Siêu thị PDFTải ngay đi em, trời tối mất

Thư viện tri thức trực tuyến

Kho tài liệu với 50,000+ tài liệu học thuật

© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

CCNA security study guide
PREMIUM
Số trang
560
Kích thước
19.5 MB
Định dạng
PDF
Lượt xem
1236

CCNA security study guide

Nội dung xem thử

Mô tả chi tiết

CCNA®

Security

Study Guide

ffirs.indd i firs.indd i 2/17/10 6:56:04 PM /17/10 6:56:04 PM

ffirs.indd ii firs.indd ii 2/17/10 6:56:10 PM /17/10 6:56:10 PM

CCNA®

Security

Study Guide

Tim Boyles

ffirs.indd iii firs.indd iii 2/17/10 6:56:10 PM /17/10 6:56:10 PM

Acquisitions Editor: Jeff Kellum

Development Editor: Stef Jones

Technical Editors: Chris Carson, Billy Haines

Production Editor: Angela Smith

Copy Editor: Judy Flynn

Editorial Manager: Pete Gaughan

Production Manager: Tim Tate

Vice President and Executive Group Publisher: Richard Swadley

Vice President and Publisher: Neil Edde

Media Project Manager 1: Laura Moss-Hollister

Media Associate Producer: Doug Kuhn

Media Quality Assurance: Josh Frank

Book Designers: Judy Fung and Bill Gibson

Proofreader: Rebecca Rider

Indexer: Jack Lewis

Project Coordinator, Cover: Lynsey Stanford

Cover Designer: Ryan Sneed

Copyright © 2010 by Wiley Publishing, Inc., Indianapolis, Indiana

Published simultaneously in Canada

ISBN: 978-0-470-52767-2

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by

any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under

Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the

Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center,

222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher

for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street,

Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with

respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including

without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or

promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work

is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional

services. If professional assistance is required, the services of a competent professional person should be sought.

Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or

Web site is referred to in this work as a citation and/or a potential source of further information does not mean that

the author or the publisher endorses the information the organization or Web site may provide or recommendations

it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or

disappeared between when this work was written and when it is read.

For general information on our other products and services or to obtain technical support, please contact

our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax

(317) 572-4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be

available in electronic books.

Library of Congress Cataloging-in-Publication Data is available from publisher.

TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John

Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without

written permission. CCNA is a registered trademark of Cisco Technology, Inc. All other trademarks are the

property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor

mentioned in this book.

10 9 8 7 6 5 4 3 2 1

ffirs.indd iv firs.indd iv 2/17/10 6:56:11 PM /17/10 6:56:11 PM

Dear Reader,

Thank you for choosing CCNA Security Study Guide. This book is part of a family

of premium-quality Sybex books, all of which are written by outstanding authors who

combine practical experience with a gift for teaching.

Sybex was founded in 1976. More than 30 years later, we’re still committed to producing

consistently exceptional books. With each of our titles, we’re working hard to set a new

standard for the industry. From the paper we print on, to the authors we work with, our

goal is to bring you the best books available.

I hope you see all that refl ected in these pages. I’d be very interested to hear your comments

and get your feedback on how we’re doing. Feel free to let me know what you think about

this or any other Sybex book by sending me an email at [email protected]. If you think you’ve

found a technical error in this book, please visit http://sybex.custhelp.com. Customer

feedback is critical to our efforts at Sybex.

Best regards,

Neil Edde

Vice President and Publisher

Sybex, an Imprint of Wiley

ffirs.indd v firs.indd v 2/17/10 6:56:12 PM /17/10 6:56:12 PM

ffirs.indd vi firs.indd vi 2/17/10 6:56:13 PM /17/10 6:56:13 PM

To God and my family. Without the support and love from both, I would

not be able to do what I do. Thanks for the many blessings.

ffirs.indd vii firs.indd vii 2/17/10 6:56:13 PM /17/10 6:56:13 PM

ffirs.indd viii firs.indd viii 2/17/10 6:56:13 PM /17/10 6:56:13 PM

Acknowledgments

When you take on a project like this, there are always a number of people involved, and this one

is no exception. I could not have done this book without the help and support of several folks.

First, I’d like to thank my technical editor, Chris Carson, for keeping me honest and offering

candid feedback. Chris also contributed to this book by writing Chapter 10 and Chapter 11. His

help was invaluable. I would also like to thank Patrick Conlan, who provided access to most of

the equipment used in the writing of this book.

A special thanks goes out to Stef Jones, this book’s developmental editor. Stef was the

one to keep me in line and was a tremendous help in shaping up some of the more diffi cult

chapters.

