Index
N
NAT (Network Address Translation), 75, 89 NAT-Traversal, 75, 89 NCSA log file format, 266 net share command analyzing intrusions, 48–49, 49 viewing shared folders, 170, 171
network infrastructure security, 68–118, See also security threats 802.11x wireless networks 802.11a/11b/11g standards, 99 design scenario, 107 enabling on clients, 102–103, 102–103 Group Policy Security Settings, 101–102, 101 MAC address filtering, 100 for open access points, 105, 105 overview, 99, 106 PEAP protocol, 103–104, 103–104 security options, 99–100, 100 Service Set Identifier, 100 threats to, 99, 106 vulnerabilities, 105 Wireless Equivalent Privacy, 100, 100 case study, 114–115 case study answers, 118 case study questions, 116–117 demand-dial routing for internal networks authentication, 94–96 configuring connection type, 93–94, 93 configuring interface type, 91–92, 92 design scenario, 97 encryption, 95–96 using IP packet filters, 96 securing connections, 96 strengthening passwords, 94–95 in virtual private networks, 92, 93–95 encrypting data in demand-dial routing, 95–96 design scenarios, 72–73, 74, 91 enabling reversible encryption, 86–87, 86 using IP Security, 70, 71, 75–78, 76, 78, 89 using L2TP/IPSec protocols, 74, 75, 88–89 using PPTP protocol, 73–74, 73, 88 using Secure Sockets Layer, 70, 71–73, 71 using Server Message Block signing, 78–79 using Transport Layer Security, 70, 71, 72 in virtual private networks, 71, 88–91 exam essentials, 108 external communications, 97–98 infrastructure server baseline templates, 299 IP infrastructures common attacks on data, 68–69 design scenario, 72–73, 74, 82 encrypting data, 70–79, 71, 73, 76, 78 installing needed software only, 79 using IP address filtering, 79–80, 80 using IP packet filtering, 79, 80–82, 81 overview, 69–70 real world scenario, 81 overview, 68, 107 remote access infrastructures CHAP protocol, 83–84 choosing authentication protocols, 83–88, 86 choosing encryption methods, 88–91 design scenarios, 88, 91 EAP protocol, 85 enabling reversible encryption, 86–87, 86 Microsoft CHAP protocol, 84 Microsoft CHAPv2 protocol, 84–85 overview, 82 PAP protocol, 83 SPAP protocol, 83 virtual private networks in, 82, 88–91 review question answers, 112–113 review questions, 110–111 network resources. See access control New Hash Rule dialog box, 335, 336 New Preferred Setting Properties dialog box, 104, 104 NNTP (Network News Transfer Protocol), 255 No auto-restart for scheduled Automatic Updates installations setting, 348–349, 350 NTFS permissions, 169, 171–172, 374 NTLM (NT LAN Manager) protocols, 126, 127