Building DMZs for Enterprise Networks (Paperback)
暫譯: 為企業網路建構 DMZ
Robert J. Shimonski, Will Schmied, v Chang, Thomas W. Shinder
- 出版商: Syngress Media
- 售價: $2,390
- 貴賓價: 9.5 折 $2,271
- 語言: 英文
- 頁數: 768
- 裝訂: Paperback
- ISBN: 1931836884
- ISBN-13: 9781931836883
已過版
買這商品的人也買了...
-
$680$537 -
$990Solaris Internals: Core Kernel Architecture
-
$2,120$2,014 -
$750Cisco Secure Intrusion Detection System (Hardcover)
-
$1,710$1,625 -
$399RHCE Red Hat Certified Engineer LINUX Study Guide, 2/e (Hardcover)
-
$888Component Development for the Java Platform (Paperback)
-
$2,250$2,138 -
$775Ethereal Packet Sniffing
-
$480$408 -
$525Itanium Rising: Breaking Through Moore's Second Law of Computing Power
-
$1,590$1,511 -
$2,730$2,594 -
$780$616 -
$2,390$2,271 -
$1,930$1,834 -
$750$593 -
$450$383 -
$990$782 -
$1,176Computer Organization and Design: The Hardware/Software Interface, 3/e(IE) (美國版ISBN:1558606041)
-
$780$616 -
$480$379 -
$2,800$2,660 -
$2,230$2,119 -
$550$429
商品描述
Description:
After reading "Building DMZs for Enterprise Networks" you will understand how to design, plan, implement, maintain, secure, and test a DMZ segment using a variety of technologies. This one-of-a-kind book by best-selling authors Robert Shimonski and Dr. Thomas W. Shinder will teach you DMZ design principles, show you how to configure the hardware that makes up DMZs, securely populate the DMZs with systems and services, and be able to implement security on a DMZ.
- Understand DMZ Concepts and Layout
See how to plan your network security and why, and learn the risks of implementing DMZs.
- Master Intrusion Detection Systems in the DMZ
Set up a honeypot, configure IDS, use CiscoSecure IDS and Snort, and set up an IDS on a small budget.
- Design and Implement a Wireless DMZ
Learn why we need wireless DMZs and how to build the wireless DMZ. Find wireless DMZ examples and a wireless LAN security best-practices list.
- Build Infrastructure Different Firewall Vendors
Use Cisco PIX firewalls, Check Point NG, Nokia solutions, and Microsoft ISA Server 2000 with your DMZ segment and control its traffic.
- Master the Basics of DMZ Router and Switch Security
Secure the most commonly forgotten pieces of the DMZ--the connecting hardware--and completely harden your edge systems.
- Understand DMZ-Based VPN Services
Learn how you place VPN Services in the DMZ and learn the differences between site-to-site VPNs and other set ups.
- Place Sun Systems on Your DMZ
Get a look at Sun Solaris bastion hosts, control access to resources, and lock down your systems.
- Build Windows 2000 Bastion Hosts on Your DMZ
Learn Windows 2000 specifics and see how to configure security, set up remote administration of DMZ hosts, and vulnerability-scan your hosts.
- Hack the DMZ
Get into the mind of the hacker and see what you need to do to secure the DMZ before hackers tear into it.
- Register for Your 1 Year Upgrade
The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!
