|
AAA Floodguard, 349
Access, checking, 392–396
Access attacks, 12
Access control lists (ACLs)
Adaptive Security Algorithm (ASA), 311
example, 302–305
inbound connections, allowing, 293
outbound connections, blocking, 284–290
table, 243–244
TurboACLs, 296–297
access-group command (PIX firewalls), 285
access-list command (PIX firewalls), 246, 284–285
Access modes for PIX firewalls, 265–267
Access problems, ISA Server, 1012–1014
ACL. see Access control lists (ACLs)
Activation key, 259–260, 376
activation-key command (PIX firewalls), 260
Active and passive modes in FTP, 314
Active content, filtering, 339–341
Active Directory, ISA Server in
altering, 849–850
implementing, 825–826
interoperability, 980–981
schema, 981
updating, 861–863
ActiveX
code, blocking, 292
objects, filtering, 341
Adaptive Security Algorithm (ASA)
description, 243–244
mechanism, 246
protocol details, 246–251
security levels, 246
state, 244–245
User Datagram Protocol (UDP), 250–251
Address range for rule base, 502
Address Resolution Protocol (ARP)
entries for CPHA, 557
gratuitous, 749–751
proxy, 319, 353–355
proxy entries, manual, 755
spoofing, 29
Address translation
description, 62–63
dynamic translation, 63–64
static translation, 63
see also Network Address Translation (NAT); Port Address Translation (PAT)
Address translation rules, explicit, 721
Addresses, running out of, 253
Addressing, checking, 382–383
Administration
H.323 Gatekeepers, 851
IPSO operating system (Nokia), 611–613
ISA Server, 882, 932
Nokia enterprise firewall appliances, 611–613
scripts, ISA Server, 975–977
Administrative access modes for PIX firewalls, 265–267
Administrator user names, 433
Administrators, configuration of, 446–449, 467–469, 629–631
Alerts, ISA Server
creating and configuring, 911–915
performance, 961–964
viewing, 911, 915
Algorithm, Diffie-Hellman, 579
alias command (PIX firewalls), 319
Antisniff tool, 30
Apache Web server, 652
Apple QuickTime, 326
Appliances, firewall, 67–69
Application filters, ISA Server, 977–978
Application inspection, 311–313
Application proxies, 57
Application server placement, 99
apply command (PIX firewalls), 290–292, 307
AppManager for ISA Server tool (NetIQ), 979
Appsend log tool, 208
Architecture, memory, 372
ARP. see Address Resolution Protocol (ARP)
arp command (PIX firewalls), 265
Arrays, ISA Server
array versus stand-alone, 837–838, 980–981
conversion from stand-alone, 860–868
inability to join, 1008
membership, managing, 908–910
remote management, 934
ASA. see Adaptive Security Algorithm (ASA)
Asymmetric encryption, 579–580
Attacks
access, 12
backdoors, 121–122
brute-force, 580
denial of service (DoS), 12, 22–23, 519
FIN scans, 16
fraggle, 26
half scans, 16
ICMP floods, 26
LAND, 25
mail-bomb, 27
ping floods, 26
ping-of-death, 25
reconnaissance, 12
scanner, 28
Smurf, 26–27
on Snort, 1205–1206
social engineering, 6, 20–21
source routing, 17
spoofing, 16–17, 173
structured, 5
SYN floods, 17, 23–25, 519–520, 543–544
system and software exploits, 17–18
teardrop, 25
Trojans, 18–19, 121–122
UDP bomb (packet storm), 27
UDP snork, 27
viruses, 19
worms, 19
see also Intrusions
Auditability, 8
Auditing PIX firewalls, 1264–1266
Authentication
description, 7–8
methods on OWA folders, 1142–1144
problems, ISA Server, 1009–1012
properties for users, 594
servers, remote, 721
Authentication panel (FireWall-1), 520
Authorized keys, 668
Availability, high. see High availability
Availability of information, 7
|