IP Address Management:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
John Wiley & Sons, Incorporated
2021
|
Ausgabe: | Second Edition |
Schriftenreihe: | IEEE Press Series on Networks and Service Management Ser
|
Online-Zugang: | FCO01 FHI01 |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (XXV, 606 Seiten) |
ISBN: | 9781119692300 9781119692263 9781119692287 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047442538 | ||
003 | DE-604 | ||
005 | 20230126 | ||
007 | cr|uuu---uuuuu | ||
008 | 210827s2021 |||| o||u| ||||||eng d | ||
020 | |a 9781119692300 |9 978-1-119-69230-0 | ||
020 | |a 9781119692263 |9 978-1-119-69226-3 | ||
020 | |a 9781119692287 |9 978-1-119-69228-7 | ||
035 | |a (ZDB-30-PQE)EBC6425038 | ||
035 | |a (ZDB-30-PAD)EBC6425038 | ||
035 | |a (ZDB-89-EBL)EBL6425038 | ||
035 | |a (OCoLC)1227385736 | ||
035 | |a (DE-599)BVBBV047442538 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-858 |a DE-573 | ||
082 | 0 | |a 004.678 | |
100 | 1 | |a Rooney, Timothy |e Verfasser |0 (DE-588)1042929289 |4 aut | |
245 | 1 | 0 | |a IP Address Management |c Michael Dooley & Timothy Rooney |
250 | |a Second Edition | ||
264 | 1 | |a Hoboken, NJ |b John Wiley & Sons, Incorporated |c 2021 | |
264 | 4 | |c ©2021 | |
300 | |a 1 Online-Ressource (XXV, 606 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a IEEE Press Series on Networks and Service Management Ser | |
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgments -- About the Authors -- Part I IPAM Introduction -- Chapter 1 Introduction -- IP Networking Overview -- IP Routing -- IP Addresses -- Protocol Layering -- OSI and TCP/IP Layers -- TCP/UDP Ports -- Intra-Link Communications -- Are We on the Same Link? -- Limiting Broadcast Domains -- Interlink Communications -- Worldwide IP Communications -- Dynamic Routing -- Routers and Subnets -- Assigning IP addresses -- The Human Element -- Why Manage IP Space? -- Basic IPAM Approaches -- Early History -- Today's IP Networks and IP Management Challenges -- Chapter 2 IP Addressing -- Internet Protocol History -- The Internet Protocol, Take 1 -- Class-Based Addressing -- Internet Growing Pains -- Private Address Space -- Classless Addressing -- Special Use IPv4 Addresses -- The Internet Protocol, Take 2 -- IPv6 Address Types and Structure -- IPv6 Address Notation -- Address Structure -- IPv6 Address Allocations -- 2000::/3 - Global Unicast Address Space -- fc00::/7 - Unique Local Address Space -- fe80::/10 - Link Local Address Space -- ff00::/8 - Multicast Address Space -- Special Use IPv6 Addresses -- IPv4-IPv6 Coexistence -- Chapter 3 IP Address Assignment -- Address Planning -- Regional Internet Registries -- RIR Address Allocation -- Address Allocation Efficiency -- Multi-Homing and IP Address Space -- Endpoint Address Allocation -- Server-based Address Allocation Using DHCP -- DHCP Servers and Address Assignment -- Device Identification by Class -- DHCP Options -- DHCP for IPv6 (DHCPv6) -- DHCP Comparison IPv4 vs. IPv6 -- DHCPv6 Address Assignment -- DHCPv6 Prefix Delegation -- Device Unique Identifiers (DUIDs) -- Identity Associations (IAs) -- DHCPv6 Options -- IPv6 Address Autoconfiguration -- Neighbor Discovery -- Modified EUI-64 Interface Identifiers -- Opaque Interface IDs | |
505 | 8 | |a Reserved Interface IDs -- Duplicate Address Detection (DAD) -- Chapter 4 Navigating the Internet with DNS -- Domain Hierarchy -- Name Resolution -- Resource Records -- Zones and Domains -- Dissemination of Zone Information -- Reverse Domains -- IPv6 Reverse Domains -- Additional Zones -- Root Hints -- Localhost Zones -- DNS Update -- Chapter 5 IPAM Technology Applications -- DHCP Applications -- Device Type Specific Configuration -- Broadband Subscriber Provisioning -- Related Lease Assignment or Limitation Applications -- Pre-Boot Execution Environment (PXE) clients -- PPP/RADIUS Environments -- Mobile IP -- Popular DNS Applications -- Host Name and IP Address Resolution -- A - IPv4 Address Record -- AAAA - IPv6 address record -- PTR - Pointer Record -- Alias Host Name Resolutions -- CNAME - Canonical Name Record -- Network Services Location -- SRV - Services Location Record -- Textual Information Lookup -- TXT - Text Record -- Many More Applications -- Part II IPAM Mechanics -- Chapter 6 IP Management Core Tasks -- IPAM Is Foundational -- Impacts of Inadequate IPAM Practice -- IPAM Is Core to Network Management -- FCAPS Summary -- Configuration Management -- Address Allocation Considerations -- Address Allocation Tasks -- Best Fit Allocation -- Sparse Allocation Method -- Random Allocation -- IP Address Assignment -- Address Deletion Tasks -- Address Renumbering or Movement Tasks -- Flash Moves -- Mobile Moves -- Network Services Configuration -- Fault Management -- Monitoring and Fault Detection -- Troubleshooting and Fault Resolution -- Nslookup -- Dig -- Accounting Management -- Inventory Assurance -- Performance Management -- Services Monitoring -- Address Capacity Management -- Auditing and Reporting -- Security Management -- ITIL Process Mappings -- Chapter 7 IPv6 Deployment -- IPv6 Deployment Process Overview -- IPv6 Address Plan Objectives | |
505 | 8 | |a IPv6 Address Plan Examples -- Case 1 -- Observations -- Case 2 -- Observations -- General IPv6 Address Plan Guidelines -- ULA Considerations -- Renumbering Impacts -- IPv4-IPv6 Coexistence Technologies -- Dual Stack Approach -- Dual Stack Deployment -- DNS Considerations -- DHCP Considerations -- Tunneling Approaches -- Tunneling Scenarios for IPv6 Packets over IPv4 Networks -- Dual-Stack Lite -- Lightweight 4over6 -- Mapping of Address and Port with Encapsulation (MAP-E) -- Additional Tunneling Approaches -- Translation Approaches -- IP/ICMP Translation -- Address Translation -- Packet Fragmentation Considerations -- IP Header Translation Algorithm -- Bump in the Host (BIH) -- Network Address Translation for IPv6-IPv4 (NAT64) -- NAT64 and DNS64 -- 464XLAT -- Mapping of Address and Port with Translation (MAP-T) -- Other Translation Techniques -- Planning Your IPv6 Deployment Process -- Chapter 8 IPAM for the Internet of Things -- IoT Architectures -- 6LoWPAN -- Summary -- Chapter 9 IPAM in the Cloud -- IPAM VNFs -- Cloud IPAM Concepts -- IP Initialization Process -- IP Initialization Implementation -- DHCP Method -- Private Cloud Static Method -- Public Cloud Static Method -- Cloud Automation with APIs -- Multi-Cloud IPAM -- Private Cloud Automation -- Public Cloud Automation -- IPAM Automation Benefits -- Unifying IPAM Automation -- Streamlined Subnet Allocation Workflow -- Workflow Realization -- Tips for Defining Workflows -- Automation Scenarios -- Intra-IPAM Automation -- DHCP Server Configuration -- DNS Server Configuration -- Subnet Assignment -- IP Address Assignment Request -- Extra-IPAM Workflow Examples -- Regional Internet Registry Reporting -- Router Configuration Provisioning -- Customer Provisioning -- Asset Inventory Integration -- Trouble Ticket Creation -- Summary -- Part III IPAM and Security -- Chapter 10 IPAM Services Security | |
