Introduction |
|
xxi | |
Assessment Test |
|
xxxiv | |
|
Part I Cisco Secure PIX Firewall Advanced |
|
|
1 | (294) |
|
|
3 | (40) |
|
Understanding a Firewall's Role in Network Security |
|
|
4 | (2) |
|
|
4 | (2) |
|
What Are the Potential Threats? |
|
|
6 | (1) |
|
Reviewing Firewall Techonologies |
|
|
6 | (6) |
|
|
6 | (1) |
|
Packet-Filtering Firewalls |
|
|
7 | (1) |
|
|
8 | (1) |
|
Firewell Technology Combinations |
|
|
9 | (3) |
|
Hardware and Software Components of the Cisco Secure PIX Firewall |
|
|
12 | (6) |
|
|
12 | (1) |
|
|
13 | (5) |
|
|
18 | (4) |
|
|
19 | (1) |
|
|
20 | (1) |
|
The Adaptive Security Algorithm (ASA) and Security Levels |
|
|
21 | (1) |
|
Working with the Firewall Services Module (FWSM) |
|
|
22 | (6) |
|
Overview of Configuration |
|
|
23 | (1) |
|
Configuring an IOS Switch |
|
|
24 | (1) |
|
Configuring a CatOS switch |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
Using the PIX Firewall CLI |
|
|
28 | (9) |
|
|
28 | (1) |
|
|
28 | (2) |
|
|
30 | (1) |
|
|
30 | (7) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
39 | (2) |
|
Answers to Review Questions |
|
|
41 | (2) |
|
PIX Firewall Configuration |
|
|
43 | (60) |
|
Preparing for Firewall Configuration |
|
|
44 | (1) |
|
Using Common Global Configuration Commands |
|
|
45 | (8) |
|
The Remote Access Commands |
|
|
45 | (2) |
|
|
47 | (1) |
|
|
48 | (1) |
|
The domain-name and hostname Commands |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (2) |
|
|
52 | (1) |
|
Configuring PIX Firewall Interfaces |
|
|
53 | (6) |
|
Naming an Interface and Assigning a Security Level |
|
|
53 | (3) |
|
Setting Interface Properties and Shutting Down the Interface |
|
|
56 | (1) |
|
|
57 | (1) |
|
Setting the Maximum Tranfer Unit |
|
|
58 | (1) |
|
|
59 | (26) |
|
Understanding Address Translation |
|
|
59 | (4) |
|
|
63 | (1) |
|
|
64 | (9) |
|
|
73 | (4) |
|
Configuring NAT on Multiple Interfaces |
|
|
77 | (8) |
|
|
85 | (7) |
|
Configuring Dynamic Routing |
|
|
86 | (1) |
|
Configuring Static Routing |
|
|
87 | (3) |
|
Configuring Multicast Routing |
|
|
90 | (2) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
93 | (6) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
97 | (2) |
|
|
99 | (2) |
|
Answer to Review Questions |
|
|
101 | (2) |
|
ACLs, Filtering, Object Grouping, and AAA |
|
|
103 | (44) |
|
|
104 | (4) |
|
|
105 | (1) |
|
|
106 | (1) |
|
Converting Conduits to ACLs |
|
|
106 | (2) |
|
|
108 | (3) |
|
How Does URL Filtering Works? |
|
|
108 | (1) |
|
Configuring the PIX Firewall for URL Filtering |
|
|
108 | (3) |
|
PPPoE and the PIX Firewall |
|
|
111 | (4) |
|
Configuring the PPPoE Client Username and Passwrd |
|
|
111 | (1) |
|
Enabling PPPoE and the PIX Firewall |
|
|
112 | (1) |
|
Verifying PPPoE Operation |
|
|
113 | (2) |
|
|
115 | (4) |
|
Configuring Objects Groups |
|
|
115 | (4) |
|
|
119 | (1) |
|
Authentication, Authorization, and Accounting (AAA) Services |
|
|
119 | (15) |
|
Installing CiscoSecure ACS for Windows 2000/NT |
|
|
120 | (5) |
|
Implementing AAA on the PIX Firewall |
|
|
125 | (7) |
|
|
132 | (2) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (6) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
140 | (2) |
|
|
142 | (2) |
|
|
144 | (1) |
|
Answer to Review Questions |
|
|
145 | (2) |
|
Advanced Protocol Handling, Attack Guards, and Intrusion Detection |
|
|
147 | (42) |
|
Advanced Protocol Handling |
|
|
148 | (11) |
|
Special Protocol Support Basics |
|
|
149 | (2) |
|
|
151 | (3) |
|
|
154 | (1) |
|
|
154 | (2) |
|
|
156 | (2) |
|
Alternative Solutions to Problem Protocols |
|
|
158 | (1) |
|
|
159 | (10) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (4) |
|
|
165 | (3) |
|
|
168 | (1) |
|
|
