|
TACACS+, 163–165
TCP, See Transmission Control Protocol
tcpdump, 39–40
TCP intercept, 111
TCP/IP, 57–64, 72, See also Internet Protocol; Transmission Control Protocol
historical context, 57–58
Network Time Protocol (NTP), 139–141
OSI Model, 57–58
physical layer, 58–64
Telnet
password vulnerability, 155
router configuration protocol, 207
Terminal Access Controller Access Control System (TACACS+), 163–165
Test access points (TAPs), 261–263
Testing, network penetration, See Network penetration testing
Threat, defined, 17–18
Threat analysis, 26–27
Time division multiplexing (TDM), 280
Timestamping, 110, 153, 169–170
Time to live (TTL) field, 79, 310–311
Token Ring, 64, 72
addressing protocol, 82
Traceroute, 79, 214, 355
Training, 44, 387
Transmission Control Protocol (TCP), 101–112, See also TCP/IP
acknowledgment field, 104
checksum, 108
congestion conditions and, 108
control bits, 104–107, 214
data offset field, 104
flow control, 108
higher-speed network operation, 110
MTU path discovery, 78–79
operation, 106–110
options, 109–110
packet filtering and, 189–193
port fields, 102–103
PPTP and, 292
pseudo-header, 108, 328
retransmitted data, 107–108
sequence numbers, 103–104
sliding windows, 112
sockets, 103
SYN attack vulnerability, 231–232
SYN filtering, 111–112
synchronization process, 105–106
vulnerabilities, 107, 110–112
window field, 107–108
Transmission media, 58–62
Transport layer security (TLS), 183, 344, See also Secure Session Layer
Transport mode (IPSec), 306, 307, 310
Tribe Flood Network (TFN), 86
Triple DES (3DES), 127–128
Trojan programs, 271
ICMP vulnerabilities, 86
"phone home" configurations, 217
Trust models, 172–177
Tunneling, 289, See also Virtual private networks
encapsulation, 289–291
split tunneling, 134–135
Tunneling protocols, 290
GRE, 290–293
L2TP, 299–305, See also Layer 2 Tunneling Protocol
PPTP, 291–299, See also Point-to-Point Tunneling Protocol
Tunnel mode (IPSec), 306, 307–310
NAT and IPSec interoperability, 328–329
Two-factor authentication, 148
Type of service (TOS) field, 75–76
|