20–22, 29, 64, 85, 410SOFTWARE WEAKNESSES. SEE APPLICATIONATTACKS,...

18, 20–22, 29, 64, 85, 410

Software weaknesses. See Application

attacks, 298

software; Operating software

server, 400

SOHO. See Small Office/Home Office

Solaris, 42, 320, 324–325, 420, 425

sessions, 93

spam, 298

Solarwinds, 291

Sound card, 381

traffic, 157

Source

Simple Network Management Protocol

(SNMP), 16, 21, 48, 67, 299,

address, 53–56, 61–63, 108, 112, 114.

431–432

See also

Inside source address;

Internet Protocol

configuration, 373

base, 134

events, 351

queries, 425

IP address, 21, 48, 69, 74, 152

layer, 16

Read Community String, 372

Read/Write Community String, 372

port, 134

number, 64–65, 79

sweep, 292

Route Bridging, 50

trap levels, 183

router, 193

usage, 13

settings, 387

Simple Server Redundancy Protocol

(SSRP), 11

TCP port, 21

Single attached FDDI, 43

Spanning Tree, 11

Single-channel TCP, 85

SPARC, 320, 425

Single-channel UDP, 85

SPD. See Security Policy Database

SIP, 127

SPI. See Security Parameter Index

Site protection, 2–15

Spoofing, 198

Site scenario, 5–7

attacks, prevention. See Internet

SKEME exchanges, 206

Protocol spoofing

SQL queries, 321

SKIP, 207

SQL*Net, 81, 85, 413, 414

SLIP. See Serial Line Internet Protocol

Small Office/Home Office (SOHO), 132

Src_addr, 163, 166, 167

Smart cards, 13

Src_mask, 163, 166

SRVTAB, 249, 250

smid, 323

files, 251

SMTP. See Simple Mail Transfer

Protocol

SSH. See Secure Shell

smtp spam (extension), 332

SSL. See Secure Sockets Layer

SMURF IP spoofing attack, 301–302

SSRP. See Simple Server Redundancy

Sniffers, 292. See also Network; Packets

usage, 294

Stand-alone server, 156

Standard access lists, 412–413

Sniffing, 198

SNMP. See Simple Network

Start-ip (parameter), 118

Management Protocol

Stateful filtering, 135

Social engineering, 3

Stateful inspection, 38–39

Static address assignment, 102

server, 238

Static (command), 119–121

Syslog

Static IP address, 381

messages, 183

Static NAT, 107, 109–111, 415

servers, 183

implementation guidelines, 114

alarm, sending, 426

Static translation, 178, 181

System Accounting, 268

stop-record (accounting notice), 270

System Administration Networking and

Security (SANS), 8

Streamworks, 115

System journaling, 182–184

Strong encryption, 218

System logs, 15

export restrictions, 200–201

Structure Access Control Lists Security

T

Policy, 427

Structure access lists security policy,

T1 connection, 154

usage, 366

TACACS. See Terminal Access

Structured filter policy, troubleshooting,

Controller Access Control System

427

TACACS+. See Terminal Access

Subnets, 61

connections, 193

Plus

field, 54

Talk, 116

Switches, 42

TAPI, 381

Symmetric cryptography, 25–26

TCP. See Transmission Control Protocol

Symmetric encryption, 30

Tcp-timeout (command), 121

Symmetric key, 25

Teardrop attack, 303

algorithm, 26

Telnet, 18, 20, 29, 48, 64, 115, 246,

Synchronization (SYN)

276

bit, 65

ability, 172

flag, 19, 20

access, 75, 93

flooding. See Transmission Control

application, 369

capability, 76

floods, 336

lines, 255

attacks, 335

password, 372

packets, 300

ports, 91

Syncronization-Acknowledgment (SYN-

protocol, 255

ACK)

requests, 176

bits, 74

services, 282

negotiation, 67

session, 69, 74–76, 145, 184

SYSLOG

idleness, 185

alarm, 347

usage, 352

messages, 385

traffic, 137, 154

folder, 349

usage, 258, 276

notification, 343

Index 463

Template

Token Ring, 38, 43

manager, 363

traffic, 334

usage, 369–370

Tokens. See One-time password tokens

use wizard, 363

examples, 13

Topology. See Network

Terminal Access Controller Access

Control System Plus (TACACS+),

Trace (command), 145