index_S

 


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

SAA (Service Assurance Agent)
sample diagrams, viewing
     Dia diagrams
     Network Notepad diagrams
SARA (Security Auditor's Research Assistant)
SAs (security associations)
SATAN (Security Administrator's Tool for Analyzing Networks)
saving
     Catalyst configuration files
     Cisco IOS configuration files
     GtkTerm configurations
     PIX configuration files
scalability of Big Brother, improving
scanners
scanning
     common ports
     TCP ports
     UDP ports
Scheidler, Balazs
SCP (Secure Copy Protocol)
SDM (Cisco Router and Security Device Manager) 2nd
     configuring on Cisco routers
     deploying on Cisco routers
     launching
     One-Step Lockdown
     Security Audit Wizard
security
     AAA
         RADIUS
         TACACS+ 2nd 3rd
     Cisco routers
         best practices
         disabling unneeded services
         passwords
         RAT
         Type 5 passwords, decrypting
         Type 7 passwords, decrypting
         vulnerabilities, discovering
     configuring on SNMP
     switches
     syslog servers
     testing
         bootableCD-ROM-based toolkits
         Nessus 2nd
         network scanners
         Nmap
         packet analyzers 2nd
Security Audit Wizard (SDM) 2nd
security wheel
selecting file format of network diagrams
sensors
service authorization, configuring for Linux-based TACACS+ user accounts
service password-encryption command
session timeouts, Linux-based TACACS+ server configuration
setup options (Nessus) 2nd
severity levels, overriding default logging
severity parameter (syslog packets)
SHA (Security Hash Algorithm)
shapes
sheets
show arp command
show interface ethernet0 command
show proc cpu command
signature-based IDSs
     Snort
         Linux-based, deploying
         Windows-based
         Windows-based, configuring
         Windows-based, deploying
         Windows-based, installing
         Windows-based, starting
SLAs (service-level agreements)
SmokePing
sniffers [See also packet analyzers]
SNMP (Simple Network Management Protocol)
     community string
     components of
    configuring
         on Cisco routers
         on Cisco switches
         on Cisco VPN 3000 Concentrators
         on PIX Firewalls
     NMSs
     securing
     versions of
Snort
    Linux-based
         alerts, viewing
         configuring
         deploying
         installing
         starting
    Windows-based
         advanced architecture
         alerts, viewing
         configuring
         deploying
         installing
         starting
source code files, Big Brother
source parameter, syslog-ng.conf
source-drivers
SPAN (Switched Port Analyzer)
     for CatOS switches, port configuration
     for IOS-based switches, port configuration
SSH (Secure Shell)
     Cisco SSH Security Advisory web page
    clients
         configuring
         PuTTY
     configuring for Cisco devices
     connecting PCs to Cisco devices
starting
     Big Brother server
         on Windows
     GtkTerm
     Linux-based Snort
     Linux-based TACACS server
     Nagios
     Syslog-ng daemon
     Windows Component Wizard
     Windows-based Snort
     Windows-based Syslog server, Kiwi Syslogd Server
stencils, Dia
     adding new icons to
Storner, Henrik
strict option (traceroute command)
summarizing protocol statistics
switches, securing
     RAT
syntax, Syslog-ng.conf statements
     destination
     filter
     log
     options
     source
syslog
     /etc/syslog.conf file, adding rules
     configuring for Cisco devices
         CatOS-based switches
         Cisco routers
         commercial Cisco products
         PIX Firewalls
         VPN concentrators
    daemon
         configuring
         restarting
         verifying operation
     deploying
    packet parameters
         facility
         hostname
         message
         severity
         timestamp
     securing
     varying formats among Cisco devices
Syslog-ng daemon
     configuring
     destination-driver file, overriding global options
     destination-drivers
     implementing as central syslog server
     installing
     logs, viewing
     source-drivers
     starting
     versus syslogd daemon
syslog-ng.conf file
     destination parameter
     filter parameter
     log parameter
     options parameter
     source parameter
syslog.conf file, reloading
Syslogd daemon
     editing
     limitations of
     permitting remote syslog messages
     versus Syslog-ng daemon
system file management with TFTP server
     IOS-based
     Linux-based
     Windows-based

 


Network Administrators Survival Guide
Network Administrators Survival Guide
ISBN: 1587052113
EAN: 2147483647
Year: 2006
Pages: 106

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net