13, 34–35, 72, 159, 243–246,
Traditional NAT, 106–107, 416
254–255, 398
Traffic
configuration, 245–246, 343
filtering, 158, 433–435. See also Cisco
example, 266–267
Internetwork Operating System;
daemon, 246
Internet Protocol
method, 264
filters. See Internet Protocol;
protocol, 40
Internetwork Packet eXchange
integrity, 419
server, 39, 161, 184, 256
through, permitting, 150–153
Terminal Access Controller Access
Control System (TACACS), 243
Transform-set access lists, applying,
212
password/username, enabling, 373
transform-set (command), 212
username/password, 372
Translation. See Address
Terminal emulation, 17, 140
Terminal Server client, 165
process, 112
Transmission Control Protocol/Internet
test (method list), 246
Protocol (TCP/IP), 115, 322
TFN, 304
hosts. See Network
TFN2K, 304
implementations, 303, 432
TFTP. See Trivial File Transfer Protocol
network communication usage,
Tftp (command), 145
15–24, 409–410
TGS. See Ticket-granting server
protocols, 296
TGT. See Ticket-granting ticket
field, 74
Three-way handshake, 245
stack, 381
Thresholds, configuration, 87–88
security, 24–37, 410–412
Ticket-granting server (TGS), 36, 248
sequence number spoofing/session
Ticket-granting ticket (TGT), 36, 248,
hijacking, 302–303
251
Transmission Control Protocol (TCP),
Time To Live (TTL), 23
18–20, 115, 204. See also Single-
Timeout. See Default timeout; Seconds
channel TCP
command, 121, 185
connections, 19–21, 93, 425
field, 80
filtering options, 30
(keyword), 82
flag, 38
parameter, 72
header, 95, 105, 114
Timestamp, 183
Intercept, 335
TLS. See Transport Layer Security
configuration, 300–301
Token card, 394
packets, 21, 71, 85, 434
Token-card servers, 398
ports, 18, 21, 35, 102, 167. See also
U
Destination; Source
UBR900 series, 40
number, 78, 108, 353
UDP. See User Datagram Protocol
scans, 292
Udp-timeout (command), 121
protocol, 65
Unattended modems, 292
selection, 369
Unbinding. See Address
sequencing information, 135
Uniform Resource Locator (URL), 160.
servers, 432–433
See also HyperText Transfer
setup handshake, 65
Protocol
SYN flooding, 300
filtering, 39, 136, 160, 168–170, 181
attacks, protection, 434
logging, 132, 136
Transparent address assignment,
Uninterruptible Power Supply (UPS), 11
102–103
Unix / UNIX
Transparent routing, 103–104
BSD, 420
Transport layer, 18–22
hosts, 42
protocol, 30
r commands, 85
security, 29–30
security breaches, 38
VPNs, 194–195
server, 144, 182
Transport Layer Security (TLS), 22,
system administration tools, 326
29–30, 195
Upper-layer information, 84
Transport mode, 203–205
UPS. See Uninterruptible Power Supply
Transport protocol, 243
Urgent (URG) flag, 19
considerations, 254
URL. See Uniform Resource Locator
Trinoo, 304
url, 169
Triple DES (3DES), 25, 41, 218
User activity, NAS reporting, 268
encryption, 40
User authentication, 43, 158, 336. See
usage. See Virtual Private Network
alsoCut-through user authentica-
Trivial File Transfer Protocol (TFTP), 21,
tion
Bạn đang xem 13, - Syngress Managing Cisco Network Security