This is the Title of the Book, eMatter Edition
Copyright © 2002 O’Reilly & Associates, Inc. All rights reserved.
161
Appendix E
APPENDIX E
Resources
This appendix lists resources that you may find useful when securing your routers,
systems, and networks. It also provides links to sites where you can find more
detailed information on topics that are out of the scope of this book—including
IPSec, RADIUS/TACACS+, and intrusion detection.
Web Sites
This site provides the most current information on Cisco routers and products.
Cisco’s online technical documentation is excellent and should usually be the
first stop for questions involving Cisco routers.
/>A direct link to Cisco’s Product Security Incident Response Team (PSIRT) and a
list of all Cisco IOS vulnerabilities.
/>Cisco’s feature navigator. It helps determine what IOSversions and hardware
support features such as IPSec and SSH.
/>NSA-recommended guides for securing Cisco routers.
Additional NSA-recommended security guides.
A security site with excellent news, articles, tools, and vulnerability listings.
SecurityFocus is also home to the Bugtraq vulnerability forum.
The original Computer Emergency Response Team (CERT) based out of Carn-
egie Mellon. CERT is an excellent resource on vulnerabilities, fixes, and incident
response.
,appe.22945 Page 161 Friday, February 15, 2002 2:52 PM
This is the Title of the Book, eMatter Edition
Copyright © 2002 O’Reilly & Associates, Inc. All rights reserved.
162
|
Appendix E: Resources
The System Administrator and Network Security web site. It is an excellent
source for research and education in the area of information security.
The Computer Security Institute web site. he source of the annual FBI/CSI com-
puter crime and security survey.
/>The MIT Kerberos web site.
/>The TACACS frequently asked questions web site (with a focus on Cisco).
/>The IETF RADIUS workgroup with links to RFCs and RADIUS information.
/>The IETF IPSec working group page with links to IPSec drafts and RFCs.
A site where you can search RFCs by number, topic, and keyword.
A site with links to more information about SNMP.
A web site for the Net-SNMP open source SNMP server and client software.
/>A large listing of IANA-reserved networks that can be included in antispoofing
filters.
/>The IETF syslog working group with links to drafts and RFCs.
The Information Systems Audit and Control Association web site. This organiza-
tion sponsors the Certified Information Systems Auditor (CISA) certification.
Books
Boney, James. Cisco IOS in a Nutshell. O’Reilly & Associates, 2001.
This book consolidates the most important commands and features of IOSinto a
single volume.
Garfinkel, Simson and Gene Spafford. Practical Unix and Internet Security, Second
Edition. O’Reilly & Associates, 1996.
This classic reference is the definitive source of information on securing both
standalone Unix systems and those connected to the Internet.
,appe.22945 Page 162 Friday, February 15, 2002 2:52 PM
This is the Title of the Book, eMatter Edition
Copyright © 2002 O’Reilly & Associates, Inc. All rights reserved.
Books
|
163
Kaeo, Merike. Designing Network Security. Cisco Press, 1999.
Cisco’s book on the fundamentals of Cisco network security.
Norberg, Stefan. Securing Windows NT/2000 Servers for the Internet. O’Reilly &
Associates, 2000.
This concise guide simplifies the job of securing a Windows server by paring
down installation and configuration instructions into a series of checklists.
Schneier, Bruce. Applied Cryptography. John Wiley & Sons, 1995.
An excellent reference and introduction to cryptography and standard encryp-
tion techniques and formulas.
Sedayao, Jeff. Cisco IOS Access Lists. O’Reilly & Associates, 2001.
This book focuses on a critical aspect of the Cisco IOS—access lists, which are
central to securing routers and networks.
van Wyk, Kenneth and Richard Forno. Incident Response. O’Reilly & Associates,
2001.
This book combines technical information with guidelines for administrative
planning so that organizations can map out their responses to computer incidents.
Wenstrom, Michael. Managing Cisco Network Security. Cisco Press, 2001.
Cisco’s overview of network security using Cisco products by Cisco Systems
Zwicky, Elizabeth, Simon Cooper, and Brent Chapman. Building Internet Firewalls,
Second Edition. O’Reilly & Associates, 2000.
An excellent book on the complexities of designing and building firewalls.
,appe.22945 Page 163 Friday, February 15, 2002 2:52 PM
,appe.22945 Page 164 Friday, February 15, 2002 2:52 PM