图书介绍

CCIE实验指南 Security 英文版PDF|Epub|txt|kindle电子书版本下载

CCIE实验指南 Security 英文版
  • (美)梅森(Mason,A.)等著 著
  • 出版社: 北京:人民邮电出版社
  • ISBN:7115127255
  • 出版时间:2004
  • 标注页数:1071页
  • 文件大小:98MB
  • 文件页数:1104页
  • 主题词:计算机网络-工程技术人员-资格考核-自学参考资料-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

CCIE实验指南 Security 英文版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

Part Ⅰ The CCIE Program and Your Lab Environment3

Chapter 1 The CCIE Security Program5

The Cisco CCIE Program5

The CCIE Security Exam5

Qualification Exam6

Lab Exam9

Summary10

Chapter 2 Building a CCIE Mind-Set13

What It Takes to Become a CCIE13

Developing Proper Study Habits14

Good Study Habits15

Common Study Traps16

Lab Experience Versus Real-World Experience18

Summary19

Chapter 3 Building the Test Laboratory21

Study Time on a Lab21

Work-Based Study Lab22

Home-Based Study Lab22

Remote Lab23

Planning Your Home Lab23

Sourcing the Lab Equipment24

Windows-based Products and UNIX26

Designing Your Practice Lab for This Book26

Summary27

Part Ⅱ Connectlvity29

Chapter 4 Layer 2 and Layer 3 Switching and LAN Connectivity31

Catalyst Operating System31

Switching Overview32

Switching Technologies32

Transparent Bridging33

Spanning Tree Overview34

Bridge Protocol Data Unit35

Election Process37

Spanning-Tree Interface States38

Spanning-Tree Address Management40

STP and IEEE 802.1q Trunks40

VLAN-Bridge STP41

STP and Redundant Connectivity41

Accelerated Aging to Retain Connectivity41

RSTP and MSTP42

Layer 3 Switching Overview42

Virtual LAN Overview42

Assigning or Modifying VLANs44

Deleting VLANs45

Configuring Extended-Range VLANs46

VLAN Trunking Protocol Overview46

The VTP Domain46

VTP Modes46

VTP Passwords47

VTP Advertisements47

VTP Version 248

VTP Pruning49

VTP Configuration Guidelines50

Displaying VTP50

Switch Interface Overview51

Access Ports51

Trunk Ports51

Routed Ports52

EtherChannel Overview53

Port-Channel Interfaces54

Understanding the Port Aggregation Protocol54

EtherChannel Load Balancing and Forwarding Methods55

EtherChannel Configuration Guidelines56

Creating Layer 2 EtherChannels57

Optional Configuration Items57

BPDU Guard57

BPDU Filtering58

UplinkFast58

BackboneFast59

Loop Guard59

Switched Port Analyzer Overview59

SPAN Session60

Configuring SPAN60

Basic Catalyst 3550 Switch Configuration63

Case Study 4-1: Basic Network Connectivity63

Case Study 4-2: Configuring Interfaces70

Case Study 4-3: Configuring PortFast72

Case Study 4-4: Creating a Layer 2 EtherChannel72

Case Study 4-5: Creating Trunks73

Case Study 4-6: Configuring Layer 3 EtherChannels74

Case Study 4-7: EtherChannel Load Balancing76

Case Study 4-8: Configuring a Routed Port77

Case Study 4-9: Configuring SPAN78

Summary80

Review Questions80

FAQs81

Chapter 5 Frame Relay Connectivity83

Frame Relay Overview83

Frame Relay Devices85

Frame Relay Topologies86

Star Topologies86

Fully Meshed Topologies87

Partially Meshed Topologies87

Frame Relay Subinterfaces88

Frame Relay Virtual Circuits89

Switched Virtual Circuits90

Permanent Virtual Circuits91

Frame Relay Signaling91

LMI Frame Format92

LMI Timers93

LMI Autosense95

Network-to-Network Interface95

User-Network Interface96

Congestion-Control Mechanisms96

Frame Relay Discard Eligibility98

DLCI Priority Levels98

Frame Relay Error Checking99

Frame Relay ForeSight99

Frame Relay Congestion Notification Methods100

Frame Relay End-to-End Keepalives100

Configuring Frame Relay102

Case Study 5-1: Configuring Frame Relay102

Case Study 5-2: Configuring Frame Relay SVCs109

Case Study 5-3: Frame Relay Traffic Shaping114

Creating a Broadcast Queue for an Interface119

Transparent Bridging and Frame Relay120

Configuring a Backup Interface for a Subinterface120

TCP/IP Header Compression121

Configuring an Individual IP Map for TCP/IP Header Compression121

Configuring an Interface for TCP/IP Header Compression122

Disabling TCP/IP Header Compression122

Troubleshooting Frame Relay Connectivity122

The show frame-relay lmi Command122

The show frame-relay pvc Command123

The show frame-relay map Command125

The debug frame-relay lmi Command125

Summary126

Review Questions127

FAQs128

Chapter 6 ISDN Connectivity133

ISDN Overview133

ISDN Standards Support133

ISDN Digital Channels134

ISDN Terminal Equipment and Network Termination Devices134

Reference Points135

ISDN Layers and Call Stages136

Point-to-Point Protocol (PPP) Overview139

Link Control Protocol (LCP)139

Network Control Protocol (NCP)140

Dial-on-Demand Routing (DDR) Overview141

