Identify, analyze, and resolve current and potential network security problems * Learn diagnostic commands, common problems and resolutions, best practices, and case studies covering a wide array of Cisco network security troubleshooting scenarios and products * Refer to common problems and re
Cisco Network Security Troubleshooting Handbook
โ Scribed by Hoda, Mynul
- Publisher
- Cisco Press
- Year
- 2005
- Tongue
- English
- Leaves
- 1154
- Series
- Networking Technology
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Identify, analyze, and resolve current and potential network security problems
Learn diagnostic commands, common problems and resolutions, best practices, and case studies covering a wide array of Cisco network security troubleshooting scenarios and products
Refer to common problems and resolutions in each chapter to identify and solve chronic issues or expedite escalation of problems to the Cisco TAC/HTTS
Flip directly to the techniques you need by following the modular chapter organization
Isolate the components of a complex network problem in sequence
Master the troubleshooting techniques used by TAC/HTTS security support engineers to isolate problems and resolve them on all four security domains: IDS/IPS, AAA, VPNs, and firewalls With the myriad Cisco(r) security products available today, you need access to a comprehensive source of defensive troubleshooting strategies to protect your enterprise network. "Cisco Network Security Troubleshooting Handbook" can single-handedly help you analyze current and potential network security problems and identify viable solutions, detailing each step until you reach the best resolution. Through its modular design, the book allows you to move between chapters and sections to find just the information you need. Chapters open with an in-depth architectural look at numerous popular Cisco security products and their packet flows, while also discussing potential third-party compatibility issues. By following the presentation of troubleshooting techniques and tips, you can observe and analyze problems through the eyes of an experienced Cisco TAC or High-Touch Technical Support (HTTS) engineer or determine how to escalate your case to a TAC/HTTS engineer. Part I starts with a solid overview of troubleshooting tools and methodologies. In Part II, the author explains the features of Cisco ASA and Cisco PIX(r) version 7.0 security platforms, Firewall Services Module (FWSM), and Cisco IOS(r) firewalls. Part III covers troubleshooting IPsec Virtual Private Networks (IPsec VPN) on Cisco IOS routers, Cisco PIX firewalls with embedded VPN functionalities, and the Cisco 3000 Concentrator. Troubleshooting tools and techniques on the Authentication, Authorization, and Accounting (AAA) framework are discussed thoroughly on routers, Cisco PIX firewalls, and Cisco VPN 3000 concentrators in Part IV. Part IV also covers troubleshooting Cisco Secure ACS on Windows, the server-side component of the AAA framework. IDS/IPS troubleshooting on IDS/IPS appliances, IDSM-2 blade, and NM-CIDS blade on Cisco IOS routers are covered in Part V. In Part VI, the author examines the troubleshooting techniques for VPN/Security Management Solution (VMS) tools used for managing products from all four security domains in greater detail: IDS/IPS, AAA, VPNs, and firewalls. "Cisco Network Security Troubleshooting Handbook" prepares you to troubleshoot your network s security devices and presents step-by-step procedures for tackling issues that arise, so that you can protect your network. This security book is part of the Cisco Press(r) Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks."
โฆ Table of Contents
Cover......Page 1
Contents......Page 10
Introduction......Page 36
Part I: Troubleshooting Tools and Methodology......Page 41
Proactive Actions for Handling Network Failure......Page 43
Types of Failure......Page 45
Problem-Solving Model......Page 46
Summary......Page 51
Using Device Diagnostic Commands......Page 53
Test Commands......Page 55
Trivial File Transfer Protocol (TFTP) Server......Page 58
Audit and Attack Tools......Page 59
Core Dump......Page 60
Part II: Troubleshooting Cisco Secure Firewalls......Page 65
Overview of PIX Firewall......Page 67
Diagnostic Commands and Tools......Page 77
Case Studies......Page 140
Common Problems and Resolutions......Page 147
Best Practices......Page 148
Overview of FWSM Firewall......Page 151
Diagnostic Commands and Tools......Page 157
Analysis of Problem Areas......Page 163
Case Studies......Page 195
Common Problems and Resolutions......Page 211
Best Practices......Page 212
Overview of IOS Firewall (CBAC)......Page 215
Diagnostic Commands and Tools......Page 232
Categories of Problem Areas......Page 237
Case Studies......Page 249
Common Problems and Resolutions......Page 255
Best Practices......Page 256
