Book description
Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip through your perimeter. This acclaimed resource has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. Coverage also includes intrusion prevention systems and wireless security. You will work your way through fortifying the perimeter, designing a secure network, and maintaining and monitoring the security of the network. Additionally, discussion of tools such as firewalls, virtual private networks, routers and intrusion detection systems make Inside Network Perimeter Security, Second Edition a valuable resource for both security professionals and GIAC Certified Firewall Analyst certification exam candidates.
Table of contents
- Copyright
- About the Authors
- About the Technical Editors
- Acknowledgments
- We Want to Hear from You!
- Reader Services
- Preface
- Introduction
-
I. The Essentials of Network Perimeter Security
- 1. Perimeter Security Fundamentals
-
2. Packet Filtering
- TCP/IP Primer: How Packet Filtering Works
- TCP and UDP Ports
- TCP's Three-way Handshake
- The Cisco Router as a Packet Filter
- An Alternative Packet Filter: IPChains
- The Cisco ACL
- Effective Uses of Packet-Filtering Devices
- Egress Filtering
- Tracking Rejected Traffic
- Problems with Packet Filters
- Dynamic Packet Filtering and the Reflexive Access List
- Summary
- References
- 3. Stateful Firewalls
- 4. Proxy Firewalls
- 5. Security Policy
-
II. Fortifying the Security Perimeter
-
6. The Role of a Router
- The Router as a Perimeter Device
- The Router as a Security Device
-
Router Hardening
- Operating System
- Locking Down Administration Points
- SSH
- The Console Port
- TFTP and FTP
- Configuration Management Tricks with TFTP and Scripts
- Simple Network Management Protocol
- Disable Unneeded Services
- Configure NTP and NTP Authentication
- Cisco TCP Keepalives Services
- Unicast Reverse Path Forwarding
- Internet Control Message Protocol Blocking
- Spoofing and Source Routing
- Router Logging
- Automatic Securing and Auditing of Cisco Routers
- Summary
- 7. Virtual Private Networks
-
8. Network Intrusion Detection
- Network Intrusion Detection Basics
- The Roles of Network IDS in a Perimeter Defense
- IDS Sensor Placement
- Case Studies
- Summary
- 9. Host Hardening
- 10. Host Defense Components
-
11. Intrusion Prevention Systems
- Rapid Changes in the Marketplace
- What Is IPS?
- IPS Limitations
-
NIPS
- How Chokepoint NIPS Work
- Switch-Type NIPS
-
Switch NIPS Deployment Recommendations
- Begin Budgeting Now
- Review Products in Report-Only Mode
- Work with Vendors Identifying Test Procedures for False Positives and False Negatives
- Be Wary of Absence of Auto-Update Mechanisms
- Be Wary of Auto-Update Mechanisms
- Document a Change-Management Mechanism
- Expect the NIPS to Be Blamed for All Problems
- Use a Combination of NIPS and NIDS Where Appropriate
- Host-Based Intrusion Prevention Systems
- Summary
-
6. The Role of a Router
-
III. Designing a Secure Network Perimeter
- 12. Fundamentals of Secure Perimeter Design
- 13. Separating Resources
- 14. Wireless Network Security
-
15. Software Architecture
- Software Architecture and Network Defense
- How Software Architecture Affects Network Defense
- Software Component Placement
- Identifying Potential Software Architecture Issues
- Software Testing
- Network Defense Design Recommendations
- Case Study: Customer Feedback System
- Case Study: Web-Based Online Billing Application
- Summary
- References
- 16. VPN Integration
-
17. Tuning the Design for Performance
- Performance and Security
- Network Security Design Elements That Impact Performance
- Impact of Encryption
- Using Load Balancing to Improve Performance
- Mitigating the Effects of DoS Attacks
- Summary
- References
- 18. Sample Designs
-
IV. Maintaining and Monitoring Perimeter Security
- 19. Maintaining a Security Perimeter
- 20. Network Log Analysis
- 21. Troubleshooting Defense Components
- 22. Assessment Techniques
-
23. Design Under Fire
- The Hacker Approach to Attacking Networks
- Adversarial Review
-
GIAC GCFW Student Practical Designs
-
Practical Design 1
- Determining the Access That Remains: Screening Filtering Routers
- Protecting the Routers
- Determining the Impact: Routers
- Determining the Access That Remains: The External Firewalls
- Determining the Impact: The External Firewalls
- Determining the Access That Remains: The Internal Firewalls
- Determining the Impact: The Internal Firewall
- Repeating as Necessary: Attacking the Whole Network
-
Practical Design 2
- Determining the Access That Remains: The External Firewall
- Determining the Impact: The External Firewall
- Determining the Access That Remains: The Public Web Server
- Determining the Impact: The Public Web Server
- Determining the Access That Remains: The Extranet Server
- Determining the Impact: The Extranet Server
- Determining the Access That Remains: The Internal Firewall
- Determining the Impact: The Internal Firewall
- Repeating as Necessary: Attacking the Whole Network
-
Practical Design 1
- Summary
- References
- 24. A Unified Security Perimeter: The Importance of Defense in Depth
- V. Appendixes
Product information
- Title: Inside Network Perimeter Security, Second Edition
- Author(s):
- Release date: March 2005
- Publisher(s): Sams
- ISBN: 0672327376
You might also like
book
Network Security First-Step, Second Edition
Network Security first-step Second Edition Tom Thomas and Donald Stoddard Your first step into the world …
book
CCNP Security Firewall 642-617 Quick Reference
As a final exam preparation tool, the CCNP Security Firewall 642-617 Quick Reference provides a concise …
book
Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
The best-selling first edition of became the bible of Internet security by showing a generation of …
book
Advanced Persistent Threat
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The …