Table of Contents:
Contents
xv
Foreword xxxi
Chapter 1 DMZ Concepts, Layout, and Conceptual Design 1
Introduction 2
Planning Network Security 2
Security Fundamentals 3
Identifying Risks to Data 6
Identifying Risks to Services 7
Identifying Potential Threats 8
Introducing Common Security Standards 9
Policies, Plans, and Procedures 10
DMZ Definitions and History 12
DMZ Concepts 13
Traffic Flow Concepts 17
Networks With and Without DMZs 21
Pros and Cons of DMZ Basic Designs 22
DMZ Design Fundamentals 24
Why Design Is So Important 25
Designing End-to-End Security for Data
Transmission Between Hosts on the Network 25
Traffic Flow and Protocol Fundamentals 26
DMZ Protocols 26
Designing for Protection in Relation to the Inherent Flaws of
TCP/IPv4 27
Public and Private IP Addressing 28
Ports 29
The OSI Model 30
Identifying Potential Risks from the Internet 31
Using Firewalls to Protect Network Resources 32
xvi Contents
Using Screened Subnets to Protect Network Resources 32
Securing Public Access to a Screened Subnet 33
Traffic and Security Risks 35
Application Servers in the DMZ 35
Domain Controllers in the DMZ 36
RADIUS-Based Authentication Servers in the DMZ 36
VPN DMZ Design Concepts 36
Advanced Risks 37
Business Partner Connections 37
Extranets 38
Web and FTP Sites 38
E-Commerce Services 39
E-Mail Services 39
Advanced Design Strategies 39
Advanced DMZ Design Concepts 40
Remote Administration Concepts 41
Authentication Design 43
Summary 44
Solutions Fast Track 45
Frequently Asked Questions 47
Chapter 2 Windows 2000 DMZ Design 49
Introduction 50
Introducing Windows 2000 DMZ Security 51
Fundamental Windows 2000 DMZ Design 52
Network Engineering the DMZ 54
Systems-Engineering the DMZ 60
Security Analysis for the DMZ 62
Building a Windows 2000 DMZ 63
Designing the DMZ Windows Style 64
Domain Considerations 64
The Contained Domain Model 66
The Extended Domain Model 67
The Internet Connection 67
Wide Area Network Link 69
DMZ Perimeter Security 75
External Router 75
Contents xvii
Firewall 75
Extra DMZ Routers 78
Name Resolution for the DMZ 79
DMZ Mail Services 80
Mail Relay 81
Web Servers 82
External Web Server 82
Designing Windows 2000 DNS in the DMZ 83
External DNS Server 84
Engineering Windows 2000 Traffic in the DMZ 85
Assessing Network Data Visibility Risks 89
Windows 2000 DMZ Design Planning List 92
Summary 94
Solutions Fast Track 95
Frequently Asked Questions 100
Chapter 3 Sun Solaris DMZ Design 103
Introduction 104
Placement of Servers 104
The Firewall Ruleset 108
The Private Network Rules 108
The Public Network Rules 111
Server Rules 113
System Design 114
Hardware Selection:The Foundation 116
Common DMZ Hardware Requirements 117
Network Hardware Considerations 117
Software Selection:The Structure 118
Popular Firewall Software Packages 119
High Availability of the DMZ Server 120
Host Security Software 121
Other Software Considerations 122
Configuration:The Plumbing and Other Details 123
Disk Layout and Considerations 123
Increasing the Verbosity of Local Auditing 124
Backup Considerations 125
Remote Administration 126
xviii Contents
Putting the Puzzle Together 126
Layering Local Security 128
Auditing Local File Permissions 130
Building the Model for Future Use 133
Implementation:The Quick, Dirty Details 135
Media Integrity 135
Physical Host Security 135
Host Network Security 136
Patch Application 136
Solaris System Hardening 137
Manual System Hardening 138
Automated System Hardening 143
Hardening Checklists for DMZ Servers and Solaris 145
