Self-Defending Networks: The Next Generation of Network Security
暫譯: 自我防衛網路:下一代網路安全

Duane De Capite

  • 出版商: Cisco Press
  • 出版日期: 2006-09-10
  • 定價: $1,440
  • 售價: 2.8$399
  • 語言: 英文
  • 頁數: 264
  • 裝訂: Paperback
  • ISBN: 1587052539
  • ISBN-13: 9781587052538
  • 相關分類: 資訊安全
  • 立即出貨 (庫存=1)

買這商品的人也買了...

相關主題

商品描述

Description 

Protect your network with self-regulating network security solutions that combat both internal and external threats.

  • Provides an overview of the security components used to design proactive network security
  • Helps network security professionals understand what the latest tools and techniques can do and how they interact
  • Presents detailed information on how to use integrated management to increase security
  • Includes a design guide with step-by-step implementation instructions

Self-Defending Networks: The Next Generation of Network Security helps networking professionals understand how to deploy an end-to-end, integrated network security solution. It presents a clear view of the various components that can be used throughout the network to not only monitor traffic but to allow the network itself to become more proactive in preventing and mitigating network attacks. This security primer provides unique insight into the entire range of Cisco security solutions, showing what each element is capable of doing and how all of the pieces work together to form an end-to-end Self-Defending Network. While other books tend to focus on individual security components, providing in-depth configuration guidelines for various devices and technologies, Self-Defending Networks instead presents a high-level overview of the entire range of technologies and techniques that comprise the latest thinking in proactive network security defenses. This book arms network security professionals with the latest information on the comprehensive suite of Cisco security tools and techniques. Network Admission Control, Network Infection Containment, Dynamic Attack Mitigation, DDoS Mitigation, Host Intrusion Prevention, and Integrated Security Management are all covered, providing the most complete overview of various security systems. It focuses on leveraging integrated management, rather than including a device-by-device manual to implement self-defending networks.

 

 

