255, 271
Private servers, 5, 9
authentication, AAA usage, 261–262
Privatel (Open Systems), 155
connection, 264, 419, 423
Privileged EXEC mode, 263–266
encapsulation, 262
Privileged mode, 146
links, 245
Process switching, 114
protocol, 397
Process-to-process security, 29
usage, 261
Profile-based methods, 328
Point-to-point solution, 12
Programs, cracking, 293–294
Point-to-point tunneling, 193
Protocol, 62. See also Auth_protocol;
Point-to-Point Tunneling Protocol
Connection; Layered protocols
(PPTP), 194
field, 62
radiuslogin (group), 260
identifier. See Security
RAS. See Remote access server
RDBMS, 321
support, 254
Real-time operating systems, 38
protocol (field), 74
RealAudio, 85, 154
Protocol (variable), 163, 166, 183
clients, 105
protocolport (command), 161, 162
Redundancy, 10
Proxies, 38
reflect (keyword), 79, 80, 82
Proxy server, 134–135
Reflexive access lists, 77–84, 413–414
PSH. See Push
PSIRT. See Cisco Product Security
applying, 82
Incident Response Team
construction, 79–83
PSTN. See Public Switched Telephone
example, 82–83
Network
Registered port numbers, 19
Public IP, 133
REJECT (response), 241, 244
Public key algorithms, 30
Reload (command), 145
Public-key-based authentication, 206
remote-access (method list), 262
Public key certificates, 27
Remote access server (RAS), 190, 234
Public key cryptography. See Rivest
configuration, AAA usage, 271–276
Shamir Adleman
connection, 165
Public key cryptography standards
traffic, 194
(PKCS), 208
Remote Authentication Dial-In User
Public key encryption, 207
Service (RADIUS), 13, 34, 35, 72,
Public Key Infrastructure Working
Bạn đang xem 255, - Syngress Managing Cisco Network Security