Configuring ISDN142

Lesson 6-1: Beginning ISDN Configuration142

Lesson 6-2: Configuring DDR144

Lesson 6-3: Routing Over ISDN149

Lesson 6-4: Configuring the Interface and Backup Interface157

Lesson 6-5: Configuring PPP Options160

Lesson 6-6: Configuring Advanced Options161

Lesson 6-7: Monitoring and Troubleshooting ISDN169

Summary178

Review Questions178

FAQs180

Chapter 7 ATM Connectivity183

ATM Overview183

Configuring ATM184

Lesson 7-1: RFC 2684: Multiprotocol Encapsulation over AAL5185

Lesson 7-2: RFC 2225: Classical IP and ARP over ATM191

Summary195

Review Questions195

FAQs196

Part Ⅲ IP Routing199

Chapter8 RIP201

RIP Structure201

Routing Updates and Timers201

Routing Metric202

Split-Horizon Issues202

RIP and Default Routes203

RIPvl Versus RIPv2203

Configuring RIP203

Case Study 8-1: Basic RIP Configuration204

Case Study 8-2: RIPv1 over Router to PIX 5.2 Connection221

Case Study 8-3:RIPv2 over Router to PIX 6.2 Connection withAuthentication225

Lesson 8-1: Advanced RIP Configuration233

Summary235

Review Questions235

FAQs236

Chapter9 EIGRP239

An EIGRP Overview240

Configuring EIGRP241

Lesson 9-1: Configuring Simple EIGRP241

EIGRP Building Blocks243

Packet Formats243

EIGRP Tables244

Feasible Successors250

Route States250

Route Tagging251

IGRP and EIGRP Interoperability251

An Example of DUAL in Action251

Configuring EIGRP Options253

Lesson 9-2: Adding a WAN Connection253

Lesson 9-3: Logging Neighbor Adjacency Changes255

Lesson 9-4: Disabling Route Summarization256

Lesson 9-5: Configuring Manual Route Summarization258

Lesson 9-6: Configuring Default Routing259

Lesson 9-7: Controlling EIGRP Routes261

Lesson 9-8: Redistributing EIGRP with Route Controls263

Lesson 9-9: Configuring EIGRP Route Authentication263

Lesson 9-10: Configuring EIGRP Stub Routing264

Lesson 9-11: Configuring EIGRP Over GRE Tunnels266

Lesson 9-12: Disabling EIGRP Split Horizon269

Troubleshooting EIGRP270

Summary272

Review Questions272

FAQs273

Chapter 10 OSPF277

Configuring OSPF278

Case Study 10-1: Basic OSPF Configuration279

Case Study 10-2: OSPF and Route Summarization306

Case Study 10-3: OSPF Filtering310

Case Study 10-4: OSPF and Non-IP Traffic over GRE312

Monitoring and Maintaining OSPF315

Verifying OSPF ABR Type 3 LSA Filtering316

Displaying OSPF Update Packet Pacing317

Summary317

Review Questions317

FAQs318

Chapter 11 IS-IS321

Integrated IS-IS Overview321

Configuring IS-IS322

Case Study 11-1: Configuring IS-IS for IP322

IS-IS Building Blocks328

The IS-IS State Machine330

The Receive Process330

The Update Process331

The Decision Process331

The Forward Process331

Pseudonodes331

IS-IS Addressing333

The Simplified NSAP Format333

Addressing Requirements334

Limiting LSP Flooding335

Blocking Flooding on Specific Interfaces335

Configuring Mesh Groups336

Generating a Default Route336

Route Redistribution337

Setting IS-IS Optional Parameters338

Setting the Advertised Hello Interval339

Setting the Advertised CSNP Interval339

Setting the Retransmission Interval339

Setting the LSP Transmission Interval339

Configuring IS-IS Authentication340

Case Study 11-2: IS-IS Authentication340

Authentication Problems345

Using show and debug Commands346

Monitoring IS-IS346

Debugging IS-IS346

Summary348

Review Questions348

FAQs349

Chapter12 BGP351

Understanding BGP Concepts351

Autonomous Systems351

BGP Functionality352

EBGP and IBGP352

BGP Updates353

Configuring BGP353

Case Study 12-1: Single-Homed Autonomous System Setup354

Case Study 12-2: Transit Autonomous System Setup363

Case Study 12-3: BGP Confederations372

Case Study 12-4: BGP Over a Firewall with a Private Autonomous System377

Case Study 12-5: BGP Through a Firewall with Prepend386

Summary394

Review Questions394

FAQ395

Chapter13 Redistribution397

Metrics397

Administrative Distance398

Classless and Classfui Capabilities398

Avoiding Problems Due to Redistribution399

Configuring Redistribution of Routing Information399

Redistributing Connected Networks into OSPF402

Lesson 13-1: Redistributing OSPF into Border Gateway Protocol402

Lesson 13-2: Redistributing OSPF Not-So-Stubby Area External Routes into BGP405

Lesson 13-3: Redistributing Routes Between OSPF and RIP Version 1407

Lesson 13-4: Redistributing Between Two EIGRP Autonomous Systems408

Lesson 13-5: Redistributing Routes Between EIGRP and IGRP in Two Different Autonomous Systems409

Lesson 13-6: Redistributing Routes Between EIGRP and IGRP in the Same Autonomous System411

