314, 327
Open Systems Interconnection (OSI), 12
customization, 329
model, 134, 255
database, 315
reference model, 16, 190, 192, 194
maintenance, 317
OpenBSD, 230, 420
updating, 329
OpenPGP, digital signature, 199
Network Time Protocol (NTP), 115, 432
Operating software, weaknesses,
Network_mask, 165
293–294
NFS, 115
Operating systems. See Real-time oper-
NIC. See Network Interface Card
ating systems
NIST. See National Institute of
Operator, 164, 166
Standards and Technology
Optimizer, 363. See also Hits optimizer
Non-isolated network, 139
usage, 371–372
Non-volatile memory, 70
OSI. See Open Systems Interconnection
none (method), 258, 265
OSPF. See Open Shortest Path First
Norandomseq, 152, 165
OTP. See One-Time Password
Normal mode FTP, 81
Out Of Band (OOB), 300
notify (extension), 332
Outbound, 162
Novell Asynchronous Services Interface
Outbound ACL, 280, 281
(NASI), 35, 254
Outbound IP traffic, 49
encryption, 235
file, 293, 294
Outbound NAT, 106–107, 416
getting, 293–294
Outbound traffic, 86
Outgoing network sessions, 424
tokens. See One-time password
tokens
outside (command), 116
PASV commands, 115
Outside interface, 142, 182
PAT. See Port address translation
Outside network, 101–104, 108–114
Peer authentication, 419
Over GRE tunnel configuration. See
Peer IP address, 205
Internet Protocol Security
Peer model, 191–192
Overlay model, 192
Peer-to-peer applications, 128
Overload (command), 119
Peers, dynamic authentication, 206
P
Permit (command), 117–118, 163, 166
permit (field), 74
Packet assembly/disassembly (PAD),
permit (keyword), 53, 62, 80
350
permit (statement), 79
connections. See X.25 PAD connec-
Personal Identification Number (PIN), 13
tions
PFM. See PIX Firewall Manager
Packet encryption, 254
PGP. See Pretty Good Privacy
packetd, 323
Photous, 207
Packets, 85
Physical access, 435
filtering, 9, 48, 134
Physical controls, 12
sniffer, 245
Physical security, 193
testing, 56
PIN. See Personal Identification Number
PAD. See Packet assembly/disassembly
Ping (command), 145, 147–148
Pager notifications, 381
ping ipx (command), 223
Palm scan, 13
Ping of Death, 303
PAM. See Port to Application Mapping
Ping sweep, 292
PAP. See Password Authentication
PIX
Protocol
Parasitic attacks, 15
access control configuration, 163–164
Passive mode FTP, 81
Adaptive Security, 150
authentication configuration, 160–162
Password Authentication Protocol (PAP),
242–246
confidentiality configuration, 168
Passwords, 3, 71, 276. See also Default
configuration examples, 170–182
passwords; Local device user-
connection, 140–141
name/password; Remote
maintenance, 182–185, 418
logins/passwords; Telnet;
placement, 140
Terminal Access Controller Access
Private Link encryption, 38
Control System
securing, 182–185, 418
choice, 14
security hole, 165
enabling, 373. See also Secret pass-
Index 457PIX Firewall, 39, 43, 134, 143, 148,
Pool (command), 119, 120
Bạn đang xem 314, - Syngress Managing Cisco Network Security