- Paperback: 194 pages
- Publisher: O'Reilly Media; 1 edition (February 2002)
- Language: English
- ISBN-10: 0596001665
- ISBN-13: 978-0596001667
- Product Dimensions: 7 x 0.5 x 9.2 inches
- Shipping Weight: 11.4 ounces (View shipping rates and policies)
- Average Customer Review: 16 customer reviews
- Amazon Best Sellers Rank: #1,479,781 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Hardening Cisco Routers (O'Reilly Networking) 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Fulfillment by Amazon (FBA) is a service we offer sellers that lets them store their products in Amazon's fulfillment centers, and we directly pack, ship, and provide customer service for these products. Something we hope you'll especially enjoy: FBA items qualify for FREE Shipping and Amazon Prime.
If you're a seller, Fulfillment by Amazon can help you increase your sales. We invite you to learn more about Fulfillment by Amazon .
Frequently bought together
Customers who bought this item also bought
To harden a router is to render it more heavily defended and more difficult to attack. Because routers (by definition) serve as points of entry into your network, it makes sense to devote extra effort to their security. Hardening Cisco Routers shows how to make adjustments to the configurations of routers from Cisco Systems to improve their resistance to attack, particularly external attack. This is essentially a book of specialized Internetwork Operating System (IOS) commands, as well as explanations of their behavior. It'll appeal to the router administrator--employed either by an organization's internal network staff, an outside consultancy, or a service provider--who wants to know which IOS commands he or she should add to routers' configuration files to tighten their security without a lot of hassle.
The great thing about this book is that you can approach it in either of two ways. If you just want to clamp down on your routers' security weaknesses as soon as possible, you can begin with the checklists at the end of each chapter (each of which focuses on a particular area, like SMTP) or the big one in an appendix, which is comprehensive. These checklists include both "how" and "why" information, as exemplified by "Disable ICMP broadcasts with the no ip directed-broadcast command." If you want more information on the big picture, or want to prepare for a specific kind of attack, read the individual chapters for detailed advice on how to set IOS to behave as you want. --David Wall
Topics covered: Internetwork Operating System (IOS) commands you can use to protect Cisco Systems routers from a variety of attacks. Specialized sections deal with security assessment, auditing, access control, privileges, optional services, and the legal importance of your login banners' contents.
"This slim tome is a veritable gem of a book. It is written in a logical and clear style that permits reading from start to finish, but each specific section is complete in it's own right and as such it allows the reader to pick up the book and dip read satisfactorily. I learnt things from this book, and for me that is the best recommendation I can give." - Raza Rizvi, news@UK
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
I bought this book with the Cisco Cookbook, and found this to be one of the most important books in a network admin's library. This is the security book that doesn't get mired down in endless pages of white papers. It simply points out major security flaws and holes, and why they should be covered.
What good is an Access List if you don't log what is or isn't stopping?
What good are your logs if you don't have timestamps backed up by NTP time sources?
What good is a complex password if 10 admins know it, and no one has individual logins?
The problems and solutions are quickly addressed with enough information to explain to your boss why this needs to be done. Then use the Cisco Cookbook or other guide to fine-tune your own solution that fits your needs.
The book is an excellent checklist/instructional guide for locking down Cisco IOS routers and switches. It is geared for the novice or intermediate Cisco administrator. It is quick, concise, (under 200 pages) and each chapter ends with a checklist. There is also a master checklist at the end of the book.
For a Cisco veteran it is a very quick read and can be used to firm up an existing configuration and/or checklist that you have already written. Also, perfect to loan to a Jr. Cisco admin so they can learn the basics.
The book is not intended to be a deep dive into Cisco security, so it is a bit thin (as others have said); however, it is a perfect stepping stone for a heavier read.
The biggest con is it was published in 2002, but it has aged much better than most IT books. A few items mentioned at in development (SNMPv3, SSHv2) are now common and a few new features have been added. While I would like a revision 2, it is still it is the best quick start to Cisco Security I have found.
This book is, pound for pound, among the best in my technical library.
Having almost no previous knowledge in router hardening (although I was aware of the basics of Cisco routers) a few hours with this book enabled me to review the "hardening" plan submitted by a highly paid security consultant, and provide useful comments on improving the proposal.
No doubt this book is the beginning, not the end, of my education on this subject. But this fine book got me off to a quick and productive start, which is high praise when compared to what could be said about so many other technical titles. Highly recommended.