Redistributing Routes to and from Other Protocols from EIGRP412

Lesson 13-7: Redistributing Static Routes to Interfaces with EIGRP412

Lesson 13-8: Redistributing Directly Connected Networks413

Lesson 13-9: Filtering Routing Information416

Summary421

Review Questions422

FAQs423

Part Ⅳ Security Practices425

Chapter 14 Security Primer427

Important Security Acronyms428

White Hats Versus Black Hats432

Cisco Security Implementations432

Cisco IOS Security Overview433

CatalystOS Security Overview434

VPN Overview435

AAA Overview436

IDS Fundamentals436

Summary437

Review Questions437

FAQs438

Chapter 15 Basic Cisco IOS Software and Catalyst 3550 Series Security441

Cisco IOS Software Security441

Network Time Protocol Security441

HTTP Server Security442

Password Management442

Access Lists443

Secure Shell443

Basic IOS Security Configuration443

Lesson 15-1: Configuring Passwords, Privileges, and Logins444

Lesson 15-2: Disabling Services451

Lesson 15-3: Setting up a Secure HTTP Server456

Case Study 15-1: Secure NTP Configuration458

Case Study 15-2: Configuring SSH464

Catalyst 3550 Security467

Lesson 15-4: Port-Based Traffic Control467

Summary472

Review Questions473

FAQs474

Chapter 16 Access Control Lists477

Overview of Access Control Lists477

Where to Configure an ACL478

When to Configure an ACL479

ACLs on the IOS Router and the Catalyst 3550 Switch480

Basic ACLs480

Advanced ACLs482

Time-of-Day ACLs483

Lock-and-Key ACLs484

Why You Should Use Lock-and-Key485

When You Should Use Lock-and-Key485

Source-Address Spoofing and Lock-and-Key485

Lock-and-Key Configuration Tips485

Verifying Lock-and-Key Configuration487

Maintaining Lock-and-Key487

Manually Deleting Dynamic Access List Entries487

Reflexive ACLs488

Reflexive ACL Benefits and Restrictions489

Reflexive ACL Design Considerations489

Router ACLs490

Port ACLs490

VLAN Maps491

Using VLAN Maps with Router ACLs491

Fragmented and Unfragmented Traffic493

Logging ACLs494

Defining ACLs495

The Implied “Deny All Traffic” ACE Statement495

ACE Entry Order496

Applying ACLs to Interfaces496

Lesson 16-1: Configuring an ACL498

Lesson 16-2: Creating a Numbered Standard IP ACL502

Lesson 16-3: Creating a Numbered Extended IP ACL502

Lesson 16-4: Creating a Named Standard IP ACL503

Lesson 16-5: Creating a Named Extended IP ACL503

Lesson 16-6: Implementing Time of Day and ACLs504

Lesson 16-7: Configuring Lock-and-Key506

Lesson 16-8: Configuring Reflexive ACLs507

Lesson 16-9: Logging ACLs511

Lesson 16-10: Configuring a Named MAC Extended ACL512

Creating a VLAN Map513

Lesson 16-11: Using ACLs with VLAN Maps513

Maintaining ACLs514

Displaying ACL Resource Usage515

Troubleshooting Configuration Issues516

ACL Configuration Size517

Unsupported Features on the Catalyst 3550 Switch518

Summary519

Review Questions519

FAQs520

Chapter 17 IP Services523

Managing IP Connections523

ICMP Unreachable Messages524

ICMP Redirect Messages524

ICMP Mask Reply Messages525

IP Path MTU Discovery525

MTU Packet Size526

IP Source Routing526

Simplex Ethernet Interfaces527

DRP Server Agents527

Filtering IP Packets Using Access Lists527

Hot Standby Router Protocol Overview528

HSRP and ICMP Redirects528

IP Accounting Overview530

