TCO (Total Cost of Ownership), and firewall solutions, 151-152
TCP (Transmission Control Protocol)
connections, ISA firewall limits, 531-533
connectivity testing, 963
and SYN attacks, 884-885, 1031-1033
TCP/IP
network security basics, 4
source routing attacks, 892
well-known ports, 1037-1038
TCP/UDP protocols and SecureNAT configuration, 370
TCSEC (Trusted Computer System Evaluation Criteria), 1012
TDR (Time Domain Reflectometer), 1016
Teardrop, 155
teardrop attacks, 886, 1033
technical vulnerabilities, 1012
telecommuter firewalls, 54
Telnet, port use, 1037
templates
ISA firewall network, 310-329
network, using, 124
terminal services
installing ISA firewalls via, 470
remotely managing ISA Servers via, 103-105
testing
Access Rules, 609-612
ISA firewall's connectivity, 511
ISA Server 2004 in prototype environment, 9
L2TP/IPSec VPN connections, 743
penetration, defined, 1011
PPTP VPN server connections, 736-737
TFN (Tribe FloodNet), 1031
threats
See also security threats
cleaning services, 1013
defined, 1012
recognizing network, 1025-1042
SSL tunneling danger, 871-873
‘three-way handshake,' 884-885, 1031-1032
Time Domain Reflectometer (TDR), 680, 1016
Time to Live (TTL), cached objects expiration, 907
tokens, security key, 34
Total Cost of Ownership (TCO)
and configuring Protocol Definitions, 379
firewall solutions, 151-152
Total Quality Management (TQM), 1045
TrackIT, 1019
training, network users in secure procedures, 1021-1022
Transmission Control Protocol. See 273
trihomed DMZ Template, 314-318, 600
Trojan horses, 1012, 1040
troubleshooting
Access Rules, 627-629
alerts, 1002-1003
anonymous users, 1002
connecting ISA Servers to Management Console, 100-101
connectivity, 1003
corporate internal network connections, 356
from Dashboard, 944
Firewall client name resolution, 390
ISA firewall installation, 539-541
name resolution problems (table), 376
publishing rules, 709-710
rule base, 167
SecureNAT client connections to FTP site, 453
SecureNAT Internet connections, 455
SMTP Server Publishing Rules, 709
Web Proxy, Firewall client connections, 454
TruSecure Corporation, 158
Trusted Information System (TIS), 38
Trusted Network Interpretation of the TCSEC (red book), 26, 1046
Trusted Root Certification Authorities, 740
Trustworthy Computing Initiative, 16-17
TTL (Time to Live), cached objects expiration, 907
Tunnel Mode, IPSec, 47, 718, 774
tunneling
SSL, 871-873
and VPN gateways, 47
vs. bridging, SSL, 670
turn-key security appliances, 231