Index_T


T

TACACS+, 163–165

TCP, See Transmission Control Protocol

tcpdump, 39–40

TCP intercept, 111

TCP/IP, 57–64, 72, See also Internet Protocol; Transmission Control Protocol

historical context, 57–58

Network Time Protocol (NTP), 139–141

OSI Model, 57–58

physical layer, 58–64

Telnet

password vulnerability, 155

router configuration protocol, 207

Terminal Access Controller Access Control System (TACACS+), 163–165

Test access points (TAPs), 261–263

Testing, network penetration, See Network penetration testing

Threat, defined, 17–18

Threat analysis, 26–27

Time division multiplexing (TDM), 280

Timestamping, 110, 153, 169–170

Time to live (TTL) field, 79, 310–311

Token Ring, 64, 72

addressing protocol, 82

Traceroute, 79, 214, 355

Training, 44, 387

Transmission Control Protocol (TCP), 101–112, See also TCP/IP

acknowledgment field, 104

checksum, 108

congestion conditions and, 108

control bits, 104–107, 214

data offset field, 104

flow control, 108

higher-speed network operation, 110

MTU path discovery, 78–79

operation, 106–110

options, 109–110

packet filtering and, 189–193

port fields, 102–103

PPTP and, 292

pseudo-header, 108, 328

retransmitted data, 107–108

sequence numbers, 103–104

sliding windows, 112

sockets, 103

SYN attack vulnerability, 231–232

SYN filtering, 111–112

synchronization process, 105–106

vulnerabilities, 107, 110–112

window field, 107–108

Transmission media, 58–62

Transport layer security (TLS), 183, 344, See also Secure Session Layer

Transport mode (IPSec), 306, 307, 310

Tribe Flood Network (TFN), 86

Triple DES (3DES), 127–128

Trojan programs, 271

ICMP vulnerabilities, 86

"phone home" configurations, 217

Trust models, 172–177

Tunneling, 289, See also Virtual private networks

encapsulation, 289–291

split tunneling, 134–135

Tunneling protocols, 290

GRE, 290–293

L2TP, 299–305, See also Layer 2 Tunneling Protocol

PPTP, 291–299, See also Point-to-Point Tunneling Protocol

Tunnel mode (IPSec), 306, 307–310

NAT and IPSec interoperability, 328–329

Two-factor authentication, 148

Type of service (TOS) field, 75–76




Network Perimeter Security. Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
ISBN: 0849316286
EAN: 2147483647
Year: 2004
Pages: 119
Authors: Cliff Riggs

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net