Index
T
TCO (Total Cost of Ownership), and firewall solutions, 151-152
TCP (Transmission Control Protocol)connections, ISA firewall limits, 531-533
connectivity testing, 963
and SYN attacks, 884-885, 1031-1033TCP/IPnetwork security basics, 4
source routing attacks, 892
well-known ports, 1037-1038TCP/UDP protocols and SecureNAT configuration, 370
TCSEC (Trusted Computer System Evaluation Criteria), 1012TDR (Time Domain Reflectometer), 1016Teardrop, 155
teardrop attacks, 886, 1033technical vulnerabilities, 1012telecommuter firewalls, 54
Telnet, port use, 1037templatesISA firewall network, 310-329
network, using, 124
terminal servicesinstalling ISA firewalls via, 470
remotely managing ISA Servers via, 103-105
testingAccess Rules, 609-612
ISA firewall's connectivity, 511
ISA Server 2004 in prototype environment, 9
L2TP/IPSec VPN connections, 743
penetration, defined, 1011PPTP VPN server connections, 736-737
TFN (Tribe FloodNet), 1031threatsSee also security threats
cleaning services, 1013defined, 1012recognizing network, 1025-1042SSL tunneling danger, 871-873
‘three-way handshake,' 884-885, 1031-1032Time Domain Reflectometer (TDR), 680, 1016Time to Live (TTL), cached objects expiration, 907
tokens, security key, 34
Total Cost of Ownership (TCO)and configuring Protocol Definitions, 379
firewall solutions, 151-152
Total Quality Management (TQM), 1045TrackIT, 1019training, network users in secure procedures, 1021-1022Transmission Control Protocol. See 273
trihomed DMZ Template, 314-318, 600
Trojan horses, 1012, 1040troubleshootingAccess Rules, 627-629
alerts, 1002-1003
anonymous users, 1002
connecting ISA Servers to Management Console, 100-101
connectivity, 1003corporate internal network connections, 356
from Dashboard, 944
Firewall client name resolution, 390
ISA firewall installation, 539-541
name resolution problems (table), 376
publishing rules, 709-710
rule base, 167
SecureNAT client connections to FTP site, 453
SecureNAT Internet connections, 455
SMTP Server Publishing Rules, 709
Web Proxy, Firewall client connections, 454
TruSecure Corporation, 158
Trusted Information System (TIS), 38
Trusted Network Interpretation of the TCSEC (red book), 26, 1046Trusted Root Certification Authorities, 740
Trustworthy Computing Initiative, 16-17
TTL (Time to Live), cached objects expiration, 907
Tunnel Mode, IPSec, 47, 718, 774
tunnelingSSL, 871-873
and VPN gateways, 47
vs. bridging, SSL, 670
turn-key security appliances, 231