—Firewalls —Configuring Cisco Access Lists —Check Point’s FireWall-1 —Intrusion Detection Systems —Authentication and Encryption

Understanding Network Transmissions Digital Communications Electromagnetic Interference EMI Fiber Optic Cable Bound and Unbound Transmissions Choosing a Transmission Medium Topology Security Ethernet Communications Wide Area Network Topologies Private Circuit Topologies Frame Relay and X.25 Basic Networking Hardware Repeaters Hubs Bridges Switches VLAN Technology Routers A Comparison of BridgingSwitching and Routing Layer 3 Switching Summary

CHAPTER 5—Firewalls

Defining an Access Control Policy Definition of a Firewall When Is a Firewall Required? Firewall Types Static Packet Filtering Dynamic Packet Filtering Proxies What Type of Firewall Should I Use? Should I Run My Firewall on UNIX or NT? UNIX versus NT NT versus UNIX You Decide… Additional Firewall Considerations Address Translation Firewall Logging Firewall Deployment Summary

CHAPTER 6—Configuring Cisco Access Lists

Cisco Routers Where to Begin Basic Security Tips Non-privilege Mode Privilege Mode Routing Access Control Lists Access List Basics Standard Access Lists Extended Access Lists Creating a Set of Access Lists Reflexive Access Lists Additional Security Precautions Blocking Smurf at the Source Blocking Smurf at the Bounce Site Blocking Smurf at the Target Site Summary

CHAPTER 7—Check Point’s FireWall-1

FireWall-1 Overview FireWall-1 Support Choosing a Platform Prepping NT for Firewall Installation Pre-install Flight Check Installing FireWall-1 The FireWall-1 Configuration Utility FireWall-1 Security Management Creating an Object for the Firewall Working with NAT Working with the FireWall-1 Rules Modifying the Firewall Properties Working with Security Servers Installing the Rules Summary

CHAPTER 8—Intrusion Detection Systems

The FAQs about IDS IDS Limitations Teardrop Attacks Other Known IDS Limitations IDS Countermeasures Host-Based IDS IDS Setup Before You Begin RealSecure Installation Configuring RealSecure Monitoring Events Reporting Summary

CHAPTER 9—Authentication and Encryption

The Need for Improved Security Clear Text Transmissions Passively Monitoring Clear Text Clear Text Protocols Good Authentication Required Session Hijacking Verifying the Destination Encryption 101 Methods of Encryption Encryption Weaknesses Government Intervention Good Encryption Required Solutions Data Encryption Standard DES Digital Certificate Servers IP Security IPSEC Kerberos Point-to-Point Tunneling Protocol Remote Access Dial-In User Service RADIUS RSA Encryption Secure Shell SSH Secure Sockets Layer SSL Security Tokens Simple Key Management for Internet Protocols SKIP Summary

CHAPTER 10—Virtual Private Networking