IP MAC Accounting530

IP Precedence Accounting531

Configuring TCP Performance Parameters531

Compressing TCP Packet Headers532

Setting the TCP Connection Attempt Time533

Using TCP Path MTU Discovery533

Using TCP Selective Acknowledgment534

Using TCP Time Stamps534

Setting the TCP Maximum Read Size534

Setting the TCP Window Size535

Setting the TCP Outgoing Queue Size535

Configuring the MultiNode Load Balancing Forwarding Agent535

Configuring the MNLB Forwarding Agent536

Network Address Translation Overview537

When to Use NAT539

Configuring IP Services539

Lesson 17-1: Configuring ICMP Redirects539

Lesson 17-2: Configuring the DRP Server Agent540

Lesson 17-3: Configuring HSRP541

Lesson 17-4: Configuring IP Accounting548

Lesson 17-5: Configuring NAT549

Monitoring and Maintaining IP Services555

Verifying HSRP Support for MPLS VPNs556

Displaying System and Network Statistics556

Clearing Caches, Tables, and Databases557

Monitoring and Maintaining the DRP Server Agent558

Clearing the Access List Counters558

Monitoring the MNLB Forwarding Agent558

Monitoring and Maintaining HSRP Support for ICMP Redirect Messages558

Monitoring and Maintaining NAT559

Summary559

Review Questions560

FAQs561

Part V Authentication and Virtual Private Networks565

Chapter 18 AAA Services567

TACACS+ Versus RADIUS567

Underlying Protocols567

Packet Encryption568

Authentication, Authorization, and Accounting Processes568

Router Management568

Interoperability568

Traffic569

Configuring AAA569

Case Study 18-1: Simplified AAA Configuration Using RADIUS569

Case Study 18-2: Configuring AAA on a PIX Firewall581

Case Study 18-3: Configuring VPN Client Remote Access593

Case Study 18-4: Authentication Proxy with TACACS+610

Case Study 18-5: Privilege Levels with TACACS+617

Case Study 18-6: Configuring PPP Callback with TACACS+621

Summary627

Review Questions627

FAQs628

Chapter 19 Virtual Private Networks631

Virtual Private Network (VPN) Overview631

Site-to-Site VPNs631

Remote-Access VPNs633

IPSec Overview633

Authentication Header (AH)634

Encapsulating Security Payload (ESP)635

IPSec Protocol Suite636

Tunnel and Transport Modes639

IPSec Operation640

Defining Interesting Traffic641

IKE Phase 1641

IKE Phase 2642

IPSec Encrypted Tunnel643

Tunnel Termination643

Configuring IPSec in Cisco IOS Software and PIX Firewalls643

Case Study 19-1: Configuring a Basic IOS-to-IOS IPSec VPN644

Case Study 19-2: Configuring a Basic PIX-to-PIX IPSec VPN671

Certificate Authority (CA) Support695

Configuring CA696

IOS-to-IOS VPN Using CA696

PIX-to-PIX VPN Using CA703

Summary710

Review Questions711

FAQs712

Chapter 20 Advanced Virtual Private Networks715

Issues with Conventional IPSec VPNs715

Solving IPSec Issues with GREs716

Solving IPSec Issues with DMVPNs716

Configuring Advanced VPNs718

Case Study 20-1: Using Dynamic Routing Over IPSec-Protected VPNs718

Case Study 20-2: Configuring DMVPN732

Summary745

Review Questions746

FAQs747

Chapter 21 Virtual Private Dialup Networks749

L2F and L2TP Overview749

VPDN Process Overview749

PPTP Overview751

Configuring VPDNs752

Case Study 21-1: Configuring the VPDN to Work with Local AAA752

Case Study 21-2: Configuring TACACS+ Authentication and Authorization for VPDN761