505 | 8 | |a Securing DHCP -- DHCP Service Availability -- DHCP Server/OS Attacks -- DHCP Server/OS Attack Mitigation -- DHCP Service Threats -- DHCP Threat Mitigation -- DHCP Authentication and Encryption -- DNS Infrastructure Risks and Attacks -- DNS Service Availability -- DNS Server/OS Attacks -- DNS Server/OS Attack Mitigation -- DNS Service Denial -- Distributed Denial of Service -- Bogus Domain Queries -- Pseudorandom Subdomain Attacks -- Denial of Service Mitigation -- Reflector Style Attacks -- Reflector Attack Mitigation -- Authoritative Poisoning -- Authoritative Poisoning Mitigation -- Resolver Redirection Attacks -- Resolver Attack Defenses -- Securing DNS Transactions -- Cache Poisoning Style Attacks -- Cache Poisoning Mitigation -- DNSSEC Overview -- The DNSSEC Resolution Process -- Negative Trust Anchors -- DNSSEC Deployment -- Last Mile Protection -- DNS Cookies -- DNS Encryption -- DNS Over TLS (DoT) -- DNS Over HTTPS (DoH) -- Encryption Beyond the Last Mile -- Chapter 11 IPAM and Network Security -- Securing Network Access -- Discriminatory Address Assignment with DHCP -- DHCP Lease Query -- Alternative Access Control Approaches -- Layer 2 Switch Alerting -- 802.1X -- Securing the Network Using IPAM -- IP-Based Security Policies (ACLs, etc.) -- Malware Detection Using DNS -- Malware Proliferation Techniques -- Phishing -- Spear Phishing -- Software Downloads -- File Sharing -- Email Attachments -- Watering Hole Attack -- Replication -- Brute Force -- Malware Examples -- Malware Mitigation -- DNS Firewall -- DNS Firewall Policy Precedence -- Other Attacks that Leverage DNS -- Network Reconnaissance -- Network Reconnaissance Defenses -- DNS Rebinding Attack -- Data Exfiltration -- Data Exfiltration Mitigation -- DNS as Data Transport (Tunneling) -- Advanced Persistent Threats -- Advanced Persistent Threats Mitigation | |
505 | 8 | |a Chapter 12 IPAM and Your Internet Presence -- IP Address Space Integrity -- Publicizing Your Public Namespace -- Domain Registries and Registrars -- DNS Hosting Providers -- Signing Your Public Namespace -- DNSSEC Zone Signing -- Key Rollover -- Prepublish Rollover -- Dual Signature Rollover -- Algorithm Rollover -- Key Security -- Enhancing Internet Application Encryption Integrity -- DNS-Based Authentication of Named Entities (DANE) -- Securing Email with DNS -- Email and DNS -- DNS Block Listing -- Sender Policy Framework (SPF) -- Domain Keys Identified Mail (DKIM) -- Domain-Based Message Authentication, Reporting, and Conformance (DMARC) -- Part IV IPAM in Practice -- Chapter 13 IPAM Use Case -- Introduction -- IPv4 Address Allocation -- First-Level Allocation -- Second-Layer Allocation -- Address Allocation Layer 3 -- Core Address Space -- External Extensions of Address Space -- Allocation Trade-Offs and Tracking -- IPAM Worldwide's Public IPv4 Address Space -- IPAM Worldwide's IPv6 Allocations -- External Extensions Address Space -- IP Address Tracking -- DNS and IP Address Management -- Chapter 14 IPAM Deployment Strategies -- General Deployment Principles for DHCP/DNS -- Disaster Recovery/Business Continuity -- DHCP Deployment -- DHCP Server Platforms -- DHCP Servers -- Virtualized DHCP Deployment -- DHCP Appliances -- DHCP Deployment Approaches -- Centralized DHCP Server Deployment -- Distributed DHCP Server Deployment -- DHCP Services Deployment Design Considerations -- DHCP Deployment on Edge Devices -- DNS Deployment -- DNS Trust Sectors -- External DNS Trust Sector -- Extranet DNS Trust Sector -- Recursive DNS Trust Sector -- Internal DNS Trust Sector -- Deploying DNS Servers with Anycast Addresses -- Anycast Addressing Benefits -- Anycast Caveats -- Configuring Anycast Addressing -- IPAM Deployment Summary -- High Availability | |
505 | 8 | |a Multiple Vendors | |
700 | 1 | |a Dooley, Michael |e Sonstige |0 (DE-588)1042929122 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Rooney, Timothy |t IP Address Management |d Newark : John Wiley & Sons, Incorporated,c2021 |z 9781119692270 |
912 | |a ZDB-30-PQE |a ZDB-35-WIC |a ZDB-35-WEL | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032844690 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119692263 |l FCO01 |p ZDB-35-WIC |q FCO_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/servlet/opac?bknumber=9295060 |l FHI01 |p ZDB-35-WEL |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182734976843776 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Rooney, Timothy |
author_GND | (DE-588)1042929289 (DE-588)1042929122 |
author_facet | Rooney, Timothy |
author_role | aut |
author_sort | Rooney, Timothy |
author_variant | t r tr |
building | Verbundindex |
bvnumber | BV047442538 |
collection | ZDB-30-PQE ZDB-35-WIC ZDB-35-WEL |
contents | Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgments -- About the Authors -- Part I IPAM Introduction -- Chapter 1 Introduction -- IP Networking Overview -- IP Routing -- IP Addresses -- Protocol Layering -- OSI and TCP/IP Layers -- TCP/UDP Ports -- Intra-Link Communications -- Are We on the Same Link? -- Limiting Broadcast Domains -- Interlink Communications -- Worldwide IP Communications -- Dynamic Routing -- Routers and Subnets -- Assigning IP addresses -- The Human Element -- Why Manage IP Space? -- Basic IPAM Approaches -- Early History -- Today's IP Networks and IP Management Challenges -- Chapter 2 IP Addressing -- Internet Protocol History -- The Internet Protocol, Take 1 -- Class-Based Addressing -- Internet Growing Pains -- Private Address Space -- Classless Addressing -- Special Use IPv4 Addresses -- The Internet Protocol, Take 2 -- IPv6 Address Types and Structure -- IPv6 Address Notation -- Address Structure -- IPv6 Address Allocations -- 2000::/3 - Global Unicast Address Space -- fc00::/7 - Unique Local Address Space -- fe80::/10 - Link Local Address Space -- ff00::/8 - Multicast Address Space -- Special Use IPv6 Addresses -- IPv4-IPv6 Coexistence -- Chapter 3 IP Address Assignment -- Address Planning -- Regional Internet Registries -- RIR Address Allocation -- Address Allocation Efficiency -- Multi-Homing and IP Address Space -- Endpoint Address Allocation -- Server-based Address Allocation Using DHCP -- DHCP Servers and Address Assignment -- Device Identification by Class -- DHCP Options -- DHCP for IPv6 (DHCPv6) -- DHCP Comparison IPv4 vs. IPv6 -- DHCPv6 Address Assignment -- DHCPv6 Prefix Delegation -- Device Unique Identifiers (DUIDs) -- Identity Associations (IAs) -- DHCPv6 Options -- IPv6 Address Autoconfiguration -- Neighbor Discovery -- Modified EUI-64 Interface Identifiers -- Opaque Interface IDs Reserved Interface IDs -- Duplicate Address Detection (DAD) -- Chapter 4 Navigating the Internet with DNS -- Domain Hierarchy -- Name Resolution -- Resource Records -- Zones and Domains -- Dissemination of Zone Information -- Reverse Domains -- IPv6 Reverse Domains -- Additional Zones -- Root Hints -- Localhost Zones -- DNS Update -- Chapter 5 IPAM Technology Applications -- DHCP Applications -- Device Type Specific Configuration -- Broadband Subscriber Provisioning -- Related Lease Assignment or Limitation Applications -- Pre-Boot Execution Environment (PXE) clients -- PPP/RADIUS Environments -- Mobile IP -- Popular DNS Applications -- Host Name and IP Address Resolution -- A - IPv4 Address Record -- AAAA - IPv6 address record -- PTR - Pointer Record -- Alias Host Name Resolutions -- CNAME - Canonical Name Record -- Network Services Location -- SRV - Services Location Record -- Textual Information Lookup -- TXT - Text Record -- Many More Applications -- Part II IPAM Mechanics -- Chapter 6 IP Management Core Tasks -- IPAM Is Foundational -- Impacts of Inadequate IPAM Practice -- IPAM Is Core to Network Management -- FCAPS Summary -- Configuration Management -- Address Allocation Considerations -- Address Allocation Tasks -- Best Fit Allocation -- Sparse Allocation Method -- Random Allocation -- IP Address Assignment -- Address Deletion Tasks -- Address Renumbering or Movement Tasks -- Flash Moves -- Mobile Moves -- Network Services Configuration -- Fault Management -- Monitoring and Fault Detection -- Troubleshooting and Fault Resolution -- Nslookup -- Dig -- Accounting Management -- Inventory Assurance -- Performance Management -- Services Monitoring -- Address Capacity Management -- Auditing and Reporting -- Security Management -- ITIL Process Mappings -- Chapter 7 IPv6 Deployment -- IPv6 Deployment Process Overview -- IPv6 Address Plan Objectives IPv6 Address Plan Examples -- Case 1 -- Observations -- Case 2 -- Observations -- General IPv6 Address Plan Guidelines -- ULA Considerations -- Renumbering Impacts -- IPv4-IPv6 Coexistence Technologies -- Dual Stack Approach -- Dual Stack Deployment -- DNS Considerations -- DHCP Considerations -- Tunneling Approaches -- Tunneling Scenarios for IPv6 Packets over IPv4 Networks -- Dual-Stack Lite -- Lightweight 4over6 -- Mapping of Address and Port with Encapsulation (MAP-E) -- Additional Tunneling Approaches -- Translation Approaches -- IP/ICMP Translation -- Address Translation -- Packet Fragmentation Considerations -- IP Header Translation Algorithm -- Bump in the Host (BIH) -- Network Address Translation for IPv6-IPv4 (NAT64) -- NAT64 and DNS64 -- 464XLAT -- Mapping of Address and Port with Translation (MAP-T) -- Other Translation Techniques -- Planning Your IPv6 Deployment Process -- Chapter 8 IPAM for the Internet of Things -- IoT Architectures -- 6LoWPAN -- Summary -- Chapter 9 IPAM in the Cloud -- IPAM VNFs -- Cloud IPAM Concepts -- IP Initialization Process -- IP Initialization Implementation -- DHCP Method -- Private Cloud Static Method -- Public Cloud Static Method -- Cloud Automation with APIs -- Multi-Cloud IPAM -- Private Cloud Automation -- Public Cloud Automation -- IPAM Automation Benefits -- Unifying IPAM Automation -- Streamlined Subnet Allocation Workflow -- Workflow Realization -- Tips for Defining Workflows -- Automation Scenarios -- Intra-IPAM Automation -- DHCP Server Configuration -- DNS Server Configuration -- Subnet Assignment -- IP Address Assignment Request -- Extra-IPAM Workflow Examples -- Regional Internet Registry Reporting -- Router Configuration Provisioning -- Customer Provisioning -- Asset Inventory Integration -- Trouble Ticket Creation -- Summary -- Part III IPAM and Security -- Chapter 10 IPAM Services Security Securing DHCP -- DHCP Service Availability -- DHCP Server/OS Attacks -- DHCP Server/OS Attack Mitigation -- DHCP Service Threats -- DHCP Threat Mitigation -- DHCP Authentication and Encryption -- DNS Infrastructure Risks and Attacks -- DNS Service Availability -- DNS Server/OS Attacks -- DNS Server/OS Attack Mitigation -- DNS Service Denial -- Distributed Denial of Service -- Bogus Domain Queries -- Pseudorandom Subdomain Attacks -- Denial of Service Mitigation -- Reflector Style Attacks -- Reflector Attack Mitigation -- Authoritative Poisoning -- Authoritative Poisoning Mitigation -- Resolver Redirection Attacks -- Resolver Attack Defenses -- Securing DNS Transactions -- Cache Poisoning Style Attacks -- Cache Poisoning Mitigation -- DNSSEC Overview -- The DNSSEC Resolution Process -- Negative Trust Anchors -- DNSSEC Deployment -- Last Mile Protection -- DNS Cookies -- DNS Encryption -- DNS Over TLS (DoT) -- DNS Over HTTPS (DoH) -- Encryption Beyond the Last Mile -- Chapter 11 IPAM and Network Security -- Securing Network Access -- Discriminatory Address Assignment with DHCP -- DHCP Lease Query -- Alternative Access Control Approaches -- Layer 2 Switch Alerting -- 802.1X -- Securing the Network Using IPAM -- IP-Based Security Policies (ACLs, etc.) -- Malware Detection Using DNS -- Malware Proliferation Techniques -- Phishing -- Spear Phishing -- Software Downloads -- File Sharing -- Email Attachments -- Watering Hole Attack -- Replication -- Brute Force -- Malware Examples -- Malware Mitigation -- DNS Firewall -- DNS Firewall Policy Precedence -- Other Attacks that Leverage DNS -- Network Reconnaissance -- Network Reconnaissance Defenses -- DNS Rebinding Attack -- Data Exfiltration -- Data Exfiltration Mitigation -- DNS as Data Transport (Tunneling) -- Advanced Persistent Threats -- Advanced Persistent Threats Mitigation Chapter 12 IPAM and Your Internet Presence -- IP Address Space Integrity -- Publicizing Your Public Namespace -- Domain Registries and Registrars -- DNS Hosting Providers -- Signing Your Public Namespace -- DNSSEC Zone Signing -- Key Rollover -- Prepublish Rollover -- Dual Signature Rollover -- Algorithm Rollover -- Key Security -- Enhancing Internet Application Encryption Integrity -- DNS-Based Authentication of Named Entities (DANE) -- Securing Email with DNS -- Email and DNS -- DNS Block Listing -- Sender Policy Framework (SPF) -- Domain Keys Identified Mail (DKIM) -- Domain-Based Message Authentication, Reporting, and Conformance (DMARC) -- Part IV IPAM in Practice -- Chapter 13 IPAM Use Case -- Introduction -- IPv4 Address Allocation -- First-Level Allocation -- Second-Layer Allocation -- Address Allocation Layer 3 -- Core Address Space -- External Extensions of Address Space -- Allocation Trade-Offs and Tracking -- IPAM Worldwide's Public IPv4 Address Space -- IPAM Worldwide's IPv6 Allocations -- External Extensions Address Space -- IP Address Tracking -- DNS and IP Address Management -- Chapter 14 IPAM Deployment Strategies -- General Deployment Principles for DHCP/DNS -- Disaster Recovery/Business Continuity -- DHCP Deployment -- DHCP Server Platforms -- DHCP Servers -- Virtualized DHCP Deployment -- DHCP Appliances -- DHCP Deployment Approaches -- Centralized DHCP Server Deployment -- Distributed DHCP Server Deployment -- DHCP Services Deployment Design Considerations -- DHCP Deployment on Edge Devices -- DNS Deployment -- DNS Trust Sectors -- External DNS Trust Sector -- Extranet DNS Trust Sector -- Recursive DNS Trust Sector -- Internal DNS Trust Sector -- Deploying DNS Servers with Anycast Addresses -- Anycast Addressing Benefits -- Anycast Caveats -- Configuring Anycast Addressing -- IPAM Deployment Summary -- High Availability Multiple Vendors |