Table of Contents

Foreword

    Introduction

Chapter 1    Understanding Types of Network Attacks and Defenses

    Categorizing Network Attacks

        Virus

        Worm

        Trojan Horse

        Denial-of-Service

        Distributed Denial-of-Service

        Spyware

        Phishing

    Understanding Traditional Network Defenses

        Router Access Lists

        Firewalls

        Intrusion Detection Systems

        Virtual Private Networks

        Antivirus Programs

    Introducing Cisco Self-Defending Networks

        DDoS Mitigation

        Intrusion Prevention Systems

        Adaptive Security Appliance

        Incident Control Service

        Network Admission Control

        IEEE 802.1x

        Host Intrusion Prevention: CSA

        Cisco Security Centralized Management

    Summary

    References

Chapter 2    Mitigating Distributed Denial-of-Service Attacks

    Understanding Types of DDoS Attacks

    DDoS Mitigation Overview

    Using Cisco Traffic Anomaly Detector

        Configuring the Traffic Anomaly Detector

        Zone Creation

        Traffic Anomaly Detector Zone Filters

        Policy Template

        Learning Phase

        Detecting and Reporting Traffic Anomalies

    Configuring Cisco Guard

        Bootstrapping

        Zone Creation and Synchronization

        Cisco Guard Zone Filters

        Zone Traffic Diversion

        Learning Phase

        Activating Zone Protection

        Generating Attack Reports

    Summary

    References

Chapter 3    Cisco Adaptive Security Appliance Overview

    Antispoofing

    Intrusion Prevention Service

        Launch ASDM for IPS Configuration

        Configure Service Policy Rules

        Define IPS Signatures

    Protocol Inspection Services

    HTTP Inspection Engine

        TCP Map

        HTTP Map

    Configuring Content Security and Control Security

        Content Security and Control Services Module (CSC-SSM) Setup

        Web

            URL Blocking

            URL Filtering

            Scanning

            File Blocking

        Mail

        Scanning

        Antispam

        Content Filtering

    File Transfer

    Summary

    References

Chapter 4    Cisco Incident Control Service

    Implementing Outbreak Management with Cisco ICS

        Outbreak Management Summary

        Information and Statistics on Network Threats from Trend Micro

        New Outbreak Management Task

        Outbreak Settings

    Displaying Outbreak Reports

        OPACL Settings

        Exception List

        Report Settings

        Watch List Settings

        Automatic Outbreak Management Task

    Displaying Devices

        Device List

        Add Device

    Viewing Logs

        Incident Log Query

        Event Log Query

        Outbreak Log Query

        Log Maintenance

    Summary

    References

Chapter 5    Demystifying 802.1x

    Fundamentals of 802.1x

    Introducing Cisco Identity-Based Networking Services

    Machine Authentication

    802.1x and NAC

    Using EAP Types

        EAP MD5

        EAP TLS

        LEAP

        PEAP

        EAP FAST

    VPN and 802.1x

    Summary

    References

Chapter 6    Implementing Network Admission Control

    Network Admission Control Overview

    NAC Framework Benefits

    NAC Framework Components

        Endpoint Security Application

        Posture Agent

        Network Access Devices

        Policy Server

        Management and Reporting Tools

    Operational Overview

    Network Admission for NAC-enabled Endpoints

        Endpoint Attempts to Access the Network

        NAD Notifies Policy Server

        Cisco Secure ACS Compares Endpoint to NAC Policy

        Cisco Secure ACS Forwards Information to Partner Policy Servers

        Cisco Secure ACS Makes a Decision

        Cisco Secure ACS Sends Enforcement Actions

        NAD Enforces Actions

        Posture Agent Actions

        Endpoint Polled for Change of Compliance

        Revalidation Process

    Network Admission for NAC Agentless Hosts

    Deployment Models

        LAN Access Compliance

        WAN Access Compliance

        Remote Access Compliance

    Summary

    References

Chapter 7    Network Admission Control Appliance

    NAC Appliance Features

    NAC Appliance Manager

    Device Management

        CCA Servers

        Filters

        Clean Access

    Switch Management

    User Management

    Monitoring

    Administration

    Summary

    References

Chapter 8    Managing the Cisco Security Agent

    Management Center for Cisco Security Agents

        Deploying Cisco Secure Agent Kits

        Displaying the End-Station Hostname in the Device Groups

        Reviewing Policies

        Attaching Rules to a Policy

        Generating and Deploying Rules

        Using Event Monitor

        Running Cisco Security Agent Analysis

    Cisco Security Agent

        Status

        System Security

    Summary

    References

Chapter 9    Cisco Security Manager

    Getting Started

    Device View

        Add Device

        Configure Access Conrol Lists (ACLs) from Device View

        Configuring Interface Roles

        Apply Access Control List (ACL) Rules to Multiple Devices

        Invoking the Policy Query

        Using Analysis and Hit Count Functions

    Map View

        Showing Devices on the Topology Map

        Adding Cloud Networks and Hosts to the Topology Map

        Configuring Firewall Access Control List (ACLs) Rules from Topology Map

    Policy View

        Access Control List (ACL) Rules Security Policy

        Policy Inheritance and Mandatory Security Policies

    IPS Management

    Object Manager

    Value Override Per Device

    Summary

    References

Chapter 10    Cisco Security Monitoring, Analysis, and Response System

    Understanding Cisco Security MARS Features

    Summary Dashboard

    Incidents

        Displaying Path of Incident and Mitigating the Attack

        Hotspot Graph and Attack Diagram

    Rules

    Query/Reports

    Management

    Admin

    Cisco Security Manager Linkages

    Summary

    References

商品描述(中文翻譯)

**描述**

保護您的網路,使用自我調節的網路安全解決方案,抵禦內部和外部威脅。

- 提供設計主動網路安全所需的安全組件概述
- 幫助網路安全專業人員了解最新工具和技術的功能及其互動方式
- 提供有關如何使用整合管理來提高安全性的詳細資訊
- 包含逐步實施指導的設計指南

《自我防禦網路:下一代網路安全》幫助網路專業人員了解如何部署端到端的整合網路安全解決方案。它清晰地展示了可以在整個網路中使用的各種組件,不僅能監控流量,還能使網路本身在防止和減輕網路攻擊方面變得更加主動。本書提供了對整個 Cisco 安全解決方案範圍的獨特見解,顯示每個元素的功能以及所有組件如何協同工作以形成端到端的自我防禦網路。雖然其他書籍往往專注於單個安全組件,提供各種設備和技術的深入配置指南,但《自我防禦網路》則提供了涵蓋主動網路安全防禦最新思維的技術和方法的高層次概述。本書為網路安全專業人員提供了有關 Cisco 安全工具和技術的最新資訊。涵蓋了網路入場控制、網路感染控制、動態攻擊緩解、DDoS 緩解、主機入侵防護和整合安全管理,提供了各種安全系統的最完整概述。它專注於利用整合管理,而不是逐一設備手冊來實施自我防禦網路。

**目錄**

前言
簡介
第1章 理解網路攻擊與防禦的類型
   分類網路攻擊
       病毒
       蠕蟲
       木馬
       拒絕服務攻擊
       分散式拒絕服務攻擊
       間諜軟體
       釣魚攻擊
   理解傳統網路防禦
       路由器存取清單
       防火牆
       入侵偵測系統
       虛擬私人網路
       防毒程式
   介紹 Cisco 自我防禦網路
       DDoS 緩解
       入侵防護系統
       自適應安全設備
       事件控制服務
       網路入場控制
       IEEE 802.1x
       主機入侵防護:CSA
       Cisco 安全集中管理
   總結
   參考文獻
第2章 減輕分散式拒絕服務攻擊
   理解 DDoS 攻擊的類型
   DDoS 緩解概述
   使用 Cisco 流量異常偵測器
       配置流量異常偵測器
       區域創建
       流量異常偵測器區域過濾器
       政策模板
       學習階段
       檢測和報告流量異常
   配置 Cisco Guard
       啟動
       區域創建和同步
       Cisco Guard 區域過濾器
       區域流量轉移
       學習階段
       啟用區域保護
       生成攻擊報告
   總結
   參考文獻
第3章 Cisco 自適應安全設備概述
   防偽
   入侵防護服務
       啟動 ASDM 進行 IPS 配置
       配置服務政策規則
       定義 IPS 簽名
   協議檢查服務
   HTTP 檢查引擎
       TCP 映射
       HTTP 映射
   配置內容安全和控制安全
       內容安全和控制服務模組 (CSC-SSM) 設定
       網頁
        URL 阻擋
        URL 過濾
        掃描
        檔案阻擋
       郵件
       掃描
       防垃圾郵件
       內容過濾
   檔案傳輸
   總結
   參考文獻
第4章 Cisco 事件控制服務
   使用 Cisco ICS 實施疫情管理
       疫情管理總結
       來自趨勢科技的網路威脅資訊和統計
       新的疫情管理任務
       疫情設定
   顯示疫情報告
       OPACL 設定
       例外清單
       報告設定
       觀察清單設定
       自動疫情管理任務
   顯示設備
       設備清單
       新增設備
   查看日誌