Identify, analyze, and resolve current and potential network security problems Learn diagnostic commands, common problems and resolutions, best practices, and case studies covering a wide array of Cisco network security troubleshooting scenarios and products Refer to common problems and resolutions in each chapter to identify and solve chronic issues or expedite escalation of problems to the Cisco TAC/HTTS Flip directly to the techniques you need by following the modular chapter organization Isolate the components of a complex network problem in sequence Master the troubleshooting techniques used by TAC/HTTS security support engineers to isolate problems and resolve them on all four security domains: IDS/IPS, AAA, VPNs, and firewalls With the myriad Cisco(r) security products available today, you need access to a comprehensive source of defensive troubleshooting strategies to protect your enterprise network. "Cisco Network Security Troubleshooting Handbook" can single-handedly help you analyze current and potential network security problems and identify viable solutions, detailing each step until you reach the best resolution. Through its modular design, the book allows you to move between chapters and sections to find just the information you need. Chapters open with an in-depth architectural look at numerous popular Cisco security products and their packet flows, while also discussing potential third-party compatibility issues. By following the presentation of troubleshooting techniques and tips, you can observe and analyze problems through the eyes of an experienced Cisco TAC or High-Touch Technical Support (HTTS) engineer or determine how to escalate your case to a TAC/HTTS engineer. Part I starts with a solid overview of troubleshooting tools and methodologies. In Part II, the author explains the features of Cisco ASA and Cisco PIX(r) version 7.0 security platforms, Firewall Services Module (FWSM), and Cisco IOS(r) firewalls. Part III covers troubleshooting IPsec Virtual Private Networks (IPsec VPN) on Cisco IOS routers, Cisco PIX firewalls with embedded VPN functionalities, and the Cisco 3000 Concentrator. Troubleshooting tools and techniques on the Authentication, Authorization, and Accounting (AAA) framework are discussed thoroughly on routers, Cisco PIX firewalls, and Cisco VPN 3000 concentrators in Part IV. Part IV also covers troubleshooting Cisco Secure ACS on Windows, the server-side component of the AAA framework. IDS/IPS troubleshooting on IDS/IPS appliances, IDSM-2 blade, and NM-CIDS blade on Cisco IOS routers are covered in Part V. In Part VI, the author examines the troubleshooting techniques for VPN/Security Management Solution (VMS) tools used for managing products from all four security domains in greater detail: IDS/IPS, AAA, VPNs, and firewalls. "Cisco Network Security Troubleshooting Handbook" prepares you to troubleshoot your network s security devices and presents step-by-step procedures for tackling issues that arise, so that you can protect your network. This security book is part of the Cisco Press(r) Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks."
Product Identifiers
Publisher
Cisco Press
ISBN-10
1587051893
ISBN-13
9781587051890
eBay Product ID (ePID)
45877584
Product Key Features
Author
Mynul Hoda
Publication Name
Cisco Network Security Troubleshooting Handbook
Format
Perfect
Language
English
Series
Networking Technology Ser.
Publication Year
2005
Type
Textbook
Number of Pages
1152 Pages
Dimensions
Item Length
9in
Item Height
2.3in
Item Width
7.3in
Item Weight
65.6 Oz
Additional Product Features
Lc Classification Number
Tk5105.59
Table of Content
Part I Troubleshooting Tools and Methodology Chapter 1 Troubleshooting Methods Proactive Actions for Handling Network Failure Types of Failure Problem-Solving Model Step 1: Define the Problem Step 2: Gather the Facts Step 3: Consider Possible Problems Step 4: Create an Action Plan Step 5: Implement the Action Plan Step 6: Observe Results Step 7: Repeat if Necessary Step 8: Document the Changes Summary Chapter 2 Understanding Troubleshooting Tools Using Device Diagnostic Commands show Commands debug Commands Test Commands ping Command traceroute Command telnet Command nslookup Command Network Analyzers Trivial File Transfer Protocol (TFTP) Server FTP Server Syslog Server Audit and Attack Tools Core Dump Using TFTP Using FTP Using rcp Using a Flash Disk Additional Configuration "Exception Memory" Command debug sanity Command Testing the Core Dump Setup Part II Troubleshooting Cisco Secure Firewalls Chapter 3 Troubleshooting Cisco Secure PIX Firewalls Overview of PIX Firewall PIX Packet Processing File System Overview Access-List time-range Keyword Enable/Disable Outbound ACL nat-control Modular Policy Framework (MPF) Objective Transparent Firewall Diagnostic Commands and Tools show Commands show xlate [detail] show connection [detail] show local-host show service-policy show asp drop show cpu usage show traffic show blocks show output filters show tech-support Debug Commands debug icmp trace debug application_protocol debug pix process debug fixup tcp udp capture Command Sniffer Capture Syslog Traceback/Crashinfo Other Tools Problem Areas Breakdown Licensing Issues Password Recovery Issue Software Upgrade and Downgrade Issues Standard Upgrade Procedure Upgrade using ROM Monitor Mode Downgrade Procedure Upgrading PIX Firewall in a Failover Setup Connection Issues Across PIX Firewall Configuration Steps Troubleshooting Steps Transparent Firewall Issues Configuration Steps Troubleshooting Steps Virtual Firewall Security Context How the Virtual Firewall Works Limitations of Virtual Firewall Configuration Steps Troubleshooting Steps Quality of Service (QoS) Issues Policing Low Latency Queuing (LLQ) Troubleshooting Steps Performance Issues High CPU Utilization High Memory Utilization Large ACL Reverse DNS & IDENT Protocol Case Studies Active/Standby Model Active/Active Model Hardware and License Requirements System and User Failover Group Initialization, Configuration Synchronization/Command Replication Configuration Examples Asymmetrical Routing Support Troubleshooting Steps Common Problems and Resolutions Best Practices Protecting the PIX Firewall Itself Protecting Network Resources Chapter 4 Troubleshooting Firewall Services Module Overview of FWSM Firewall FWSM Architecture Control Plane (CP) Network Processors (NP) Packet Flows Diagnostic Commands and Tools Show Commands show Commands on the Switch show Commands on the FWSM Debug Commands Sniffer on the FWSM Syslog on the FWSM Sniffer Capture Analysis of Problem Areas Licensing Issues Hardware Issues Firewall Module Administration Issues Flash Setting the Boot Device (Route Processor) Maintenance Partition Password Recovery Procedure Up