
Libro Certificacion de Seguridad Ofensiva nivel 1 "La biblia del hacking"

Iniciado por AlexTT

Respuestas: 2
Vistas: 6434
Último mensaje Junio 12, 2018, 06:29:56 pm
por zenna