Inside Network Perimeter Security (2nd Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

failover 2nd FakeAP false positive/negative signatures 2nd 3rd

false positives

     HIPS     IPS

fault tolerance     secure perimeter design         geographic redundancy 2nd         intrasite redundancy 2nd 3rd 4th 5th

         intrasystem redundancy feel (network log analysis), developingfile and print services [See resource-sharing services]

file globbing vulnerabilities [See Linux;WU-FTPD]

file integrity checkers

file integrity checkers (host-based IDS) 2nd

     AIDE     Samhain

     Tripwire

     Tripwire Manager     Winalysis

file permissions     race conditions 2nd

    restricting         Windows

         Windows, NTFS

file permissions, restricting

     UNIX 2nd

file shares (Windows)

     creating/deleting

file transfers

     SSH

Filter Action Wizard (Windows XP)

     IPSec parameters, enforcing 2nd 3rd

filtering

    egress

         role in perimeter defense 2nd

    ingress

         role in perimeter defense 2nd     network log file data 2nd

filtering packets     software architecturefilters

    content

         network performance 2nd

    egress

         adversarial reviews, determining attacker access 2nd

    ingress         adversarial reviews, determining attacker access 2nd    No CDP Messages filter setting         adversarial reviews, determining attacker access 2nd

    No IP Directed Broadcasts filter setting

         adversarial reviews, determining attacker access    No IP Unreachable Messages filter setting

         adversarial reviews, determining attacker access    No Source Routing filter setting         adversarial reviews, determining attacker access    packet

         network performance 2ndFIN scans     Nmap

FIN-WAIT-1 state (TCP connections)

FIN-WAIT-2 state (TCP connections)

Finger services

     disabling 2nd fingerprinting

Firewall F-1 (Check Point)

     network log analysis 2nd 3rd     SmartView Tracker

firewall logs    analyzing

         Check Point Firewall F-1 2nd 3rd         Cisco PIX logs 2nd

         IPTable logs

         Norton Personal Firewall logs 2nd

         ZoneAlarm logs 2nd

Firewall Toolkit (FWTK) 2nd

Firewall-1 (Check Point)

    troubleshooting

         FW Monitor 2nd

         FW Monitor case studies 2nd

Firewall-1 firewalls (Check Point)

     network log analysis, automating 2nd

Firewall-1 NG firewalls (Check Point)

     IPS 2nd

     OPSEC Alliance

firewalls 2nd     application compatibility

     as chokepoints     as security policies 2nd    Check Point Firewall-1

         automating network log analysis 2nd

    Check Point Firewall-1 NG

         IPS 2nd

         OPSEC Alliance

     Check Point VSX     chokepoint NIPS 2nd         Check Point Firewall-1 NG firewalls 2nd         modwall firewalls 2nd

     circuit

     clustering 2nd     compromised hosts

     deep packet inspection 2nd 3rd    Deep Packet Inspection         high-risk services    deep packet inspection

         SSL     defining    external

         adversarial reviews, determining attacker access 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

         adversarial reviews, determining impact of misconfigurations/vulnerabilities 2nd 3rd 4th 5th 6th 7th

         NetScreen-100, adversarial reviews 2nd 3rd 4th 5th 6th

         NetScreen-100, From DMZ rulebase 2nd         NetScreen-100, incoming rulebase 2nd

         NetScreen-100, outgoing rulebase

         NetScreen-100, To DMZ rulebase         rulebases

         translation settings for outbound network connections 2nd         translation settings for public services 2nd

     host-based         IDS logs 2nd

    host-centric

         role in internal network defense 2nd 3rd

     IDS sensor deployment 2nd

    inline

         system performance

     internal

         adversarial reviews

         adversarial reviews, determining attacker access 2nd 3rd 4th

         adversarial reviews, determining impact of misconfigurations/vulnerabilities 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

         Nokia IP330, adversarial reviews 2nd 3rd

         Nokia IP330, rulebases 2nd

         rulebases

    IPChains

         Nmap ACK scans 2nd    IPSec

         VPN     managing (network security assessments) 2nd    modwall

         IPS 2nd

    NetScreen-100

         adversarial reviews, determining attacker access 2nd 3rd 4th 5th 6th

         From DMZ rulebase 2nd

         incoming rulebase 2nd         outgoing rulebase         To DMZ rulebase    Netscreen-204 (Juniper)

         rulebase for 2nd

    Nokia IP330         adversarial reviews 2nd 3rd

         rulebases 2nd     Nokia IP350         rulebase for    Nokia IP440

         adversarial reviews, determining attacker access 2nd     personal 2nd 3rd         BackOfficer Friendly (NFR)

