Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
8Activity

Table Of Contents

Foreword
CCIE Security Written Exam Blueprint
How to Prepare for the CCIE Security Written Exam Using This Book 7
How to Prepare for the CCIE Security Written Exam Using This Book
General Networking Topics
“Do I Know This Already?” Quiz
Networking Basics—The OSI Reference Model 21
Foundation Topics
Networking Basics—The OSI Reference Model
Layer 1: The Physical Layer
Layer 2: The Data Link Layer
Layer 3: The Network Layer
Layer 4: The Transport Layer
Layer 5: The Session Layer
Layer 6: The Presentation Layer
Layer 7: The Application Layer
TCP/IP and OSI Model Comparison
Example of Peer-to-Peer Communication
Ethernet Overview
Switching and Bridging
Bridge Port States
FastEther Channel
Internet Protocol
Variable-Length Subnet Masks
Classless Interdomain Routing
Transmission Control Protocol
TCP Mechanisms
TCP Services
Address Resolution Protocol (ARP)
Reverse ARP
Dynamic Host Configuration Protocol
Hot Standby Router Protocol
Internet Control Message Protocol
File Transfer Protocol and Trivial File Transfer Protocol
Routing Protocols
Routing Information Protocol
Border Gateway Protocol
Basic Rate and Primary Rate Interfaces
ISDN Framing and Frame Format
ISDN Layer 2 Protocols
Cisco IOS ISDN Commands
IP Multicast
Asynchronous Communications and Access Devices
Foundation Summary
Requirements for FastEther Channel 89
Requirements for FastEther Channel
Scenario 2-1: Routing IP on Cisco Routers 99
Scenario 2-1: Routing IP on Cisco Routers
Scenario 2-1 Answers: Routing IP on Cisco Routers 101
Scenario Answers
Scenario 2-1 Answers: Routing IP on Cisco Routers
Application Protocols
Domain Name System
Trivial File Transfer Protocol
File Transfer Protocol
Active FTP
Passive FTP
Hypertext Transfer Protocol
Secure Socket Layer
Simple Network Management Protocol 121
Simple Network Management Protocol
Simple Mail Transfer Protocol
Network Time Protocol
Scenario 3-1: Configuring DNS, TFTP, NTP, and SNMP
Scenario 3-1 Solutions
Cisco IOS Specifics and Security
Cisco Hardware
Random-Access Memory (RAM)
Nonvolatile RAM (NVRAM)
Central Processing Unit
Read-Only Memory
Cisco Interfaces
Saving and Loading Files
show and debug Commands
Router CLI
Debugging Cisco Routers
Password Recovery
Basic Security on Cisco Routers 179
Basic Security on Cisco Routers
IP Access Lists
Access Lists on Cisco Routers
Extended Access Lists
Scenario 4-1: Configuring Cisco Routers for Passwords and Access Lists 195
Scenario 4-1: Configuring Cisco Routers for Passwords and Access Lists
Security Protocols
Authentication, Authorization, and Accounting (AAA)
Authentication
Accounting
Remote Authentication Dial-In User Service (RADIUS)
RADIUS Configuration Task List
Terminal Access Controller Access Control System Plus (TACACS+)
TACACS+ Configuration Task List
TACACS+ Versus RADIUS
Kerberos Configuration Task List
Virtual Private Dial-Up Networks (VPDN) 229
Virtual Private Dial-Up Networks (VPDN)
Encryption Technology Overview 235
Encryption Technology Overview
Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES)
Digital Signature Standard (DSS)
Message Digest 5 (MD5) and Secure Hash Algorithm (SHA)
IP Security IPSec
Internet Key Exchange (IKE)
IKE Phase I Messages Types 1-6
IKE Phase II Message Types 1-3
Certificate Enrollment Protocol (CEP)
Scenario 5-1: Configuring Cisco Routers for IPSec 271
Scenario 5-1: Configuring Cisco Routers for IPSec
Scenario 5-1 Solutions
Operating Systems and Cisco Security Applications
UNIX Command Structure
UNIX Permissions
UNIX File Systems
Microsoft NT Systems
Browsing and Windows Names Resolution
Scaling Issues in Windows NT
Login and Permissions
Windows NT Users and Groups
Windows NT Domain Trust
Common Windows DOS Commands 295
Common Windows DOS Commands
Cisco Secure for Windows and UNIX 297
Cisco Secure for Windows and UNIX
Cisco Secure Intrusion Detection System and Cisco Secure Scanner 299
Cisco Secure Policy Manager
Cisco Secure Intrusion Detection System and Cisco Secure Scanner
NetRanger (Cisco Secure Intrusion Detection System)
NetSonar (Cisco Secure Scanner)
Cisco Security Wheel
Q & A
Scenario 6-2: UNIX File Permissions 311
Scenario 6-1: NT File Permissions
Scenario 6-2: UNIX File Permissions
Scenario 6-1 Solution
Scenario 6-2 Solution
Security Technologies
Advanced Security Concepts
Network Address Translation and Port Address Translation
NAT Operation on Cisco Routers
Cisco Private Internet Exchange (PIX)
Cisco PIX Firewall Software Features
Cisco IOS Firewall Security Feature Set
Public Key Infrastructure
Virtual Private Networks
Scenario
Scenario 7-1: Configuring a Cisco PIX for NAT
Scenario Answer
Scenario 7-1 Solution
Network Security Policies, Vulnerabilities, and Protection
Network Security Policies
Standards Bodies and Incident Response Teams
Incident Response Teams
Internet Newsgroups
Vulnerabilities, Attacks, and Common Exploits
Intrusion Detection System
Protecting Cisco IOS from Intrusion 375
Protecting Cisco IOS from Intrusion
Scenario 8-1: Defining IOS Commands to View DoS Attacks in Real Time 387
Scenario 8-1: Defining IOS Commands to View DoS Attacks in Real Time
Scenario 8-1 Solution
0 of .
Results for:
No results containing your search query
P. 1
CCIE Self Study CCIE Security Exam Cert Guide 1st Ed

CCIE Self Study CCIE Security Exam Cert Guide 1st Ed

Ratings: (0)|Views: 537|Likes:
Published by Khan Just

More info:

Published by: Khan Just on Jun 21, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/10/2014

pdf

text

original

You're Reading a Free Preview
Pages 11 to 20 are not shown in this preview.
You're Reading a Free Preview
Pages 31 to 415 are not shown in this preview.
You're Reading a Free Preview
Pages 426 to 458 are not shown in this preview.
You're Reading a Free Preview
Pages 469 to 514 are not shown in this preview.
You're Reading a Free Preview
Page 525 is not shown in this preview.

Activity (8)

You've already reviewed this. Edit your review.
byronvega liked this
1 thousand reads
1 hundred reads
Harikumar Menon liked this
Jawaid Iqbal liked this
Miguel Hernandez liked this
Nazem Arja liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->