169 | (7) |
|
|
169 | (6) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (6) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
181 | (3) |
|
|
184 | (2) |
|
Answers to the Written Lab |
|
|
186 | (1) |
|
Answer To Review Questions |
|
|
187 | (2) |
|
Firewall Failover and PDM |
|
|
189 | (38) |
|
|
190 | (5) |
|
|
190 | (4) |
|
Fault-Tolerant Strategies |
|
|
194 | (1) |
|
|
195 | (13) |
|
PIX Firewall Failover Features |
|
|
195 | (1) |
|
PIX Firewall Failover Requirements |
|
|
195 | (1) |
|
How PIX Firewall Failover Works |
|
|
196 | (7) |
|
|
203 | (1) |
|
Basic Failover Configuration |
|
|
204 | (4) |
|
Cisco PIX Device Manager (PDM) |
|
|
208 | (12) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
210 | (2) |
|
Using PDM to Configure the PIX Firewall |
|
|
212 | (8) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
223 | (2) |
|
|
225 | (1) |
|
Answers to Review Questions |
|
|
226 | (1) |
|
VPNs and the PIX Firewall |
|
|
227 | (68) |
|
Preparing to Configure VPN support |
|
|
228 | (1) |
|
Configuring IKE on a Firewall |
|
|
229 | (8) |
|
|
229 | (1) |
|
Configuring the IKE Policy |
|
|
230 | (1) |
|
Configuring Preshared Keys |
|
|
231 | (1) |
|
Configuring the Use of Certificate Authorities (CAs) on a Firewall |
|
|
232 | (5) |
|
Configuring IPSec on a Firewall |
|
|
237 | (7) |
|
|
237 | (1) |
|
Creating and Configuring Transform Sets |
|
|
238 | (2) |
|
Setting the Tunnel Lifetime |
|
|
240 | (1) |
|
|
241 | (3) |
|
Verifying and Troubleshooting IPSec Configuration on a Firewall |
|
|
244 | (4) |
|
Viewing Configuration Information |
|
|
244 | (3) |
|
Understanding Error Messages |
|
|
247 | (1) |
|
|
248 | (1) |
|
Understanding Remote Access VPN |
|
|
248 | (5) |
|
Extended Authentication (Xauth) |
|
|
248 | (1) |
|
IKE Mode Config for Dynamic Addressing |
|
|
249 | (1) |
|
Pushing Additional Attributes to the VPN Client |
|
|
250 | (1) |
|
|
251 | (2) |
|
Installing and Configuring the Cisco VPN Client |
|
|
253 | (8) |
|
|
255 | (6) |
|
|
261 | (12) |
|
Setting Up a Site-to-Site VPN |
|
|
263 | (5) |
|
Setting Up a Remote Access VPN |
|
|
268 | (5) |
|
Enterprise PIX Firewall Management and Maintenance |
|
|
273 | (8) |
|
Cisco Secure Policy Manager (CSPM) |
|
|
273 | (2) |
|
PIX Management Center (MC) |
|
|
275 | (2) |
|
|
277 | (4) |
|
|
281 | (1) |
|
|
281 | (1) |
|
|
282 | (1) |
|
|
282 | (1) |
|
|
283 | (8) |
|
|
286 | (1) |
|
|
286 | (1) |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
287 | (1) |
|
|
288 | (3) |
|
|
291 | (2) |
|
Answers to the Written Lab |
|
|
293 | (1) |
|
Answers to Review Questions |
|
|
294 | (1) |
|
Part II Cisco Secure Virtual Private Networks |
|
|
295 | (192) |
|
Introduction to Virtual Private Networks |
|
|
297 | (32) |
|
|
298 | (4) |
|
|
298 | (1) |
|
|
299 | (3) |
|
|
302 | (15) |
|
|
303 | (1) |
|
IPSec Building Blocks: AH and ESP |
|
|
303 | (4) |
|
|
307 | (2) |
|
|
309 | (1) |
|
Diffie-Hellman Key Exchange |
|
|
309 | (2) |
|
|
311 | (2) |
|
|
313 | (2) |
|
IPSec Security Associations |
|
|
315 | (2) |
|
|
317 | (5) |
|
Defining Interesting Traffic |
|
|
317 | (1) |
|
|
318 | (2) |
|
|
320 | (1) |
|
|
320 | (2) |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
323 | (1) |
|
|
323 | (1) |
|
|
323 | (1) |
|
|
324 | (1) |
|
|
325 | (3) |
|
Answers to Review Questions |
|
|
328 | (1) |
|
Introduction to Cisco VPN Devices |
|
|
329 | (54) |
|
Introducting the VPN 3000 Concentrators |
|
|
330 | (6) |
|
Overview of the VPN 3005 Concentrator |
|
|
331 | (2) |
|
Overview of VPN 3015 through 3080 Concentrators |
|
|
333 | (2) |
|
VPN Concentrator Client Support |
|
|
335 | (1) |
|
Introducing the 3002 VPN Hardware Client |
|
|
336 | (20) |
|
Configuring the 3002 CLI Quick Configuration Utility |
