Implementing Cisco IOS Network Security (IINS)

(CCNA Security exam 640-553) (Authorized Self-Study Guide)

1st Edition

Copyright © 2009 Cisco Systems, Inc.

ISBN-10: 1-58705-815-4
ISBN-13: -78-158705-815-8

Warning and Disclaimer

Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an "as is" basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the CD or programs accompanying it.

When reviewing corrections, always check the print number of your book. Corrections are made to printed books with each subsequent printing.

First Printing: April 2009

Corrections for December 15, 2011

Pg / Error / Correction
310 / Chapter 4, Figure 4-5, sixth character, under Cipher text
Reads:
J / Should read:
I
311 / Chapter 4, Figure 4-5, sixth character, under Cipher text
Reads:
J / Should read:
I
313 / Chapter 4, middle of page, second part down, Under Clear Text = WOLFE
Reads:
(When the elements are the same, the result is 1, and when the elements are different, the result is 1). / Should read:
(When the elements are the same, the result is 0, and when the elements are different, the result is 1).
313 / Chapter 4, middle of page, third part down
Reads:
Cipher Text: 11100101 11110001 11111001 11110110 11101000 / Should read:
Cipher Text: 00011010 00001110 00000110 00001001 00010111
313 / Chapter 4, middle of page, under Re-applying the Key On The Cipher Text to Find the Clear Text:
Reads:
Cipher Text: 11100101 11110001 11111001 m11110110 11101000 / Should read:
Cipher Text: 00011010 00001110 00000110 00001001 00010111
NOTE: for the XOR calculator enter the input data 1 and 2 as one value without spaces:
WOLFE=0101011101001111010011000100011001000101
MAJOR=0100110101000001010010100100111101010010

Corrections for November 7, 2011

Pg / Error / Correction
274 / Example 3-8, fourth line down
Reads:
R1(config)# access-list 150 deny ip 169.0.0.0 0.255.255.255 any / Should read:
R1(config)# access-list 150 deny ip 169.254.0.0 0.0.255.255 any

Corrections for July 8, 2011

Pg / Error / Correction
572 / Appendix A, Answers to Chapter Review Questions, Chapter 7, Answer to Question 4
Reads:
4. Define logical unit number (LUN).
b. A collection of ports from a set of connected Fibre channel switches / Should read:
4. Define logical unit number (LUN).
c. An address for an individual disk drive and, by extension, the disk device itself

Corrections for September 30, 2010

Pg / Error / Correction
569 / Appendix A, Answers to Chapter Review Questions, Chapter 1, Answer to Question 25
Reads:
25. Which are the three elements of threat control and containment?
d. Threat control for applications / Should read:
25. Which are the three elements of threat control and containment?
a. Threat control for endpoints
b. Threat control for infrastructure
c. Threat control for email

This errata sheet is intended to provide updated technical information. Spelling and grammar misprints are updated during the reprint process, but are not listed on this errata sheet.

Updated 12/15/2011