271PRIVATE SERVERS, 5, 9AUTHENTICATION, AAA USAGE, 261–262PRIVATE...

255, 271

Private servers, 5, 9

authentication, AAA usage, 261–262

Privatel (Open Systems), 155

connection, 264, 419, 423

Privileged EXEC mode, 263–266

encapsulation, 262

Privileged mode, 146

links, 245

Process switching, 114

protocol, 397

Process-to-process security, 29

usage, 261

Profile-based methods, 328

Point-to-point solution, 12

Programs, cracking, 293–294

Point-to-point tunneling, 193

Protocol, 62. See also Auth_protocol;

Point-to-Point Tunneling Protocol

Connection; Layered protocols

(PPTP), 194

field, 62

radiuslogin (group), 260

identifier. See Security

RAS. See Remote access server

RDBMS, 321

support, 254

Real-time operating systems, 38

protocol (field), 74

RealAudio, 85, 154

Protocol (variable), 163, 166, 183

clients, 105

protocolport (command), 161, 162

Redundancy, 10

Proxies, 38

reflect (keyword), 79, 80, 82

Proxy server, 134–135

Reflexive access lists, 77–84, 413–414

PSH. See Push

PSIRT. See Cisco Product Security

applying, 82

Incident Response Team

construction, 79–83

PSTN. See Public Switched Telephone

example, 82–83

Network

Registered port numbers, 19

Public IP, 133

REJECT (response), 241, 244

Public key algorithms, 30

Reload (command), 145

Public-key-based authentication, 206

remote-access (method list), 262

Public key certificates, 27

Remote access server (RAS), 190, 234

Public key cryptography. See Rivest

configuration, AAA usage, 271–276

Shamir Adleman

connection, 165

Public key cryptography standards

traffic, 194

(PKCS), 208

Remote Authentication Dial-In User

Public key encryption, 207

Service (RADIUS), 13, 34, 35, 72,

Public Key Infrastructure Working