Inside Network Perimeter Security (2nd Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

L0phtCrack password-cracking software 2nd L2TP (Layer Two Tunneling Protocol)     versus IPSec 2nd

     versus PPTP 2nd

     Windows XP client software configuration example 2nd 3rd LaBrea Technologies Sentry 2nd

LAN    desktops         resource separation 2nd LANguard Network Security Scanner (GFI) 2nd 3rd 4th

LANs     Doomlaptops

     resource separation 2nd

LAST-ACK state (TCP connections)

latency

     defining 2nd     gateway processing

     packet size

     ping command     propagation 2nd

Layer 3 switchingLayer 4 dispatchers (load balancers)

     network performance 2ndLayer 7 dispatchers (load balancers)

     network performance 2nd

ldd utility

     application layer, troubleshooting

LEAP (Lightweight Extensible Authentication Protocol) 2nd

     dictionary attacks 2nd

limited personal use policies (security policies)

link layer

    troubleshooting

         ARP 2nd 3rd

         ifconfig utility

         ipconfig utility

         Tcpdump 2nd

Link search extension (Google) 2nd

Linux     Check Point FireWall-1 stateful firewalls 2nd 3rd 4th 5th 6th 7th

     IPChains 2nd    Netfilter/IPTables         state tables, example of 2nd

         stateful firewalls 2nd 3rd 4th 5th 6th

    rpm utility

         software, removing

     WU-FTPD

Lion worm LISTEN state (TCP connections)listener stations     network security assessments 2nd

listeners (proxy servers)

listing     ports 2nd

load balancers     network performance 2nd 3rd         Layer 4 dispatchers 2nd         Layer 7 dispatchers 2nd

local authentication    routers         SNMP 2nd 3rd

Local Security Policy editor (windows)

     null sessions, limiting

Local Security Policy editor (Windows)

     security logs, auditinglocking

     MAC addresses 2nd 3rd

     wired management 2nd log analyzers

log file monitoring utilities (host-based IDS)     Logcheck 2nd

log files     analyzing 2nd

         automating

         automating, Check Point Firewall-1 firewalls 2nd

         automating, data retrieval 2nd

         automating, designing reports 2nd

         automating, file formats

         automating, log volume

         automating, SIM software

         developing feel for

         finding fun in

         firewall logs, Check Point FireWall-1 logs 2nd 3rd

         firewall logs, Cisco PIX logs 2nd

         firewall logs, IPTable logs

         firewall logs, Norton Personal Firewall logs 2nd

         firewall logs, ZoneAlarm logs 2nd         IDS logs 2nd

         keyword searches         router logs 2nd         router logs, Cisco router logs 2nd

         timestamps

         UNIX

     characteristics of

         occasionally recorded information 2nd

         rarely recorded information 2nd         regularly recorded information 2nd     DNS requests     event correlation

     general troubleshooting

     importance of     incident handling 2nd

     intrusion detection     TCP flags 2nd     timestamps     TTL

Logcheck log file monitoring utility 2ndloggers (keystroke)     firewall tunnels 2nd

logging

     in IDS

    routers

         router hardening 2nd 3rd 4th login banners (routers), creating 2nd

login local command (routers)

login local command (SSH)     router hardening

logings     router attacks

logistics of network security assessments, determininglogs

    detailed

         system performance 2nd

     OpenSSH connections

    protocol-aware

         proxy firewalls

         proxy firewalls, RingZero Trojan exploit 2nd

     Web proxies

lsof (list open file) utility

Категории