Summary 147
Solutions Fast Track 148
Frequently Asked Questions 150
Chapter 4 Wireless DMZs 153
Introduction 154
Why Do We Need Wireless DMZs? 156
Passive Attacks on Wireless Networks 156
War Driving 157
Sniffing 160
Active Attacks on Wireless Networks 160
Spoofing (Interception) and Unauthorized Access 161
Denial of Service and Flooding Attacks 164
Man-in-the-Middle Attacks on Wireless Networks 166
Network Hijacking and Modification 166
Jamming Attacks 168
Designing the Wireless DMZ 169
Wireless DMZ Components 171
Access Points 172
Network Adapters 172
RADIUS Servers 173
Enterprise Wireless Gateways and Wireless Gateways 173
Firewalls and Screening Routers 174
Other Segmentation Devices 174
Contents xix
Wireless DMZ Examples 174
Wireless LAN Security Best-Practices Checklist 178
Summary 181
Solutions Fast Track 181
Frequently Asked Questions 183
Chapter 5 Firewall Design: Cisco PIX 185
Introduction 186
Basics of the PIX 186
Securing Your Network Perimeters 187
The Cisco Perimeter Security Solution 187
Cisco PIX Versions and Features 192
Cisco PIX Firewalls 192
The Cisco PIX 501 Firewall 192
The Cisco PIX 506E Firewall 193
The Cisco PIX 515E Firewall 194
The Cisco PIX 525 Firewall 196
The Cisco PIX 535 Firewall 197
Cisco Firewall Software 198
The Cisco PIX Device Manager 199
Cisco PIX Firewall Licensing 200
Cisco PIX Firewall Version 6.3 201
PIX Firewall PCI Card Options 202
Making a DMZ and Controlling Traffic 207
Securely Managing the PIX 207
The Console 207
Telnet 208
SSH 209
The PIX Device Manager 210
Authenticating Management Access to the PIX 212
PIX Configuration Basics 213
Defining Interfaces 213
Configuring NAT 218
Outbound NAT 220
Inbound NAT 225
Verifying and Monitoring NAT 229
Configuring Access Rules 229
Creating an Outbound Access Control List 230
xx Contents
Creating an Inbound Access Control List 232
Creating Turbo ACLs 232
Monitoring ACLs 233
Routing Through the PIX 235
Static Routing 235
Enabling RIP 237
OSPF 238
Configuring Advanced PIX Features 239
The PIX Failover Services 239
What Causes Failover to Occur 240
Failover Requirements 240
Configuring Stateful Failover with a Failover Cable 241
Configuring Stateful LAN-Based Failover 244
Testing and Monitoring Failover 247
Blocking ActiveX and Java 247
URL Filtering 248
Cut-Through Proxy 249
Application Inspection 250
Intrusion Detection 251
FloodGuard, FragGuard, and DNSGuard 251
Securing SNMP and NTP 252
PIX Firewall Design and
Configuration Checklist 253
Summary 254
Solutions Fast Track 255
Frequently Asked Questions 257
Chapter 6 Firewall and DMZ Design: Check Point NG 259
Introduction 260
Basics of Check Point NG 260
Stateful Inspection 261
Network Address Translation 261
Management Architecture 262
Securing Your Network Perimeters 262
The Check Point Perimeter Security Solution 262
Configuring Check Point to Secure Network Perimeters 263
Antispoofing 264
Contents xxi
SmartDefense 266
Stateful Inspection Customization 273
Making a DMZ and Controlling Traffic 275
Configuring the DMZ Interface 275
Configuring Access Rules 277
Configuring Network Address Translation 279
Routing Through Check Point FireWall-1/VPN-1 280
Check Point NG Secure DMZ Checklist 280
Summary 282
Solutions Fast Track 282
Frequently Asked Questions 283
Chapter 7 Firewall and DMZ Design: Nokia Firewall 285
Introduction 286
Basics of the Nokia Firewall 286
Choosing the Right Platform 287
Nokia IP120 Appliance 287
Nokia IP350/IP380 Platforms 287
Nokia IP530 Platform 288
