Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
1Activity

Table Of Contents

Five Key Issues of Network Security
The Threats to Security
Defensive Strategies
Defensive Strategy Requirements
The Castle Analogy
Attacking the Castle
The Castle’s Firewall
The Castle’s Intrusion Detection
The Castle’s Back Doors
The Defense Technologies
Describing the Layers of a Defended Network
Access Control
Authentication
Authentication Tokens
Firewalls
Encryption
Passwords
Intrusion Detection Systems
Auditing
Security Auditing Basics
Security Audits
security audit:
Audit Trails
Handling and Preserving Audit Data
Legal Considerations
audit trail:
Lesson Review
RFCs
The Function of IP
The Subnet Mask
Routing
VLSM and CIDR
X-casting
Connections
Ports
Network Monitor
Wireshark
Wireshark Overview
TCP Connections
The Session Teardown Process
Analyzing the Session Teardown Process
Capturing and Identifying ICMP Messages
Continuing the Complete Session Analysis
Performing a Complete FTP Session Analysis
Implementing Cisco Banners
SSH Overview
Router Configuration to use SSH
The ARP Process
LAN-to-LAN Routing Process
LAN-to-WAN Routing Process
The Routing Process
Static and Dynamic Routing
ICMP
Source Routing
Small Services
Finger
Remaining Services
AutoSecure
Access Control List Operation
The Access List Process
The Wildcard Mask
Implementing Access Control Lists
Defending Against Attacks with ACLs
ACL Logging
Firewall Methodologies
What a Firewall Cannot Do
Implementation Options for Firewalls
Stateless and Stateful Packet Inspection
How Attackers Get Around Packet Filters
Proxy Process
Proxy Benefits
Proxy Problems
An Attack on the Bastion Host
What is a Honeypot?
Goals of the Honeypot
Legal Issues
Examining the Common Types of Firewalls
Building Firewall Rules to Control Network Communications
Common Firewall Topologies
Why Would I Want a Firewall on My Network?
What Can a Firewall Not Protect You From?
Things to Consider About Firewall Implementation
Configuring Microsoft ISA Server 2006
Introduction to ISA Server 2006
ISA Server Installation Requirements
Configuring ISA Server 2006
Exploring the Microsoft ISA Server 2006 Interface
Exporting/Importing ISA Server 2006 Configurations as XML Files
Exporting the Default Configuration
ISA Server 2006 Firewall Policies
ISA Server 2006 Access Rule Elements
Content Types
Creating a Content Group Rule Element
ISA Server 2006 Scheduling
Creating and Modifying Schedule Rule Elements
Using Content Types and Schedules in Rules
ISA Server 2006 Network Rule Elements
ISA Server Publishing Rules
ISA Server 2006 Caching
Configuring ISA Server 2006 Network Templates
Configure ISA Server 2006 in a Three-legged DMZ
Configuring ISA Server Monitoring
ISA Server 2006 Logging
Additional Configuration Options for ISA Server 2006
Packet Prioritization
Uninstalling ISA Server 2006
Firewalling in Linux
The Flow of the Chains
Configuration Options
The iptables Command
Chain Management
Rule Management
Rule Creation
Other Options
Rule Examples
Creating a Chain
Deleting a Chain
Flushing a Chain
Checking for Connections
Negating Values
Defining a Target
Complex Rules
Configuring Masquerading
Case Study
Implementing Firewall Technologies
Identifying Default IPSec Security Policies
Saving the Customized MMC Configuration
The Secure Server (Require Security) Policy
The Rules Tab for the Secure Server (Require Security) Policy
Creating Custom IPSec Policies
Creating the 1_REQUEST_AH(md5)_only Policy
Editing Authentication Method Policies
Editing the 1_REQUEST_AH(md5)_only Policy
Setting Up the Computer’s Response
Configuring AH in Both Directions
Configuring FTP
Implementing the IPSec Policy
Implementing the 1_REQUEST_AH(md5)_only Policy
Request-only Session Analysis
Implementing a Request-and-Respond Policy
Configuring a Request-and-Respond IPSec Session
Request-and-Respond Session Analysis
Analyzing the Request-and-Respond Session
Configuring the IPSec Response
AH and ESP IPSec Session Analysis
Configuring and Analyzing an IPSec Session Using AH and ESP
Configuring All the Options
Implementing the 7_REQUIRE_ AH(sha)+ESP(sha+3des) Policy
