Inside Network Perimeter Security (2nd Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

CA (Certificate Authorities)     digital certificates     PKI

     SSL standard connections 2nd

cacheflow servers 2ndCampbell, Sam

     GIAC GCFW network security design, adversarial review of 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd Canvas exploitation library softwarecase studies    Check Point Firewall-1, troubleshooting

         FW Monitor 2nd    defense in depth         Nimda worm 2nd

    IDS

         networks with multiple external access points 2nd

         simple network infrastructures 2nd 3rd

         unrestricted network environments 2nd 3rd    network performance

         ISDN network connections 2nd

         satellite-based networks 2nd     router link encryption 2nd

    secure perimeter design         complex e-commerce business sites 2nd

         complex e-commerce business sites, DMZ 2nd 3rd 4th         complex e-commerce business sites, internal networks 2nd

         complex e-commerce business sites, Internet 2nd 3rd

         complex e-commerce business sites, proxy layers 2nd 3rd

         complex e-commerce business sites, security networks 2nd 3rd 4th

         small businesses with basic Internet presence 2nd 3rd 4th 5th 6th 7th

         small e-commerce business sites 2nd 3rd 4th 5th 6th 7th 8th 9th

         telecommuters using broadband connections 2nd 3rd 4th 5th 6th

     SSL Web server

     VPN

         IPSec 2nd 3rd

         SSL 2nd

         terminal servers 2nd 3rd

     wireless network security design 2nd 3rd 4th 5th

castle analogy (defense in depth)

     hiding         fragment reconnaissance

         ping reconnaissance         SYN/FIN attacks 2nd     internal defenses

         airgaps

         internal firewalls

         personal firewalls

         SDN 2nd 3rd 4th

     layered defenses 2nd    secret passages         firewall tunnels         firewall tunnels, HTTP tunneling 2nd

         firewall tunnels, insider threats 2nd 3rd 4th

         firewall tunnels, perimeter configuration changes 2nd 3rd         firewall tunnels, SOAP

         firewall tunnels, Web server attacks 2nd 3rdCBAC     routers         inspect statements

         stateful inspection CBAC (context-based access control)CD-Universe

     credit card attacks 2nd

CDP (Cisco Discovery Protocol)

     disabling

Certificate Authorities (CA)     digital certificates

     PKI

     SSL standard connections 2nd change management (perimeter security maintenance)

     communicating proposed changes     detecting/preventing unauthorized changes 2nd

     discovering systems/devices     patches 2nd

     personnel support

     rolling back undesired changes

     testing changes

     verifying proper system operation

changes, reviewing (troubleshooting process)

Check Point Firewall F-1

     network log analysis 2nd 3rd

     SmartView Tracker

Check Point Firewall-1

    troubleshooting

         FW Monitor 2nd

         FW Monitor, case studies 2nd

Check Point Firewall-1 firewalls

     network log analysis, automating 2ndCheck Point Firewall-1 NG firewalls

     IPS 2nd     OPSEC Alliance Check Point FireWall-1 stateful firewalls 2nd 3rd 4th 5th

     implied rules

     protocol support 2nd

     SmartDashboard

     SmartDefense 2nd

     state tables     state tables, example of 2nd     stateful inspection, configuring for 2nd     timeouts 2nd

Check Point Integrity

Check Point VSX (Virtual System Extension)checklists

     host hardening 2nd chokepoint devices (NIPS) chokepoint NIPS (network intrusion prevention systems)     firewalls 2nd

         Check Point Firewall-1 NG 2nd         modwall 2nd     IDS plus something classification

         HogWash

         IntruShield 2nd

         LaBrea Technologies Sentry 2nd

         NFR Sentivist 2nd         Snort-Inline

chokepoints

chroot facility 2nd chroot jails

ciphertext     defining

circuit bandwidths 2nd circuit firewalls

Cisco

     CSA 2nd

     PIX VPDN configuration example 2nd 3rd 4th

    routers

         access list rules 2nd

         IPSec VPN configuration examples 2nd 3rd 4th 5th 6th 7th 8th 9th

     SDN 2nd 3rd 4th

         NAC 2nd 3rd 4th

     stock options exploits

     transform sets

Cisco ACL (access control lists)

     deny 2nd

     extended

         blocking ICMP echo requests 2nd         established keyword 2nd

         established keyword, DNS 2nd         filtering ICMP messages 2nd         filtering ports

