TY - BOOK AU - Northcutt,Stephen AU - Zeltser,Lenny AU - Winters,Scott AU - Frederick,Karen Kent AU - Ritchey,Ronald W. TI - Inside network perimeter security : : the definitive guide to firewalls, VPNs, routers, and intrusion detection systems / SN - 0735712328 PY - 2003/// CY - Indianapolis : PB - New Riders, KW - REDES INFORMATICAS KW - SEGURIDAD INFORMATICA KW - FIREWALLS N1 - CONTENIDO I Perimeter Fundamentals 1 1 Perimeter Security Fundamentals 3 2 Packet Filtering 23 3 Stateful Firewalls 55 4 Proxy Firewalls 85 5 Security Policy 103 II Extending the Perimeter 125 6 The Role of a Router 127 7 Network Intrusion Detection 161 8 Virtual Private Networks 185 9 Host Hardening 231 10 Host Defense Components 253 III Perimeter Design 295 11 Design Fundamentals 297 12 Separating Resources 323 13 Software Architecture 355 14 VPN Integration 379 15 Tuning the Design for Performance 405 16 Sample Designs 433 IV Perimeter Assessment 459 17 Maintaining a Security Perimeter 461 18 Network Log Analysis 493 19 Troubleshooting Defense Components 517 20 Assessment Techniques 549 21 Design Under Fire 579 22 Importance of Defense in Depth 613 V Appendixes 633 A Cisco Access List Sample Configurations 635 B Crypto 101 645 C Network Air Gaps 651 ER -