Nokia IP710/IP740 Platform 289
Configuring the Nokia Appliance 290
Serial Console Access 290
Configuring IPSO Settings 291
Using CLISH 292
Software Installation 294
Securing Your Network Perimeters 296
Plan Ahead 296
Know the Purpose of Your DMZ 297
DMZ Type 297
New or Existing Network 297
Network Plan 297
Time Constraints 298
Available Support Assistance 298
The Nokia Perimeter Security Solution 299
Configuring Check Point FireWall-1
Address Translation Rules 299
Building the DMZ 304
xxii Contents
Configuring Check Point FireWall-1 Security and Address
Translation Rules 310
Additional Considerations for Designing a DMZ 311
Nokia Firewall and DMZ Design Checklist 315
Summary 316
Solutions Fast Track 316
Frequently Asked Questions 319
Chapter 8 Firewall and DMZ Design: ISA Server 2000 321
Introduction 322
Configuring a Trihomed DMZ 322
The Network Layout 324
CLIENTDC 325
ISA 326
Internal Interface 326
External Interface 326
DMZ Interface 326
DMZSMTPRELAY 326
Router 327
Interface #1 (the DMZ Interface) 327
Interface #2 (the Public Interface) 327
Laptop (External Network Client) 327
Configuring the ISA Server 328
Ping Testing the Connections 330
Creating an Inbound ICMP Ping Query
Packet Filter on the ISA Server External Interface 331
Creating an Inbound ICMP Ping Query
Packet Filter to the DMZ Host’s Interface 334
Pinging the ISA Server Interfaces from the DMZ Hosts 337
Creating a Global ICMP Packet Filter for DMZ Hosts 337
Publishing DMZ SMTP Servers 338
Publishing a DMZ SMTP Mail Relay Server 342
Publishing a Web Server 350
Publishing an FTP Server on a Trihomed DMZ Segment 351
How FTP Works 351
Normal or PORT or Active Mode FTP 351
Passive or PASV Mode FTP 352
Contents xxiii
Challenges Created by the FTP Protocol 353
PORT Mode FTP Client-Side Firewall 354
PORT Mode FTP Server-Side Firewall 354
PASV Mode FTP Client-Side Firewall 355
PASV Mode FTP Client-Side Firewall 356
Using Packet Filters to Publish the PORT Mode
FTP Server 356
Using Packet Filters to Publish the PASV Mode FTP Server 359
Beware the “Allow All” Packet Filter 360
External Network Clients Cannot Use the DMZ Interface to
Connect to the Internal Network 362
Summary 364
Solutions Fast Track 364
Frequently Asked Questions 366
Chapter 9 DMZ Router and Switch Security 369
Introduction 370
Securing the Router 370
Router Placement in a DMZ Environment 370
Border Gateway Protocol 375
Access Control Lists 379
Security Banner 385
Securely Administering the Router 386
Disabling Unneeded IOS features 397
Cisco Discovery Protocol 398
Redirects 398
Unreachables 399
Directed Broadcasts 399
Proxy ARP 400
Small Services 400
Finger 401
IP Source Routing 401
Bootp Server 402
Other Security Features 402
Securing the Switch 403
Cisco Switches 404
Catalyst 2950 404
xxiv Contents
Catalyst 3550 405
Catalyst 4500 405
Catalyst 6500 406
Securely Managing Switches 407
Console 408
Telnet 408
SSH 410
HTTP 410
Enable Passwords 410
AAA 411
Syslogs, SNMP, and NTP 412
Security Banner 412
Disabling Unneeded IOS features 412
VLAN Trunking Protocol 413
VLANs 414
Private VLANS 419
Securing Switch Ports 422
IOS Bugs and Security Advisories 424
DMZ Router and Switch Security Best-Practice Checklists 425
Router Security Checklist 425
Switch Security Checklist 426
Summary 428
Solutions Fast Track 428
Frequently Asked Questions 430
Chapter 10 DMZ-Based VPN Services 433
Introduction 434
VPN Services in the DMZ 434
VPN Deployment Models 435
VPN Termination at the Edge Router 436
