18, 20–22, 29, 64, 85, 410
Software weaknesses. See Application
attacks, 298
software; Operating software
server, 400
SOHO. See Small Office/Home Office
Solaris, 42, 320, 324–325, 420, 425
sessions, 93
spam, 298
Solarwinds, 291
Sound card, 381
traffic, 157
Source
Simple Network Management Protocol
(SNMP), 16, 21, 48, 67, 299,
address, 53–56, 61–63, 108, 112, 114.
431–432
See also Inside source address;
Internet Protocol
configuration, 373
base, 134
events, 351
queries, 425
IP address, 21, 48, 69, 74, 152
layer, 16
Read Community String, 372
Read/Write Community String, 372
port, 134
number, 64–65, 79
sweep, 292
Route Bridging, 50
trap levels, 183
router, 193
usage, 13
settings, 387
Simple Server Redundancy Protocol
(SSRP), 11
TCP port, 21
Single attached FDDI, 43
Spanning Tree, 11
Single-channel TCP, 85
SPARC, 320, 425
Single-channel UDP, 85
SPD. See Security Policy Database
SIP, 127
SPI. See Security Parameter Index
Site protection, 2–15
Spoofing, 198
Site scenario, 5–7
attacks, prevention. See Internet
SKEME exchanges, 206
Protocol spoofing
SQL queries, 321
SKIP, 207
SQL*Net, 81, 85, 413, 414
SLIP. See Serial Line Internet Protocol
Small Office/Home Office (SOHO), 132
Src_addr, 163, 166, 167
Smart cards, 13
Src_mask, 163, 166
SRVTAB, 249, 250
smid, 323
files, 251
SMTP. See Simple Mail Transfer
Protocol
SSH. See Secure Shell
smtp spam (extension), 332
SSL. See Secure Sockets Layer
SMURF IP spoofing attack, 301–302
SSRP. See Simple Server Redundancy
Sniffers, 292. See also Network; Packets
usage, 294
Stand-alone server, 156
Standard access lists, 412–413
Sniffing, 198
SNMP. See Simple Network
Start-ip (parameter), 118
Management Protocol
Stateful filtering, 135
Social engineering, 3
Stateful inspection, 38–39
Static address assignment, 102
server, 238
Static (command), 119–121
Syslog
Static IP address, 381
messages, 183
Static NAT, 107, 109–111, 415
servers, 183
implementation guidelines, 114
alarm, sending, 426
Static translation, 178, 181
System Accounting, 268
stop-record (accounting notice), 270
System Administration Networking and
Security (SANS), 8
Streamworks, 115
System journaling, 182–184
Strong encryption, 218
System logs, 15
export restrictions, 200–201
Structure Access Control Lists Security
T
Policy, 427
Structure access lists security policy,
T1 connection, 154
usage, 366
TACACS. See Terminal Access
Structured filter policy, troubleshooting,
Controller Access Control System
427
TACACS+. See Terminal Access
Subnets, 61
connections, 193
Plus
field, 54
Talk, 116
Switches, 42
TAPI, 381
Symmetric cryptography, 25–26
TCP. See Transmission Control Protocol
Symmetric encryption, 30
Tcp-timeout (command), 121
Symmetric key, 25
Teardrop attack, 303
algorithm, 26
Telnet, 18, 20, 29, 48, 64, 115, 246,
Synchronization (SYN)
276
bit, 65
ability, 172
flag, 19, 20
access, 75, 93
flooding. See Transmission Control
application, 369
capability, 76
floods, 336
lines, 255
attacks, 335
password, 372
packets, 300
ports, 91
Syncronization-Acknowledgment (SYN-
protocol, 255
ACK)
requests, 176
bits, 74
services, 282
negotiation, 67
session, 69, 74–76, 145, 184
SYSLOG
idleness, 185
alarm, 347
usage, 352
messages, 385
traffic, 137, 154
folder, 349
usage, 258, 276
notification, 343
Index 463Template
Token Ring, 38, 43
manager, 363
traffic, 334
usage, 369–370
Tokens. See One-time password tokens
use wizard, 363
examples, 13
Topology. See Network
Terminal Access Controller Access
Control System Plus (TACACS+),
Trace (command), 145
Bạn đang xem 18, - Syngress Managing Cisco Network Security