Self-Defending Networks: The Next Generation of Network Security
暫譯: 自我防衛網路:下一代網路安全
Duane De Capite
- 出版商: Cisco Press
- 出版日期: 2006-09-10
- 定價: $1,440
- 售價: 2.8 折 $399
- 語言: 英文
- 頁數: 264
- 裝訂: Paperback
- ISBN: 1587052539
- ISBN-13: 9781587052538
-
相關分類:
資訊安全
立即出貨 (庫存=1)
買這商品的人也買了...
-
$860$679 -
$450$383 -
$590$466 -
$280$238 -
$490$382 -
$680$578 -
$640$608 -
$380$323 -
$450$383 -
$580$493 -
$880$695 -
$390$332 -
$780$663 -
$650$514 -
$650$507 -
$580$493 -
$650$507 -
$350$298 -
$720$569 -
$650$553 -
$680$537 -
$2,200$2,090 -
$680$537 -
$580$493 -
$299Agile Web Development with Rails, 2/e
相關主題
商品描述
Description
Protect your network with self-regulating network security solutions that combat both internal and external threats.
- Provides an overview of the security components used to design proactive network security
- Helps network security professionals understand what the latest tools and techniques can do and how they interact
- Presents detailed information on how to use integrated management to increase security
- Includes a design guide with step-by-step implementation instructions
Self-Defending Networks: The Next Generation of Network Security helps networking professionals understand how to deploy an end-to-end, integrated network security solution. It presents a clear view of the various components that can be used throughout the network to not only monitor traffic but to allow the network itself to become more proactive in preventing and mitigating network attacks. This security primer provides unique insight into the entire range of Cisco security solutions, showing what each element is capable of doing and how all of the pieces work together to form an end-to-end Self-Defending Network. While other books tend to focus on individual security components, providing in-depth configuration guidelines for various devices and technologies, Self-Defending Networks instead presents a high-level overview of the entire range of technologies and techniques that comprise the latest thinking in proactive network security defenses. This book arms network security professionals with the latest information on the comprehensive suite of Cisco security tools and techniques. Network Admission Control, Network Infection Containment, Dynamic Attack Mitigation, DDoS Mitigation, Host Intrusion Prevention, and Integrated Security Management are all covered, providing the most complete overview of various security systems. It focuses on leveraging integrated management, rather than including a device-by-device manual to implement self-defending networks.
Table of Contents
Foreword
Introduction
Chapter 1 Understanding Types of Network Attacks and Defenses
Categorizing Network Attacks
Virus
Worm
Trojan Horse
Denial-of-Service
Distributed Denial-of-Service
Spyware
Phishing
Understanding Traditional Network Defenses
Router Access Lists
Firewalls
Intrusion Detection Systems
Virtual Private Networks
Antivirus Programs
Introducing Cisco Self-Defending Networks
DDoS Mitigation
Intrusion Prevention Systems
Adaptive Security Appliance
Incident Control Service
Network Admission Control
IEEE 802.1x
Host Intrusion Prevention: CSA
Cisco Security Centralized Management
Summary
References
Chapter 2 Mitigating Distributed Denial-of-Service Attacks
Understanding Types of DDoS Attacks
DDoS Mitigation Overview
Using Cisco Traffic Anomaly Detector
Configuring the Traffic Anomaly Detector
Zone Creation
Traffic Anomaly Detector Zone Filters
Policy Template
Learning Phase
Detecting and Reporting Traffic Anomalies
Configuring Cisco Guard
Bootstrapping
Zone Creation and Synchronization
Cisco Guard Zone Filters
Zone Traffic Diversion
Learning Phase
Activating Zone Protection
Generating Attack Reports
Summary
References
Chapter 3 Cisco Adaptive Security Appliance Overview
Antispoofing
Intrusion Prevention Service
Launch ASDM for IPS Configuration
Configure Service Policy Rules
Define IPS Signatures
Protocol Inspection Services
HTTP Inspection Engine
TCP Map
HTTP Map
Configuring Content Security and Control Security
Content Security and Control Services Module (CSC-SSM) Setup
Web
URL Blocking
URL Filtering
Scanning
File Blocking
Scanning
Antispam
Content Filtering
File Transfer
Summary
References
Chapter 4 Cisco Incident Control Service
