67, 85, 115, 143–145
protocol, 30
protocol, 69
User authorization, 336
server, 70, 250, 356
User Datagram Protocol (UDP), 18,
application, 143
21–22, 64, 80, 115, 204. See also
software, 58
Single-channel UDP
usage, 251
datagrams, 67
Trojan horse attacks, 294
header, 105
TTL. See Time To Live
packets, 85
Tunnel mode, 203–205
ports, 102, 310, 322, 334
Tunnel settings, 387
number, 59, 108, 154
Twice NAT, 111–112
scans, 292
Two-way traffic, 206
selection, 369
Index 465Vulnerability profile, 312
sessions, 71, 413
Vxtreme, 116
usage, 35, 88, 254
User-level client, 30
W
User-level network access restrictions,
400
Web. See World Wide Web
User sessions, 424
Web of trust, 28
Username. See Local device user-
WebSENSE (NetPartners), 39, 136, 160,
name/password; Telnet; Terminal
170
Access Controller Access Control
running, 178, 181
System
web filtering software, 172
enabling. See Terminal Access
Controller Access Control System
Well Known Ports, 19
sessions. See Null username sessions
Wheelgroup. See NetRanger
username (command), 264
Wide Area Network (WAN). See Global
WAN
Users, maliciousness, 296
management, 361
solution. See Routed WAN manage-
V
ment solution
VDOLive, 85, 116
networks, 190
Verification commands. See Network
speeds, 321
Address Translation
technologies, 5
Virtual LAN (VLAN), 292
Wildcard mask, 53–56, 62–63. See also
Virtual Private Dial Network (VPDN),
Destination
Bạn đang xem 67, - Syngress Managing Cisco Network Security