Index_A


A

AAA Floodguard, 349

Access, checking, 392–396

Access attacks, 12

Access control lists (ACLs)

Adaptive Security Algorithm (ASA), 311

example, 302–305

inbound connections, allowing, 293

outbound connections, blocking, 284–290

table, 243–244

TurboACLs, 296–297

access-group command (PIX firewalls), 285

access-list command (PIX firewalls), 246, 284–285

Access modes for PIX firewalls, 265–267

Access problems, ISA Server, 1012–1014

ACL. see Access control lists (ACLs)

Activation key, 259–260, 376

activation-key command (PIX firewalls), 260

Active and passive modes in FTP, 314

Active content, filtering, 339–341

Active Directory, ISA Server in

altering, 849–850

implementing, 825–826

interoperability, 980–981

schema, 981

updating, 861–863

ActiveX

code, blocking, 292

objects, filtering, 341

Adaptive Security Algorithm (ASA)

description, 243–244

mechanism, 246

protocol details, 246–251

security levels, 246

state, 244–245

User Datagram Protocol (UDP), 250–251

Address range for rule base, 502

Address Resolution Protocol (ARP)

entries for CPHA, 557

gratuitous, 749–751

proxy, 319, 353–355

proxy entries, manual, 755

spoofing, 29

Address translation

description, 62–63

dynamic translation, 63–64

static translation, 63

see also Network Address Translation (NAT); Port Address Translation (PAT)

Address translation rules, explicit, 721

Addresses, running out of, 253

Addressing, checking, 382–383

Administration

H.323 Gatekeepers, 851

IPSO operating system (Nokia), 611–613

ISA Server, 882, 932

Nokia enterprise firewall appliances, 611–613

scripts, ISA Server, 975–977

Administrative access modes for PIX firewalls, 265–267

Administrator user names, 433

Administrators, configuration of, 446–449, 467–469, 629–631

Alerts, ISA Server

creating and configuring, 911–915

performance, 961–964

viewing, 911, 915

Algorithm, Diffie-Hellman, 579

alias command (PIX firewalls), 319

Antisniff tool, 30

Apache Web server, 652

Apple QuickTime, 326

Appliances, firewall, 67–69

Application filters, ISA Server, 977–978

Application inspection, 311–313

Application proxies, 57

Application server placement, 99

apply command (PIX firewalls), 290–292, 307

AppManager for ISA Server tool (NetIQ), 979

Appsend log tool, 208

Architecture, memory, 372

ARP. see Address Resolution Protocol (ARP)

arp command (PIX firewalls), 265

Arrays, ISA Server

array versus stand-alone, 837–838, 980–981

conversion from stand-alone, 860–868

inability to join, 1008

membership, managing, 908–910

remote management, 934

ASA. see Adaptive Security Algorithm (ASA)

Asymmetric encryption, 579–580

Attacks

access, 12

backdoors, 121–122

brute-force, 580

denial of service (DoS), 12, 22–23, 519

FIN scans, 16

fraggle, 26

half scans, 16

ICMP floods, 26

LAND, 25

mail-bomb, 27

ping floods, 26

ping-of-death, 25

reconnaissance, 12

scanner, 28

Smurf, 26–27

on Snort, 1205–1206

social engineering, 6, 20–21

source routing, 17

spoofing, 16–17, 173

structured, 5

SYN floods, 17, 23–25, 519–520, 543–544

system and software exploits, 17–18

teardrop, 25

Trojans, 18–19, 121–122

UDP bomb (packet storm), 27

UDP snork, 27

viruses, 19

worms, 19

see also Intrusions

Auditability, 8

Auditing PIX firewalls, 1264–1266

Authentication

description, 7–8

methods on OWA folders, 1142–1144

problems, ISA Server, 1009–1012

properties for users, 594

servers, remote, 721

Authentication panel (FireWall-1), 520

Authorized keys, 668

Availability, high. see High availability

Availability of information, 7




The Best Damn Firewall Book Period
The Best Damn Firewall Book Period
ISBN: 1931836906
EAN: 2147483647
Year: 2003
Pages: 240

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net