Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] SAA (Service Assurance Agent) sample diagrams, viewing Dia diagrams Network Notepad diagrams SARA (Security Auditor's Research Assistant) SAs (security associations) SATAN (Security Administrator's Tool for Analyzing Networks) saving Catalyst configuration files Cisco IOS configuration files GtkTerm configurations PIX configuration files scalability of Big Brother, improving scanners scanning common ports TCP ports UDP ports Scheidler, Balazs SCP (Secure Copy Protocol) SDM (Cisco Router and Security Device Manager) 2nd configuring on Cisco routers deploying on Cisco routers launching One-Step Lockdown Security Audit Wizard security AAA RADIUS TACACS+ 2nd 3rd Cisco routers best practices disabling unneeded services passwords RAT Type 5 passwords, decrypting Type 7 passwords, decrypting vulnerabilities, discovering configuring on SNMP switches syslog servers testing bootableCD-ROM-based toolkits Nessus 2nd network scanners Nmap packet analyzers 2nd Security Audit Wizard (SDM) 2nd security wheel selecting file format of network diagrams sensors service authorization, configuring for Linux-based TACACS+ user accounts service password-encryption command session timeouts, Linux-based TACACS+ server configuration setup options (Nessus) 2nd severity levels, overriding default logging severity parameter (syslog packets) SHA (Security Hash Algorithm) shapes sheets show arp command show interface ethernet0 command show proc cpu command signature-based IDSs Snort Linux-based, deploying Windows-based Windows-based, configuring Windows-based, deploying Windows-based, installing Windows-based, starting SLAs (service-level agreements) SmokePing sniffers [See also packet analyzers] SNMP (Simple Network Management Protocol) community string components of configuring on Cisco routers on Cisco switches on Cisco VPN 3000 Concentrators on PIX Firewalls NMSs securing versions of Snort Linux-based alerts, viewing configuring deploying installing starting Windows-based advanced architecture alerts, viewing configuring deploying installing starting source code files, Big Brother source parameter, syslog-ng.conf source-drivers SPAN (Switched Port Analyzer) for CatOS switches, port configuration for IOS-based switches, port configuration SSH (Secure Shell) Cisco SSH Security Advisory web page clients configuring PuTTY configuring for Cisco devices connecting PCs to Cisco devices starting Big Brother server on Windows GtkTerm Linux-based Snort Linux-based TACACS server Nagios Syslog-ng daemon Windows Component Wizard Windows-based Snort Windows-based Syslog server, Kiwi Syslogd Server stencils, Dia adding new icons to Storner, Henrik strict option (traceroute command) summarizing protocol statistics switches, securing RAT syntax, Syslog-ng.conf statements destination filter log options source syslog /etc/syslog.conf file, adding rules configuring for Cisco devices CatOS-based switches Cisco routers commercial Cisco products PIX Firewalls VPN concentrators daemon configuring restarting verifying operation deploying packet parameters facility hostname message severity timestamp securing varying formats among Cisco devices Syslog-ng daemon configuring destination-driver file, overriding global options destination-drivers implementing as central syslog server installing logs, viewing source-drivers starting versus syslogd daemon syslog-ng.conf file destination parameter filter parameter log parameter options parameter source parameter syslog.conf file, reloading Syslogd daemon editing limitations of permitting remote syslog messages versus Syslog-ng daemon system file management with TFTP server IOS-based Linux-based Windows-based |