ctrlnum | (ZDB-30-PQE)EBC6425038 (ZDB-30-PAD)EBC6425038 (ZDB-89-EBL)EBL6425038 (OCoLC)1227385736 (DE-599)BVBBV047442538 |
dewey-full | 004.678 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.678 |
dewey-search | 004.678 |
dewey-sort | 14.678 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | Second Edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>11297nmm a2200505zc 4500</leader><controlfield tag="001">BV047442538</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230126 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210827s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119692300</subfield><subfield code="9">978-1-119-69230-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119692263</subfield><subfield code="9">978-1-119-69226-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119692287</subfield><subfield code="9">978-1-119-69228-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC6425038</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC6425038</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL6425038</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227385736</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047442538</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-858</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.678</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rooney, Timothy</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1042929289</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IP Address Management</subfield><subfield code="c">Michael Dooley & Timothy Rooney</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second Edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">John Wiley & Sons, Incorporated</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXV, 606 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IEEE Press Series on Networks and Service Management Ser</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgments -- About the Authors -- Part I IPAM Introduction -- Chapter 1 Introduction -- IP Networking Overview -- IP Routing -- IP Addresses -- Protocol Layering -- OSI and TCP/IP Layers -- TCP/UDP Ports -- Intra-Link Communications -- Are We on the Same Link? -- Limiting Broadcast Domains -- Interlink Communications -- Worldwide IP Communications -- Dynamic Routing -- Routers and Subnets -- Assigning IP addresses -- The Human Element -- Why Manage IP Space? -- Basic IPAM Approaches -- Early History -- Today's IP Networks and IP Management Challenges -- Chapter 2 IP Addressing -- Internet Protocol History -- The Internet Protocol, Take 1 -- Class-Based Addressing -- Internet Growing Pains -- Private Address Space -- Classless Addressing -- Special Use IPv4 Addresses -- The Internet Protocol, Take 2 -- IPv6 Address Types and Structure -- IPv6 Address Notation -- Address Structure -- IPv6 Address Allocations -- 2000::/3 - Global Unicast Address Space -- fc00::/7 - Unique Local Address Space -- fe80::/10 - Link Local Address Space -- ff00::/8 - Multicast Address Space -- Special Use IPv6 Addresses -- IPv4-IPv6 Coexistence -- Chapter 3 IP Address Assignment -- Address Planning -- Regional Internet Registries -- RIR Address Allocation -- Address Allocation Efficiency -- Multi-Homing and IP Address Space -- Endpoint Address Allocation -- Server-based Address Allocation Using DHCP -- DHCP Servers and Address Assignment -- Device Identification by Class -- DHCP Options -- DHCP for IPv6 (DHCPv6) -- DHCP Comparison IPv4 vs. IPv6 -- DHCPv6 Address Assignment -- DHCPv6 Prefix Delegation -- Device Unique Identifiers (DUIDs) -- Identity Associations (IAs) -- DHCPv6 Options -- IPv6 Address Autoconfiguration -- Neighbor Discovery -- Modified EUI-64 Interface Identifiers -- Opaque Interface IDs</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Reserved Interface IDs -- Duplicate Address Detection (DAD) -- Chapter 4 Navigating the Internet with DNS -- Domain Hierarchy -- Name Resolution -- Resource Records -- Zones and Domains -- Dissemination of Zone Information -- Reverse Domains -- IPv6 Reverse Domains -- Additional Zones -- Root Hints -- Localhost Zones -- DNS Update -- Chapter 5 IPAM Technology Applications -- DHCP Applications -- Device Type Specific Configuration -- Broadband Subscriber Provisioning -- Related Lease Assignment or Limitation Applications -- Pre-Boot Execution Environment (PXE) clients -- PPP/RADIUS Environments -- Mobile IP -- Popular DNS Applications -- Host Name and IP Address Resolution -- A - IPv4 Address Record -- AAAA - IPv6 address record -- PTR - Pointer Record -- Alias Host Name Resolutions -- CNAME - Canonical Name Record -- Network Services Location -- SRV - Services Location Record -- Textual Information Lookup -- TXT - Text Record -- Many More Applications -- Part II IPAM Mechanics -- Chapter 6 IP Management Core Tasks -- IPAM Is Foundational -- Impacts of Inadequate IPAM Practice -- IPAM Is Core to Network Management -- FCAPS Summary -- Configuration Management -- Address Allocation Considerations -- Address Allocation Tasks -- Best Fit Allocation -- Sparse Allocation Method -- Random Allocation -- IP Address Assignment -- Address Deletion Tasks -- Address Renumbering or Movement Tasks -- Flash Moves -- Mobile Moves -- Network Services Configuration -- Fault Management -- Monitoring and Fault Detection -- Troubleshooting and Fault Resolution -- Nslookup -- Dig -- Accounting Management -- Inventory Assurance -- Performance Management -- Services Monitoring -- Address Capacity Management -- Auditing and Reporting -- Security Management -- ITIL Process Mappings -- Chapter 7 IPv6 Deployment -- IPv6 Deployment Process Overview -- IPv6 Address Plan Objectives</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">IPv6 Address Plan Examples -- Case 1 -- Observations -- Case 2 -- Observations -- General IPv6 Address Plan Guidelines -- ULA Considerations -- Renumbering