V



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

validate-update-source command (routers)
validating
     firewalls (network security assessments) 2nd
verifying perimeter devices phase (network security assessments)
     access control verification
         firewall management 2nd
         traffic restrictions 2nd 3rd
     assessment stations 2nd
     firewall validation 2nd
     listener stations 2nd
version scans (Nmap) 2nd
viewing
     NAT translation tables
     PAT translation tables
Virtual Vault Servers (HP)
    adversarial reviews
         determining attacker access 2nd 3rd
         determining impact of misconfigurations/vulnerabilities 2nd
     mkacct command
VisualZone utility
VLAN
     AP 2nd
     resource separation
         firewalls 2nd
         private VLANs 2nd
         routers 2nd
         switches
         VLAN-hopping attacks 2nd
     tag headers
VLAN interfaces
     ACL, in/out keywords
VLAN-hopping attacks 2nd
VLVHLP (ver large, very high-latency packets)
     unenforceable security policies
VMware software 2nd
voice mail systems
     secure perimeter design
VPDN (Virtual Private Dial-Up Networks)
     Cisco PIX configuration example 2nd 3rd 4th
VPN
     resource separation 2nd
    secure perimeter design
         firewall interaction 2nd 3rd 4th 5th 6th
VPN (Virtual Private Network)
     intranet VPN
VPN (virtual private networks) [See also remote desktop software]
VPN (Virtual Private Networks)
    benefits of
         cost effectiveness
         deployment 2nd
         security 2nd 3rd
     case study
         IPSec 2nd 3rd
         SSL 2nd
         terminal servers 2nd 3rd
    Cisco router configurations
         access list rules 2nd
     compromised clients, handling 2nd
VPN (virtual private networks)
     defining
VPN (Virtual Private Networks)
     defining
VPN (virtual private networks)
     defining
VPN (Virtual Private Networks)
     Diffie-Hellman asymmetric key encryption algorithms
     disadvantages of
         implementation
         Internet availability
         packet overhead
         processing overhead
         troubleshooting
     encryption 2nd 3rd
         application layer
         network layer 2nd
         transport layer
         tunneling as 2nd 3rd
     IPSec
VPN (virtual private networks)
     IPSec
VPN (Virtual Private Networks)
    IPSec
         AH protocol
         AH protocol, ESP protocol combinations 2nd
         AH protocol, ICV
         AH protocol, packet header information 2nd 3rd
VPN (virtual private networks)
    IPSec
         client integration 2nd
VPN (Virtual Private Networks)
    IPSec
         configuration examples, Cisco routers 2nd 3rd 4th 5th 6th 7th 8th 9th
         configuration examples, Windows XP 2nd 3rd 4th 5th 6th 7th 8th
         ESP protocol
         ESP protocol, AH protocol combinations 2nd
         ESP protocol, IPSec transport mode
         ESP protocol, IPSec tunnel mode 2nd
         ESP protocol, NAT 2nd
         ESP protocol, packet header components 2nd
         ESP protocol, packet traces 2nd
         IKE protocol
         IKE protocol, digital certificate authentication
         IKE protocol, phase 1 negotiations 2nd 3rd 4th 5th 6th 7th
         IKE protocol, phase 2 negotiations 2nd
         IKE protocol, pre-shared key authentication
         NAT-T
         PAT 2nd
VPN (virtual private networks)
    IPSec
         perimeter defenses 2nd 3rd
VPN (Virtual Private Networks)
    IPSec
         SA 2nd 3rd
         SAD 2nd 3rd
VPN (virtual private networks)
    IPSec
         server integration 2nd
VPN (Virtual Private Networks)
    IPSec
         SPD
         transport mode
         transport mode, ESP protocol
         tunnel mode, ESP protocol 2nd
         tunneling mode
         versus L2TP 2nd
         wireless network security
     L2TP
         versus IPSec 2nd
         versus PPTP 2nd
         Windows XP client software configuration example 2nd 3rd
     network layer cryptography 2nd 3rd
     network security assessments
         access controls 2nd
         authentication 2nd 3rd
         client restrictions 2nd
         encryption
     network security, designing 2nd
VPN (virtual private networks)
     perimeter defense, role in 2nd
VPN (Virtual Private Networks)
     PPTP 2nd
         Cisco PIX VPDN configuration example 2nd 3rd 4th
         versus L2TP 2nd
     proprietary implementations
     proxy firewalls
     remote connectivity, determining type of 2nd
    requirements of
         authentication
         confidentiality
         data integrity 2nd
VPN (virtual private networks)
    SSH
         file transfers
         port forwarding
         standard connections, client integration
         standard connections, perimeter defenses
         standard connections, server integration
         standard connections, uses of
         tunneling
         tunneling, client integration
         tunneling, performance
         tunneling, perimeter defenses
         tunneling, server integration
         tunneling, uses of
         vulnerabilities of 2nd
     SSL
         OWA 2nd
         perimeter defenses
         proxy servers
         proxy servers, perimeter defenses
         proxy servers, uses of
         standard connections
         standard connections, client integration 2nd
         standard connections, perimeter defenses 2nd
         standard connections, server integration 2nd
         standard connections, uses of 2nd
         tunneling 2nd 3rd
         uses of 2nd
VPN (Virtual Private Networks)
     tunneling 2nd
         as encryption 2nd 3rd
         packets
     wireless network security
VPN concentrators
VPN passthrough
VSX (Virtual System Extension)
VTY (virtual terminal lines) 2nd 3rd
vulnerabilities
     false positives
     researching 2nd
     unknown vulnerabilities, defining 2nd
vulnerability
     versus risk
vulnerability discovery phase (network security assessments) 2nd 3rd
     eEye Security Retina 2nd
     GFI LANguard Network Security Scanner 2nd 3rd 4th
     ISS Internet scanner 2nd 3rd 4th
     Nessus 2nd 3rd 4th 5th
     technique risk levels
     vulnerabilities, researching 2nd
vulnerability scanners 2nd
     eEye Security Retina 2nd
     GFI LANguard Network Security Scanner 2nd 3rd 4th
     ISS Internet scanner 2nd 3rd 4th
     Nessus 2nd 3rd 4th 5th
         NASL 2nd
         plug-ins 2nd
     tests, limiting
vulnerability scanning software
     Nessus



Inside Network Perimeter Security
Inside Network Perimeter Security (2nd Edition)
ISBN: 0672327376
EAN: 2147483647
Year: 2005
Pages: 230

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net