Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.

M

MAC addresses

filtering, 259 “262

limiting to one per port, 244

monitoring, 247

switch port and, 248

maintenance and support agreements, 449 “450

management access, IOS devices, 156 “164

auxiliary port access, 161 “162

console access, 157 “158

logon banners, 164

overview, 156 “157

privileged mode access, 162 “163

usernames and AAA, 163

VTY access, 158 “161

Web-based access, 161

management console, IDS/IPS, 78

management interface, network sensors, 81

management module, enterprise campus, 381 “382

management perceptions/expectations

being realistic, 487

communicating with management, 485 “486

demonstrating the value proposition, 487

gaining management trust, 485 “486

overview, 485

management teams

incident response, 519

meetings, 509

organizational/ group roles and responsibilities, 508 “509

MD5 (Message Digest 5), 62, 143

medium risk rating, 25

Melissa virus, 235

mentoring, 509

Message Digest 5 (MD5), 62, 143

Message Integrity Check (MIC), 267

message integrity, VPNs, 143 “145

messages of the day (MOTD), 392

MIB values, SNMP, 333 “334

MIC (Message Integrity Check), 267

Microsoft Certificate Services, 148

Microsoft IAS server, 283 “286, 304 “308

Microsoft IIS, 78 “79

Microsoft Network Monitor, 402

Microsoft Windows. See Windows-based systems

misuse detection, 77

misuse of resources, 211

monitoring

bandwidth and change, 529

enterprise monitoring policy, 34

interfaces, 441 “442

network sensors, 81

security policies, 26

types of, 9

Monitoring Center for Security, Cisco, 96

MOTD (messages of the day), 392

multi-home firewalls, 349 “351

Категории