         configuring 2nd

         IPSec packet-filtering 2nd

         Norton 2nd 3rd

         PF 2nd 3rd 4th         role in internal network defense 2nd 3rd

         workstations

         workstations, websites         ZoneAlarm Pro 2nd

    proxy         advantages of 2nd

         configuring         disadvantages of 2nd 3rd

         FTP 2nd

         FTP, bypassing via

         functions of

         FWTK 2nd

         Gauntlet 2nd

         generic proxies 2nd

         hiding network structures 2nd

         high-risk services

         internal protected networks

         market availability 2nd 3rd

         network discovery 2nd

         network performance 2nd

         nontransparent, request handling

         performance of         PORT command 2nd 3rd

         protocol compatibility 2nd         protocol support         protocol-aware logs

         protocol-aware logs, RingZero Trojan exploit 2nd

         RETR command

         role in perimeter defense

         SOCKS protocol

         SOCKSv4 protocol         SOCKSv5 protocol         Squid         transparent, request handling 2nd

         URL

         versus stateful firewalls         VPM

     redundancy 2nd 3rd     secure perimeter design 2nd         access control 2nd         basic filtering 2nd

         inline firewalls 2nd         ISP controlled routers 2nd         parallel firewalls 2nd 3rd

         VPN interaction 2nd 3rd 4th 5th 6th

    servers

         IPSec packet-filtering 2nd

         PF 2nd 3rd 4th         versus workstation firewalls 2nd

     software architecture

         IP protocols    stateful

         application layer commands         Check Point FireWall-1 2nd 3rd 4th 5th

         Check Point FireWall-1, configuring for stateful inspection 2nd         Check Point FireWall-1, implied rules

         Check Point FireWall-1, protocol support 2nd

         Check Point FireWall-1, SmartDashboard

         Check Point FireWall-1, SmartDefense 2nd

         Check Point FireWall-1, state table example 2nd

         Check Point FireWall-1, state tables

         Check Point FireWall-1, timeouts 2nd

         Cisco PIX

         Cisco PIX, fixup command 2nd 3rd 4th

         Cisco PIX, FWSM 2nd

         Cisco PIX, inbound/outbound traffic connections 2nd

         Cisco PIX, PDM 2nd 3rd 4th 5th 6th 7th

         Cisco PIX, show conn command 2nd

         FTP control sessions

         functions of 2nd         Juniper Networks NetScreen 2nd

         multimedia protocols         Netfilter/IPTables 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th         network performance 2nd

         port command (FTP)

         role in perimeter defense 2nd

         troubleshooting application protocol inspection 2nd 3rd

         versus proxy firewalls

    Symantec         adversarial reviews, determining attacker access 2nd 3rd 4th 5th 6th 7th    troubleshooting         FW Monitor 2nd

         Telnet

     tunnels         HTTP tunneling 2nd

         insider threats;employees/contractors 2nd         insider threats;spyware/keystroke loggers 2nd         perimeter configuration changes 2nd 3rd         SOAP

         Web server attacks 2nd 3rd     validation (network security assessments) 2nd    VLAN

         resource separation 2nd

     workstations

         configuring 2nd

         Norton Personal Firewalls 2nd 3rd         versus server firewalls 2nd

         websites

         Zonealarm Pro 2ndfirmware

     AP firmware, updating fixup command (Cisco PIX stateful firewalls) 2nd 3rd 4th

Fluhrer, Scott     Weaknesses in the Key Scheduling Algorithm of RC4 [ITAL] 2nd

focus (troubleshooting rules) 2nd

follow up phase (incident response)

footprints

forming hypothesis (troubleshooting process) 2nd

Foundstone Fport

fping utility

Fport (Foundstone)

frag option (Nmap)

fragments

     Nmap frag option

fragments (packet-filtering) 2nd 3rd

fragments, reconnaissance by

freeware

    spyware         blocking 2nd

freshness (proxy caches) friendly net access (IP addresses) 2nd 3rd 4th From DMZ rulebase (NetScreen-100 external firewall) 2nd

FTP

    PASV FTP

         extended ACL 2nd 3rd

     router hardening

FTP (     reflexive ACL 2ndFTP (File Transfer Protocol)     extended ACL 2nd 3rd

    port command

         stateful firewalls    state

         tracking 2ndFTP (File Transfer Protocols)     proxy firewalls 2nd         bypassing

FW Monitor     Check Point Firewall-1, troubleshooting 2nd         case studies 2nd

FW-1 stateful firewalls 2nd 3rd 4th 5th

     implied rules

     protocol support 2nd

     SmartDashboard     SmartDefense 2nd

     state tables

     state tables, example of 2nd     stateful inspection, configuring for 2nd

     timeouts 2nd FWSM (FireWall Services Module), Cisco PIX stateful firewalls 2nd

FWTK (Firewall Toolkit) 2nd

Категории