| < Day Day Up > |
|
NAT (Network Address Translation), 75, 89
NAT-Traversal, 75, 89
NCSA log file format, 266
net share command
analyzing intrusions, 48–49, 49
viewing shared folders, 170, 171
network infrastructure security, 68–118,
See also security threats
802.11x wireless networks
802.11a/11b/11g standards, 99
design scenario, 107
enabling on clients, 102–103, 102–103
Group Policy Security Settings, 101–102, 101
MAC address filtering, 100
for open access points, 105, 105
overview, 99, 106
PEAP protocol, 103–104, 103–104
security options, 99–100, 100
Service Set Identifier, 100
threats to, 99, 106
vulnerabilities, 105
Wireless Equivalent Privacy, 100, 100
case study, 114–115
case study answers, 118
case study questions, 116–117
demand-dial routing for internal networks
authentication, 94–96
configuring connection type, 93–94, 93
configuring interface type, 91–92, 92
design scenario, 97
encryption, 95–96
using IP packet filters, 96
securing connections, 96
strengthening passwords, 94–95
in virtual private networks, 92, 93–95
encrypting data
in demand-dial routing, 95–96
design scenarios, 72–73, 74, 91
enabling reversible encryption, 86–87, 86
using IP Security, 70, 71, 75–78, 76, 78, 89
using L2TP/IPSec protocols, 74, 75, 88–89
using PPTP protocol, 73–74, 73, 88
using Secure Sockets Layer, 70, 71–73, 71
using Server Message Block signing, 78–79
using Transport Layer Security, 70, 71, 72
in virtual private networks, 71, 88–91
exam essentials, 108
external communications, 97–98
infrastructure server baseline templates, 299
IP infrastructures
common attacks on data, 68–69
design scenario, 72–73, 74, 82
encrypting data, 70–79, 71, 73, 76, 78
installing needed software only, 79
using IP address filtering, 79–80, 80
using IP packet filtering, 79, 80–82, 81
overview, 69–70
real world scenario, 81
overview, 68, 107
remote access infrastructures
CHAP protocol, 83–84
choosing authentication protocols, 83–88, 86
choosing encryption methods, 88–91
design scenarios, 88, 91
EAP protocol, 85
enabling reversible encryption, 86–87, 86
Microsoft CHAP protocol, 84
Microsoft CHAPv2 protocol, 84–85
overview, 82
PAP protocol, 83
SPAP protocol, 83
virtual private networks in, 82, 88–91
review question answers, 112–113
review questions, 110–111
network resources. See access control
New Hash Rule dialog box, 335, 336
New Preferred Setting Properties dialog box, 104, 104
NNTP (Network News Transfer Protocol), 255
No auto-restart for scheduled Automatic Updates installations setting, 348–349, 350
NTFS permissions, 169, 171–172, 374
NTLM (NT LAN Manager) protocols, 126, 127
| < Day Day Up > |
|