22, 29, 195, 208
Control Protocol
Internet Explorer
information, 127
version 4.0, 348, 399
range, 312, 387
version 5.0, 381
scheme, usage. See Local Area
Internet Key Exchange (IKE), 33, 129,
Network
206–207, 211
Internet Protocol (IP) spoofing, 433–434
CA, interaction, 208
attack, 303. See also SMURF IP spoof-
phases, 206
ing attack
protocol, 201
prevention, 75
SA, 139
Internet Protocol Security (IPSec), 27,
usage, 202, 203
31–33, 129, 136, 198–231,
419–421. See also Manual IPSec
Internet Mail Access Protocol (IMAP), 22
acceleration, 209
Internet Protocol (IP), 22–23. See also
Public IP
architecture, 201–210
access lists, 51–59, 78, 81, 87. See
CET, interaction, 210–211
alsoExtended IP access lists
client connection. See Cisco IPSec
configuration, 146–149
communications, 201
destination address, 203
configuration. See Cisco IPSec
FAQs, 45
cryptography mapping, 139
filters, 362
limitations, 209
Frag Guard, 132, 136
manual keying configuration, 212–218
fragmentation, 128
mode, defining, 212
attacks, 136
network security, 336
header, 33
over GRE tunnel configuration,
layer, 70
218–226
Multicast, 116
SA, 206
network security, 1
security management, 382–383
Index 451operation, inability, 308–309
tunnel groups, 387
system. See Network-based IDS sys-
Internet Security Association Key
tem
Management Protocol (ISAKMP),
Bạn đang xem 22, - Syngress Managing Cisco Network Security