Book description
Expert guidance on designing secure networks
Understand security best practices and how to take advantage of the networking gear you already have
Review designs for campus, edge, and teleworker networks of varying sizes
Learn design considerations for device hardening, Layer 2 and Layer 3 security issues, denial of service, IPsec VPNs, and network identity
Understand security design considerations for common applications such as DNS, mail, and web
Identify the key security roles and placement issues for network security elements such as firewalls, intrusion detection systems, VPN gateways, content filtering, as well as for traditional network infrastructure devices such as routers and switches
Learn 10 critical steps to designing a security system for your network
Examine secure network management designs that allow your management communications to be secure while still maintaining maximum utility
Try your hand at security design with three included case studies
Benefit from the experience of the principal architect of the original Cisco Systems SAFE Security Blueprint
Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. The included secure network design techniques focus on making network and security technologies work together as a unified system rather than as isolated systems deployed in an ad-hoc way.
Beginning where other security books leave off, Network Security Architectures shows you how the various technologies that make up a security system can be used together to improve your network's security. The technologies and best practices you'll find within are not restricted to a single vendor but broadly apply to virtually any network system. This book discusses the whys and hows of security, from threats and counter measures to how to set up your security policy to mesh with your network architecture. After learning detailed security best practices covering everything from Layer 2 security to e-commerce design, you'll see how to apply the best practices to your network and learn to design your own security system to incorporate the requirements of your security policy. You'll review detailed designs that deal with today's threats through applying defense-in-depth techniques and work through case studies to find out how to modify the designs to address the unique considerations found in your network.
Whether you are a network or security engineer, Network Security Architectures will become your primary reference for designing and building a secure network.
This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Table of contents
- About This eBook
- Title Page
- Copyright Page
- About the Author
- Acknowledgments
- Dedication Page
- Contents at a Glance
- Table of Contents
- Icons Used in This Book
- Command Syntax Conventions
- Foreword
- Preface
-
Part I: Network Security Foundations
-
Chapter 1. Network Security Axioms
- Network Security Is a System
- Business Priorities Must Come First
- Network Security Promotes Good Network Design
- Everything Is a Target
- Everything Is a Weapon
- Strive for Operational Simplicity
- Good Network Security Is Predictable
- Avoid Security Through Obscurity
- Confidentiality and Security Are Not the Same
- Summary
- Reference
- Applied Knowledge Questions
- Chapter 2. Security Policy and Operations Life Cycle
- Chapter 3. Secure Networking Threats
- Chapter 4. Network Security Technologies
-
Chapter 1. Network Security Axioms
-
Part II: Designing Secure Networks
- Chapter 5. Device Hardening
- Chapter 6. General Design Considerations
- Chapter 7. Network Security Platform Options and Best Deployment Practices
-
Chapter 8. Common Application Design Considerations
-
DNS
- Don’t Put All Your DNS Servers in One Place
- Have More Than One Authoritative DNS Server
- Make Your External DNS Servers Nonrecursive Responders Only
- Provide Protected Internal DNS Servers
- Separate the Information Provided by External and Internal DNS Servers
- Limit Zone Transfers to Authorized Servers
- DNS Filtering Case Studies
- HTTP/HTTPS
- FTP
- Instant Messaging
- Application Evaluation
- Summary
- References
- Applied Knowledge Questions
- Chapter 9. Identity Design Considerations
- Chapter 10. IPsec VPN Design Considerations
- Chapter 11. Supporting-Technology Design Considerations
-
Chapter 12. Designing Your Security System
- Network Design Refresher
- Security System Concepts
- Impact of Network Security on the Entire Design
-
Ten Steps to Designing Your Security System
- Step 1: Review Completed Security Policy Documents
- Step 2: Analyze the Current Network Against the Security Policy
- Step 3: Select Technologies and Evaluate Product Capabilities
- Step 4: Design an Ideal Rough Draft of the Security System
- Step 5: Test Key Components in a Lab
- Step 6: Evaluate and Revise Design/Policy
- Step 7: Finalize Design
- Step 8: Implement the Security System in One Critical Area
- Step 9: Roll Out to Other Areas
- Step 10: Design/Policy Validation
- Two-Step Evaluation Checklist
- Summary
- Applied Knowledge Questions
-
Part III: Secure Network Designs
-
Chapter 13. Edge Security Design
- What Is the Edge?
- Expected Threats
- Threat Mitigation
- Identity Considerations
- Network Design Considerations
- Small Network Edge Security Design
- Medium Network Edge Security Design
- High-End Resilient Edge Security Design
- Provisions for E-Commerce and Extranet Design
- Summary
- References
- Applied Knowledge Questions
- Chapter 14. Campus Security Design
- Chapter 15. Teleworker Security Design
-
Chapter 13. Edge Security Design
-
Part IV: Network Management, Case Studies, and Conclusions
- Chapter 16. Secure Network Management and Network Security Management
- Chapter 17. Case Studies
- Chapter 18. Conclusions
- Appendix A. Glossary of Terms
- Appendix B. Answers to Applied Knowledge Questions
- Appendix C. Sample Security Policies
- Index
- Code Snippets
Product information
- Title: Network Security Architectures
- Author(s):
- Release date: April 2004
- Publisher(s): Cisco Press
- ISBN: 158705115X
You might also like
book
End-to-End Network Security: Defense-in-Depth
End-to-End Network Security Defense-in-Depth Best practices for assessing and improving network defenses and responding to security …
book
Wireless Security Architecture
Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutions Wireless Security …
book
IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS
Create and manage highly-secure Ipsec VPNs with IKEv2 and Cisco FlexVPN The IKEv2 protocol significantly improves …
book
Cisco ISE for BYOD and Secure Unified Access, 2nd Edition
Fully updated: The complete guide to Cisco Identity Services Engine solutions Using Cisco Secure Access Architecture …