O'Reilly - Cisco IOS Access List

















Cisco routers are used widely both on the Internet and in corporate intranets. At the same time, the Cisco Internet Operating System (IOS) has grown to be very large and complex, and Cisco documentation fills several volumes.

"Cisco IOS Access Lists" focuses on a critical aspect of the Cisco IOS--access lists. Access lists are central to the task of securing routers and networks, and administrators cannot implement access control policies or traffic routing policies without them. Access lists are used to specify both the targets of network policies and the policies themselves. They specify packet filtering for firewalls all over the Internet.

"Cisco IOS Access Lists" covers three critical areas:

Intranets. The book serves as an introduction and a reference for network engineers implementing routing policies within intranet networking.

Firewalls. The book is a supplement and companion reference to books such as Brent Chapman's "Building Internet Firewalls." Packet filtering is an integral part of many firewall architectures, and

"Cisco IOS Access Lists "describes common packet filtering tasks and provides a "bag of tricks" for firewall implementers.

The Internet. This book is also a guide to the complicated world of route maps. Route maps are an arcane BGP construct necessary to make high level routing work on the Internet.

"Cisco IOS Access Lists" differs from other Cisco router titles in that it focuses on practical instructions for setting router access policies. The details of interfaces and routing protocol settings are not discussed.

http://www.mediafire.com/?n5xg2njmp9y

Cisco Press The Complete Cisco VPN Configuration Guide


















Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution

  • A complete resource for understanding VPN components and VPN design issues
  • Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and remote access clients
  • Discover troubleshooting tips and techniques from real-world scenarios based on the author’s vast field experience
  • Filled with relevant configurations you can use immediately in your own network

With increased use of Internet connectivity and less reliance on private WAN networks, virtual private networks (VPNs) provide a much-needed secure method of transferring critical information. As Cisco Systems® integrates security and access features into routers, firewalls, clients, and concentrators, its solutions become ever more accessible to companies with networks of all sizes. The Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco® VPN products, describing how to set up IPsec and Secure Sockets Layer (SSL) connections on any type of Cisco device, including concentrators, clients, routers, or Cisco PIX® and Cisco ASA security appliances. With copious configuration examples and troubleshooting scenarios, it offers clear information on VPN implementation designs.


http://www.mediafire.com/?pvjyhj2gzxu

Security Threat Mitigation and Response: Understanding Cisco Security MARS (Networking Technology)













Dale Tesch is a product sales specialist for the Cisco Security MARS product line for the Cisco Systems® United States AT Security team. Dale came to Cisco Systems through the acquisition of Protego Networks in February 2005. Since then, he has had the primary responsibilities of training the Cisco sales and engineering team on SIM systems and Cisco Security MARS and for providing advanced sales support to Cisco customers.

Greg Abelar has been an employee of Cisco Systems since December 1996. He was an original member of the Cisco Technical Assistance Security team, helping to hire and train many of the team’s engineers. He has held various positions in both the Security Architecture and Security Technical Marketing Engineering teams at Cisco.

  • Understand how to protect your network with a defense-in-depth strategy
  • Examine real-world examples of cost savings realized by Cisco Security MARS deployments
  • Evaluate the technology that underpins the Cisco Security MARS appliance
  • Set up and configure Cisco Security MARS devices and customize them for your environment
  • Configure Cisco Security MARS to communicate with your existing hosts, servers, network devices, security appliances, and other devices in your network
  • Investigate reported threats and use predefined reports and queries to get additional information about events and devices in your network
  • Use custom reports and custom queries to generate device and event information about your network and security events
  • Learn firsthand from real-world customer stories how Cisco Security MARS has thwarted network attacks

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.


http://www.mediafire.com/?bmfgennjec1

Cisco ASA: All-in-One Firewall, Ips, and VPN Adaptive Security Appliance















Identify, mitigate, and respond to network attacks

  • Understand the evolution of security technologies that make up the unified ASA device and how to install the ASA hardware
  • Examine firewall solutions including network access control, IP routing, AAA, application inspection, virtual firewalls, transparent (Layer 2) firewalls, failover and redundancy, and QoS
  • Evaluate Intrusion Prevention System (IPS) solutions including IPS integration and Adaptive Inspection and Prevention Security Services Module (AIP-SSM) configuration
  • Deploy VPN solutions including site-to-site IPsec VPNs, remote- access VPNs, and Public Key Infrastructure (PKI)
  • Learn to manage firewall, IPS, and VPN solutions with Adaptive Security Device Manager (ASDM)

Achieving maximum network security is a challenge for most organizations. Cisco® ASA, a new unified security device that combines firewall, network antivirus, intrusion prevention, and virtual private network (VPN) capabilities, provides proactive threat defense that stops attacks before they spread through the network.

This new family of adaptive security appliances also controls network activity and application traffic and delivers flexible VPN connectivity. The result is a powerful multifunction network security device that provides the security breadth and depth for protecting your entire network, while reducing the high deployment and operations costs and complexities associated with managing multiple point products.

http://www.mediafire.com/?ttbysxcknjx

Advanced MPLS Design and Implementation (CCIE Professional Development)MPLS and VPN Architectures, Volume II (Networking Technology)




















Master the latest MPLS VPN solutions to design, deploy, and troubleshoot advanced or large-scale networks

With MPLS and VPN Architectures, Volume II, you'll learn:

  • How to integrate various remote access technologies into the backbone providing VPN service to many different types of customers
  • The new PE-CE routing options as well as other advanced features, including per-VPN Network Address Translation (PE-NAT)
  • How VRFs can be extended into a customer site to provide separation inside the customer network
  • The latest MPLS VPN security features and designs aimed at protecting the MPLS VPN backbone
  • How to carry customer multicast traffic inside a VPN
  • The latest inter-carrier enhancements to allow for easier and more scalable deployment of inter-carrier MPLS VPN services
  • Advanced troubleshooting techniques including router outputs to ensure high availability

MPLS and VPN Architectures, Volume II, builds on the best-selling MPLS and VPN Architectures, Volume I (1-58705-002-1), from Cisco Press. Extending into more advanced topics and deployment architectures, Volume II provides readers with the necessary tools they need to deploy and maintain a secure, highly available VPN.

MPLS and VPN Architectures, Volume II, begins with a brief refresher of the MPLS VPN Architecture. Part II describes advanced MPLS VPN connectivity including the integration of service provider access technologies (dial, DSL, cable, Ethernet) and a variety of routing protocols (IS-IS, EIGRP, and OSPF), arming the reader with the knowledge of how to integrate these features into the VPN backbone. Part III details advanced deployment issues including security, outlining the necessary steps the service provider must take to protect the backbone and any attached VPN sites, and also detailing the latest security features to allow more advanced topologies and filtering. This part also covers multi-carrier MPLS VPN deployments. Finally, Part IV provides a methodology for advanced MPLS VPN troubleshooting.

http://www.mediafire.com/?3v3etbiixnf