101–102, 136, 336, 414–417.DMZ, NAT CONFIGURATION, 124–127SEE ALSO...

99, 101–102, 136, 336, 414–417.

DMZ, NAT configuration, 124–127

See also

Dynamic NAT; Outbound

documentation, 11

NAT; Static NAT; Traditional NAT;

equipment, 5

Twice NAT

IDS, 305–308

applications, interaction, 114

integrity, 9, 11–12

architectures, 106–112

intrusion detection, 305–311

configuration, 149–153, 210. See also

Cisco IOS; Network; Private net-

inventory, 11

work

mask, 166

commands, 116–121

monitoring, 4

considerations, 127–129, 416–417

performance, 209

defining, 382

perimeter/device security, 291–292

deployment, guidelines, 113–116

protection, 356. See also Internet

devices, 106–114

server. See Layer 2 Transport Protocol

interoperability, 210

network server

services, 91

overview, 100–101

disabling, 431–433

devices, interoperability, 421

disadvantages, 114

sessions. See Outgoing network ses-

sions

FAQs, 130

sniffers, 291

hops, 114

Index 455

Novell Directory Services (NDS), 398

overview, 100–106

nrConfigure, 327–329

pool, 175

nrdirmap, 323

router, 106

NSDB. See Network Security Database

statistics, 121

ntalk, 116

usage, 153, 358

NTFS file partition, 381

verification commands, 121–122

NTFS volume, 373

Network (authorization), 423

NTP. See Network Time Protocol

Network (authorization type), 264

Network-based IDS system, 323

Null authentication algorithm, 31

Null encryption algorithm, 31

Network-based intrusion detection, 424

Null username sessions, 271

Network-based products, 308

Network Interface Card (NIC), 133, 139,