[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] packet filters access control lists (ACLs) firewalls OSI layers 2nd spoofing packets encapuslation (VPNs) 2nd packets (IP) attacks preventing (Frag Guard) 2nd passive mode (FTP) 2nd passive routing firewalls 2nd 3rd password command (CLI) passwords PIX firewalls recovering 2nd PAT (port address translation) additional resources dynamic mappings 2nd exam prep questions 2nd 3rd 4th 5th 6th implementing with NAT 2nd IP address translation IP addresses address table 2nd PDM (PIX Device Manager) additional resources commands limitations of 2nd connections establishing 2nd 3rd Login dialog box Security Alert dialog box Security Warning dialog box exam prep questions 2nd 3rd 4th 5th 6th function of installation 3DES activation DES activation IP address configuration PDM image uploads 2nd saving PDM image to TFTP servers loading (Startup Wizard) 2nd 3rd PIX firewalls configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th system requirements devices 2nd 3rd supported clients unsupported commands 2nd peers security associations (SA) creating between (IPSec) 2nd 3rd 4th 5th 6th people hacking perimeter routers network firewall configuration ping command (CLI) ping test failovers PIX Device Manager, [See PDM] PIX firewall access methods console port HTTP 2nd 3rd 4th Secure Shell (SSH) 2nd 3rd 4th 5th 6th 7th Telnet 2nd activation keys 2nd 3rd 4th adaptive security algorithm (ASA) connection tables security levels 2nd translation tables basic connections border routers commands global 2nd 3rd interface 2nd 3rd IP address nameif 2nd nat 2nd 3rd route 2nd configuration saving (CLI) 2nd viewing (CLI) 2nd 3rd 4th 5th 6th 7th configurations additional resources exam prep questions 2nd 3rd 4th 5th 6th configuring via commands (Listing 4.10) 2nd console port configuring cut-through proxy default factory configurations 2nd 3rd 4th 5th DMZ (demilitarized zone) areas 2nd bastion hosts downloadable access control lists 2nd 3rd 4th dynamic address translation (NAT) 2nd dynamic address translation (PAT) 2nd embedded operating system exam prep questions 2nd 3rd 4th 5th expansion cards 2nd failovers 2nd cable-based configurations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th causes 2nd configuring 2nd 3rd 4th 5th 6th 7th detection 2nd failed states hardware requirements 2nd interface tests 2nd 3rd 4th 5th LAN-based configurations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th licenses 2nd non-stateful 2nd replication 2nd 3rd 4th software requirements 2nd 3rd 4th stateful 2nd 3rd 4th states, forcing hot standby feature ICMP ping traffic allow incoming IDS global audit policies IDS specific audit policies inbound traffic setting up 2nd 3rd information logging 2nd 3rd 4th 5th 6th 7th 8th 9th 10th interfaces naming models capabilities table 2nd Cisco PIX 501 Firewall 2nd Cisco PIX 506E Firewall Cisco PIX 515E Firewall Cisco PIX 525 Firewall Cisco PIX 535 Firewall 2nd outbound traffic setting up 2nd 3rd 4th 5th 6th 7th 8th 9th password recovery file 2nd perimeter routers SNMP configuring 2nd SNMP version support software licensing 2nd 3rd static address translation (NAT) 2nd 3rd TFTP servers images overview 2nd images, copying 2nd 3rd images, upgrades images, upgrades (monitor mode) 2nd 3rd trusted areas 2nd untrusted areas 2nd URL filtering virtual private networks (VPNs) PIX firewalls additional resources 2nd areas trusted untrusted 2nd configuring (PDM) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th exam prep questions 2nd 3rd 4th 5th 6th ICMP message numbers 2nd ICMP ping traffic allow incoming ICMP traffic response options 2nd IDS engines inside interface (trusted) outside interface (untrusted) 2nd TCP implementation 2nd SYN attack vulnerability UDP implementation PIX MC (Cisco Management Center for Firewall) access rules 2nd additional resources 2nd configuration tabs 2nd Admin Configuration 2nd Devices Reports Workflow exam prep questions 2nd 3rd 4th 5th 6th group attributes 2nd login methods management functions 2nd 3rd splash screen Point-to-Point Protocol over Ethernet, [See PPPoE] port address translation, [See PAT] port redirection IP addresses 2nd PPPoE (Point-to-Point Protocol over Ethernet) ip address command PIX firewall configuration 2nd 3rd 4th 5th 6th 7th 8th uses vpdn group authentication command vpdn group command 2nd vpdn group localname command vpdn username and password command PPTP (Point-to-Point Tunneling Protocol) VPN implementation VPNs remote access client configuration 2nd 3rd 4th 5th 6th 7th 8th 9th practice exam adaptive ambiguous questions 2nd answering strategies 2nd 3rd fixed-length 2nd memorization strategies 2nd preparation strategies question types 2nd sample 1 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th answer key 2nd sample 2 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th answer key 2nd 3rd time strategies practice tests Cisco Web site CramSession Web site ExamCram2 Web site MeasureUp Web site 2nd PrepLogic Web site 2nd Trancender Web site 2nd pre-shared keys (authentication) IPSec PrepLogic contacting customer service PrepLogic Practice Exams, Preview Edition 2nd 3rd button options 2nd Flash Review mode installing interface design post-exam review Practice Exam mode 2nd question quality score report simulation features software requirements time remaining option uninstalling PrepLogic Web site practice test resources 2nd private IP addresses classes translation TCP UDP translation tables conn 2nd 3rd 4th 5th xlate 2nd 3rd 4th 5th privilege command command options 2nd 3rd privileged mode CLI Prometric Test Centers 2nd protocols AAA services RADIUS 2nd 3rd TACACS+ 2nd 3rd 4th additional resources DHCP clients 2nd servers 2nd 3rd 4th 5th 6th 7th servers, automatic configuration servers, manual configuration exam prep questions 2nd 3rd 4th 5th 6th 7th 8th firewalls access problems 2nd 3rd 4th 5th 6th fixups 2nd 3rd 4th 5th FTP fixup protocol ftp command 2nd passive mode 2nd 3rd standard mode 2nd 3rd HTTP fixups 2nd PPPoE PIX configuration 2nd 3rd 4th 5th 6th 7th 8th uses RSH fixup protocol rsh command 2nd RSTP operational modes 2nd SQL*Net fixup protocol sqlnet command VoIP H.323 2nd operational modes Session Initiation Protocol (SIP) Skinny Client Control Protocol (SCCP) 2nd proxy filters firewalls OSI layers 2nd 3rd pull-down menus PIX firewall configuration (PDM) File Options Wizards |