Inside Network Perimeter Security (2nd Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

validate-update-source command (routers)validating     firewalls (network security assessments) 2nd

verifying perimeter devices phase (network security assessments)

     access control verification         firewall management 2nd

         traffic restrictions 2nd 3rd     assessment stations 2nd     firewall validation 2nd     listener stations 2nd

version scans (Nmap) 2ndviewing     NAT translation tables

     PAT translation tables

Virtual Vault Servers (HP)

    adversarial reviews

         determining attacker access 2nd 3rd         determining impact of misconfigurations/vulnerabilities 2nd

     mkacct command

VisualZone utilityVLAN

     AP 2nd     resource separation

         firewalls 2nd         private VLANs 2nd

         routers 2nd

         switches

         VLAN-hopping attacks 2nd

     tag headers

VLAN interfaces

     ACL, in/out keywords

VLAN-hopping attacks 2nd

VLVHLP (ver large, very high-latency packets)

     unenforceable security policies

VMware software 2nd

voice mail systems

     secure perimeter design

VPDN (Virtual Private Dial-Up Networks)

     Cisco PIX configuration example 2nd 3rd 4thVPN

     resource separation 2nd    secure perimeter design         firewall interaction 2nd 3rd 4th 5th 6th

VPN (Virtual Private Network)

     intranet VPN

VPN (virtual private networks) [See also remote desktop software]

VPN (Virtual Private Networks)

    benefits of         cost effectiveness         deployment 2nd         security 2nd 3rd

     case study

         IPSec 2nd 3rd         SSL 2nd

         terminal servers 2nd 3rd    Cisco router configurations         access list rules 2nd     compromised clients, handling 2nd

VPN (virtual private networks)     definingVPN (Virtual Private Networks)

     defining

VPN (virtual private networks)

     defining

VPN (Virtual Private Networks)     Diffie-Hellman asymmetric key encryption algorithms

     disadvantages of

         implementation         Internet availability

         packet overhead         processing overhead

         troubleshooting     encryption 2nd 3rd

         application layer

         network layer 2nd

         transport layer

         tunneling as 2nd 3rd

     IPSec

VPN (virtual private networks)

     IPSec

VPN (Virtual Private Networks)

    IPSec

         AH protocol

         AH protocol, ESP protocol combinations 2nd

         AH protocol, ICV

         AH protocol, packet header information 2nd 3rd

VPN (virtual private networks)    IPSec

         client integration 2ndVPN (Virtual Private Networks)    IPSec

         configuration examples, Cisco routers 2nd 3rd 4th 5th 6th 7th 8th 9th

         configuration examples, Windows XP 2nd 3rd 4th 5th 6th 7th 8th

         ESP protocol

         ESP protocol, AH protocol combinations 2nd

         ESP protocol, IPSec transport mode         ESP protocol, IPSec tunnel mode 2nd         ESP protocol, NAT 2nd         ESP protocol, packet header components 2nd

         ESP protocol, packet traces 2nd

         IKE protocol         IKE protocol, digital certificate authentication

         IKE protocol, phase 1 negotiations 2nd 3rd 4th 5th 6th 7th         IKE protocol, phase 2 negotiations 2nd         IKE protocol, pre-shared key authentication         NAT-T

         PAT 2ndVPN (virtual private networks)    IPSec

         perimeter defenses 2nd 3rd

VPN (Virtual Private Networks)

    IPSec

         SA 2nd 3rd         SAD 2nd 3rd

VPN (virtual private networks)

    IPSec         server integration 2nd

VPN (Virtual Private Networks)    IPSec

         SPD         transport mode

         transport mode, ESP protocol

         tunnel mode, ESP protocol 2nd

         tunneling mode

         versus L2TP 2nd

         wireless network security

     L2TP

         versus IPSec 2nd

         versus PPTP 2nd

         Windows XP client software configuration example 2nd 3rd

     network layer cryptography 2nd 3rd

     network security assessments

         access controls 2nd

         authentication 2nd 3rd

         client restrictions 2nd         encryption

     network security, designing 2ndVPN (virtual private networks)     perimeter defense, role in 2nd

VPN (Virtual Private Networks)

     PPTP 2nd

         Cisco PIX VPDN configuration example 2nd 3rd 4th

         versus L2TP 2nd

     proprietary implementations     proxy firewalls     remote connectivity, determining type of 2nd    requirements of

         authentication

         confidentiality         data integrity 2nd

VPN (virtual private networks)    SSH         file transfers         port forwarding

         standard connections, client integration         standard connections, perimeter defenses         standard connections, server integration

         standard connections, uses of

         tunneling

         tunneling, client integration

         tunneling, performance         tunneling, perimeter defenses

         tunneling, server integration

         tunneling, uses of         vulnerabilities of 2nd

     SSL         OWA 2nd

         perimeter defenses         proxy servers

         proxy servers, perimeter defenses

         proxy servers, uses of

         standard connections

         standard connections, client integration 2nd

         standard connections, perimeter defenses 2nd

         standard connections, server integration 2nd

         standard connections, uses of 2nd

         tunneling 2nd 3rd

         uses of 2nd

VPN (Virtual Private Networks)

     tunneling 2nd

         as encryption 2nd 3rd

         packets

     wireless network security VPN concentrators

VPN passthrough VSX (Virtual System Extension) VTY (virtual terminal lines) 2nd 3rd

vulnerabilities

     false positives

     researching 2nd

     unknown vulnerabilities, defining 2nd

vulnerability     versus risk vulnerability discovery phase (network security assessments) 2nd 3rd     eEye Security Retina 2nd

     GFI LANguard Network Security Scanner 2nd 3rd 4th

     ISS Internet scanner 2nd 3rd 4th     Nessus 2nd 3rd 4th 5th

     technique risk levels     vulnerabilities, researching 2nd vulnerability scanners 2nd     eEye Security Retina 2nd

     GFI LANguard Network Security Scanner 2nd 3rd 4th     ISS Internet scanner 2nd 3rd 4th     Nessus 2nd 3rd 4th 5th

         NASL 2nd

         plug-ins 2nd

     tests, limiting

vulnerability scanning software     Nessus

Категории