Tabla de Contenidos:
  • pt. I. Security overview and firewalls
  • Ch. 1. Security threats
  • Ch. 2. Introduction to firewalls
  • pt. II. Managing access to routers
  • Ch. 3. Accessing a router
  • Ch. 4. Disabling unnecessary services
  • Ch. 5. Authentication, authorization, and accounting
  • pt. III. Nonstateful filtering technologies
  • Ch. 6. Access list introduction
  • Ch. 7. Basic access lists
  • pt. IV. Stateful and advanced filtering technologies
  • Ch. 8. Reflexive access lists
  • Ch. 9. Context-based access control
  • Ch. 10. Filtering web and application traffic
  • pt. V. Address translation and firewalls
  • Ch. 11. Address translation
  • Ch. 12. Address translation issues
  • pt. VI. Managing access through routers
  • Ch. 13. Lock-and-key access lists
  • Ch. 14. Authentication proxy
  • Ch. 15. Routing protocol protection
  • pt. VII. Detecting and preventing attacks
  • Ch. 16. Intrusion-detection system
  • Ch. 17. DoS protection
  • Ch. 18. Logging events
  • pt. VIII. Virtual private networks
  • Ch. 19. IPSec site-to-site connections
  • Ch. 20. IPSec remote-access connections
  • pt. IX. Case study
  • Ch. 21. Case study.