And last but not least, thanks to the team at Sybex for supporting me in this endeavor:

Pete Gaughan, editorial manager; Jeff Kellum, acquisitions editor; and Jenni Housh, Connor

O’Brien, and Angela Smith, who are all on the editorial team. I’m sure I gave Jeff plenty of

cause for concern over the course of the better part of a year, but we all survived—I think.

Also, thanks to copyeditor Judy Flynn, proofreader Rebecca Rider, and indexer Jack Lewis.

ffirs.indd ix firs.indd ix 2/17/10 6:56:13 PM /17/10 6:56:13 PM

ffirs.indd x firs.indd x 2/17/10 6:56:13 PM /17/10 6:56:13 PM

About The Author

Tim Boyles is an IT manager at a large retailer based in the Dallas–Fort Worth Metroplex.

He has been involved in networking and security for over 20 years. He is the holder of

many certifi cations, including CISSP, CISA, CISM, GCIH, GAWN, and of course CCNA

and CCNA-Security. Tim has worked on many networking and security books. He was

previously the security practice leader for the South Central operation of BT Global

Services and has been engaged with consulting for a number of years with numerous large

corporate clients. He is also a mentor instructor for the SANS Institute, having conducted

sessions on CISSP training, Incident Handling, Wireless Penetration Testing, and Web

Application Security.

About the Contributor

Chris L. Carson, CCIE #19511, is a principal at Ethical Networks, a network and

security consulting provider in the Dallas–Ft. Worth area. He has been in the network

and security industry for more than 17 years and holds over 20 industry certifi cations,

including CCIE, CCSP, CEH, and CCNA-Security. Most of his career has been spent

working for large Cisco Gold partners throughout the United States. Chris’s previous

position as a security practice manager and principal for one of the largest Cisco partners

in North Texas has provided him with expertise in designing, implementing, and

troubleshooting solutions for many Fortune 500 customers.

ffirs.indd xi firs.indd xi 2/17/10 6:56:13 PM /17/10 6:56:13 PM

ffirs.indd xii firs.indd xii 2/17/10 6:56:13 PM /17/10 6:56:13 PM

Contents at a Glance

Introduction xxv

Assessment Test xxxii

Chapter 1 Introduction to Network Security 1

Chapter 2 Creating the Secure Network 25

Chapter 3 Securing Administrative Access 51

Chapter 4 Configuring AAA Services 77

Chapter 5 Securing Your Router 117

Chapter 6 Layer 2 Security 159

Chapter 7 Implementing Cisco IOS Firewall 193

Chapter 8 Implementing Cisco IOS Intrusion Prevention 245

Chapter 9 Understanding Cryptographic Solutions 281

Chapter 10 Using Digital Signatures 299

Chapter 11 Using Asymmetric Encryption and PKI 323

Chapter 12 Implementing Site-to-Site IPsec VPN Solutions 377

Appendix A Securing Voice Solutions 425

Appendix B Introduction to SAN Security 441

Appendix C Exploring Endpoint Security 451

Appendix D Capstone Exercise 461

Appendix E About the Companion CD 483

Glossary 487

Index 495

ffirs.indd xiii firs.indd xiii 2/17/10 6:56:13 PM /17/10 6:56:13 PM

ffirs.indd xiv firs.indd xiv 2/17/10 6:56:14 PM /17/10 6:56:14 PM

Contents

Introduction xxv

Assessment Test xxxii

Chapter 1 Introduction to Network Security 1

Threats to Network Security 2

External Threats 3

Internal Threats 5

Application Security 6

Network Security Objectives 6

Classification of Data 8

Security Controls 11

Security Controls by Type 11

Security Controls by Purpose 12

Incident Response 13

Preparation 13

Identification 15

Containment 16

Eradication 17

Recovery 17

Lessons Learned 17

Law and Ethics 18

Legal Matters 18

Intellectual Property 19

Ethics 20

Review Questions 21

Answers to Review Questions 23

Chapter 2 Creating the Secure Network 25

Creating a Security Policy 26

Goals of a Security Policy 26

Policies and Procedures 27

Other Documents 28

Managing Risk 28

Secure Network Design 32

Creating Security Awareness 34

Maintaining Operational Security 35

Defining the Systems Development Life Cycle 35

Review of Operations Security 37

Evolution of Threats 38

ftoc.indd xv toc.indd xv 2/17/10 9:04:44 PM /17/10 9:04:44 PM

Tải ngay đi em, còn do dự, trời tối mất!