29, 195, 208CONTROL PROTOCOLINTERNET EXPLORERINFORMATION, 127VERSI...

22, 29, 195, 208

Control Protocol

Internet Explorer

information, 127

version 4.0, 348, 399

range, 312, 387

version 5.0, 381

scheme, usage. See Local Area

Internet Key Exchange (IKE), 33, 129,

Network

206–207, 211

Internet Protocol (IP) spoofing, 433–434

CA, interaction, 208

attack, 303. See also SMURF IP spoof-

phases, 206

ing attack

protocol, 201

prevention, 75

SA, 139

Internet Protocol Security (IPSec), 27,

usage, 202, 203

31–33, 129, 136, 198–231,

419–421. See also Manual IPSec

Internet Mail Access Protocol (IMAP), 22

acceleration, 209

Internet Protocol (IP), 22–23. See also

Public IP

architecture, 201–210

access lists, 51–59, 78, 81, 87. See

CET, interaction, 210–211

also

Extended IP access lists

client connection. See Cisco IPSec

configuration, 146–149

communications, 201

destination address, 203

configuration. See Cisco IPSec

FAQs, 45

cryptography mapping, 139

filters, 362

limitations, 209

Frag Guard, 132, 136

manual keying configuration, 212–218

fragmentation, 128

mode, defining, 212

attacks, 136

network security, 336

header, 33

over GRE tunnel configuration,

layer, 70

218–226

Multicast, 116

SA, 206

network security, 1

security management, 382–383

Index 451

operation, inability, 308–309

tunnel groups, 387

system. See Network-based IDS sys-

Internet Security Association Key

tem

Management Protocol (ISAKMP),