Index
[SYMBOL][A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
AAA (authentication, authorization, and accounting) AAA model accounting 2nd authentication 2nd authorization configuration of CiscoSecure ACS 2ndsecuirty servers RADIUS 2nd securing network with AAA server security servers 2nd Kerberos 2nd TACACS+ versus RADIUS aaa new-model command AAA servicesacceptable use policy security policy coverage ofaccess control based on a PC's IP addresses DAC model, attributes of restricing access to a website routers administrative access Access Control Entries (ACE)access lists dynamic PIX Firewall SNMP managers using community string access lists, router 2nd applied to an interface, configuring direction of the data flow assigning to router interface enhanced 2nd dynamic access lists time-based access listsextended reflexive access lists extended access lists extended numbered access list 2nd identification numbers and typesnamed commands numbered access list commands permissions, example of permitting IPSec traffic on VPNs standard numbered IP access lists, additional keywords access points (APs) 2nd beacon messages, SSID in placement and configuration of 2nd SAFE design recommendations wireless clients communicating without zone coverage area and access-enable commandaccess-enable command issued for user in a dynamic access list access-list filters on routers, vulnerability of accounting 2nd 3rd 4th important function records TACACS+accounts renaming critical accounts ACK (Acknowledgment field), TCP headers Acknowledgment number, TCP ACS (Access Control Server) configuration of 2nd download site, trial copies RADIUS authentication setup active responses to attacks, network IDS active scanning for wireless stations or access points adaptive protocols, checking Adaptive Security Algorithm (ASA)Address Resolution Protocol (ARP) spoofing address space of program code, making nonexecutableaddresses protocol, obtained by router for neighboring devices and platformsadministative personnel access to routersadministration VPN manager functions Advanced Services for Network Security (ASNS) AES (Advanced Encryption Standard) AES algorithm agents, SNMP defining relationship with manager AH (authentication header) protocol establishing use of in IPSec policy identified in IPSec transform sets identifying for IKE Phase 2 transport mode tunnel mode Airsnort program Aladdin eToken alarms and events (RMON), monitoring traffic with alarms, IDS analyzing for IDS tuning monitoring and tuningnetwork IDS notification and reporting features routers configured for network IDS alerts and audit trails, generated by CBACalgorithms asymmetric key algorithms 2nd Diffie-Hellman PGP RSA definition of hashing SSL and TLS symmetric key algorithms 2nd AES DES Triple DES (3DES) allow all model (security plan) allowed and disallowed behavior, defining analysis tools (network traffic analysis) Annualized Rate of Occurrence (ARO) anomaly-based IDSs anonymous access antireplay protection antivirus software 2ndapplication layer data-driven attacksapplication layer, OSI model Kerberos authentication service SNMP on application-layer protocols, CBAC inspection of 2nd example ofAPs
[See access points] ARO (Annualized Rate of Occurrence)ARP (Address Resolution Protocol) spoofing ASA (Adaptive Security Algorithm) PIX Firewall data flow ASNS (Advanced Services for Network Security) asymmetric key algorithms 2nd Diffie-Hellman PGP RSA asymmetric key encryption 2ndattacks broadcast, configuring router to prevent buffer overflow connection hijacking (TCP) connection-killing (TCP/IP)denial-of-service (DoS) stopping with stateful firewall denial-of-service attacks, using IP spoofing deriving WEP key stream with protocol analyzer email ICMP packets, using to export confidential information in cryptoanalysis[attacks:cryptoanalysis] IP fragment attacks network IDS responses to prevented by policy-based IDS rebuffed by network IDS (example) SYN-flooding, prevention by CBAC TCP SYN flood attacks auditing audit trails generated by CBAC case study 2ndeducation on
[See SANS Institute] monitoring traffic with RMON and SNMP network auditing in design process SAA (Service Assurance Agent), usingSNMP
[See SNMP[auditing:SNMP]]authenticated users potential threats posed by authentication 2nd 3rd 4th 5th [See also hash algorithms] 802.1X framework and EAP protocol alternatives to reusable passwords configuring for website access 2ndencapsulating security payload
[See ESP protocol] hardware keys, using HMAC, used with IPSec IPSec, identifying method for IKE Phase 1 Kerberos 2nd 3rd open, for wireless networks peer authentication methods on VPNs 2nd PKI users RADIUS ACS setup for attribute pairs (AV pairs) summary of shared key authentication, wireless networks TACACS+ 2nd TACAS+ token-based systems user authentication method, selecting for VPN WEP protocol wireless station, using WEP WLANs, stations and clientsauthentication header protocol
[See AH protocol] authentication policyauthentication, authorization, and accounting
[See AAA services] [See AAA] authority and scope, statement of (security policy) authorization 2nd 3rd TACACS+ autocommand automating signature updates for IDSs AV pairs, RADIUS authentication availability of data and resources