VPN Termination at the Corporate Firewall 438
VPN Termination at a Dedicated VPN Appliance 439
Topology Models 440
Meshed Topology 440
Star Topology 441
Hub-and-Spoke Topology 442
Remote Access Topology 442
Contents xxv
Placement of Devices 443
Business Partner Connections 444
Remote Access Services 444
Nokia 445
NetScreen VPNs 446
Cisco VPNs 447
Windows VPN 450
Designing an IPSec Solution 451
Designing an IPSec Encryption Scheme 451
Designing an IPSec Management Strategy 452
Designing Negotiation Policies 453
Designing Security Policies 453
Designing IP Filters 454
Defining Security Levels 454
Connecting B2B Sites 455
Extranets 455
VPN Security 456
Active Directory Security 457
Summary 459
Solutions Fast Track 459
Frequently Asked Questions 461
Chapter 11 Implementing Wireless DMZs 463
Introduction 464
Implementing a Wireless Gateway with Reef Edge Dolphin 464
Installing Dolphin 467
Configuring Dolphin 472
Improving the User Experience 475
Dolphin Review 477
Implementing RADIUS with Cisco LEAP 477
LEAP Features 478
Building a LEAP Solution 480
Installing and Configuring Steel Belted Radius 482
Configuring LEAP 486
Windows Active Directory Domain
Authentication with LEAP and RADIUS 491
LEAP Review 493
xxvi Contents
Summary 495
Solutions Fast Track 495
Frequently Asked Questions 496
Chapter 12 Sun Solaris Bastion Hosts 499
Introduction 500
Configuring the Fundamentals 500
System Installation 501
Minimizing Services 502
Additional Steps 505
System Patching 507
Removing SUID Programs 507
TCP/IP Stack Hardening 508
Controlling Access to Resources 509
Address-Based Access Control 510
Configuring TCP Wrappers 510
Cryptographic Access Control 513
Creating an IPSec Policy File 514
Auditing Access to Resources 517
The SunScreen Basic Security Module 518
BSM Configuration 518
Viewing Audit Data 520
Authentication 521
Bastion Host Configuration 523
SMTP Relays 524
FTP and Web Servers 528
Sun Solaris Bastion Hosts Checklists 529
Summary 531
Solutions Fast Track 531
Frequently Asked Questions 533
Chapter 13 Windows 2000 Bastion Hosts 535
Introduction 536
Configuring the Fundamentals 536
Domain Members or Standalone Servers? 537
Installing from Scratch 538
Disk Partitions 538
Removing Optional Components 539
Contents xxvii
Service Packs and Hotfixes 539
Creating a New Local Administrator 542
Security Configuration Through the
Microsoft Management Console 542
Account Lockout Policy (Under Account Policies) 544
Audit Policy (Under Local Policies) 544
User Rights Assignment (Under Local Policies) 546
Security Options (Under Local Policies) 547
Event Log 549
Restricted Groups 549
System Services 550
Registry and File System ACLs 551
Applying the High-Security DMZ Template 555
Remote Administration of DMZ Hosts 556
Using Terminal Services for Remote
Desktop Administration 556
Installing Terminal Services 558
Configuring Terminal Services Securely 558
Using Terminal Services for File Replication 561
Using IPSec-Enhanced Telnet for
Command-Line Administration 562
Vulnerability-Scan Your Host 565
Bastion Host Configuration 567
Configuring IIS Servers for Web Access 567
Setting Up an Anonymous, Public Web Site 567
The IIS Lockdown Tool 570
The URLScan Tool (New and Improved) 576
Final Configuration Steps 577
Setting Up a Secure Web Site 579
Configuring an IIS Server for FTP 581
Configuring an IIS Server for SMTP 582
Checklists 583
Windows 2000 Server Hardening Checklist 583
IIS Hardening Checklist (WWW, FTP, and SMTP) 584
