Index_N


N

name resolution, 168 “169
naming conventions. See also usernames
balancing functionality with anonymity, 8
standardizing, 330
NAT (Network Address Protocol), 7, 353
NAT Traversal, 137 “138
National Infrastructure Protection Center (NIPC), 533
Nessus, 410 “422
certificate generation, 411 “412
clients , 413 “415
components , 410
installation package, 410 “411
overview, 401
preferences, 416 “417
reporting scan results, 419 “423
scanning options, 418
target selection, 418 “419
updates and plug-ins, 413
user creation process, 412 “413
Netcat, 401
Netstumbler, 245 “246
network
connection policy, 35
design, 4 “9
documentation policy, 35
IP addressing schemes, 6
name. See SSID (Service Set Identifier)
perimeter security. See secure perimeter
protocols, 8
Network Address Protocol (NAT), 7, 353
Network Analyzer, Network Associates, 404
Network Architect, 507
network devices (IOS), 156 “164
802.1x port-based authentication, 304
AAA and, 163
accounting, 300 “301
alerts for configuration management, 332
authentication, 286 “287, 292
authorization, 295 “296
auxiliary port access, 161 “162
Bootp and, 167
CDP and, 164
configuration autoloading, disabling, 168
console access, 157 “158
core dumps, 175
DHCP and, 167
directed broadcasts, 169
finger server and, 166
ICMP and, 170
interfaces, disabling unused, 174
IP source routing, 169
logon banners, 164
loopback addresses, 173 “174
name resolution, 168 “169
NTP and, 166 “167
privileged mode access, 162 “163
Proxy ARP and, 169
roles, 302 “303
routers. See routers
security policy for, 8
SNMP and, 171 “173
switches. See switches
syslog and, 170
TCP and, 164
UDP and, 164
VTY access, 158 “161
Web-based access, 161
network management. See also NMS (network management system)
configuring IPsec on Windows 2000, 336 “345
overview, 312
protocols, 335 “336
network management system. See NMS (network management system)
Network Monitor, Microsoft, 402
Network Security Database (NSDB), 88
network sensors
interfaces, 81
overview, 77 “78
placement, 85 “87
tuning, 87 “88
tuning Cisco IDS sensors, 90 “94
tuning PureSecure sensors, 88 “90
Network Time Protocol. See NTP (Network Time Protocol)
network traffic
blocking, 103 “104
encapsulating insecure , 51 “60
filters, 127 “128, 214
flow through Internet access module, 354 “356
IPsec capture, 345
IPsec rules, 342
management mechanisms, 181
security protocols, 136 “140
traffic generation testing, 441
network-based IDS/IPS (NIDS/NIPS), 76 “77, 362, 378
newsletters, 482
NICs, 272
NIDS/NIPS (network-based IDS/IPS), 76 “77, 362, 378
NIPC (National Infrastructure Protection Center), 533
Nmap
port scanning, 401
suppliers for, 247
TCP scans , 408 “410
UDP scan, 406 “407
NMS (network management system)
accounting or asset management, 335
configuration management, 330 “333
fault management. See fault management
overview, 312 “313
performance management, 333 “335
security management, 335
Nortel Contivity
assigning filtering rules to interfaces, 128
authentication and authorization, 121 “123
digital certificates, 150
disabling management protocols, 111
disabling unnecessary SAs and IKE proposals, 126
disabling unnecessary tunneling protocols, 124 “125
HTTPS support for, 111 “121
IPsec-based VPNs and, 135 “136
message integrity, 144 “145
overview, 106
pre-shared keys, 146 “147
routing protocols, 132 “134
Nortel Optivity, 453
notification, incident response, 532
NSDB (Network Security Database), 88
NTBugTraq, 394, 449
NTP (Network Time Protocol)
configuring for Cisco IDS, 82
configuring for WAPs, 256
disabling on IOS devices, 166
hardening, 62
securing use on IOS devices, 166 “167
null routing, 181



Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 125

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net