         FTP 2nd 3rd

         IP addresses, friendly net access 2nd

         PASV FTP 2nd 3rd

         ports

         rule order 2nd         syntax of 2nd     fragments 2nd     implicit denies 2nd

     in/out keywords 2nd 3rd

         VLAN interfaces     IPv6 2nd

     log keywords     named 2nd         adding/deleting entries 2nd 3rd         reflexive ACL

     numbered     reflexive 2nd         FTP 2nd

         ICMP

         named ACL 2nd

         outbound traffic 2nd

         PASV FTP         TCP flags 2nd

         UDP

     rule order, planning    standard

         applying to interfaces         blacklisting 2nd 3rd

         egress filtering 2nd         ingress filtering 2nd 3rd 4th

         IP addresses, friendly net access 2nd

         syntax of

     wildcard masks 2nd 3rd 4th

Cisco auto secure command

    router configurations

         examples of 2nd 3rd 4th 5th 6th

Cisco extended ACL (access control lists)

     established keyword 2nd

         DNS 2nd

     FTP 2nd 3rd

    ICMP echo requests

         blocking 2nd

    ICMP messages

         filtering 2nd    IP addresses

         friendly net access 2nd     PASV FTP 2nd 3rd     ports

         filtering

     rule order 2nd

     syntax of 2nd

Cisco IPv6 ACL (access control lists) 2nd

Cisco PIX firewall logs     analyzing 2nd Cisco PIX stateful firewalls     fixup command 2nd 3rd 4th

     FWSM 2nd

     inbound/outbound traffic connections 2nd     PDM 2nd

         Configuration screen 2nd         Hosts/Networks screen         System Properties screen         Translation Rules screen

     show conn command 2nd Cisco reflexive ACL (access control lists) 2nd     FTP 2nd

     ICMP

     named ACL 2nd

     outbound traffic 2nd

     PASV FTP     TCP flags 2nd

     UDP

Cisco router logs     analyzing 2nd

Cisco routers [See routers]     Cisco ACL

         Cisco wildcard masks 2nd 3rd 4th         deny 2nd

         extended

         extended, blocking ICMP echo requests 2nd

         extended, established keyword 2nd 3rd 4th

         extended, filtering ICMP messages 2nd

         extended, filtering ports

         extended, friendly net IP address access 2nd

         extended, FTP 2nd 3rd

         extended, PASV FTP 2nd 3rd

         extended, ports

         extended, rule order 2nd

         extended, syntax of 2nd

         fragments 2nd

         implicit denies 2nd

         in/out keywords 2nd 3rd         IPv6 2nd

         log keywords         named 2nd         named, adding/deleting entries 2nd 3rd

         named, reflexive ACL

         numbered

         planning rule order

         reflexive 2nd

         reflexive, FTP 2nd         reflexive, ICMP         reflexive, named ACL 2nd         reflexive, outbound traffic 2nd

         reflexive, PASV FTP

         reflexive, TCP flags 2nd         reflexive, UDP

         standard, applying to interfaces         standard, blacklisting 2nd 3rd         standard, egress filtering 2nd         standard, friendly net IP address access 2nd

         standard, ingress filtering 2nd 3rd 4th         standard, syntax of     configuring 2nd

     network filtering

Cisco standard ACL (access control lists)

     blacklisting 2nd 3rd

     egress filtering 2nd     ingress filtering 2nd 3rd 4th

     interfaces, applying to

    IP addresses         friendly net access 2nd

     syntax ofCisco TCP Keepalives services

     router hardening Cisco wildcard masks 2nd 3rd 4th

Citrix MetaFrame

     reverse proxies

clarity (security policies)

class maps

     footprints

cleartext

     defining

client networks

    resource separation

         dialup connections 2nd

         LAN-connected desktops 2nd

         laptops 2nd

         VPN 2nd

         wireless systems 2nd 3rd CLOSE-WAIT state (TCP connections)

