Industrial-Sized Deals TextBTS15 Shop Women's Handbags Learn more nav_sap_plcc_6M_fly_beacon Disturbed $5 Off Fire TV Stick Subscribe & Save Shop Popular Services gotS5 gotS5 gotS5  Amazon Echo Starting at $99 Kindle Voyage Metal Gear Solid 5 Shop Back to School with Amazon Back to School with Amazon Outdoor Recreation Learn more
Digital List Price: $19.99
Kindle Price: $9.99

Save $14.96 (60%)

These promotions will be applied to this item:

Some promotions may be combined; others are not eligible to be combined with other offers. For details, please see the Terms & Conditions associated with these promotions.

Deliver to your Kindle or other device

Deliver to your Kindle or other device

Flip to back Flip to front
Audible Narration Playing... Paused   You are listening to a sample of the Audible narration for this Kindle book.
Learn more

Hardening Cisco Routers Kindle Edition

17 customer reviews

Amazon Price New from Used from
Kindle
"Please retry"
$9.99

Length: 194 pages

Kindle Daily Deals
Kindle Delivers: Daily Deals
Subscribe to find out about each day's Kindle Daily Deals for adults and young readers. Learn more (U.S. customers only)

Editorial Reviews

Amazon.com Review

To harden a router is to render it more heavily defended and more difficult to attack. Because routers (by definition) serve as points of entry into your network, it makes sense to devote extra effort to their security. Hardening Cisco Routers shows how to make adjustments to the configurations of routers from Cisco Systems to improve their resistance to attack, particularly external attack. This is essentially a book of specialized Internetwork Operating System (IOS) commands, as well as explanations of their behavior. It'll appeal to the router administrator--employed either by an organization's internal network staff, an outside consultancy, or a service provider--who wants to know which IOS commands he or she should add to routers' configuration files to tighten their security without a lot of hassle.

The great thing about this book is that you can approach it in either of two ways. If you just want to clamp down on your routers' security weaknesses as soon as possible, you can begin with the checklists at the end of each chapter (each of which focuses on a particular area, like SMTP) or the big one in an appendix, which is comprehensive. These checklists include both "how" and "why" information, as exemplified by "Disable ICMP broadcasts with the no ip directed-broadcast command." If you want more information on the big picture, or want to prepare for a specific kind of attack, read the individual chapters for detailed advice on how to set IOS to behave as you want. --David Wall

Topics covered: Internetwork Operating System (IOS) commands you can use to protect Cisco Systems routers from a variety of attacks. Specialized sections deal with security assessment, auditing, access control, privileges, optional services, and the legal importance of your login banners' contents.

Review

"This slim tome is a veritable gem of a book. It is written in a logical and clear style that permits reading from start to finish, but each specific section is complete in it's own right and as such it allows the reader to pick up the book and dip read satisfactorily. I learnt things from this book, and for me that is the best recommendation I can give." - Raza Rizvi, news@UK

Product Details

  • File Size: 407 KB
  • Print Length: 194 pages
  • Simultaneous Device Usage: Unlimited
  • Publisher: O'Reilly Media; 1 edition (February 21, 2002)
  • Publication Date: February 9, 2009
  • Sold by: Amazon Digital Services, Inc.
  • Language: English
  • ASIN: B0026OR3MG
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Lending: Not Enabled
  • Enhanced Typesetting: Not Enabled
  • Amazon Best Sellers Rank: #728,431 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images?


More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Most Helpful Customer Reviews

8 of 8 people found the following review helpful By Daniel Ginensky on June 2, 2004
Format: Paperback
Intended audiences: network administrators, security advisors/auditors, system architects.
This book is, pound for pound, among the best in my technical library.
Having almost no previous knowledge in router hardening (although I was aware of the basics of Cisco routers) a few hours with this book enabled me to review the "hardening" plan submitted by a highly paid security consultant, and provide useful comments on improving the proposal.
No doubt this book is the beginning, not the end, of my education on this subject. But this fine book got me off to a quick and productive start, which is high praise when compared to what could be said about so many other technical titles. Highly recommended.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 8 people found the following review helpful By A Customer on December 31, 2002
Format: Paperback
This book is concise and well written. It covers most, if not all of the areas involved in locking down Cisco routers. And it does so in clearly defined chapters, making it very easy to navigate as a reference. In addition, each topic is accompanied by clear configuration examples.
I also found it very complete. Even covering information which I haven't yet come across in the various NSA guides and Cisco texts on the subject. As someone already mentioned, you'll no longer need to trawl the web and other sources for this info; Thomas Akin and O'Reilly's have done the hard work for you.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 8 people found the following review helpful By Edmund Bennett on May 24, 2002
Format: Paperback
This book is nothing short of a goldmine. I have read many infosec books, including plenty of Cisco security books, and this one packs twice as much quality information with twice as many topics in a tenth of the space. This one is cut in dry. The layout is perfect. The topic is stated, followed by the vulnerability and then the fix. A network admin's dream, without all of the filler.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 5 people found the following review helpful By Jim Fraiser on April 3, 2002
Format: Paperback
This book is a huge *must* for anyone who works with Cisco routers. I got it because as a network admin I needed a checklist on securing our routers. Showed it to our InfoSec director and he ordered all our routers nationwide to be secured according to the book's checklists!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 4 people found the following review helpful By "danilody" on July 20, 2002
Format: Paperback
Although the content of the book can be found in the Cisco web site, but why bother digging the web site for it?
Thomas Akin did a great job by providing all the basics (and more) that we should do to hardened Cisco Routers before putting it in a production network specially those routers providing internet access to users.
Danilo Castro Dy
MCP+I, MCSE, CCNP
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 6 people found the following review helpful By PPW on April 16, 2002
Format: Paperback
As a professional, I feel the ratings on these books can be very important. In the case of the reviewer Ron C., who doesn't really have a use for the book, should not give books a low rating because the information isn't useful to him but recommends it highly for someone who is interested in the topic. I do need the information in this book and it is an excellent book with pertinent information.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By Billye Moore on August 1, 2002
Format: Paperback Verified Purchase
This is not a Cisco Security Book. BUT it is a book on how to make your Internet Routers virtually hack/crack proof. Great information on ACL's and gaping security holes that are open on default installs it makes you think.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Mr. N. E. Sheridan on August 22, 2005
Format: Paperback
No nonsense. No mucking around. Here's the problem, here's the solution. Have to say though, you probably wont find anything new to you inside this book; but its dead handy for checking you've covered most of your bases (then you'll write a common config script and probably never look at it again!! :) )
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Forums

There are no discussions about this product yet.
Be the first to discuss this product with the community.
Start a new discussion
Topic:
First post:
Prompts for sign-in