Case Study 21-3: Configuring the PIX Firewall to Use PPTP766

Lesson 21-1: Configuring the Default VPDN Group Template768

Summary769

Review Questions770

FAQs771

Part Ⅵ Firewalls773

Chapter 22 Cisco IOS Firewall775

Creating a Customized Firewall776

Configuring TCP Intercept776

Lesson 22-1: Configuring TCP Intercept778

CBAC Overview781

Traffic Filtering781

Traffic Inspection782

Alerts and Audit Trails782

Intrusion Detection783

CBAC Limitations and Restrictions783

CBAC Operation784

When and Where to Configure CBAC790

CBAC-Supported Protocols790

Using IPSec with CBAC791

Lesson 22-2: Configuring CBAC791

Monitoring and Maintaining CBAC798

Turning Off CBAC802

Case Study 22-1: Configuring CBAC on Two Interfaces802

Port-to-Application Mapping (PAM)806

How PAM Works806

When to Use PAM808

Lesson 22-3: Configuring PAM808

Monitoring and Maintaining PAM810

Summary810

Review Questions810

FAQs811

Chapter23 Cisco PIX Firewall813

Security Levels and Address Translation813

TCP and UDP814

Configuring a Cisco PIX Firewall814

Lesson 23-1: Configuring the PIX Firewall Basics815

Lesson 23-2: Configuring Network Protection and Controlling Its Access and Use824

Lesson 23-3: Supporting Specific Protocols and Applications834

Lesson 23-4: Monitoring the PIX Firewall838

Lesson 23-5: Using the PIX Firewall as a DHCP Server844

Lesson 23-6: New Features in PIX Firewall Version 6.2846

Summary854

Review Questions854

FAQs855

Part Ⅶ Intrusion Detection857

Chapter 24 IDS on the Cisco PIX Firewall and lOS Software859

Cisco IOS Software Intrusion Detection859

Cisco PIX Firewall Intrusion Detection860

Cisco IOS Software and PIX IDS Signatures861

Configuring Cisco IDS867

Case Study 24-1: Configuring the Cisco IOS Software IDS867

Case Study 24-2: Configuring the Cisco Secure PIX Firewall IDS870

Summary874

Review Questions874

FAQs876

Chapter 25 Internet Service Provider Security Services879

Preventing Denial-of-Service Attacks879

Committed Access Rate (CAR)879

Reverse Path Forwarding (RPF)880

Layer 2 VPN (L2VPN)880

802.1Q881

Layer 2 Protocol Tunneling881

Configuring ISP Services881

Case Study 25-1: DoS Prevention Through Rate Limiting882

Case Study 25-2: DoS Prevention Through RPF886

Case Study 25-3: Configuring L2VPN887

Summary895

Review Questions895

FAQs896

Part Ⅷ Sample Lab Scenarios899

Chapter 26 Sample Lab Scenarios901

Practice Lab Format901

How the Master Lab Compares to the CCIE Security Lab Exam902

CCIE Practice Lab 1: Building Layer 2903

Equipment List903

Prestaging: Configuring the Frame Relay Switch904

Prestaging: Configuring the First Backbone Router, R9-BB 1905

Prestaging: Configuring the Second Backbone Router, R7-BB2907

Lab Rules909

Timed Portion909

CCIE Practice Lab 2: Routing911

Equipment List911

Lab Rules912

Timed Portion913

CCIE Practice Lab 3: Configuring Protocol Redistribution and Dial Backup915

Equipment List915

Lab Rules915

Timed Portion916

CCIE Practice Lab 4: Configuring Basic Security917

Equipment List917

Lab Rules919

Timed Portion919

CCIE Practice Lab 5: Dial and Application Security921

Equipment List921

Lab Rules921

Timed Portion922

CCIE Practice Lab 6: Configuring Advanced Security Features926

Equipment List926

Lab Rules926

Timed Portion927

CCIE Practice Lab 7: Service Provider931

Equipment List931

Lab Rules932

Timed Portion932

CCIE Practice Lab 8: All-Inclusive Master Lab933

Equipment List933

Prestaging: Configuring the Frame Relay Switch934

Prestaging: Configuring the First Backbone Router, R7-BB1936

Prestaging: Configuring the Second Backbone Router, R7-BB2937

Prestaging: Configuring the Reverse Telnet Router940

Lab Rules941

Timed Portion942

Summary952

Part Ⅸ Appendixes955

Appendix A Basic UNIX Security957

Appendix B Basic Windows Security969

Appendix C ISDN Error Codes and Debugging Reference983

Appendix D Password Recovery on Cisco IOS, Catalystos, and PIX995

Appendix E Security-Related RFCs and Publications1017

Appendix F Answers to the Review Questions1029

热门推荐