CLOSED state (TCP connections) CLOSING state (TCP connections) clustering firewalls 2nd

Code Red worm

     SANS Institute exploit

collecting symptoms (troubleshooting process) 2nd

commands

     Cisco router shorthand communicating risks (security policies) 2ndcommunity names (SNMP)     router attacks 2nd

community strings (SNMP)

company atmosphere, determining (security policies)     contracts 2nd

     directives     unwritten policies     written policies compartmentalization

complete access lists    private-only networks         examples for 2nd 3rd 4th 5th

    screened subnet networks

         examples for 2nd 3rd 4th 5th 6th 7th

complex e-commerce site case studies 2nd

     DMZ 2nd 3rd 4th     internal networks 2nd

     Internet 2nd 3rd

     proxy layers 2nd 3rd     security networks 2nd 3rd 4th

compliance (security policies)Computer Management applet (Windows)

     file shares, creating/deleting Computer Security Incident Handling Step by Step [ITAL] (SANS Institute)

concentrators (VPN)

conciseness (security policies) 2nd

confidentiality (VPN requirements)

configuration management

     defining

     responsibility of

Configuration screen (PDM) 2nd

configuring

    antivirus software

         EICAR test files

     Cisco routers 2nd

     mail relays 2nd 3rd 4th

     NAT for routers 2nd

    NTP         routers 2nd 3rd

    perimeters         firewall tunnels 2nd 3rd    personal firewalls

         workstations 2nd

     routers 2nd

         TFTP 2nd

conformance (security policies)

connection tracking     definingconsole ports (routers)     hardening 2nd

containment phase (incident response)

content filters     network performance 2nd

contractors     firewall tunnels 2ndcontracts     security policies, writing 2nd

control (security policies)     administrative controlscopiers

     secure perimeter design

CORBA (Common Object Request Broker Architecture)

     interapplication communication

Core Impact exploitation library software corporate culture, determining (security policies)

     contracts 2nd

     directives     unwritten policies

     written policies Corporate Servers security zone, creating 2nd

Corporate Workstations security zone, creatingcorrelating events

     network log files

cost

     secure perimeter design 2nd 3rd

     versus risk 2nd

costs

     VPN

CPU usage (routers)

     proc command 2nd

Crack password-cracking software 2nd

crafted packets

credit card attacks

     CD-Universe 2nd

credit card exploits

     script kiddies CRL (certificate revocation lists) 2nd

     RA crown jewels, information as 2nd crypto key generate rsa command (SSH)

crypto maps 2nd

cryptography

     ciphertext, defining

     cleartext, defining

    encryption         application layer, VPN         network layer, VPN 2nd         network security assessments

         transport layer, VPN

         tunneling, VPN 2nd 3rd         wireless

         wireless, auditing 2nd 3rd         wireless, EAP-TLS 2nd 3rd         wireless, implementing 2nd         wireless, LEAP 2nd 3rd 4th

         wireless, PEAP 2nd 3rd         wireless, TinyPEAP         wireless, WEP 2nd

         wireless, WPA protocol 2nd 3rd 4th

     encryption algorithms

         asymmetric key

         asymmetric key, Diffie-Hellman 2nd         asymmetric key, PGP

         asymmetric key, public/private keys

         digital signatures 2nd         hash algorithms

         hash algorithms, MD5         hash algorithms, SHA-1

         shared key         shared key, DES

    encryption kyes

         defining

    hardware accelerators

         network performance 2nd

    network layer

         network performance 2nd 3rd 4th 5th

     PGP

     PKI

     plain text, defining

    public key

         network performance

    symmetric key

         algorithm key sizes

         network performance 2nd    transport layer

         network performance 2nd 3rd crystal box designs, defining CSA (Cisco Security Agent) 2nd

Csico 3660 routers

Категории