For World Wide Web Service (HTTP) 584
For World Wide Web Service (HTTPS) 586
xxviii Contents
For FTP Service 586
For SMTP Service 586
Summary 587
Solutions Fast Track 587
Frequently Asked Questions 589
Checklists 590
Chapter 14 Hacking the DMZ 593
Introduction 594
Reconnaissance and Penetration Testing 597
Defense in Depth 597
Recon 101 600
Picking a Target 602
Basic Information Gathering 603
Whois Lookup 605
Social Engineering 610
Hiding Your Identity 611
Scanning Techniques 613
Network Mapping 616
Vulnerability Scanning 626
Auditing and Logging Evasion 632
Probing Analog Connections 632
Attacking the DMZ Hosts 638
DNS Exploits 638
General BIND Security 644
DNS Spoofing Attacks 645
SQL Attacks and Hacks 647
E-Mail Attacks and Hacks 651
Other Attack Methods 655
DMZ Hardening Checklist 657
Summary 659
Solutions Fast Track 660
Frequently Asked Questions 663
Contents xxix
Chapter 15 Intrusion Detection in the DMZ 667
Introduction 668
Intrusion Detection 101 672
Deployment of an IDS 678
Repelling the Hacker 685
Honeypots in the DMZ 687
Configuring a Honeypot for Your DMZ 687
Host-Based Intrusion Detection Systems 689
Tripwire 690
Saving the DNS Server 692
Implementing HIDS on Your DNS Server 694
Keeping the Web Server Serving 695
CiscoSecure IDS 697
Snort 706
The Poor Man’s IDS 714
Network Time 717
More IDS Deployment Strategies 717
Case Study 720
Lessons Learned 721
Summary 722
Solutions Fast Track 723
Frequently Asked Questions 725
Index 727
商品描述(中文翻譯)
描述:
在閱讀《為企業網路建立 DMZ》後,您將了解如何設計、規劃、實施、維護、安全性及測試 DMZ 區段,並使用各種技術。這本由暢銷書作者 Robert Shimonski 和 Dr. Thomas W. Shinder 所撰寫的獨特書籍,將教您 DMZ 設計原則,展示如何配置構成 DMZ 的硬體,安全地填充 DMZ 的系統和服務,並能夠在 DMZ 上實施安全性。
- 了解 DMZ 概念和佈局
了解如何規劃您的網路安全及其原因,並學習實施 DMZ 的風險。
- 精通 DMZ 中的入侵檢測系統
設置蜜罐,配置 IDS,使用 CiscoSecure IDS 和 Snort,並在小預算下設置 IDS。
- 設計和實施無線 DMZ
了解為何需要無線 DMZ 以及如何建立無線 DMZ。查找無線 DMZ 的範例和無線 LAN 安全最佳實踐清單。
- 建立不同防火牆供應商的基礎設施
使用 Cisco PIX 防火牆、Check Point NG、Nokia 解決方案和 Microsoft ISA Server 2000 與您的 DMZ 區段,並控制其流量。
- 精通 DMZ 路由器和交換機安全的基本知識
確保 DMZ 中最常被遺忘的部分——連接硬體——並徹底加固您的邊緣系統。
- 了解基於 DMZ 的 VPN 服務
了解如何在 DMZ 中放置 VPN 服務,並學習站對站 VPN 與其他設置之間的差異。
- 在您的 DMZ 上放置 Sun 系統
了解 Sun Solaris 堡壘主機,控制對資源的訪問,並鎖定您的系統。
- 在您的 DMZ 上建立 Windows 2000 堡壘主機
了解 Windows 2000 的具體內容,並查看如何配置安全性,設置 DMZ 主機的遠端管理,並對主機進行漏洞掃描。
- 破解 DMZ
進入駭客的思維,了解在駭客攻擊之前,您需要做什麼來保護 DMZ。
- 註冊您的 1 年升級
Syngress Solutions 升級計劃保護您免受內容過時的影響,並提供每月郵件、白皮書等!
目錄:
內容
前言
第 1 章 DMZ 概念、佈局和概念設計
引言
規劃網路安全
安全基本原則
識別數據風險
識別服務風險
識別潛在威脅
介紹常見安全標準
政策、計劃和程序
DMZ 定義和歷史
DMZ 概念
流量流動概念
有無 DMZ 的網路
DMZ 基本設計的優缺點
DMZ 設計基本原則
為何設計如此重要
設計端到端的數據安全
網路上主機之間的傳輸
流量流動和協議基本原則
DMZ 協議
針對 TCP/IPv4 的固有缺陷設計保護
公共和私有 IP 位址
端口
OSI 模型
識別來自互聯網的潛在風險
使用防火牆保護網路資源
使用篩選子網保護網路資源
保護對篩選子網的公共訪問
流量和安全風險
DMZ 中的應用伺服器
DMZ 中的域控制器
DMZ 中的基於 RADIUS 的身份驗證伺服器
VPN DMZ 設計概念
進階風險
業務夥伴連接
外部網路
網頁和 FTP 網站
電子商務服務
電子郵件服務
進階設計策略
進階 DMZ 設計概念
遠端管理概念
身份驗證設計
總結
解決方案快速通道
常見問題
第 2 章 Windows 2000 DMZ 設計
引言
介紹 Windows 2000 DMZ 安全
Windows 2000 DMZ 設計基本原則
網路工程 DMZ
系統工程 DMZ
DMZ 的安全分析
建立 Windows 2000 DMZ
設計 DMZ 的 Windows 風格
域考量
包含域模型
擴展域模型
互聯網連接
廣域網連接
DMZ 邊界安全
外部路由器
防火牆
額外 DMZ 路由器
DMZ 的名稱解析
DMZ 郵件服務
郵件中繼
網頁伺服器
外部網頁伺服器
在 DMZ 中設計 Windows 2000 DNS
外部 DNS 伺服器
在 DMZ 中工程 Windows 2000 流量
評估網路數據可見性風險
Windows 2000 DMZ 設計規劃清單
總結
解決方案快速通道
常見問題
第 3 章 Sun Solaris DMZ 設計
引言
伺服器的放置
防火牆規則集
私有網路規則
公共網路規則
伺服器規則
系統設計
硬體選擇:基礎
常見 DMZ 硬體要求
網路硬體考量
軟體選擇:結構
流行的防火牆軟體包
DMZ 伺服器的高可用性
主機安全軟體
其他軟體考量
配置:管道和其他細節
磁碟佈局和考量
增加本地審計的詳細程度
備份考量
遠端管理
將拼圖組合在一起
分層本地安全
審計本地檔案權限
為未來使用建立模型
實施:快速、簡單的細節
媒體完整性
物理主機安全
主機網路安全
補丁應用
Solaris 系統加固
手動系統加固
自動化系統加固
DMZ 伺服器和 Solaris 的加固檢查清單
總結
解決方案快速通道
常見問題
第 4 章 無線 DMZ
引言
為何我們需要無線 DMZ?
