Firewall Fundamentals

Index

[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

caching, enabling on ISA server

central office implementation

certificates, authentication

chains (Netfilter)

     user-defined

     within filter table

     within mangle table

     within NAT table

change control

     as part of troubleshooting methodology

change control system

     logging

     setting up 2nd

checklist

     for building Netfilter-based firewalls

     for Linksys router configuration

     for Trend Micro's PC-cillin firewall feature configuration

     for Windows Firewall configuration

     of troubleshooting procedures, developing

choosing between ASA and PIX

CIDR (classless interdomain routing)

circuit-level firewalls

Cisco PIX Firewall [See PIX/ASA firewalls , URL filtering .]

classes of IP addresses

classifications of routing protocols

CLI (command-line interface), firewall management

closed source firewalls

closed-source vendor software, availability of patches

combining VLANs and firewalls on a network

commands

     enable

     fixup 2nd

     interface

     logging

     logging permit-hostdown

comparing

     deep packet inspection and application layer filtering

     HTTP and HTTPS

     known good and current configuration

configuration files

     controlling access to

     RCS log, viewing

configuring

     ACLs

         parameters

     ASA

     default gateway

     interfaces

     Linksys routers

         administration

         basic setup procedures

         checklist

         gaming application support

         security

     NAT

         on PIX 6.x

         on PIX 7.x

     Netfilter

         with Firestarter

         with Firewall Builder

         with iptables

         with Webmin

     PIX/ASA firewall

         remote management access

         URL filtering

     syslog

     Trend Micro's PC-cillin firewall feature 2nd

         checklist

         profiles

         security level

     Windows Firewall

         checklist

connection teardowns (TCP), reasons for

connection-oriented protocols, TCP 2nd

     port numbers

     segments

     sliding windows

     SYN flood

connectionless protocols

     sessions

     UDP

         header fields

         messages

connectivity

     requirements for Linksys routers

     testing

     through firewall, troubleshooting 2nd

     to firewall, troubleshooting

console notification

controlling

     access to configuration files

     management interface access

         in-band management

         out-of-band management

         SSH

         Telnet

corner cases

corrupt IP packets

creating

     access rules

     effective security policies

     NetFilter-based firewalls, checklist

     publishing rules

     security policies

CS-MARS (Cisco Security Monitoring, Analysis and Response System)

Категории