99, 101–102, 136, 336, 414–417.
DMZ, NAT configuration, 124–127
See also Dynamic NAT; Outbound
documentation, 11
NAT; Static NAT; Traditional NAT;
equipment, 5
Twice NAT
IDS, 305–308
applications, interaction, 114
integrity, 9, 11–12
architectures, 106–112
intrusion detection, 305–311
configuration, 149–153, 210. See also
Cisco IOS; Network; Private net-
inventory, 11
work
mask, 166
commands, 116–121
monitoring, 4
considerations, 127–129, 416–417
performance, 209
defining, 382
perimeter/device security, 291–292
deployment, guidelines, 113–116
protection, 356. See also Internet
devices, 106–114
server. See Layer 2 Transport Protocol
interoperability, 210
network server
services, 91
overview, 100–101
disabling, 431–433
devices, interoperability, 421
disadvantages, 114
sessions. See Outgoing network ses-
sions
FAQs, 130
sniffers, 291
hops, 114
Index 455Novell Directory Services (NDS), 398
overview, 100–106
nrConfigure, 327–329
pool, 175
nrdirmap, 323
router, 106
NSDB. See Network Security Database
statistics, 121
ntalk, 116
usage, 153, 358
NTFS file partition, 381
verification commands, 121–122
NTFS volume, 373
Network (authorization), 423
NTP. See Network Time Protocol
Network (authorization type), 264
Network-based IDS system, 323
Null authentication algorithm, 31
Null encryption algorithm, 31
Network-based intrusion detection, 424
Null username sessions, 271
Network-based products, 308
Network Interface Card (NIC), 133, 139,
Bạn đang xem 99, - Syngress Managing Cisco Network Security