Impacts -- IPv4-IPv6 Coexistence Technologies -- Dual Stack Approach -- Dual Stack Deployment -- DNS Considerations -- DHCP Considerations -- Tunneling Approaches -- Tunneling Scenarios for IPv6 Packets over IPv4 Networks -- Dual-Stack Lite -- Lightweight 4over6 -- Mapping of Address and Port with Encapsulation (MAP-E) -- Additional Tunneling Approaches -- Translation Approaches -- IP/ICMP Translation -- Address Translation -- Packet Fragmentation Considerations -- IP Header Translation Algorithm -- Bump in the Host (BIH) -- Network Address Translation for IPv6-IPv4 (NAT64) -- NAT64 and DNS64 -- 464XLAT -- Mapping of Address and Port with Translation (MAP-T) -- Other Translation Techniques -- Planning Your IPv6 Deployment Process -- Chapter 8 IPAM for the Internet of Things -- IoT Architectures -- 6LoWPAN -- Summary -- Chapter 9 IPAM in the Cloud -- IPAM VNFs -- Cloud IPAM Concepts -- IP Initialization Process -- IP Initialization Implementation -- DHCP Method -- Private Cloud Static Method -- Public Cloud Static Method -- Cloud Automation with APIs -- Multi-Cloud IPAM -- Private Cloud Automation -- Public Cloud Automation -- IPAM Automation Benefits -- Unifying IPAM Automation -- Streamlined Subnet Allocation Workflow -- Workflow Realization -- Tips for Defining Workflows -- Automation Scenarios -- Intra-IPAM Automation -- DHCP Server Configuration -- DNS Server Configuration -- Subnet Assignment -- IP Address Assignment Request -- Extra-IPAM Workflow Examples -- Regional Internet Registry Reporting -- Router Configuration Provisioning -- Customer Provisioning -- Asset Inventory Integration -- Trouble Ticket Creation -- Summary -- Part III IPAM and Security -- Chapter 10 IPAM Services Security</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Securing DHCP -- DHCP Service Availability -- DHCP Server/OS Attacks -- DHCP Server/OS Attack Mitigation -- DHCP Service Threats -- DHCP Threat Mitigation -- DHCP Authentication and Encryption -- DNS Infrastructure Risks and Attacks -- DNS Service Availability -- DNS Server/OS Attacks -- DNS Server/OS Attack Mitigation -- DNS Service Denial -- Distributed Denial of Service -- Bogus Domain Queries -- Pseudorandom Subdomain Attacks -- Denial of Service Mitigation -- Reflector Style Attacks -- Reflector Attack Mitigation -- Authoritative Poisoning -- Authoritative Poisoning Mitigation -- Resolver Redirection Attacks -- Resolver Attack Defenses -- Securing DNS Transactions -- Cache Poisoning Style Attacks -- Cache Poisoning Mitigation -- DNSSEC Overview -- The DNSSEC Resolution Process -- Negative Trust Anchors -- DNSSEC Deployment -- Last Mile Protection -- DNS Cookies -- DNS Encryption -- DNS Over TLS (DoT) -- DNS Over HTTPS (DoH) -- Encryption Beyond the Last Mile -- Chapter 11 IPAM and Network Security -- Securing Network Access -- Discriminatory Address Assignment with DHCP -- DHCP Lease Query -- Alternative Access Control Approaches -- Layer 2 Switch Alerting -- 802.1X -- Securing the Network Using IPAM -- IP-Based Security Policies (ACLs, etc.) -- Malware Detection Using DNS -- Malware Proliferation Techniques -- Phishing -- Spear Phishing -- Software Downloads -- File Sharing -- Email Attachments -- Watering Hole Attack -- Replication -- Brute Force -- Malware Examples -- Malware Mitigation -- DNS Firewall -- DNS Firewall Policy Precedence -- Other Attacks that Leverage DNS -- Network Reconnaissance -- Network Reconnaissance Defenses -- DNS Rebinding Attack -- Data Exfiltration -- Data Exfiltration Mitigation -- DNS as Data Transport (Tunneling) -- Advanced Persistent Threats -- Advanced Persistent Threats Mitigation</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 12 IPAM and Your Internet Presence -- IP Address Space Integrity -- Publicizing Your Public Namespace -- Domain Registries and Registrars -- DNS Hosting Providers -- Signing Your Public Namespace -- DNSSEC Zone Signing -- Key Rollover -- Prepublish Rollover -- Dual Signature Rollover -- Algorithm Rollover -- Key Security -- Enhancing Internet Application Encryption Integrity -- DNS-Based Authentication of Named Entities (DANE) -- Securing Email with DNS -- Email and DNS -- DNS Block Listing -- Sender Policy Framework (SPF) -- Domain Keys Identified Mail (DKIM) -- Domain-Based Message Authentication, Reporting, and Conformance (DMARC) -- Part IV IPAM in Practice -- Chapter 13 IPAM Use Case -- Introduction -- IPv4 Address Allocation -- First-Level Allocation -- Second-Layer Allocation -- Address Allocation Layer 3 -- Core Address Space -- External Extensions of Address Space -- Allocation Trade-Offs and Tracking -- IPAM Worldwide's Public IPv4 Address Space -- IPAM Worldwide's IPv6 Allocations -- External Extensions Address Space -- IP Address Tracking -- DNS and IP Address Management -- Chapter 14 IPAM Deployment Strategies -- General Deployment Principles for DHCP/DNS -- Disaster Recovery/Business Continuity -- DHCP Deployment -- DHCP Server Platforms -- DHCP Servers -- Virtualized DHCP Deployment -- DHCP Appliances -- DHCP Deployment Approaches -- Centralized DHCP Server Deployment -- Distributed DHCP Server Deployment -- DHCP Services Deployment Design Considerations -- DHCP Deployment on Edge Devices -- DNS Deployment -- DNS Trust Sectors -- External DNS Trust Sector -- Extranet DNS Trust Sector -- Recursive DNS Trust Sector -- Internal DNS Trust Sector -- Deploying DNS Servers with Anycast Addresses -- Anycast Addressing Benefits -- Anycast Caveats -- Configuring Anycast Addressing -- IPAM Deployment Summary -- High Availability</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Multiple Vendors</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dooley, Michael</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1042929122</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Rooney, Timothy</subfield><subfield code="t">IP Address Management</subfield><subfield code="d">Newark : John Wiley & Sons, Incorporated,c2021</subfield><subfield code="z">9781119692270</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-35-WIC</subfield><subfield code="a">ZDB-35-WEL</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032844690</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119692263</subfield><subfield code="l">FCO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FCO_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/servlet/opac?bknumber=9295060</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-35-WEL</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047442538 |
illustrated | Not Illustrated |
index_date | 2024-07-03T18:01:24Z |
indexdate | 2024-07-10T09:12:16Z |
institution | BVB |
isbn | 9781119692300 9781119692263 9781119692287 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032844690 |
