154, 159, 320, 335. SEE ALSOACCOUNTINGINBOUND ACL; OUTBOUND ACLCON...

38, 154, 159, 320, 335. See also

Accounting

Inbound ACL; Outbound ACL

configuration, 269–271

consistency, ensuring, 367

records, generation suppression, 271

definition

software, 15

changes, tracking, 427

Acctg_service, 161

consistency, 427

ACE. See Access control entry

deployment time, 427

Acknowledgment (ACK)

deployment time, increasing, 367

bit, 66, 95, 300

Manager, 373. See also CiscoWorks

2000 ACL Manager

flag, 19, 20, 65, 410, 413

security policy. See Structure Access

process, 18

Control Lists Security Policy

ACL. See Access Control List

usage. See Structure access lists

acl_consult, 167

security policy

Acl_name, 163, 164, 166

usage, 110, 134, 362, 363

ACLS, 281

Access Control Server (ACS), 41, 401.

ACS. See Access Control Server

See also

Cisco Secure Access

ActiveX

Control Server

439

blocking, 136

software, weaknesses, 293–294

Application layer, 17–18

controls, 170

filtering, 160, 168–170

security, 28

Address. See Internet Protocol

VPNs, 194–195

assignment. See Dynamic address

Application-layer protocol, 88

assignment; Static address assign-

Application Level Gateway (ALG), 101,

ment; Transparent address

105–106, 114

assignment

usage, 115–116, 127

binding, 103

ARA. See AppleTalk Remote Access

lookup/translation, 103

ARAP, 271

mapping, retention. See Applications

connection, 264

realm, 101

Archie, 115

registry, 104

ARP, 23–24. See Address Resolution

unbinding, 103

Protocol

address (command), 144, 145

AS. See Authentication server

Address Resolution Protocol (ARP),

AS3500, 398

22–24

AS5800, 398

requests, 24

ASCII

Addressing scheme, usage, 114

character, 68

Administrative controls, 12

login, 244

admins (method), 266, 267

text, 58, 235

Advanced Encryption Standard (AES),

Asymmetric cryptography, 26