85, 115, 143–145PROTOCOL, 30PROTOCOL, 69USER AUTHORIZATION, 336SER...

67, 85, 115, 143–145

protocol, 30

protocol, 69

User authorization, 336

server, 70, 250, 356

User Datagram Protocol (UDP), 18,

application, 143

21–22, 64, 80, 115, 204. See also

software, 58

Single-channel UDP

usage, 251

datagrams, 67

Trojan horse attacks, 294

header, 105

TTL. See Time To Live

packets, 85

Tunnel mode, 203–205

ports, 102, 310, 322, 334

Tunnel settings, 387

number, 59, 108, 154

Twice NAT, 111–112

scans, 292

Two-way traffic, 206

selection, 369

Index 465

Vulnerability profile, 312

sessions, 71, 413

Vxtreme, 116

usage, 35, 88, 254

User-level client, 30

W

User-level network access restrictions,

400

Web. See World Wide Web

User sessions, 424

Web of trust, 28

Username. See Local device user-

WebSENSE (NetPartners), 39, 136, 160,

name/password; Telnet; Terminal

170

Access Controller Access Control

running, 178, 181

System

web filtering software, 172

enabling. See Terminal Access

Controller Access Control System

Well Known Ports, 19

sessions. See Null username sessions

Wheelgroup. See NetRanger

username (command), 264

Wide Area Network (WAN). See Global

WAN

Users, maliciousness, 296

management, 361

solution. See Routed WAN manage-

V

ment solution

VDOLive, 85, 116

networks, 190

Verification commands. See Network

speeds, 321

Address Translation

technologies, 5

Virtual LAN (VLAN), 292

Wildcard mask, 53–56, 62–63. See also

Virtual Private Dial Network (VPDN),

Destination