| | | Copyright |
| | | About the Author |
| | | About the Contributing Author |
| | | About the Technical Reviewers |
| | | Acknowledgments |
| | | Icons Used in This Book |
| | | Command Syntax Conventions |
| | | Foreword |
| | | Introduction |
| | | Chapter 1. Understanding Types of Network Attacks and Defenses |
| | | | Categorizing Network Attacks |
| | | | Understanding Traditional Network Defenses |
| | | | Introducing Cisco Self-Defending Networks |
| | | | Summary |
| | | | References |
| | | Chapter 2. Mitigating Distributed Denial-of-Service Attacks |
| | | | Understanding Types of DDoS Attacks |
| | | | DDoS Mitigation Overview |
| | | | Using Cisco Traffic Anomaly Detector |
| | | | Configuring Cisco Guard |
| | | | Summary |
| | | | References |
| | | Chapter 3. Cisco Adaptive Security Appliance Overview |
| | | | Antispoofing |
| | | | Intrusion Prevention Service |
| | | | Protocol Inspection Services |
| | | | HTTP Inspection Engine |
| | | | Configuring Content Security and Control Security |
| | | | Summary |
| | | | References |
| | | Chapter 4. Cisco Incident Control Service |
| | | | Implementing Outbreak Management with Cisco ICS |
| | | | Displaying Outbreak Reports |
| | | | Displaying Devices |
| | | | Viewing Logs |
| | | | Summary |
| | | | References |
| | | Chapter 5. Demystifying 802.1x |
| | | | Fundamentals of 802.1x |
| | | | Introducing Cisco Identity-Based Networking Services |
| | | | Machine Authentication |
| | | | Section 802.1. x and NAC |
| | | | Using EAP Types |
| | | | VPN and 802.1x |
| | | | Summary |
| | | | References |
| | | Chapter 6. Implementing Network Admission Control |
| | | | Network Admission Control Overview |
| | | | NAC Framework Benefits |
| | | | NAC Framework Components |
| | | | Operational Overview |
| | | | Deployment Models |
| | | | Summary |
| | | | References |
| | | Chapter 7. Network Admission Control Appliance |
| | | | NAC Appliance Features |
| | | | NAC Appliance Manager |
| | | | Summary |
| | | | References |
| | | Chapter 8. Managing the Cisco Security Agent |
| | | | Management Center for Cisco Security Agents |
| | | | Cisco Security Agent |
| | | | Summary |
| | | | References |
| | | Chapter 9. Cisco Security Manager |
| | | | Getting Started |
| | | | Device View |
| | | | Map View |
| | | | Policy View |
| | | | IPS Management |
| | | | Object Manager |
| | | | Value Override Per Device |
| | | | Summary |
| | | | References |
| | | Chapter 10. Cisco Security Monitoring, Analysis, and Response System |
| | | | Understanding Cisco Security MARS Features |
| | | | Summary Dashboard |
| | | | Incidents |
| | | | Rules |
| | | | Query/Reports |
| | | | Management |
| | | | Admin |
| | | | Cisco Security Manager Linkages |
| | | | Summary |
| | | | References |
| | | Index |