Index
[SYMBOL][A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
labor or manpower requirements, network design and LAN-to-LAN tunnel type Land.C attacks LANs (limited-area networks) [See also WLANs] connectivity between, using wireless networks peer-to-peer, limitations of WLANs LANs (local-area networks) latency, testing in network traffic simulation Layer 2 or Layer 3, OSI model, NetScreen firewalls operating at Layer 3, OSI model Layer 4, OSI model (TCP layer) Layer 7, OSI model layered approach to security defense in depth external physical security internal physical securitylayers of security external physical security internal physical security least trusted levels of logging warning levels, information sent to SYSLOG server life cycle (network), stages of 2nd Light Extensible Authentication Protocol (LEAP) link layer, extensible authentication (802.1X) Linksys, Inc local Internet security zone (Internet Explorer) local-area networks (LANs) lock-and-key access lists lock-and-key feature 2nd logging 2nd case study 2nd default log file directory, changing for security enabling for web servers IIS, supported log file formats IP session, by network IDSs levels of SYSLOG logins, encrypted Kerberos SSH (Secure Shell) LZS compression algorithm