Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.

T

T1/T3 lines, 363

TACACS/TACAS+ (Terminal Access Controller Access Control System)

as AAA mechanism, 281

accounting, 301 “302

authentication, 293 “295

as authentication server, 48, 250

authorization, 297 “300

dial-in remote access, 152

login authentication, 287 “292

TCP (Transmission Control Protocol)

communication over, 409

disabling small servers on IOS devices, 164

filtering rules and, 128

TCP scans , 408 “410

TCP three-way handshake, 409

TCP/IP, 315, 336

technical interview, 503 “504

Telnet

compared with 3DES/SSH, 103

as insecure protocol, 110

preventing remote administration, 42 “44

securing remote administration, 44 “48

Temporal Key Integrity Protocol (TKIP), 267

tenured employees , 484

Terminal Access Controller Access Control System. See TACACS/TACAS+ (Terminal Access Controller Access Control System)

testing

change planning and, 434 “436

upgrading and, 452

TFTP (Trivial File Transfer Protocol), 64, 454

threats. See also risk analysis

defining, 28

e-mail content filters, 234

identifying, 489 “490

Internet content filters, 211 “212

list of common, 489

protection for all known, 393 “396

ratings, 24 “25

risk analysis and, 488

TKIP (Temporal Key Integrity Protocol), 267

traceroute, 441

training. See also staffing

computer-based, 512

conferences, 512

cross-training, 510

instructor-led, 511

lab environment, 513 “514

overview, 510

resources for, 510 “511

self-study, 513

users, 28

value and cost of, 511

vendor, 512 “513

Transmission Control Protocol. See TCP (Transmission Control Protocol)

transport mode, AH and ESP, 139 “140

Trivial File Transfer Protocol (TFTP), 64, 454

trunk lines, VTP, 199

trust

gaining management, 485 “486

gaining user , 481

trust models, 373 “375

tunnel mode, AH and ESP, 139 “141

tunneling protocols, removing unnecessary, 123 “125

tunneling rules, IPsec, 340 “342

Категории