[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] N2H2 URL filtering server configuring 2nd 3rd 4th 5th named access control lists downloadable 2nd nameif command PIX firewall configuration 2nd naming interfaces PIX firewalls NAT (network address translation) additional resources dynamic mappings 2nd exam prep questions 2nd 3rd 4th 5th 6th implementing with PAT 2nd IP address translation IP addresses internal-to-global mapping mapping tables overloading nat 0 command implementing with access control list (ACL) 2nd static command 2nd 3rd nat 0 command 2nd implementing with access control list (ACL) 2nd nat command dynamic mappings 2nd listings The nat and global Commands for a Single Host (4.6) The nat and global Commands for a Subnet (4.7) The nat and global Commands for Multiple Interfaces (4.9) PIX firewall configuration 2nd 3rd nesting object groups 2nd network activity test failovers network address translation, [See NAT] network layer (OSI model) IPSec 2nd Network Time Protocol, [See NTP] networks firewall configuration perimeter routers stacked standard three-pronged security policy NIC status test failovers no failover active command non-stateful failovers 2nd NTP (Network Time Protocol) authentication commands ntp authenticate ntp authentication-key ntp trusted-key clients configuring on PIX firewall 2nd 3rd commands ntp server 2nd show ntp show ntp associations show ntp status Example of Configuring Secure NTP (Listing 7.3) master clock servers NTP Server Configuration Example (Listing 7.2) operational status displaying 2nd 3rd 4th servers time synchronization functions ntp authenticate command ntp authentication-key command ntp server command 2nd ntp trusted-key command |