Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.

W

WAN access module, 363

WAN Administrator, 507

WAN connections, 86

WAN Management Team, 508

WAPs (wireless access points)

authentication, 264

Cisco Aironet 1200 configuration, 257 “258

detecting unauthorized WAPs from wired network, 246 “247

detecting unauthorized WAPs wirelessly , 245 “246

DHCP server, disabling, 257

location of, 9

logging configuration, 255

MAC address filtering and, 259 “262

NTP configuration, 256

overview, 243

preventing rouge, 242 “244

remote administration of, 248 “252

removing rouge, 248

restricting wireless access modes, 258 “259

SNMP configuration, 255 “256

SSID configuration, 252 “254

warnings/notifications, in security policy, 28

Web services DMZ segment, 366

web sites. See resources ( vendors , publications , and web sites)

Websense, 222 “234

configuring to work with Cisco Secure PIX Firewall, 222 “223

filtering rules, 223 “231

reports , 231 “234

WEP (Wired Equivalent Privacy)

configuring for wireless clients , 272 “273

configuring wireless connections, 264 “265

flaws in, 263 “264

WEP key recovery, 263

WhatsUp Gold, 314 “320

alert configuration, 316

maps loading at startup, 319

SNMP SmartScan, 314

starting as service, 320

TCP/IP services detection, 315

user access, 318 “319

web-based management option, 317 “318

wide- open WAP connection, 262

WiFi Protected Access. See WPA (WiFi Protected Access)

Windows-based systems

hardening PureSecure, 78 “81

IPsec configuration in Windows 2000, 336 “345

virus protection for, 13

Windows domain configuration, 305 “308

Windows XP client configuration, 308

Wired Equivalent Privacy. See WEP (Wired Equivalent Privacy)

wireless access module, 365 “366

wireless access points. See WAPs (wireless access points)

wireless analyzers, 245

wireless clients

SSIDs and, 252

WEP configuration, 272 “273

WPA configuration with pre-shared keys, 273

WPA configuration with RADIUS/802.1x, 274 “276

wireless connections

methods , 262

policy for, 32

securing, 5, 14

VPN configuration, 271

WEP configuration, 263 “265

wireless access points, 9

WPA configuration, 266 “271

wireless LANs. See WLANs (wireless LANs)

wireless routers, 243

wireless security policy, 242

WLANs (wireless LANs)

detecting unauthorized WAPs from wired network, 246 “247

detecting unauthorized WAPs wirelessly, 245 “246

hardening WAPs. See WAPs (wireless access points)

hardening wireless clients. See wireless clients

hardening wireless connections. See wireless connections

modes of operation and components , 243

overview, 242

preventing rouge APs, 242 “244

removing rouge APs, 248

work environment, 506

workarounds. See also patches/updates

staying informed about, 448 “449

when to use, 447 “448

worms, 235. See also viruses

WPA (WiFi Protected Access), 266 “271

802.11i and, 266

authentication, 266 “267

configuring wireless clients, 273 “276

configuring wireless connections, 267 “271

MIC and, 267

TKIP and, 267

WPA-PSK (WPA with pre-shared keys), 267 “269

Категории