Cantitate/Preț
Produs

Integrated Security Technologies and Solutions - Volume II: Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity and Virtualization

Autor Aaron Woland, Vivek Santuka, Chad Mitchell, Jamie Sanbower
en Limba Engleză Paperback – 6 apr 2019

Subliniem de la început că Integrated Security Technologies and Solutions - Volume II este o resursă avansată, adresată profesioniștilor în securitate cu experiență și candidaților pentru certificarea CCIE Security. Lectura presupune o înțelegere solidă a fundamentelor de rețea, deoarece autorii, toți experți CCIE, trec rapid de la conceptele teoretice la arhitecturi complexe de design și implementare. Structura volumului este riguros organizată pentru a facilita progresia tehnică. Primele capitole reiau fundamentele AAA (Authentication, Authorization, and Accounting) și protocoalele RADIUS și TACACS+, evoluând rapid către implementări sofisticate de control al accesului prin Cisco Identity Services Engine (ISE). Dacă AAA Identity Management Security v-a oferit cadrul teoretic și fundamentele protocoalelor, această carte oferă instrumentele practice necesare pentru a integra sisteme disparate într-o soluție unitară de securitate. Reținem atenția deosebită acordată zonelor de intersecție tehnologică: integrarea ISE cu Cisco FMC sau WSA și utilizarea API-urilor pentru automatizarea proceselor. Spre deosebire de manualele de certificare standard, acest volum pune un accent major pe integrarea între produse și pe virtualizarea funcțiilor de rețea. Capitolele dedicate segmentării prin TrustSec, suportului pentru BYOD și evaluării posturii dispozitivelor sunt completate de exemple de configurare și, esențial pentru activitatea de zi cu zi, de secțiuni de depanare (troubleshooting). Această abordare transformă volumul dintr-un ghid de studiu într-un instrument de referință pentru administrarea soluțiilor de tip Next-Generation Security, acoperind inclusiv tehnologii moderne precum microsegmentarea și Network Function Virtualization (NFV).

Citește tot Restrânge

Preț: 46390 lei

Preț vechi: 57988 lei
-20%

Puncte Express: 696

Carte disponibilă

Livrare economică 05-19 mai
Livrare express 18-24 aprilie pentru 6376 lei


Specificații

ISBN-13: 9781587147074
ISBN-10: 1587147076
Pagini: 688
Dimensiuni: 187 x 232 x 37 mm
Greutate: 1.22 kg
Ediția:1. Auflage
Editura: Cisco Press

De ce să citești această carte

Recomandăm această lucrare inginerilor de rețea care doresc să stăpânească ecosistemul Cisco ISE și securitatea virtualizată. Cititorul câștigă o perspectivă practică, de nivel expert, asupra implementării politicilor de acces și a conectivității securizate prin VPN. Este un instrument indispensabil pentru cei care se pregătesc pentru examenele CCIE v5, oferind scenarii reale de configurare pe care alte manuale le abordează doar teoretic.


Cuprins

Introduction xix Part I Knock, Knock! Who's There? 1 Chapter 1 Who and What: AAA Basics 3 Fundamentals of AAA 3 Understanding the Concept of Triple-A in the Real World 4 Compare and Select AAA Options 4 TACACS+ 7 RADIUS 12 Comparing RADIUS and TACACS+ 15 Summary 16 Chapter 2 Basic Network Access Control 17 What Is Cisco ISE? 17 ISE Architecture for Network Access AAA 18 Configuring ISE for Single/Standalone and Multinode Deployments 23 ISE Configuration for Network Access 32 802.1X and Beyond 54 Configuring Wired Network Access with ISE 71 Configuring Wireless Network Access with ISE 115 Verifying Dot1X and MAB 140 Summary 148 Chapter 3 Beyond Basic Network Access Control 149 Profiling with ISE 149 ISE Profiler and CoA 175 Profiles in Authorization Policies 178 Passive Identities and EasyConnect 180 Summary 191 Chapter 4 Extending Network Access with ISE 193 Get Ready, Get Set, Prerequisites 194 BYOD Onboarding with ISE 197 MDM Onboarding and Enforcement with ISE 236 Posture Assessment and Remediation with ISE 244 Guest Access with ISE 265 TrustSec with ISE 287 Summary 306 Chapter 5 Device Administration Control with ISE 307 The Case for Centralized AAA 307 RADIUS Versus TACACS+ for Device Administration 308 Using TACACS+ for Device Administration 309 Using RADIUS for Device Administration 343 Summary 352 Part II Spread the Love! 353 Chapter 6 Sharing the Context 355 The Many Integration Types of the Ecosystem 356 pxGrid in Depth 361 Summary 406 Chapter 7 APIs in Cisco Security 407 APIs 101 407 Firepower Management Center APIs 413 Identity Services Engine APIs 424 Advanced Malware Protection APIs 428 Threat Grid APIs 433 Umbrella APIs 435 Summary 437 References 437 Part III c2889775343d1ed91b 439 Chapter 8 Security Connectivity 441 Hashing, Ciphers, Cryptography, and PKI 441 Virtual Private Networks 461 Layer 2 Encryption: IEEE 802.1AE/MACsec 470 Summary 474 References 474 Chapter 9 Infrastructure VPN 477 IPsec with IKEv1 478 IPsec with IKEv2 484 EzVPN 492 DMVPN 500 FlexVPN 514 GETVPN 532 Summary 541 References 541 Chapter 10 Remote Access VPN 543 Remote Access VPN Overview 543 Cisco AnyConnect Secure Mobility Client 546 Client-Based Remote Access VPN 554 Clientless Remote Access VPN 586 Summary 595 References 595 Part IV The Red Pill 597 Chapter 11 Security Virtualization and Automation 599 Cisco Virtual Solutions and Server Virtualization 599 Virtualization and Automation Solutions 602 Summary 613 References 614 97815877147074, TOC, 2/28/19

Descriere

The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions - Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams. Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint. Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions. Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting. Review the essentials of Authentication, Authorization, and Accounting (AAA) Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them Enforce basic network access control with the Cisco Identity Services Engine (ISE) Implement sophisticated ISE profiling, EzConnect, and Passive Identity features Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services Safely share context with ISE, and implement pxGrid and Rapid Threat Containment Integrate ISE with Cisco FMC, WSA, and other devices Leverage Cisco Security APIs to increase control and flexibility Review Virtual Private Network (VPN) concepts and types Understand and deploy Infrastructure VPNs and Remote Access VPNs Virtualize leading Cisco Security products Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation