|
Tables
connections (CONN), 245
translations (XLATE), 245, 279
Tables and chains (Linux), 138
TACACS (Terminal Access Control Access Control Server) servers, 511
Takedown book, 250
Targets, built-in, 139
TCP. see Transmission Control Protocol (TCP)
TCP Intercept, 350
TCP/IP driver port range, 852, 868
TCP/IPv4 flaws, 94
TCPDump, 1185–1186, 1198–1199
tcpdump software, 405
TDR (time domain reflectometer), 30
Teardrop attacks, 25
Technical support options, 407–408
Telnet access, disabling, 669
Telnet for testing, 177
Terminal Access Control Access Control Server (TACACS) servers, 511
terminal command (PIX firewalls), 266
Terminal Services, installing in ISA Server, 935–938
Terminals, multiple, 178
Testing
clusters with Nokia, 778–784
ClusterXL, 743–748, 759–764
GUI client access, 638–641
IKE in a VPN, 590–591
Solaris and Linux firewalls, 172–173
TFTP (Trivial File Transfer Protocol)
description, 261
servers, 347
.TGZ files, 683
Third-party cluster solutions, 722, 799
Threats
external, 5, 50–51
physical access control, 10–11
virtual intruders, 11–12
Thresholds, performance, 944
Throughput
improving, 800–802
versus connections, 799–800
versus speed, 942
Time, date, and time zone settings in IPSO, 660–661
Time domain reflectometer (TDR), 30
Time objects, 513–514
Time settings, importance of, 722
Timeouts
global session, 505
negative cache entries, ISA, 834
SIP session, 332
translations table (XLATE), 279
tmp directory, 622
Token Ring, 371, 379
Tolerance for failed logins, 520
top tool, 174
Topology Map panel, 493
ToS (type of service), 156–159
Traffic, capturing. see Capturing traffic
Traffic management in IPSO, 677–678
Translation, address. see Network Address Translation (NAT); Port Address Translation (PAT)
Translation, checking, 389–392
Translation rules, explicit, 721
Translations table (XLATE), 245, 279, 311
Transmission Control Protocol (TCP)
Adaptive Security Algorithm (ASA), 248–250
header fields, 248
service object, 505
Trial period, 743
Trivial File Transfer Protocol (TFTP)
description, 261
servers, 347
Trojan horse programs, 18–19, 121–122
Troubleshooting
access, 392–396
addressing, 382–383
capturing traffic, 404–408
connectivity, 175, 381–382
failover cable, 388–389
IPsec, 396–404
OSI model, using, 56, 369
PIX cabling, 378–381
PIX hardware, 370–378
routing, 384–389
translation, 389–392
Troubleshooting ISA Server
access problems, 1012–1014
analysis, 996
arrays, inability to join, 1008
assessment, 996
authentication problems, 1009–1012
caching problems, 1019–1020
client connection problems, 1017–1019
client performance problems, 1015–1016
configuration problems, 1006–1009
DHCP Server lease, can't renew, 1007
documentation, 997
Event Viewer logs, 997–998
guidelines, 994
hardware and software incompatibility, 1005–1006
Help files, 999–1002
information gathering, 995–996
Internet mailing lists and newsgroups, 1004–1005
LAT entry, inability to save, 1008
Microsoft documentation and technical support, 1002–1003
Microsoft Exchange servers, 1006
Network Monitor, 998–999
Outlook Web Access (OWA), 1149–1150
publishing problems, 1020–1022
SecureNAT (S-NAT) connections, 1015–1018
Server Control (ISACTRL) won't start, 1008–1009
services failing to start, 1007–1008
solution implementation, 996
third-party Web sites, 1003
Trust state, 731–732
Trust values, relative, 246
Trusted Computer System Evaluation Criteria (Orange Book), 41
Tunneling
encryption in Check Point firewalls, 580–581
protocols, 252
terminator, 252
TurboACLs, 296–297
Turbolinux, 1210
"227" messages, 317–318
Type of service (ToS), 156–159
Types of firewalls
categories, 55–57
hardware-based, 67–69
software, 69–70
vendors list, 66–67
|