對無線網路的被動攻擊
戰爭駭客
嗅探
對無線網路的主動攻擊
欺騙(攔截)和未經授權的訪問
拒絕服務和洪水攻擊
對無線網路的中間人攻擊
網路劫持和修改
干擾攻擊
設計無線 DMZ
無線 DMZ 組件
接入點
網路適配器
RADIUS 伺服器
企業無線閘道和無線閘道
防火牆和篩選路由器
其他分段設備
無線 DMZ 範例
無線 LAN 安全最佳實踐清單
總結
解決方案快速通道
常見問題
第 5 章 防火牆設計:Cisco PIX
引言
PIX 的基本知識
保護您的網路邊界
Cisco 邊界安全解決方案
Cisco PIX 版本和功能
Cisco PIX 防火牆
Cisco PIX 501 防火牆
Cisco PIX 506E 防火牆
Cisco PIX 515E 防火牆
Cisco PIX 525 防火牆
Cisco PIX 535 防火牆
Cisco 防火牆軟體
Cisco PIX 設備管理器
Cisco PIX 防火牆授權
Cisco PIX 防火牆版本 6.3
PIX 防火牆 PCI 卡選項
建立 DMZ 並控制流量
安全管理 PIX
控制台
Telnet
SSH
PIX 設備管理器
驗證管理訪問 PIX
PIX 配置基本知識
定義介面
配置 NAT
出站 NAT
入站 NAT
驗證和監控 NAT
配置訪問規則
創建出站訪問控制列表
創建入站訪問控制列表
創建 Turbo ACL
監控 ACL
通過 PIX 路由
靜態路由
啟用 RIP
OSPF
配置進階 PIX 功能
PIX 故障轉移服務
故障轉移發生的原因
故障轉移要求
使用故障轉移電纜配置有狀態故障轉移
配置基於 LAN 的有狀態故障轉移
測試和監控故障轉移
阻止 ActiveX 和 Java
URL 過濾
直通代理
應用檢查
入侵檢測
FloodGuard、FragGuard 和 DNSGuard
保護 SNMP 和 NTP
PIX 防火牆設計和配置檢查清單
總結
解決方案快速通道
常見問題
第 6 章 防火牆和 DMZ 設計:Check Point NG
引言
Check Point NG 的基本知識
有狀態檢查
網路地址轉換
管理架構
保護您的網路邊界
Check Point 邊界安全解決方案
配置 Check Point 以保護網路邊界
防止欺騙
SmartDefense
有狀態檢查自定義
建立 DMZ 並控制流量
配置 DMZ 介面
配置訪問規則
配置網路地址轉換
通過 Check Point FireWall-1/VPN-1 路由
Check Point NG 安全 DMZ 檢查清單
總結
解決方案快速通道
常見問題
第 7 章 防火牆和 DMZ 設計:Nokia 防火牆
引言
Nokia 防火牆的基本知識
選擇合適的平台
Nokia IP120 設備
Nokia IP350/IP380 平台
Nokia IP530 平台
Nokia IP710/IP740 平台
配置 Nokia 設備
串行控制台訪問
配置 IPSO 設定