Index_N

 < Day Day Up > 



N

NAT (Network Address Translation), 75, 89

NAT-Traversal, 75, 89

NCSA log file format, 266

net share command

analyzing intrusions, 48–49, 49

viewing shared folders, 170, 171

network infrastructure security, 68–118,

See also security threats

802.11x wireless networks

802.11a/11b/11g standards, 99

design scenario, 107

enabling on clients, 102–103, 102–103

Group Policy Security Settings, 101–102, 101

MAC address filtering, 100

for open access points, 105, 105

overview, 99, 106

PEAP protocol, 103–104, 103–104

security options, 99–100, 100

Service Set Identifier, 100

threats to, 99, 106

vulnerabilities, 105

Wireless Equivalent Privacy, 100, 100

case study, 114–115

case study answers, 118

case study questions, 116–117

demand-dial routing for internal networks

authentication, 94–96

configuring connection type, 93–94, 93

configuring interface type, 91–92, 92

design scenario, 97

encryption, 95–96

using IP packet filters, 96

securing connections, 96

strengthening passwords, 94–95

in virtual private networks, 92, 93–95

encrypting data

in demand-dial routing, 95–96

design scenarios, 72–73, 74, 91

enabling reversible encryption, 86–87, 86

using IP Security, 70, 71, 75–78, 76, 78, 89

using L2TP/IPSec protocols, 74, 75, 88–89

using PPTP protocol, 73–74, 73, 88

using Secure Sockets Layer, 70, 71–73, 71

using Server Message Block signing, 78–79

using Transport Layer Security, 70, 71, 72

in virtual private networks, 71, 88–91

exam essentials, 108

external communications, 97–98

infrastructure server baseline templates, 299

IP infrastructures

common attacks on data, 68–69

design scenario, 72–73, 74, 82

encrypting data, 70–79, 71, 73, 76, 78

installing needed software only, 79

using IP address filtering, 79–80, 80

using IP packet filtering, 79, 80–82, 81

overview, 69–70

real world scenario, 81

overview, 68, 107

remote access infrastructures

CHAP protocol, 83–84

choosing authentication protocols, 83–88, 86

choosing encryption methods, 88–91

design scenarios, 88, 91

EAP protocol, 85

enabling reversible encryption, 86–87, 86

Microsoft CHAP protocol, 84

Microsoft CHAPv2 protocol, 84–85

overview, 82

PAP protocol, 83

SPAP protocol, 83

virtual private networks in, 82, 88–91

review question answers, 112–113

review questions, 110–111

network resources. See access control

New Hash Rule dialog box, 335, 336

New Preferred Setting Properties dialog box, 104, 104

NNTP (Network News Transfer Protocol), 255

No auto-restart for scheduled Automatic Updates installations setting, 348–349, 350

NTFS permissions, 169, 171–172, 374

NTLM (NT LAN Manager) protocols, 126, 127



 < Day Day Up > 



MCSE. Windows Server 2003 Network Security Design Study Guide Exam 70-298
MCSE: Windows(r) Server 2003 Network Security Design Study Guide (70-298)
ISBN: 0782143296
EAN: 2147483647
Year: 2004
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net