oclc_num | 1227385736 |
open_access_boolean | |
owner | DE-858 DE-573 |
owner_facet | DE-858 DE-573 |
physical | 1 Online-Ressource (XXV, 606 Seiten) |
psigel | ZDB-30-PQE ZDB-35-WIC ZDB-35-WEL ZDB-35-WIC FCO_PDA_WIC_Kauf |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | John Wiley & Sons, Incorporated |
record_format | marc |
series2 | IEEE Press Series on Networks and Service Management Ser |
spelling | Rooney, Timothy Verfasser (DE-588)1042929289 aut IP Address Management Michael Dooley & Timothy Rooney Second Edition Hoboken, NJ John Wiley & Sons, Incorporated 2021 ©2021 1 Online-Ressource (XXV, 606 Seiten) txt rdacontent c rdamedia cr rdacarrier IEEE Press Series on Networks and Service Management Ser Description based on publisher supplied metadata and other sources Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgments -- About the Authors -- Part I IPAM Introduction -- Chapter 1 Introduction -- IP Networking Overview -- IP Routing -- IP Addresses -- Protocol Layering -- OSI and TCP/IP Layers -- TCP/UDP Ports -- Intra-Link Communications -- Are We on the Same Link? -- Limiting Broadcast Domains -- Interlink Communications -- Worldwide IP Communications -- Dynamic Routing -- Routers and Subnets -- Assigning IP addresses -- The Human Element -- Why Manage IP Space? -- Basic IPAM Approaches -- Early History -- Today's IP Networks and IP Management Challenges -- Chapter 2 IP Addressing -- Internet Protocol History -- The Internet Protocol, Take 1 -- Class-Based Addressing -- Internet Growing Pains -- Private Address Space -- Classless Addressing -- Special Use IPv4 Addresses -- The Internet Protocol, Take 2 -- IPv6 Address Types and Structure -- IPv6 Address Notation -- Address Structure -- IPv6 Address Allocations -- 2000::/3 - Global Unicast Address Space -- fc00::/7 - Unique Local Address Space -- fe80::/10 - Link Local Address Space -- ff00::/8 - Multicast Address Space -- Special Use IPv6 Addresses -- IPv4-IPv6 Coexistence -- Chapter 3 IP Address Assignment -- Address Planning -- Regional Internet Registries -- RIR Address Allocation -- Address Allocation Efficiency -- Multi-Homing and IP Address Space -- Endpoint Address Allocation -- Server-based Address Allocation Using DHCP -- DHCP Servers and Address Assignment -- Device Identification by Class -- DHCP Options -- DHCP for IPv6 (DHCPv6) -- DHCP Comparison IPv4 vs. IPv6 -- DHCPv6 Address Assignment -- DHCPv6 Prefix Delegation -- Device Unique Identifiers (DUIDs) -- Identity Associations (IAs) -- DHCPv6 Options -- IPv6 Address Autoconfiguration -- Neighbor Discovery -- Modified EUI-64 Interface Identifiers -- Opaque Interface IDs Reserved Interface IDs -- Duplicate Address Detection (DAD) -- Chapter 4 Navigating the Internet with DNS -- Domain Hierarchy -- Name Resolution -- Resource Records -- Zones and Domains -- Dissemination of Zone Information -- Reverse Domains -- IPv6 Reverse Domains -- Additional Zones -- Root Hints -- Localhost Zones -- DNS Update -- Chapter 5 IPAM Technology Applications -- DHCP Applications -- Device Type Specific Configuration -- Broadband Subscriber Provisioning -- Related Lease Assignment or Limitation Applications -- Pre-Boot Execution Environment (PXE) clients -- PPP/RADIUS Environments -- Mobile IP -- Popular DNS Applications -- Host Name and IP Address Resolution -- A - IPv4 Address Record -- AAAA - IPv6 address record -- PTR - Pointer Record -- Alias Host Name Resolutions -- CNAME - Canonical Name Record -- Network Services Location -- SRV - Services Location Record -- Textual Information Lookup -- TXT - Text Record -- Many More Applications -- Part II IPAM Mechanics -- Chapter 6 IP Management Core Tasks -- IPAM Is Foundational -- Impacts of Inadequate IPAM Practice -- IPAM Is Core to Network Management -- FCAPS Summary -- Configuration Management -- Address Allocation Considerations -- Address Allocation Tasks -- Best Fit Allocation -- Sparse Allocation Method -- Random Allocation -- IP Address Assignment -- Address Deletion Tasks -- Address Renumbering or Movement Tasks -- Flash Moves -- Mobile Moves -- Network Services Configuration -- Fault Management -- Monitoring and Fault Detection -- Troubleshooting and Fault Resolution -- Nslookup -- Dig -- Accounting Management -- Inventory Assurance -- Performance Management -- Services Monitoring -- Address Capacity Management -- Auditing and Reporting -- Security Management -- ITIL Process Mappings -- Chapter 7 IPv6 Deployment -- IPv6 Deployment Process Overview -- IPv6 Address Plan Objectives IPv6 Address Plan Examples -- Case 1 -- Observations -- Case 2 -- Observations -- General IPv6 Address Plan Guidelines -- ULA Considerations -- Renumbering Impacts -- IPv4-IPv6 Coexistence Technologies -- Dual Stack Approach -- Dual Stack Deployment -- DNS Considerations -- DHCP Considerations -- Tunneling Approaches -- Tunneling Scenarios for IPv6 Packets over IPv4 Networks -- Dual-Stack Lite -- Lightweight 4over6 -- Mapping of Address and Port with Encapsulation (MAP-E) -- Additional Tunneling Approaches -- Translation Approaches -- IP/ICMP Translation -- Address Translation -- Packet Fragmentation Considerations -- IP Header Translation Algorithm -- Bump in the Host (BIH) -- Network Address Translation for IPv6-IPv4 (NAT64) -- NAT64 and DNS64 -- 464XLAT -- Mapping of Address and Port with Translation (MAP-T) -- Other Translation Techniques -- Planning Your IPv6 Deployment Process -- Chapter 8 IPAM for the Internet of Things -- IoT Architectures -- 6LoWPAN -- Summary -- Chapter 9 IPAM in the Cloud -- IPAM VNFs -- Cloud IPAM Concepts -- IP Initialization Process -- IP Initialization Implementation -- DHCP Method -- Private Cloud Static Method -- Public Cloud Static Method -- Cloud Automation with APIs -- Multi-Cloud IPAM -- Private Cloud Automation -- Public Cloud Automation -- IPAM Automation Benefits -- Unifying IPAM Automation -- Streamlined Subnet Allocation Workflow -- Workflow Realization -- Tips for Defining Workflows -- Automation Scenarios -- Intra-IPAM Automation -- DHCP Server Configuration -- DNS Server Configuration -- Subnet Assignment -- IP Address Assignment Request -- Extra-IPAM Workflow Examples -- Regional Internet Registry Reporting -- Router Configuration Provisioning -- Customer Provisioning -- Asset Inventory Integration -- Trouble Ticket Creation -- Summary -- Part III IPAM and Security -- Chapter 10 IPAM Services Security Securing DHCP -- DHCP Service Availability -- DHCP Server/OS Attacks -- DHCP Server/OS Attack Mitigation -- DHCP Service Threats -- DHCP Threat Mitigation -- DHCP Authentication and Encryption -- DNS Infrastructure Risks and Attacks -- DNS Service Availability -- DNS Server/OS Attacks -- DNS Server/OS Attack Mitigation -- DNS Service Denial -- Distributed