Router Security Strategies: Securing IP Network Traffic Planes 1st Edition, Kindle Edition
Learn more
The Amazon Book Review
Book recommendations, author interviews, editors' picks, and more. Read it now.
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
-
Apple
-
Android
-
Windows Phone
-
Android
|
Download to your computer
|
Kindle Cloud Reader
|
Customers who bought this item also bought
Network Security with Netflow and IPFIX: Big Data Analytics for Information Security (Networking Technology)Kindle EditionAvailable for download now.
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)Kindle EditionAvailable for download now.
Editorial Reviews
From the Back Cover
- Understand the operation of IP networks and routers
- Learn about the many threat models facing IP networks, Layer 2 Ethernet switching environments, and IPsec and MPLS VPN services
- Learn how to segment and protect each IP traffic plane by applying defense in depth and breadth principles
- Use security techniques such as ACLs, rate limiting, IP Options filtering, uRPF, QoS, RTBH, QPPB, and many others to protect the data plane of IP and switched Ethernet networks
- Secure the IP control plane with rACL, CoPP, GTSM, MD5, BGP and ICMP techniques and Layer 2 switched Ethernet-specific techniques
- Protect the IP management plane with password management, SNMP, SSH, NTP, AAA, as well as other VPN management, out-of-band management, and remote access management techniques
- Secure the IP services plane using recoloring, IP fragmentation control, MPLS label control, and other traffic classification and process control techniques
About the Author
Gregg Schudel,CCIE No. 9591 (Security), joined Cisco in 2000 as a consulting system engineer supporting the U.S. Service Provider Organization. Gregg focuses on IP core network and services security architectures and technology for inter-exchange carriers, web services providers, and mobile providers. Gregg is also part of a team of Corporate and Field resources focused on driving Cisco Service Provider Security Strategy. Prior to joining Cisco, Gregg worked for many years with BBN Technologies, where he supported network security research and development, most notably in conjunction with DARPA and other federal agencies involved in security research. Gregg holds an MS in engineering from George Washington University, and a BS in engineering from Florida Institute of Technology. Gregg can be contacted through e-mail at gschudel@cisco.com.
David J. Smith, CCIE No. 1986 (Routing and Switching), joined Cisco in 1995 and is a consulting system engineer supporting the Service Provider Organization. Since 1999 David has focused on service provider IP core and edge architectures, including IP routing, MPLS technologies, QoS, infrastructure security, and network telemetry. Between 1995 and 1999, David supported enterprise customers designing campus and global WANs. Prior to joining Cisco, David worked at Bellcore developing systems software and experimental ATM switches. David holds an MS in information networking from Carnegie Mellon University, and a BS in computer engineering from Lehigh University. David can be contacted through e-mail at dasmith@cisco.com.
--This text refers to an alternate kindle_edition edition.Product details
- ASIN : B0051TM5L2
- Publisher : Cisco Press; 1st edition (December 29, 2007)
- Publication date : December 29, 2007
- Language : English
- File size : 14649 KB
- Simultaneous device usage : Up to 5 simultaneous devices, per publisher limits
- Text-to-Speech : Enabled
- Screen Reader : Supported
- Enhanced typesetting : Enabled
- X-Ray : Not Enabled
- Word Wise : Not Enabled
- Print length : 672 pages
- Lending : Not Enabled
-
Best Sellers Rank:
#2,883,089 in Kindle Store (See Top 100 in Kindle Store)
- #1,074 in Online Safety & Piracy
- #4,067 in Privacy & Online Safety
- #6,134 in Computer Networking (Kindle Store)
- Customer Reviews:
Customer reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
Unfortunately no reference to NX OS or Zone Based/IOS firewall so if you want something related to those 2 technologies you should search elsewhere.
I also didn't like the fact that the same information was sometimes repeated over and over again.
Otherwise a good book to have on your library.
RSS focuses on ways to protect transit, receive, and exception IP traffic in the data, control, management, and service planes of Enterprise and Service Provider (SP) networks. That one sentence almost summarizes the entire table of contents, where Chs 4-7 cover the four planes, Chs 8 and 9 provide case studies for Enterprise and SP networks, respectively, and Chs 1-3 provide introductory and conceptual material. This is how to write a technical book! Tangential material appears in four appendices, and the authors keep the reader on track through the entire text.