Configuring the AH-and-ESP IPSec Response Policy
Implementing the 7_RESPOND_ AH(sha)+ESP(sha+3des) Policy
Implementing the Full IPSec Session
VPN Business Drivers
VPN Types
VPN Elements
Tunneling and Security Protocols
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
IPSec
IPSec Tunnel and Transport Modes
IPSec and Network Address Translation (NAT)
VPN Implementation Challenges
VPNs and Firewalls
VPN Authentication
VPN Clients
Establishing the VPN
Returning the Classroom Setup to its Original State
The Goals of an Intrusion Detection System
What is Intrusion Detection?
Some Intrusion Detection Definitions
The IDS Matrix
IDS Components
Realistic Goals of IDS
The Intrusion Detection Process
Behavioral Use
Information Collection and Analysis
Host-based IDS Design
Centralized Host-based IDS Design
Distributed Host-based IDS Design
Describing Centralized Host-based Intrusion Detection
Network-based IDS Design
Traditional Network-based IDS Design
Distributed Network-based IDS Design
When to Analyze
Interval Analysis
Real-time Analysis
How to Analyze
Signature Analysis
An Example Signature
Statistical Analysis
Detection of Outside Threats
Detection of Inside Threats
Anticipation of Attack Monitoring
Surveillance Monitoring
Provide the Magic Solution
Manage Hardware Failures
Investigate an Attack
100 Percent Analysis
Snort Deployment
How Snort Works
Snort Fundamentals
Common Snort Commands
Using Snort as a Packet Sniffer
It’s All in the Rules
Snort Rule IDs
More Rule Options
Pre-configured Rules
Examine Denial of Service Rules
Examine Backdoor Rules
Examine Web Attack Rules
Examining Web Attack Rules
Examine Web IIS Rules
Configuring Snort to Use a Database
Snort Output Plug-ins
Configure Snort to Use a Database
Installing MySQL for Snort
MySQL User Accounts
Snort to Database Connectivity
Snort as a Service
LAMP On SuSe
Apache and PHP
Enable Snort on Linux
Configuring MySQL on Linux
Connecting Snort to a Database
Installing ADOdb and BASE
Configuring BASE
Generating Snort Events
Wireless Networking Fundamentals
Wireless Equipment
Wireless Media
Radio Wireless Media
Bluetooth
Short Message Service
IEEE 802.11
Wireless Application Protocol
Association
WLAN Topologies
Lesson Configuration
Prepare for the Ad-hoc Network
Configure the Second WNIC
Enable the Ad-Hoc Network
Enabling the Ad-Hoc Network
802.11 Framing
Access Point Configuration
Installing the Linksys WAP54G Access Point
Configure the Infrastructure Clients
Adding Infrastructure Network Clients
WLAN Threats
Wireless Transport Layer Security (WTLS)
Fundamental Access Point Security
Wired Equivalent Privacy (WEP)
Configure WEP
Installing the Netgear WPN824 Access Point
Establishing the WEP Network
Configuring WEP on the Network Client
Temporal Key Integrity Protocol (TKIP)
Extensible Authentication Protocol (EAP)
Wi-Fi Protected Access (WPA)
Configure WPA2
Supplicants
Configuring WPA2 on the Network Client
802.1x
NetStumbler
Identify Wireless Networks
OmniPeek Personal
WildPackets Drivers
OmniPeek Personal Captures
Viewing OmniPeek Personal Captures
Live Captures
Viewing Live OmniPeek Personal Captures
Non-802.11 Packets
Decode WEP
Aircrack
WEPCrack
AirSnort
Ekahau
Kismet
802.1x and EAP
EAP Types
Lightweight EAP (LEAP)
EAP with Transport Layer Security (EAP-TLS)
EAP with Tunneled Transport Layer Security (EAP- TTLS)
Protected EAP (PEAP)
0 of .
Results for:
No results containing your search query
P. 1
SCNS - Tactical Perimeter Defense

SCNS - Tactical Perimeter Defense

Ratings: (0)|Views: 42|Likes:
Published by Tran Tuan Sinh

More info:

Published by: Tran Tuan Sinh on Jul 21, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

02/17/2014

pdf

text

original

You're Reading a Free Preview
Pages 12 to 133 are not shown in this preview.
You're Reading a Free Preview
Pages 145 to 160 are not shown in this preview.
You're Reading a Free Preview
Pages 172 to 185 are not shown in this preview.
You're Reading a Free Preview
Pages 197 to 337 are not shown in this preview.
You're Reading a Free Preview
Pages 349 to 592 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->