| I Perimeter Fundamentals |
|
1 | (124) |
|
Perimeter Security Fundamentals |
|
|
3 | (20) |
|
|
|
4 | (3) |
|
|
|
7 | (12) |
|
Case Study: Defense in Depth in Action |
|
|
19 | (1) |
|
|
|
20 | (3) |
|
|
|
23 | (32) |
|
TCP/IP Primer: How Packet Filtering Works |
|
|
24 | (2) |
|
The Cisco Router as a Packet Filter |
|
|
26 | (3) |
|
Effective Uses of Packet-Filtering Devices |
|
|
29 | (13) |
|
Problems with Packet Filters |
|
|
42 | (7) |
|
Dynamic Packet Filtering and the Reflexive Access List |
|
|
49 | (5) |
|
|
|
54 | (1) |
|
|
|
54 | (1) |
|
|
|
55 | (30) |
|
How a Stateful Firewall Works |
|
|
55 | (2) |
|
|
|
57 | (12) |
|
Stateful Filtering and Stateful Inspection |
|
|
69 | (14) |
|
|
|
83 | (1) |
|
|
|
84 | (1) |
|
|
|
85 | (18) |
|
|
|
85 | (4) |
|
|
|
89 | (1) |
|
Proxy or Application Gateway Firewalls |
|
|
90 | (3) |
|
Protocol Issues for Proxies |
|
|
93 | (3) |
|
|
|
96 | (4) |
|
|
|
100 | (1) |
|
|
|
101 | (2) |
|
|
|
103 | (22) |
|
|
|
104 | (8) |
|
|
|
112 | (8) |
|
|
|
120 | (3) |
|
|
|
123 | (1) |
|
|
|
124 | (1) |
| II Extending the Perimeter |
|
125 | (170) |
|
|
|
127 | (34) |
|
The Router as a Perimeter Device |
|
|
128 | (5) |
|
The Router as a Security Device |
|
|
133 | (10) |
|
|
|
143 | (15) |
|
|
|
158 | (3) |
|
Network Intrusion Detection |
|
|
161 | (24) |
|
Network Intrusion Detection Basics |
|
|
161 | (9) |
|
The Roles of Network IDS in a Perimeter Defense |
|
|
170 | (4) |
|
|
|
174 | (5) |
|
|
|
179 | (5) |
|
|
|
184 | (1) |
|
|
|
185 | (46) |
|
|
|
186 | (4) |
|
Advantages and Disadvantages of VPNs |
|
|
190 | (6) |
|
|
|
196 | (25) |
|
Other VPN Protocols: PPTP and L2TP |
|
|
221 | (7) |
|
|
|
228 | (1) |
|
|
|
229 | (2) |
|
|
|
231 | (22) |
|
|
|
231 | (2) |
|
Hardening Against Local Attacks |
|
|
233 | (7) |
|
Hardening Against Network Attacks |
|
|
240 | (7) |
|
Hardening Against Application Attacks |
|
|
247 | (3) |
|
Additional Hardening Guidelines |
|
|
250 | (2) |
|
|
|
252 | (1) |
|
|
|
253 | (42) |
|
|
|
254 | (4) |
|
|
|
258 | (5) |
|
|
|
263 | (17) |
|
Host-Based Intrusion Detection |
|
|
280 | (10) |
|
Challenges of Host Defense Components |
|
|
290 | (2) |
|
|
|
292 | (1) |
|
|
|
293 | (2) |
| III Perimeter Design |
|
295 | (164) |
|
|
|
297 | (26) |
|
Gathering Design Requirements |
|
|
298 | (14) |
|
|
|
312 | (9) |
|
|
|
321 | (1) |
|
|
|
322 | (1) |
|
|
|
323 | (32) |
|
|
|
324 | (9) |
|
|
|
333 | (15) |
|
|
|
348 | (4) |
|
|
|
352 | (1) |
|
|
|
353 | (2) |
|
|
|
355 | (24) |
|
Software Architecture and Network Defense |
|
|
356 | (2) |
|
How Software Architecture Affects Network Defense |
|
|
