Index_T


T

Tables

connections (CONN), 245

translations (XLATE), 245, 279

Tables and chains (Linux), 138

TACACS (Terminal Access Control Access Control Server) servers, 511

Takedown book, 250

Targets, built-in, 139

TCP. see Transmission Control Protocol (TCP)

TCP Intercept, 350

TCP/IP driver port range, 852, 868

TCP/IPv4 flaws, 94

TCPDump, 1185–1186, 1198–1199

tcpdump software, 405

TDR (time domain reflectometer), 30

Teardrop attacks, 25

Technical support options, 407–408

Telnet access, disabling, 669

Telnet for testing, 177

Terminal Access Control Access Control Server (TACACS) servers, 511

terminal command (PIX firewalls), 266

Terminal Services, installing in ISA Server, 935–938

Terminals, multiple, 178

Testing

clusters with Nokia, 778–784

ClusterXL, 743–748, 759–764

GUI client access, 638–641

IKE in a VPN, 590–591

Solaris and Linux firewalls, 172–173

TFTP (Trivial File Transfer Protocol)

description, 261

servers, 347

.TGZ files, 683

Third-party cluster solutions, 722, 799

Threats

external, 5, 50–51

physical access control, 10–11

virtual intruders, 11–12

Thresholds, performance, 944

Throughput

improving, 800–802

versus connections, 799–800

versus speed, 942

Time, date, and time zone settings in IPSO, 660–661

Time domain reflectometer (TDR), 30

Time objects, 513–514

Time settings, importance of, 722

Timeouts

global session, 505

negative cache entries, ISA, 834

SIP session, 332

translations table (XLATE), 279

tmp directory, 622

Token Ring, 371, 379

Tolerance for failed logins, 520

top tool, 174

Topology Map panel, 493

ToS (type of service), 156–159

Traffic, capturing. see Capturing traffic

Traffic management in IPSO, 677–678

Translation, address. see Network Address Translation (NAT); Port Address Translation (PAT)

Translation, checking, 389–392

Translation rules, explicit, 721

Translations table (XLATE), 245, 279, 311

Transmission Control Protocol (TCP)

Adaptive Security Algorithm (ASA), 248–250

header fields, 248

service object, 505

Trial period, 743

Trivial File Transfer Protocol (TFTP)

description, 261

servers, 347

Trojan horse programs, 18–19, 121–122

Troubleshooting

access, 392–396

addressing, 382–383

capturing traffic, 404–408

connectivity, 175, 381–382

failover cable, 388–389

IPsec, 396–404

OSI model, using, 56, 369

PIX cabling, 378–381

PIX hardware, 370–378

routing, 384–389

translation, 389–392

Troubleshooting ISA Server

access problems, 1012–1014

analysis, 996

arrays, inability to join, 1008

assessment, 996

authentication problems, 1009–1012

caching problems, 1019–1020

client connection problems, 1017–1019

client performance problems, 1015–1016

configuration problems, 1006–1009

DHCP Server lease, can't renew, 1007

documentation, 997

Event Viewer logs, 997–998

guidelines, 994

hardware and software incompatibility, 1005–1006

Help files, 999–1002

information gathering, 995–996

Internet mailing lists and newsgroups, 1004–1005

LAT entry, inability to save, 1008

Microsoft documentation and technical support, 1002–1003

Microsoft Exchange servers, 1006

Network Monitor, 998–999

Outlook Web Access (OWA), 1149–1150

publishing problems, 1020–1022

SecureNAT (S-NAT) connections, 1015–1018

Server Control (ISACTRL) won't start, 1008–1009

services failing to start, 1007–1008

solution implementation, 996

third-party Web sites, 1003

Trust state, 731–732

Trust values, relative, 246

Trusted Computer System Evaluation Criteria (Orange Book), 41

Tunneling

encryption in Check Point firewalls, 580–581

protocols, 252

terminator, 252

TurboACLs, 296–297

Turbolinux, 1210

"227" messages, 317–318

Type of service (ToS), 156–159

Types of firewalls

categories, 55–57

hardware-based, 67–69

software, 69–70

vendors list, 66–67




The Best Damn Firewall Book Period
The Best Damn Firewall Book Period
ISBN: 1931836906
EAN: 2147483647
Year: 2003
Pages: 240

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net