Denial of Service -- Bogus Domain Queries -- Pseudorandom Subdomain Attacks -- Denial of Service Mitigation -- Reflector Style Attacks -- Reflector Attack Mitigation -- Authoritative Poisoning -- Authoritative Poisoning Mitigation -- Resolver Redirection Attacks -- Resolver Attack Defenses -- Securing DNS Transactions -- Cache Poisoning Style Attacks -- Cache Poisoning Mitigation -- DNSSEC Overview -- The DNSSEC Resolution Process -- Negative Trust Anchors -- DNSSEC Deployment -- Last Mile Protection -- DNS Cookies -- DNS Encryption -- DNS Over TLS (DoT) -- DNS Over HTTPS (DoH) -- Encryption Beyond the Last Mile -- Chapter 11 IPAM and Network Security -- Securing Network Access -- Discriminatory Address Assignment with DHCP -- DHCP Lease Query -- Alternative Access Control Approaches -- Layer 2 Switch Alerting -- 802.1X -- Securing the Network Using IPAM -- IP-Based Security Policies (ACLs, etc.) -- Malware Detection Using DNS -- Malware Proliferation Techniques -- Phishing -- Spear Phishing -- Software Downloads -- File Sharing -- Email Attachments -- Watering Hole Attack -- Replication -- Brute Force -- Malware Examples -- Malware Mitigation -- DNS Firewall -- DNS Firewall Policy Precedence -- Other Attacks that Leverage DNS -- Network Reconnaissance -- Network Reconnaissance Defenses -- DNS Rebinding Attack -- Data Exfiltration -- Data Exfiltration Mitigation -- DNS as Data Transport (Tunneling) -- Advanced Persistent Threats -- Advanced Persistent Threats Mitigation Chapter 12 IPAM and Your Internet Presence -- IP Address Space Integrity -- Publicizing Your Public Namespace -- Domain Registries and Registrars -- DNS Hosting Providers -- Signing Your Public Namespace -- DNSSEC Zone Signing -- Key Rollover -- Prepublish Rollover -- Dual Signature Rollover -- Algorithm Rollover -- Key Security -- Enhancing Internet Application Encryption Integrity -- DNS-Based Authentication of Named Entities (DANE) -- Securing Email with DNS -- Email and DNS -- DNS Block Listing -- Sender Policy Framework (SPF) -- Domain Keys Identified Mail (DKIM) -- Domain-Based Message Authentication, Reporting, and Conformance (DMARC) -- Part IV IPAM in Practice -- Chapter 13 IPAM Use Case -- Introduction -- IPv4 Address Allocation -- First-Level Allocation -- Second-Layer Allocation -- Address Allocation Layer 3 -- Core Address Space -- External Extensions of Address Space -- Allocation Trade-Offs and Tracking -- IPAM Worldwide's Public IPv4 Address Space -- IPAM Worldwide's IPv6 Allocations -- External Extensions Address Space -- IP Address Tracking -- DNS and IP Address Management -- Chapter 14 IPAM Deployment Strategies -- General Deployment Principles for DHCP/DNS -- Disaster Recovery/Business Continuity -- DHCP Deployment -- DHCP Server Platforms -- DHCP Servers -- Virtualized DHCP Deployment -- DHCP Appliances -- DHCP Deployment Approaches -- Centralized DHCP Server Deployment -- Distributed DHCP Server Deployment -- DHCP Services Deployment Design Considerations -- DHCP Deployment on Edge Devices -- DNS Deployment -- DNS Trust Sectors -- External DNS Trust Sector -- Extranet DNS Trust Sector -- Recursive DNS Trust Sector -- Internal DNS Trust Sector -- Deploying DNS Servers with Anycast Addresses -- Anycast Addressing Benefits -- Anycast Caveats -- Configuring Anycast Addressing -- IPAM Deployment Summary -- High Availability Multiple Vendors Dooley, Michael Sonstige (DE-588)1042929122 oth Erscheint auch als Druck-Ausgabe Rooney, Timothy IP Address Management Newark : John Wiley & Sons, Incorporated,c2021 9781119692270 |
spellingShingle | Rooney, Timothy IP Address Management Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgments -- About the Authors -- Part I IPAM Introduction -- Chapter 1 Introduction -- IP Networking Overview -- IP Routing -- IP Addresses -- Protocol Layering -- OSI and TCP/IP Layers -- TCP/UDP Ports -- Intra-Link Communications -- Are We on the Same Link? -- Limiting Broadcast Domains -- Interlink Communications -- Worldwide IP Communications -- Dynamic Routing -- Routers and Subnets -- Assigning IP addresses -- The Human Element -- Why Manage IP Space? -- Basic IPAM Approaches -- Early History -- Today's IP Networks and IP Management Challenges -- Chapter 2 IP Addressing -- Internet Protocol History -- The Internet Protocol, Take 1 -- Class-Based Addressing -- Internet Growing Pains -- Private Address Space -- Classless Addressing -- Special Use IPv4 Addresses -- The Internet Protocol, Take 2 -- IPv6 Address Types and Structure -- IPv6 Address Notation -- Address Structure -- IPv6 Address Allocations -- 2000::/3 - Global Unicast Address Space -- fc00::/7 - Unique Local Address Space -- fe80::/10 - Link Local Address Space -- ff00::/8 - Multicast Address Space -- Special Use IPv6 Addresses -- IPv4-IPv6 Coexistence -- Chapter 3 IP Address Assignment -- Address Planning -- Regional Internet Registries -- RIR Address Allocation -- Address Allocation Efficiency -- Multi-Homing and IP Address Space -- Endpoint Address Allocation -- Server-based Address Allocation Using DHCP -- DHCP Servers and Address Assignment -- Device Identification by Class -- DHCP Options -- DHCP for IPv6 (DHCPv6) -- DHCP Comparison IPv4 vs. IPv6 -- DHCPv6 Address Assignment -- DHCPv6 Prefix Delegation -- Device Unique Identifiers (DUIDs) -- Identity Associations (IAs) -- DHCPv6 Options -- IPv6 Address Autoconfiguration -- Neighbor Discovery -- Modified EUI-64 Interface Identifiers -- Opaque Interface IDs Reserved Interface IDs -- Duplicate Address Detection (DAD) -- Chapter 4 Navigating the Internet with DNS -- Domain Hierarchy -- Name Resolution -- Resource Records -- Zones and Domains -- Dissemination of Zone Information -- Reverse Domains -- IPv6 Reverse Domains -- Additional Zones -- Root Hints -- Localhost Zones -- DNS Update -- Chapter 5 IPAM Technology Applications -- DHCP Applications -- Device Type Specific Configuration -- Broadband Subscriber Provisioning -- Related Lease Assignment or Limitation Applications -- Pre-Boot Execution Environment (PXE) clients -- PPP/RADIUS Environments -- Mobile IP -- Popular DNS Applications -- Host Name and IP Address Resolution -- A - IPv4 Address Record -- AAAA - IPv6 address record -- PTR - Pointer Record -- Alias Host Name Resolutions -- CNAME - Canonical Name Record -- Network Services Location -- SRV - Services Location Record -- Textual Information Lookup -- TXT - Text Record -- Many More Applications -- Part II IPAM Mechanics -- Chapter 6 IP Management Core Tasks -- IPAM Is Foundational -- Impacts of Inadequate IPAM Practice -- IPAM Is Core to Network Management -- FCAPS Summary -- Configuration Management -- Address Allocation Considerations -- Address Allocation Tasks -- Best Fit Allocation -- Sparse Allocation Method -- Random Allocation -- IP Address Assignment -- Address Deletion Tasks -- Address Renumbering or Movement Tasks -- Flash Moves -- Mobile Moves -- Network Services Configuration -- Fault Management -- Monitoring and Fault Detection -- Troubleshooting and Fault Resolution -- Nslookup -- Dig -- Accounting Management -- Inventory Assurance -- Performance Management -- Services Monitoring -- Address Capacity Management -- Auditing and Reporting -- Security Management -- ITIL Process Mappings -- Chapter 7 IPv6 Deployment -- IPv6 Deployment Process Overview -- IPv6 Address Plan Objectives IPv6 Address Plan Examples -- Case 1 -- Observations -- Case 2 -- Observations -- General IPv6 Address Plan Guidelines -- ULA Considerations -- Renumbering Impacts -- IPv4-IPv6 Coexistence Technologies -- Dual Stack Approach -- Dual Stack Deployment -- DNS Considerations -- DHCP Considerations -- Tunneling Approaches -- Tunneling Scenarios for IPv6 Packets over IPv4 Networks -- Dual-Stack Lite -- Lightweight 4over6 -- Mapping of Address and Port with Encapsulation (MAP-E) -- Additional Tunneling Approaches -- Translation Approaches -- IP/ICMP Translation -- Address Translation -- Packet Fragmentation Considerations -- IP Header Translation Algorithm -- Bump in the Host (BIH) -- Network Address Translation for IPv6-IPv4 (NAT64) -- NAT64 and DNS64 -- 464XLAT -- Mapping of Address and Port with Translation (MAP-T) -- Other Translation Techniques -- Planning Your IPv6 Deployment Process -- Chapter 8 IPAM for the Internet of Things -- IoT Architectures -- 6LoWPAN -- Summary -- Chapter 9 IPAM in the Cloud -- IPAM VNFs -- Cloud IPAM Concepts -- IP Initialization Process -- IP Initialization Implementation -- DHCP Method -- Private Cloud Static Method -- Public Cloud Static Method -- Cloud Automation with APIs -- Multi-Cloud IPAM -- Private Cloud Automation -- Public Cloud Automation -- IPAM Automation Benefits -- Unifying IPAM Automation -- Streamlined Subnet Allocation Workflow -- Workflow Realization -- Tips for Defining Workflows -- Automation Scenarios -- Intra-IPAM Automation -- DHCP Server Configuration -- DNS Server Configuration -- Subnet Assignment -- IP Address Assignment Request -- Extra-IPAM Workflow Examples -- Regional Internet Registry Reporting -- Router Configuration Provisioning -- Customer Provisioning -- Asset Inventory Integration -- Trouble Ticket Creation -- Summary -- Part III IPAM and Security -- Chapter 10 IPAM Services Security Securing DHCP -- DHCP Service Availability -- DHCP Server/OS Attacks -- DHCP Server/OS Attack Mitigation -- DHCP Service Threats -- DHCP Threat Mitigation -- DHCP Authentication and Encryption -- DNS Infrastructure Risks and Attacks -- DNS Service Availability -- DNS Server/OS Attacks -- DNS Server/OS Attack Mitigation -- DNS Service Denial -- Distributed Denial of Service -- Bogus Domain Queries -- Pseudorandom Subdomain Attacks -- Denial of Service Mitigation -- Reflector Style Attacks -- Reflector Attack Mitigation -- Authoritative Poisoning -- Authoritative Poisoning Mitigation -- Resolver Redirection Attacks -- Resolver Attack Defenses -- Securing DNS Transactions -- Cache Poisoning Style Attacks -- Cache Poisoning Mitigation -- DNSSEC Overview -- The DNSSEC Resolution Process -- Negative Trust Anchors -- DNSSEC Deployment -- Last Mile Protection -- DNS Cookies -- DNS Encryption -- DNS Over TLS (DoT) -- DNS Over HTTPS (DoH) -- Encryption Beyond the Last Mile -- Chapter 11 IPAM and Network Security -- Securing Network Access -- Discriminatory Address Assignment with DHCP -- DHCP Lease Query -- Alternative Access Control Approaches -- Layer 2 Switch Alerting -- 802.1X -- Securing the Network Using IPAM -- IP-Based Security Policies (ACLs, etc.) -- Malware Detection Using DNS -- Malware Proliferation Techniques -- Phishing -- Spear Phishing -- Software Downloads -- File Sharing -- Email Attachments -- Watering Hole Attack -- Replication -- Brute Force -- Malware Examples -- Malware Mitigation -- DNS Firewall -- DNS Firewall Policy Precedence -- Other Attacks that Leverage DNS -- Network Reconnaissance -- Network Reconnaissance Defenses -- DNS Rebinding Attack -- Data Exfiltration -- Data Exfiltration Mitigation -- DNS as Data Transport (Tunneling) -- Advanced Persistent Threats -- Advanced Persistent Threats Mitigation Chapter 12 IPAM and Your Internet Presence -- IP Address Space Integrity -- Publicizing Your Public Namespace -- Domain Registries and Registrars -- DNS Hosting Providers -- Signing Your Public Namespace -- DNSSEC Zone Signing -- Key Rollover -- Prepublish Rollover -- Dual Signature Rollover -- Algorithm Rollover -- Key Security -- Enhancing Internet Application Encryption Integrity -- DNS-Based Authentication of Named Entities (DANE) -- Securing Email with DNS -- Email and DNS -- DNS Block Listing -- Sender Policy Framework (SPF) -- Domain Keys Identified Mail (DKIM) -- Domain-Based Message Authentication, Reporting, and Conformance (DMARC) -- Part IV IPAM in Practice -- Chapter 13 IPAM Use Case -- Introduction -- IPv4 Address Allocation -- First-Level Allocation -- Second-Layer Allocation -- Address Allocation Layer 3 -- Core Address Space -- External Extensions of Address Space -- Allocation Trade-Offs and Tracking -- IPAM Worldwide's Public IPv4 Address Space -- IPAM Worldwide's IPv6 Allocations -- External Extensions Address Space -- IP Address Tracking -- DNS and IP Address Management -- Chapter 14 IPAM Deployment Strategies -- General Deployment Principles for DHCP/DNS -- Disaster Recovery/Business Continuity -- DHCP Deployment -- DHCP Server Platforms -- DHCP Servers -- Virtualized DHCP Deployment -- DHCP Appliances -- DHCP Deployment Approaches -- Centralized DHCP Server Deployment -- Distributed DHCP Server Deployment -- DHCP Services Deployment Design Considerations -- DHCP Deployment on Edge Devices -- DNS Deployment -- DNS Trust Sectors -- External DNS Trust Sector -- Extranet DNS Trust Sector -- Recursive DNS Trust Sector -- Internal DNS Trust Sector -- Deploying DNS Servers with Anycast Addresses -- Anycast Addressing Benefits -- Anycast Caveats -- Configuring Anycast Addressing -- IPAM Deployment Summary -- High Availability Multiple Vendors |
title | IP Address Management |
title_auth | IP Address Management |
title_exact_search | IP Address Management |
title_exact_search_txtP | IP Address Management |
title_full | IP Address Management Michael Dooley & Timothy Rooney |
title_fullStr | IP Address Management Michael Dooley & Timothy Rooney |
title_full_unstemmed | IP Address Management Michael Dooley & Timothy Rooney |
title_short | IP Address Management |
title_sort | ip address management |
work_keys_str_mv | AT rooneytimothy ipaddressmanagement AT dooleymichael ipaddressmanagement |