38, 154, 159, 320, 335. See also
Accounting
Inbound ACL; Outbound ACL
configuration, 269–271
consistency, ensuring, 367
records, generation suppression, 271
definition
software, 15
changes, tracking, 427
Acctg_service, 161
consistency, 427
ACE. See Access control entry
deployment time, 427
Acknowledgment (ACK)
deployment time, increasing, 367
bit, 66, 95, 300
Manager, 373. See also CiscoWorks
2000 ACL Manager
flag, 19, 20, 65, 410, 413
security policy. See Structure Access
process, 18
Control Lists Security Policy
ACL. See Access Control List
usage. See Structure access lists
acl_consult, 167
security policy
Acl_name, 163, 164, 166
usage, 110, 134, 362, 363
ACLS, 281
Access Control Server (ACS), 41, 401.
ACS. See Access Control Server
See also Cisco Secure Access
ActiveX
Control Server
439blocking, 136
software, weaknesses, 293–294
Application layer, 17–18
controls, 170
filtering, 160, 168–170
security, 28
Address. See Internet Protocol
VPNs, 194–195
assignment. See Dynamic address
Application-layer protocol, 88
assignment; Static address assign-
Application Level Gateway (ALG), 101,
ment; Transparent address
105–106, 114
assignment
usage, 115–116, 127
binding, 103
ARA. See AppleTalk Remote Access
lookup/translation, 103
ARAP, 271
mapping, retention. See Applications
connection, 264
realm, 101
Archie, 115
registry, 104
ARP, 23–24. See Address Resolution
unbinding, 103
Protocol
address (command), 144, 145
AS. See Authentication server
Address Resolution Protocol (ARP),
AS3500, 398
22–24
AS5800, 398
requests, 24
ASCII
Addressing scheme, usage, 114
character, 68
Administrative controls, 12
login, 244
admins (method), 266, 267
text, 58, 235
Advanced Encryption Standard (AES),
Asymmetric cryptography, 26
Bạn đang xem 38, - Syngress Managing Cisco Network Security