|
|
337 | (4) |
|
Configuring the Hardware Client with the Quick Configuration Utility |
|
|
341 | (8) |
|
Managing the Hardware Client |
|
|
349 | (1) |
|
Additional VPN 3002 Client Features |
|
|
349 | (7) |
|
Introducing the VPN Software Clients |
|
|
356 | (9) |
|
Configurating the Connection |
|
|
357 | (1) |
|
Setting Authentication Properties |
|
|
357 | (1) |
|
Setting Connection Properties |
|
|
358 | (1) |
|
|
359 | (3) |
|
Preconfiguring the VPN Client |
|
|
362 | (3) |
|
Overview of the Cisco VPN Software Client Auto-Initiation |
|
|
365 | (2) |
|
|
367 | (1) |
|
|
367 | (1) |
|
|
368 | (1) |
|
|
368 | (2) |
|
Answers to the Written Lab |
|
|
370 | (1) |
|
|
371 | (9) |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
375 | (1) |
|
|
376 | (1) |
|
|
377 | (1) |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
378 | (2) |
|
|
380 | (2) |
|
Answers to Review Questions |
|
|
382 | (1) |
|
Configuring the VPN Concentrator |
|
|
383 | (70) |
|
Using the CLI for Initial Configuration |
|
|
386 | (7) |
|
|
386 | (7) |
|
Using Web Quick Configuration Mode |
|
|
393 | (6) |
|
Configuring Physical Interfaces |
|
|
395 | (1) |
|
Setting System Information |
|
|
395 | (1) |
|
Setting the Tunnel-Creation Method |
|
|
396 | (1) |
|
Setting Address Assignment |
|
|
396 | (1) |
|
Configuring Authentication |
|
|
397 | (2) |
|
|
399 | (1) |
|
Changing the Admin Password |
|
|
399 | (1) |
|
Configuring User and Policy Management |
|
|
399 | (25) |
|
|
400 | (1) |
|
|
401 | (8) |
|
|
409 | (1) |
|
Configuring an Authentication Server |
|
|
409 | (1) |
|
Configuring Access Hours and Filters |
|
|
410 | (3) |
|
Configuring Backup on the Hardware Client |
|
|
413 | (1) |
|
Configuring Load Balancing |
|
|
414 | (2) |
|
Configuring LAN-to-LAN IPSec |
|
|
416 | (2) |
|
Updating Clients Automatically |
|
|
418 | (3) |
|
Setting Up the Stateful Firewall |
|
|
421 | (3) |
|
Configuring the Use of IPSec Digital Certificates |
|
|
424 | (12) |
|
Introducing the Public Key Infrastructure |
|
|
424 | (1) |
|
Requesting and Installing Concentrator Certificates |
|
|
425 | (8) |
|
Requesting and Installing Client Certificates |
|
|
433 | (3) |
|
Firewall Feature Set for the IPSec Software Client |
|
|
436 | (3) |
|
Software Client's ``Are You There'' Feature |
|
|
436 | (1) |
|
Software Clients Stateful Firewall Feature |
|
|
436 | (1) |
|
Software Client's Central Policy Protection Feature |
|
|
437 | (1) |
|
Client Firewall Statistics |
|
|
437 | (2) |
|
Customizing Firewall Policy |
|
|
439 | (1) |
|
Configure the VPN 3000 Concentrator for IPSec over UDP and IPSec over TCP |
|
|
439 | (4) |
|
Overview of Port Address Translation |
|
|
440 | (1) |
|
Configuring IPSec over UDP |
|
|
441 | (1) |
|
Configuring NAT-Transversal |
|
|
442 | (1) |
|
Configuring IPSec over TCP |
|
|
443 | (1) |
|
|
443 | (1) |
|
|
444 | (1) |
|
|
445 | (1) |
|
|
445 | (1) |
|
|
446 | (3) |
|
|
447 | (1) |
|
|
448 | (1) |
|
|
449 | (2) |
|
Answers to Review Questions |
|
|
451 | (1) |
|
Answers to the Written Lab |
|
|
452 | (1) |
|
Managing the VPN Concentrator |
|
|
453 | (34) |
|
Monitoring the VPN Concentrator |
|
|
454 | (17) |
|
Viewing Concentrator Monitoring Information |
|
|
455 | (10) |
|
Configuring Logging and SNMP Traps |
|
|
465 | (6) |
|
Administering the VPN Concentrator |
|
|
471 | (9) |
|
Configuring Access Rights |
|
|
471 | (4) |
|
|
475 | (1) |
|
Administering File Management |
|
|
476 | (2) |
|
|
478 | (1) |
|
|
479 | (1) |
|
|
480 | (7) |
|
|
480 | (1) |
|
|
481 | (1) |
|
|
481 | (1) |
|
|
482 | (2) |
|
Answers to the Written Lab |
|
|
484 | (1) |
|
Answers to Review Questions |
|
|
485 | (2) |
Glossary |
|
487 | (12) |
Index |
|
499 | |