Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology.
At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.THE BASICS The Need for Security The New Reality Designing the Security Infrastructure Identifying Security Risks and Threats Practice Session Security and Audit Checklist Conclusion Understanding OSI and TCP/IP The OSI Model TCP/IP Overview Practice Session Security and Audit Checklist Conclusion Routed and Routing Protocols Routing Activities Routable Protocols Routing Protocols Routing Protocol Basics Practice Session Security and Audit Checklist Conclusion Understanding Router Basics Router Overview Router Modes Router Components Router Status Practice Session Security and Audit Checklist Conclusion Router Management Router Setup Updating the IOS Troubleshooting Logging Recording Access List Violations Log Processing Simple Network Management Protocol (SNMP) Cisl£#