| | Copyright |
| | About the Author |
| | About the Contributing Author |
| | About the Technical Reviewers |
| | Acknowledgments |
| | Icons Used in This Book |
| | Command Syntax Conventions |
| | Foreword |
| | Introduction |
| | Chapter 1. Understanding Types of Network Attacks and Defenses |
| | | Categorizing Network Attacks |
| | | Understanding Traditional Network Defenses |
| | | Introducing Cisco Self-Defending Networks |
| | | Summary |
| | | References |
| | Chapter 2. Mitigating Distributed Denial-of-Service Attacks |
| | | Understanding Types of DDoS Attacks |
| | | DDoS Mitigation Overview |
| | | Using Cisco Traffic Anomaly Detector |
| | | Configuring Cisco Guard |
| | | Summary |
| | | References |
| | Chapter 3. Cisco Adaptive Security Appliance Overview |
| | | Antispoofing |
| | | Intrusion Prevention Service |
| | | Protocol Inspection Services |
| | | HTTP Inspection Engine |
| | | Configuring Content Security and Control Security |
| | | Summary |
| | | References |
| | Chapter 4. Cisco Incident Control Service |
| | | Implementing Outbreak Management with Cisco ICS |
| | | Displaying Outbreak Reports |
| | | Displaying Devices |
| | | Viewing Logs |
| | | Summary |
| | | References |
| | Chapter 5. Demystifying 802.1x |
| | | Fundamentals of 802.1x |
| | | Introducing Cisco Identity-Based Networking Services |
| | | Machine Authentication |
| | | Section 802.1. x and NAC |
| | | Using EAP Types |
| | | VPN and 802.1x |
| | | Summary |
| | | References |
| | Chapter 6. Implementing Network Admission Control |
| | | Network Admission Control Overview |
| | | NAC Framework Benefits |
| | | NAC Framework Components |
| | | Operational Overview |
| | | Deployment Models |
| | | Summary |
| | | References |
| | Chapter 7. Network Admission Control Appliance |
| | | NAC Appliance Features |
| | | NAC Appliance Manager |
| | | Summary |
| | | References |
| | Chapter 8. Managing the Cisco Security Agent |
| | | Management Center for Cisco Security Agents |
| | | Cisco Security Agent |
| | | Summary |
| | | References |
| | Chapter 9. Cisco Security Manager |
| | | Getting Started |
| | | Device View |
| | | Map View |
| | | Policy View |
| | | IPS Management |
| | | Object Manager |
| | | Value Override Per Device |
| | | Summary |
| | | References |
| | Chapter 10. Cisco Security Monitoring, Analysis, and Response System |
| | | Understanding Cisco Security MARS Features |
| | | Summary Dashboard |
| | | Incidents |
| | | Rules |
| | | Query/Reports |
| | | Management |
| | | Admin |
| | | Cisco Security Manager Linkages |
| | | Summary |
| | | References |
| | Index |