pt. I. Security overview and firewalls -- Ch. 1. Security threats -- Ch. 2. Introduction to firewalls -- pt. II. Managing access to routers -- Ch. 3. Accessing a router -- Ch. 4. Disabling unnecessary services -- Ch. 5. Authentication, authorization, and accounting -- pt. III. Nonstateful filtering technologies -- Ch. 6. Access list introduction -- Ch. 7. Basic access lists -- pt. IV. Stateful and advanced filtering technologies -- Ch. 8. Reflexive access lists -- Ch. 9. Context-based access control -- Ch. 10. Filtering web and application traffic -- pt. V. Address translation and firewalls -- Ch. 11. Address translation -- Ch. 12. Address translation issues -- pt. VI. Managing access through routers -- Ch. 13. Lock-and-key access lists -- Ch. 14. Authentication proxy -- Ch. 15. Routing protocol protection -- pt. VII. Detecting and preventing attacks -- Ch. 16. Intrusion-detection system -- Ch. 17. DoS protection -- Ch. 18. Logging events -- pt. VIII. Virtual private networks -- Ch. 19. IPSec site-to-site connections -- Ch. 20. IPSec remote-access connections -- pt. IX. Case study -- Ch. 21. Case study
Notes
"Harden perimeter routers with Cisco firewall functionality and features to ensure network security."