358 | (5) |
|
Software Component Placemen |
|
|
363 | (3) |
|
Identifying Potential Software Architecture Issues |
|
|
366 | (2) |
|
|
|
368 | (2) |
|
Network Defense Design Recommendations |
|
|
370 | (1) |
|
Case Study: Customer Feedback System |
|
|
371 | (3) |
|
Case Study: Web-Based Online Billing Application |
|
|
374 | (2) |
|
|
|
376 | (1) |
|
|
|
377 | (2) |
|
|
|
379 | (26) |
|
|
|
380 | (5) |
|
|
|
385 | (5) |
|
|
|
390 | (4) |
|
|
|
394 | (4) |
|
|
|
398 | (1) |
|
|
|
399 | (5) |
|
|
|
404 | (1) |
|
Tuning the Design for Performance |
|
|
405 | (28) |
|
|
|
405 | (4) |
|
Network Security Design Elements that Impact performance |
|
|
409 | (12) |
|
|
|
421 | (7) |
|
Using Load Balancing to Improve Performance |
|
|
428 | (3) |
|
|
|
431 | (1) |
|
|
|
432 | (1) |
|
|
|
433 | (26) |
|
Review of Security Design Criteria |
|
|
434 | (2) |
|
|
|
436 | (20) |
|
|
|
456 | (3) |
| IV Perimeter Assessment |
|
459 | (174) |
|
Maintaining a Security Perimeter |
|
|
461 | (32) |
|
System and Network Monitoring |
|
|
462 | (16) |
|
|
|
478 | (5) |
|
|
|
483 | (7) |
|
|
|
490 | (1) |
|
|
|
491 | (2) |
|
|
|
493 | (24) |
|
The Importance of Network Log Files |
|
|
494 | (5) |
|
|
|
499 | (7) |
|
|
|
506 | (2) |
|
Analyzing Network Firewall Logs |
|
|
508 | (3) |
|
Analyzing Host-Centric Firewall and IDS Logs |
|
|
511 | (4) |
|
|
|
515 | (2) |
|
Troubleshooting Defense Components |
|
|
517 | (32) |
|
The Process of Troubleshooting |
|
|
518 | (3) |
|
Troubleshooting Rules of Thumb |
|
|
521 | (2) |
|
The Troubleshooter's Toolbox |
|
|
523 | (23) |
|
|
|
546 | (1) |
|
|
|
547 | (2) |
|
|
|
549 | (30) |
|
|
|
550 | (18) |
|
|
|
568 | (7) |
|
|
|
575 | (2) |
|
|
|
577 | (2) |
|
|
|
579 | (34) |
|
The Hacker Approach to Attacking Networks |
|
|
580 | (1) |
|
|
|
580 | (3) |
|
GIAC GCFW Student Practical Designs |
|
|
583 | (27) |
|
|
|
610 | (1) |
|
|
|
611 | (2) |
|
Importance of Defense in Depth |
|
|
613 | (20) |
|
Castles: An Example of Defense-in-Depth Architecture |
|
|
614 | (10) |
|
|
|
624 | (4) |
|
Defense in Depth with Information |
|
|
628 | (3) |
|
|
|
631 | (2) |
| V Appendixes |
|
633 | (23) |
|
A Cisco Access List Sample Configurations |
|
|
635 | (10) |
|
Complete Access List for a Private ONLY Network |
|
|
635 | (4) |
|
Complete Access List for a Screened Subnet Network that Allows Public Server Internet Access |
|
|
639 | (6) |
|
|
|
645 | (6) |
|
|
|
646 | (4) |
|
|
|
650 | (1) |
|
|
|
650 | (1) |
|
|
|
651 | (5) |
|
|
|
651 | (2) |
|
|
|
653 | (2) |
|
Using Air Gaps in Conjunction with Firewalls |
|
|
655 | (1) |
|
|
|
656 | (1) |
|
|
|
656 | |