A Cisco troubleshooting methodology. It includes coverage of: how to create, operate and use Cisco Access lists; how to secure a network when access occurs via a Cisco Router; and the TCP/IP Protocol and its use with Cisco routers. There are a number of security discussions too, and these include: public network and private network security threats and how to prevent them; how firewalls and proxy servers can be used as a first line of defence; how to configure Cisco Routers to accept only specific recognized incoming packets; using the Cisco PIX Firewall and the Centri firewall; and how to use the special security features built into Cisco routers.
"synopsis" may belong to another edition of this title.
Cisco Security Architectures demystifies access lists, the PIX Firewall, and how to secure a Cisco based network.
In today's age of remote users and widespread Internet access, security continues to be of utmost importance to network administrators and engineers. This important, comprehensive guide shows you how to avoid common mistakes that result in network vulnerability and provides numerous examples of practical methods to bulletproof your network.
This book examines different security configurations in Cisco-based networks. Clear and concise, the authors explain the operation and utilization of Cisco's routers as well as the Cisco PIX Firewall and special security features built into cisco routers. Real-world examples are used throughout the book, which enables you to correctly configure equipment using the most current technology available. Invaluable troubleshooting tips and techniques are included to enhance network security.
This book will show you how to:
This resource is a must-have for administrators and network engineers who desire a greater understanding of Cisco network security, hardware, software, Internet, TCP/IP protocols, and security devices employed in this system.About the Author:
Gilbert Held is an internationally recognized author and lecturer who specializes in the application of computer and communications technology. The author of over 40 books covering personal computers, data communications, and business trade topics, he is the only person to twice win the competitive Karp Interface Award. A winner, as well, of the American Publishers Institute and numerous other industry awards, Mr. Held was selected by Federal Computer Week as one of the top 100 persons in government, industry, and academia who has made a difference in the acquisition and use of computer systems. Among his other books are Voice Over Data Networks; Cisco Security Architecture; Cisco Router Performance Field Guide; and Voice/Data Internetworking, all from McGraw-Hill.
Kent Hundley, CCNA (Lexington, KY) is a Senior Network Engineer at INS, Inc. where he specializes in network integration and consulting. He is the co-author with Gil Held of Cisco Security Architectures.
"About this title" may belong to another edition of this title.
Book Description McGraw-Hill Companies. PAPERBACK. Book Condition: New. 0071347089 BRAND NEW NEVER USED IN STOCK 125,000+ HAPPY CUSTOMERS SHIP EVERY DAY WITH FREE TRACKING NUMBER. Bookseller Inventory # 0071347089
Book Description McGraw-Hill Companies, 1999. Paperback. Book Condition: New. book. Bookseller Inventory # 0071347089
Book Description McGraw-Hill Companies, 1999. Paperback. Book Condition: New. 1. Bookseller Inventory # DADAX0071347089
Book Description Book Condition: Brand New. Book Condition: Brand New. Bookseller Inventory # 97800713470821.0