Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] SAFE blueprint Cisco Enterprise Composite Network Model Enterprise Campus Functional Area Enterprise Edge Functional Area Service Provider Edge Functional Area SAN (storage area networking) script-kiddies security 802.1x standard assessing attacks access attacks DoS attacks information disclosure attacks reconnaissance attacks best practices network management security policies, implementing Catalyst hardware security Catalyst native security CIS on voice networks on wireless networks 802.11i standard AirDefense Fast Secure Roaming MAC address verification SSIDs threat mitigation WEP policies, implementing vulnerabilities WPA security management segments self-defending networks sequencing serialization delay Server module services provided by CN shaping traffic shared trees shared-key authentication signaling traffic bandwidth single-site IP telephony design site surveys for wireless networks site-local unicast addresses Slammer worm SLAs (service-level agreements) SLB (Server Load Balancing) snapshot routing sniffing SNMP (Simple Network Management Protocol) SoBig.F worm social engineering source trees sparse mode (PIM) split-horizon rule SSIDs (Service Set Identifiers) SSL (secure sockets layer) SSO (Stateful Switchover) stacks stateful firewalling stateless autoconfiguration process (IPv6) static packet filtering static port membership static routes 2nd sticky-learning addresses storage networking storage networking models STP (Spanning Tree Protocol) 2nd 3rd blocking state learning state link cost PVST RSTP strategies for network management strong authentication subnet addresses available host addresses, calculating 2nd calculating device addresses, calculating summary routes, calculating subnet masks prefixes VLSMs calculating summarization summary routes, calculating SWAN (Cisco Structured Wireless-Aware Network) switches 2nd switching 2nd comparing to bridging Layer 2 MAC addresses redundancy Layer 3 learning process versus STP learning state MLS security trunks, VTP VLANs membership PVST trunks switching the packet SYN requests syslog |