Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] security accounting 2nd anti-virus software 2nd authentication 2nd 3rd CHAP 2nd PAP 2nd 3rd with username and password 2nd 3rd authorization 2nd firewalls 2nd 3rd 4th DMZs 2nd traffic filtering logic 2nd 3rd identifying allowable traffic on enterprise network Internet connection 2nd 3rd 4th IDSs network-based signatures VPNs 2nd 3rd segmentation TCP segments mss TCP versus packets sending email sequence number field TCP header sequence numbers serial interfaces CSU/DSU serial links 2nd addressing 2nd 3rd SEs (sales engineers) signatures single broadcast domains single site networks SMTP 2nd and POP3 snail mail Sneakernet sniffers 2nd software email client source address field Ethernet header 2nd 3rd source IP address field 2nd standards 2nd encoding Ethernet networking models proprietary 2nd public 2nd 3rd 4th 5th OSI reference model 2nd standards (networking) data transmission 2nd electrical interference error recovery standards bodies IEEE ITU static IP routes 2nd static routes STP (shielded twisted pair) straight-through cables structured wiring plans 2nd 3rd subnets directly connected 2nd end-to-end routing process 2nd 3rd subnetting 2nd 3rd 4th 5th 6th switch ports 2nd switches autonegotiation 2nd creating multiple physical LANs devices:switches:creating multiple physical LANs 2nd flooding 2nd forwarding decisions Frame Relay MAC address table MAC addresses learning 2nd reducing congestion 2nd 3rd buffers 2nd 3rd full-duplex transmission supporting multiple speeds trunking 2nd 3rd trunks VLANs creating 2nd 3rd forwarding decisions frame forwarding 2nd reasons for implementing 2nd SYN flag bit SYN flag bit (TCP) |