Index_V


V

VACLs (VLAN ACLs), 196 “197, 375
validation, 331 “332
value proposition, 487
vendors . See also resources (vendors, publications , and web sites)
knowing exploit susceptibility of, 8
as training resource, 512 “513
version control, 330
Virtual Local Area Networks. See VLANs (Virtual Local Area Networks)
Virtual Private Networks. See VPNs (Virtual Private Networks)
Virtual Router Redundancy Protocol (VRRP), 129 “131, 360
Virus Software Administrator, 507
viruses
e-mail content filters for, 235 “236
implementing virus protection, 5, 12 “14
spreading via e-mail, 235
turning off auto-response feature, 235
VLAN ACLs (VACLs), 196 “197, 375
VLAN hopping , 194 “195
VLAN Trunking Protocol. See VTP (VLAN Trunking Protocol)
VLANs (Virtual Local Area Networks), 372
determining which are in use and location of, 7
for DMZ, 353 “354
system isolation and, 375
trust models, 373 “375
VMS (VPN/Security Management Solution), 96
VPN Administrator, 507
VPN clients , 150 “151
VPN/remote access module, 360 “362
VPN/Security Management Solution (VMS), 96
VPNs (Virtual Private Networks)
authentication and authorization, 121 “123
clients, 150 “151
configuring for wireless connections, 271
connection types, 107 “108
connectivity- related issues, 106 “107
encryption protocols, 141 “143
filtering rules for interfaces, 127 “128
hardening methods for, 110
IDS/IPS sensor placement, 85
IKE authentication, 146 “150
IPsec-based, 135 “136
message integrity, 143 “145
overview, 106
policy for, 32
redundancy and fault tolerance, 129 “131
remote administration, 110 “121
remote exploits and, 7
removing unnecessary SAs and IKE proposals, 125 “126
removing unnecessary tunneling protocols, 123 “125
routing protocols, 131 “134
SAs, 140 “141
technologies for, 108 “110
traffic security protocols, 136 “140
VRRP (Virtual Router Redundancy Protocol), 129 “131, 360
VTP (VLAN Trunking Protocol)
auto-negotiation , 199
configuring, 198
passwords, 380
trunk lines, 199
vulnerabilities
minimizing by disabling unused services, 393
policy for, 31
SSH and, 394
vulnerability assessment (VA). See also Nessus
overview, 399
sources for, 424
tools, 401 “402



Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 125

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net