Understanding Network Transmissions Digital Communications
Electromagnetic Interference EMI Fiber Optic Cable
Bound and Unbound Transmissions Choosing a Transmission Medium
Topology Security Ethernet Communications
Wide Area Network Topologies Private Circuit Topologies
Frame Relay and X.25 Basic Networking Hardware
Repeaters Hubs
Bridges Switches
VLAN Technology Routers
A Comparison of BridgingSwitching and Routing Layer 3 Switching
Summary
CHAPTER 5—Firewalls
Defining an Access Control Policy Definition of a Firewall
When Is a Firewall Required? Firewall Types
Static Packet Filtering Dynamic Packet Filtering
Proxies What Type of Firewall Should I Use?
Should I Run My Firewall on UNIX or NT? UNIX versus NT
NT versus UNIX You Decide…
Additional Firewall Considerations Address Translation
Firewall Logging Firewall Deployment
Summary
CHAPTER 6—Configuring Cisco Access Lists
Cisco Routers Where to Begin
Basic Security Tips Non-privilege Mode
Privilege Mode Routing
Access Control Lists Access List Basics
Standard Access Lists Extended Access Lists
Creating a Set of Access Lists Reflexive Access Lists
Additional Security Precautions Blocking Smurf at the Source
Blocking Smurf at the Bounce Site Blocking Smurf at the Target Site
Summary
CHAPTER 7—Check Point’s FireWall-1
FireWall-1 Overview FireWall-1 Support
Choosing a Platform Prepping NT for Firewall Installation
Pre-install Flight Check Installing FireWall-1
The FireWall-1 Configuration Utility FireWall-1 Security Management
Creating an Object for the Firewall Working with NAT
Working with the FireWall-1 Rules Modifying the Firewall Properties
Working with Security Servers Installing the Rules
Summary
CHAPTER 8—Intrusion Detection Systems
The FAQs about IDS IDS Limitations
Teardrop Attacks
Other Known IDS Limitations IDS Countermeasures
Host-Based IDS IDS Setup
Before You Begin RealSecure Installation
Configuring RealSecure Monitoring Events
Reporting Summary
CHAPTER 9—Authentication and Encryption
The Need for Improved Security Clear Text Transmissions
Passively Monitoring Clear Text Clear Text Protocols
Good Authentication Required Session Hijacking
Verifying the Destination Encryption 101
Methods of Encryption Encryption Weaknesses
Government Intervention Good Encryption Required
Solutions Data Encryption Standard DES
Digital Certificate Servers IP Security IPSEC
Kerberos Point-to-Point Tunneling Protocol
Remote Access Dial-In User Service RADIUS RSA Encryption
Secure Shell SSH Secure Sockets Layer SSL
Security Tokens Simple Key Management for Internet Protocols SKIP
Summary
CHAPTER 10—Virtual Private Networking