Part III: Troubleshooting Virtual Private Networks......Page 259
Overview of IPsec Protocol......Page 261
Diagnostic Commands and Tools......Page 271
Analysis of Problem Areas......Page 277
Case Studies......Page 308
Common Problems and Resolutions......Page 319
Best Practices......Page 325
Diagnostic Commands and Tools......Page 335
Categorization of Problem Areas......Page 340
Case Studies......Page 372
Common Problems and Resolutions......Page 375
Best Practices......Page 382
Diagnostic Commands and Tools......Page 385
Analysis of Problem Areas......Page 394
Case Studies......Page 427
Common Problems and Resolutions......Page 444
Best Practices......Page 448
Part IV: Troubleshooting Network Access Control......Page 455
Overview of Authentication, Authorization, and Accounting (AAA)......Page 457
Diagnostic Commands and Tools......Page 467
Analysis of Problem Areas......Page 470
Case Studies......Page 496
Common Problems and Resolutions......Page 510
Best Practices......Page 512
Overview of Authentication, Authorization, and Accounting (AAA)......Page 515
Diagnostic Commands and Tools......Page 521
Problem Areas Analysis......Page 524
Case Studies......Page 568
Common Problems and Resolutions......Page 574
Best Practices......Page 576
Overview of AAA......Page 579
Diagnostic Commands and Tools......Page 590
Categorization of Problem Areas......Page 596
Case Studies......Page 612
Common Problems and Resolutions......Page 620
Best Practices......Page 623
AAA Implementation on the Concentrator......Page 625
Diagnostic Commands and Tools......Page 627
Analysis of Problem Areas......Page 628
Case Studies......Page 646
Common Problems and Resolutions......Page 649
Best Practices......Page 650
Overview of CS ACS......Page 653
Diagnostic Commands and Tools......Page 659
Categorization of Problem Areas......Page 663
Case Studies......Page 693
User/NAS Import Options......Page 696
Common Problems and Resolutions......Page 699
Best Practices......Page 708
Part V: Troubleshooting Intrusion Prevention Systems......Page 711
Overview of IPS Sensor Software......Page 713
Diagnostic Commands and Tools......Page 723
Classification of Problem Areas......Page 730
Case Studies......Page 801
Common Problems and Their Resolution......Page 815
Best Practices......Page 819
Overview of IDSM-2 Blade on the Switch......Page 825
Diagnostic Commands and Tools......Page 829
Common Problems and Resolutions......Page 831
Case Study......Page 856
Common Problems and Resolutions......Page 864
Best Practices......Page 867
Overview of NM-CIDS on the Router......Page 869
Common Problems and Resolutions......Page 873
Case Studies......Page 888
Common Problems and Resolutions......Page 891
Best Practices......Page 896
Overview of CiscoWorks Common Services......Page 899
Diagnostic Commands and Tools......Page 901
Categorization of Problem Areas......Page 903
Case Studies......Page 914
Common Problems and Resolutions......Page 915
Best Practices......Page 919
Overview of IDM and IDS/IPS Management......Page 921
Diagnostic Commands and Tools......Page 923
Analysis of Problem Areas......Page 926
Case Study......Page 958
Common Problems and Resolutions......Page 963
Best Practices......Page 967
Overview of Firewall MC......Page 969
Diagnostic Commands and Tools......Page 970
Analysis of Problem Areas......Page 972
Common Problems and Resolutions......Page 992
Best Practices......Page 994
Overview of Router MC......Page 997
Diagnostic Commands and Tools......Page 998
Analysis of Problem Areas......Page 1001
Case Study......Page 1012
Best Practices......Page 1018
Overview of CSA MC and Agent......Page 1021
Diagnostic Commands and Tools......Page 1025
Categorization of Problem Areas......Page 1030
Common Problems and Resolutions......Page 1070
Best Practices......Page 1074
Overview of IEV and Security Monitor......Page 1077
Categorization of Problem Areas......Page 1084
Case Study......Page 1106
Common Problems and Resolutions......Page 1110
Best Practices......Page 1115
A......Page 1117
C......Page 1119
D......Page 1126
E......Page 1127
F......Page 1128
H......Page 1129
I......Page 1130
L......Page 1133
M......Page 1134
N......Page 1135
P......Page 1136
Q-R......Page 1138
S......Page 1140
T......Page 1143
V......Page 1144
X-Y-Z......Page 1146
๐ SIMILAR VOLUMES
<P style="MARGIN: 0px"><I>Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Foundation Learning Guide</I> is a Ciscoยฎ authorized learning tool for CCNP preparation. As part of the Cisco Press foundation learning series, this book covers how to maintain and monitor complex enterprise network
With this concise, problem-solving guide, networking professionals will learn how to identify network security threats and implement uniform security throughout their networks, secure remote dial-in access with CiscoSecure ACS and Cisco IOS AAA features, protect Internet access on their perimeter ro