Books & Videos

Table of Contents

  1. Chapter 1 Router Security

    1. Router Security?

    2. Routers: The Foundation of the Internet

    3. What Can Go Wrong

    4. What Routers Are at Risk?

    5. Moving Forward

  2. Chapter 2 IOS Version Security

    1. The Need for a Current IOS

    2. Determining the IOS Version

    3. IOS Versions and Vulnerabilities

    4. IOS Security Checklist

  3. Chapter 3 Basic Access Control

    1. Authentication Versus Authorization

    2. Points of Access

    3. Basic Access Control

    4. Remote Administration

    5. Protection with IPSec

    6. Basic Access Control Security Checklist

  4. Chapter 4 Passwords and Privilege Levels

    1. Password Encryption

    2. Clear-Text Passwords

    3. service password-encryption

    4. Enable Security

    5. Strong Passwords

    6. Keeping Configuration Files Secure

    7. Privilege Levels

    8. Password Checklist

  5. Chapter 5 AAA Access Control

    1. Enabling AAA

    2. Local Authentication

    3. TACACS+ Authentication

    4. RADIUS Authentication

    5. Kerberos Authentication

    6. Token-Based Access Control

    7. AAA Security Checklist

  6. Chapter 6 Warning Banners

    1. Legal Issues

    2. Example Banner

    3. Adding Login Banners

    4. Warning Banner Checklist

  7. Chapter 7 Unnecessary Protocols and Services

    1. ICMP

    2. Source Routing

    3. Small Services

    4. Finger

    5. HTTP

    6. CDP

    7. Proxy ARP

    8. Miscellaneous

    9. SNMP

    10. Unnecessary Protocols and Services Checklist

  8. Chapter 8 SNMP Security

    1. SNMP Versions

    2. Securing SNMP v1 and v2c

    3. Securing SNMP v3

    4. SNMP Management Servers

    5. SNMP Security Checklist

  9. Chapter 9 Secure Routing and Antispoofing

    1. Antispoofing

    2. Routing Protocol Security

    3. Routing Protocol and Antispoofing Checklist

  10. Chapter 10 NTP

    1. NTP Overview

    2. Configuring NTP

    3. NTP Checklist

  11. Chapter 11 Logging

    1. Logging in General

    2. Router Logging

    3. ACL Violation Logging

    4. AAA Accounting

    5. Logging Checklist

  1. Appendix A Checklist Quick Reference

    1. Hardening Your Routers

    2. Auditing Your Routers

    3. Cisco Router Security Checklist

  2. Appendix B Physical Security

    1. Protection Against People

    2. Protection Against Murphy and Mother Nature

    3. Physical Security Checklist

  3. Appendix C Incident Response

    1. Warning!

    2. Keys to Investigating

    3. Attack Versus Accident

    4. Discover What Happened and the Scope of the Incident

    5. Evidence Preservation

    6. Recovering from the Incident

    7. Preventing Future Incidents

    8. Incident Response Checklist

  4. Appendix D Configuration Examples

    1. Basic Example Configuration

    2. AAA Example Configuration

    3. SNMP Example Configuration

    4. HTTP Configuration

  5. Appendix E Resources

    1. Web Sites

    2. Books

  6. Colophon