34–35, 72, 159, 243–246,TRADITIONAL NAT, 106–107, 416254–255, 398T...

13, 34–35, 72, 159, 243–246,

Traditional NAT, 106–107, 416

254–255, 398

Traffic

configuration, 245–246, 343

filtering, 158, 433–435. See also Cisco

example, 266–267

Internetwork Operating System;

daemon, 246

Internet Protocol

method, 264

filters. See Internet Protocol;

protocol, 40

Internetwork Packet eXchange

integrity, 419

server, 39, 161, 184, 256

through, permitting, 150–153

Terminal Access Controller Access

Control System (TACACS), 243

Transform-set access lists, applying,

212

password/username, enabling, 373

transform-set (command), 212

username/password, 372

Translation. See Address

Terminal emulation, 17, 140

Terminal Server client, 165

process, 112

Transmission Control Protocol/Internet

test (method list), 246

Protocol (TCP/IP), 115, 322

TFN, 304

hosts. See Network

TFN2K, 304

implementations, 303, 432

TFTP. See Trivial File Transfer Protocol

network communication usage,

Tftp (command), 145

15–24, 409–410

TGS. See Ticket-granting server

protocols, 296

TGT. See Ticket-granting ticket

field, 74

Three-way handshake, 245

stack, 381

Thresholds, configuration, 87–88

security, 24–37, 410–412

Ticket-granting server (TGS), 36, 248

sequence number spoofing/session

Ticket-granting ticket (TGT), 36, 248,

hijacking, 302–303

251

Transmission Control Protocol (TCP),

Time To Live (TTL), 23

18–20, 115, 204. See also Single-

Timeout. See Default timeout; Seconds

channel TCP

command, 121, 185

connections, 19–21, 93, 425

field, 80

filtering options, 30

(keyword), 82

flag, 38

parameter, 72

header, 95, 105, 114

Timestamp, 183

Intercept, 335

TLS. See Transport Layer Security

configuration, 300–301

Token card, 394

packets, 21, 71, 85, 434

Token-card servers, 398

ports, 18, 21, 35, 102, 167. See also

U

Destination; Source

UBR900 series, 40

number, 78, 108, 353

UDP. See User Datagram Protocol

scans, 292

Udp-timeout (command), 121

protocol, 65

Unattended modems, 292

selection, 369

Unbinding. See Address

sequencing information, 135

Uniform Resource Locator (URL), 160.

servers, 432–433

See also

HyperText Transfer

setup handshake, 65

Protocol

SYN flooding, 300

filtering, 39, 136, 160, 168–170, 181

attacks, protection, 434

logging, 132, 136

Transparent address assignment,

Uninterruptible Power Supply (UPS), 11

102–103

Unix / UNIX

Transparent routing, 103–104

BSD, 420

Transport layer, 18–22

hosts, 42

protocol, 30

r commands, 85

security, 29–30

security breaches, 38

VPNs, 194–195

server, 144, 182

Transport Layer Security (TLS), 22,

system administration tools, 326

29–30, 195

Upper-layer information, 84

Transport mode, 203–205

UPS. See Uninterruptible Power Supply

Transport protocol, 243

Urgent (URG) flag, 19

considerations, 254

URL. See Uniform Resource Locator

Trinoo, 304

url, 169

Triple DES (3DES), 25, 41, 218

User activity, NAS reporting, 268

encryption, 40

User authentication, 43, 158, 336. See

usage. See Virtual Private Network

also

Cut-through user authentica-

Trivial File Transfer Protocol (TFTP), 21,

tion