Network Administrators Survival Guide

 

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

SAA (Service Assurance Agent)

sample diagrams, viewing

     Dia diagrams

     Network Notepad diagrams

SARA (Security Auditor's Research Assistant)

SAs (security associations)

SATAN (Security Administrator's Tool for Analyzing Networks)

saving     Catalyst configuration files

     Cisco IOS configuration files

     GtkTerm configurations

     PIX configuration files

scalability of Big Brother, improving scannersscanning

     common ports     TCP ports     UDP ports Scheidler, Balazs

SCP (Secure Copy Protocol) SDM (Cisco Router and Security Device Manager) 2nd     configuring on Cisco routers     deploying on Cisco routers     launching     One-Step Lockdown     Security Audit Wizard

security

     AAA         RADIUS         TACACS+ 2nd 3rd

     Cisco routers

         best practices

         disabling unneeded services

         passwords         RAT

         Type 5 passwords, decrypting         Type 7 passwords, decrypting

         vulnerabilities, discovering     configuring on SNMP     switches     syslog servers     testing

         bootableCD-ROM-based toolkits

         Nessus 2nd

         network scanners

         Nmap

         packet analyzers 2nd

Security Audit Wizard (SDM) 2nd

security wheel

selecting file format of network diagrams

sensors

service authorization, configuring for Linux-based TACACS+ user accounts

service password-encryption command

session timeouts, Linux-based TACACS+ server configuration

setup options (Nessus) 2nd

severity levels, overriding default logging severity parameter (syslog packets)

SHA (Security Hash Algorithm)

shapes

sheets

show arp command show interface ethernet0 command show proc cpu command

signature-based IDSs     Snort         Linux-based, deploying         Windows-based

         Windows-based, configuring         Windows-based, deploying         Windows-based, installing         Windows-based, starting SLAs (service-level agreements) SmokePing sniffers [See also packet analyzers]

SNMP (Simple Network Management Protocol)

     community string     components of    configuring

         on Cisco routers

         on Cisco switches

         on Cisco VPN 3000 Concentrators

         on PIX Firewalls     NMSs

     securing     versions of

Snort    Linux-based         alerts, viewing         configuring         deploying

         installing

         starting

    Windows-based

         advanced architecture

         alerts, viewing

         configuring

         deploying

         installing

         starting

source code files, Big Brother

source parameter, syslog-ng.conf

source-drivers

SPAN (Switched Port Analyzer)

     for CatOS switches, port configuration     for IOS-based switches, port configuration

SSH (Secure Shell)

     Cisco SSH Security Advisory web page

    clients

         configuring         PuTTY     configuring for Cisco devices

     connecting PCs to Cisco devicesstarting     Big Brother server         on Windows

     GtkTerm     Linux-based Snort     Linux-based TACACS server     Nagios     Syslog-ng daemon     Windows Component Wizard     Windows-based Snort

     Windows-based Syslog server, Kiwi Syslogd Server

stencils, Dia     adding new icons to Storner, Henrik

strict option (traceroute command)

summarizing protocol statistics

switches, securing

     RATsyntax, Syslog-ng.conf statements

     destination     filter

     log     options     sourcesyslog     /etc/syslog.conf file, adding rules

     configuring for Cisco devices

         CatOS-based switches

         Cisco routers

         commercial Cisco products

         PIX Firewalls

         VPN concentrators

    daemon

         configuring

         restarting

         verifying operation

     deploying

    packet parameters

         facility

         hostname         message

         severity

         timestamp

     securing

     varying formats among Cisco devicesSyslog-ng daemon     configuring

     destination-driver file, overriding global options     destination-drivers     implementing as central syslog server     installing

     logs, viewing     source-drivers     starting     versus syslogd daemonsyslog-ng.conf file     destination parameter     filter parameter

     log parameter

     options parameter     source parameter syslog.conf file, reloading

Syslogd daemon

     editing

     limitations of

     permitting remote syslog messages     versus Syslog-ng daemon

system file management with TFTP server     IOS-based

     Linux-based     Windows-based

 

Категории