Implementing Outbreak Management with Cisco ICS
Outbreak Management Summary
Information and Statistics on Network Threats from Trend Micro
New Outbreak Management Task
Outbreak Settings
Displaying Outbreak Reports
OPACL Settings
Exception List
Report Settings
Watch List Settings
Automatic Outbreak Management Task
Displaying Devices
Device List
Add Device
Viewing Logs
Incident Log Query
Event Log Query
Outbreak Log Query
Log Maintenance
Summary
References
Chapter 5 Demystifying 802.1x
Fundamentals of 802.1x
Introducing Cisco Identity-Based Networking Services
Machine Authentication
802.1x and NAC
Using EAP Types
EAP MD5
EAP TLS
LEAP
PEAP
EAP FAST
VPN and 802.1x
Summary
References
Chapter 6 Implementing Network Admission Control
Network Admission Control Overview
NAC Framework Benefits
NAC Framework Components
Endpoint Security Application
Posture Agent
Network Access Devices
Policy Server
Management and Reporting Tools
Operational Overview
Network Admission for NAC-enabled Endpoints
Endpoint Attempts to Access the Network
NAD Notifies Policy Server
Cisco Secure ACS Compares Endpoint to NAC Policy
Cisco Secure ACS Forwards Information to Partner Policy Servers
Cisco Secure ACS Makes a Decision
Cisco Secure ACS Sends Enforcement Actions
NAD Enforces Actions
Posture Agent Actions
Endpoint Polled for Change of Compliance
Revalidation Process
Network Admission for NAC Agentless Hosts
Deployment Models
LAN Access Compliance
WAN Access Compliance
Remote Access Compliance
Summary
References
Chapter 7 Network Admission Control Appliance
NAC Appliance Features
NAC Appliance Manager
Device Management
CCA Servers
Filters
Clean Access
Switch Management
User Management
Monitoring
Administration
Summary
References
Chapter 8 Managing the Cisco Security Agent
Management Center for Cisco Security Agents
Deploying Cisco Secure Agent Kits
Displaying the End-Station Hostname in the Device Groups
Reviewing Policies
Attaching Rules to a Policy
Generating and Deploying Rules
Using Event Monitor
Running Cisco Security Agent Analysis
Cisco Security Agent
Status
System Security
Summary
References
Chapter 9 Cisco Security Manager
Getting Started
Device View
Add Device
Configure Access Conrol Lists (ACLs) from Device View
Configuring Interface Roles
Apply Access Control List (ACL) Rules to Multiple Devices
Invoking the Policy Query
Using Analysis and Hit Count Functions
Map View
Showing Devices on the Topology Map
Adding Cloud Networks and Hosts to the Topology Map
Configuring Firewall Access Control List (ACLs) Rules from Topology Map
Policy View
Access Control List (ACL) Rules Security Policy
Policy Inheritance and Mandatory Security Policies
IPS Management
Object Manager
Value Override Per Device
Summary
References
Chapter 10 Cisco Security Monitoring, Analysis, and Response System
Understanding Cisco Security MARS Features
Summary Dashboard
Incidents
Displaying Path of Incident and Mitigating the Attack
Hotspot Graph and Attack Diagram
Rules
Query/Reports
Management
Admin
Cisco Security Manager Linkages
Summary
References
商品描述(中文翻譯)
**描述**
保護您的網路,使用自我調節的網路安全解決方案,抵禦內部和外部威脅。
- 提供設計主動網路安全所需的安全組件概述
- 幫助網路安全專業人員了解最新工具和技術的功能及其互動方式
- 提供有關如何使用整合管理來提高安全性的詳細資訊
- 包含逐步實施指導的設計指南
《自我防禦網路:下一代網路安全》幫助網路專業人員了解如何部署端到端的整合網路安全解決方案。它清晰地展示了可以在整個網路中使用的各種組件,不僅能監控流量,還能使網路本身在防止和減輕網路攻擊方面變得更加主動。本書提供了對整個 Cisco 安全解決方案範圍的獨特見解,顯示每個元素的功能以及所有組件如何協同工作以形成端到端的自我防禦網路。雖然其他書籍往往專注於單個安全組件,提供各種設備和技術的深入配置指南,但《自我防禦網路》則提供了涵蓋主動網路安全防禦最新思維的技術和方法的高層次概述。本書為網路安全專業人員提供了有關 Cisco 安全工具和技術的最新資訊。涵蓋了網路入場控制、網路感染控制、動態攻擊緩解、DDoS 緩解、主機入侵防護和整合安全管理,提供了各種安全系統的最完整概述。它專注於利用整合管理,而不是逐一設備手冊來實施自我防禦網路。
**目錄**
前言
簡介
第1章 理解網路攻擊與防禦的類型
分類網路攻擊
病毒
蠕蟲
木馬
拒絕服務攻擊
分散式拒絕服務攻擊
間諜軟體
釣魚攻擊
理解傳統網路防禦
路由器存取清單
防火牆
入侵偵測系統
虛擬私人網路
防毒程式
介紹 Cisco 自我防禦網路
DDoS 緩解
入侵防護系統
自適應安全設備
事件控制服務
網路入場控制
IEEE 802.1x
主機入侵防護:CSA
Cisco 安全集中管理
總結
參考文獻
第2章 減輕分散式拒絕服務攻擊
理解 DDoS 攻擊的類型
DDoS 緩解概述
使用 Cisco 流量異常偵測器
配置流量異常偵測器
區域創建
流量異常偵測器區域過濾器
政策模板
學習階段
檢測和報告流量異常
配置 Cisco Guard
啟動
區域創建和同步
Cisco Guard 區域過濾器
區域流量轉移
學習階段
啟用區域保護
生成攻擊報告
總結
參考文獻
第3章 Cisco 自適應安全設備概述
防偽
入侵防護服務
啟動 ASDM 進行 IPS 配置
配置服務政策規則
定義 IPS 簽名
協議檢查服務
HTTP 檢查引擎
TCP 映射
HTTP 映射
配置內容安全和控制安全
內容安全和控制服務模組 (CSC-SSM) 設定
網頁
URL 阻擋
URL 過濾
掃描
檔案阻擋
郵件
掃描
防垃圾郵件
內容過濾
檔案傳輸
總結
參考文獻
第4章 Cisco 事件控制服務
使用 Cisco ICS 實施疫情管理
疫情管理總結
來自趨勢科技的網路威脅資訊和統計
新的疫情管理任務
疫情設定
顯示疫情報告
OPACL 設定
例外清單
報告設定
觀察清單設定
自動疫情管理任務
顯示設備
設備清單
新增設備
查看日誌