Index_M


M

MAC addresses
filtering, 259 “262
limiting to one per port, 244
monitoring, 247
switch port and, 248
maintenance and support agreements, 449 “450
management access, IOS devices, 156 “164
auxiliary port access, 161 “162
console access, 157 “158
logon banners, 164
overview, 156 “157
privileged mode access, 162 “163
usernames and AAA, 163
VTY access, 158 “161
Web-based access, 161
management console, IDS/IPS, 78
management interface, network sensors, 81
management module, enterprise campus, 381 “382
management perceptions/expectations
being realistic, 487
communicating with management, 485 “486
demonstrating the value proposition, 487
gaining management trust, 485 “486
overview, 485
management teams
incident response, 519
meetings, 509
organizational/ group roles and responsibilities, 508 “509
MD5 (Message Digest 5), 62, 143
medium risk rating, 25
Melissa virus, 235
mentoring, 509
Message Digest 5 (MD5), 62, 143
Message Integrity Check (MIC), 267
message integrity, VPNs, 143 “145
messages of the day (MOTD), 392
MIB values, SNMP, 333 “334
MIC (Message Integrity Check), 267
Microsoft Certificate Services, 148
Microsoft IAS server, 283 “286, 304 “308
Microsoft IIS, 78 “79
Microsoft Network Monitor, 402
Microsoft Windows. See Windows-based systems
misuse detection, 77
misuse of resources, 211
monitoring
bandwidth and change, 529
enterprise monitoring policy, 34
interfaces, 441 “442
network sensors, 81
security policies, 26
types of, 9
Monitoring Center for Security, Cisco, 96
MOTD (messages of the day), 392
multi-home firewalls, 349 “351



Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 125

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net