RSS makes a compelling case for network security in a world where applications and Web 2.0 are all the rage. I believe many people who scoff at network security have no real idea of the complexities inherent in modern network infrastructure. Too many application-centric people take it for granted that they can reach whatever Web victim they're attacking; perhaps that is a credit to network engineers who've made their creations just work and not be the center of attention. Should attackers decide to focus on network infrastructure, RSS provides plenty of techniques for defending routers and even some switches. I enjoyed learning more about several uRPF techniques, Flexible Pattern Matching (FPM), Selective Packet Discard, Receive ACLS, Control Plane Policing, Dynamic APR Inspection (DAI), and CLI Views. Many of these methods exist to protect the network itself, not necessarily the endpoints. While the authors do mention a desire to protect hosts, I liked seeing such a focus on defending infrastructure. Perhaps "network security" should be a term transitioned to solely mean protecting network platforms?
I thought Appendix B would be the standard catalog of TCP/IP header diagrams, but I was pleasantly described to see a different approach. App B did depict IP, TCP, UDP, ICMP, IEEE 802.3, and 802.1Q headers, but the authors provide a security implication for each field in these headers. I found that to be original and informative.
I subtracted one star for two aspects of the book which bothered me. First, the authors tend to use the term "threat" in a manner which is not consistent with real threat terminology. For example, p 87 speaks of "the potential threat and impact of a given vulnerability". Threat, impact, and vulnerability are all separate concepts. Ch 2, where such terminology appears, is titled "Threat Models for IP Networks." If you read the chapter it is a catalog of attacks, which sections titled "Resource Exhaustion Attacks", "Spoofing Attacks", and so on. Clearly Ch 2 is "Attack Models for IP Networks".
Second, although the material in RSS is excellent, the authors' tendency to repeat concepts wore me down. It's usually acceptable to begin a section by referencing and/or rephrasing material from an earlier chapter, or at worst farther back in the same chapter. It's simply annoying to be told the same material that appeared in the last paragraph. Any time the reader encounters "as stated in the last section" or similar, the authors should reconsider discussing the concept again. Edits like these wouldn't necessarily shrink the book that much, but the text would not treat the reader as if he or she has too short an attention span to remember what he or she just read.
Despite those two concerns, I still very much enjoyed reading RSS. You will probably get more out of the book if you have MPLS experience, but the authors provide plenty of background anyway. One of the best aspects of RSS is the presentation of extensive IOS syntax for all of the major concepts in the book. The authors do not talk about a technique and then leave it as an exercise for the reader to determine how that idea should be implemented in IOS. Those trying to protect data, control, management, and service IP traffic will be well-served by reading RSS.
The things I like about this book:
So many authors tend to try to spread their subject matter out too wide and take too broad of an approach when writing about network security. Schudel and Smith didn't do that. Instead they focused on specific areas and worked diligently to stay on target. It was very refreshing to read a book that actually didn't wander off on tangential subjects on a regular basis.
As for actual subject matter I was very pleased to find a book that discussed the various "planes" within Cisco IOS. In my opinion Cisco has not been very good about documenting this subject and so this book has cleared up several knowledge gaps I had prior to reading it. All of the bits of information I've heard or read about in the past were pulled together in a clear and concise manner. It was also pleasing to see just the right amount of configuration "shows" rather than pages and pages of them.
I also was very happy that this book was not full of fluff. The authors used just enough background info to convey their message but did not go overboard in non-essential detail. As with any technical reference I prefer thorough and correct information but many times there is just too much description that just gets in the way.
Some reviewers stated that the authors repeated themselves within this book. For me this was not a negative. There are certain topics that I very much need repeated in order to retain it thoroughly and so this was not a problem for me. The repetitious content was neither significant nor time consuming so I consider it to be a positive rather than a negative.
The things I do not like about this book:
This is trivial but I would have much preferred a hardback book rather than a paperback. This is a personal preference of course but hardbacks tend to last longer for me.
