D

Daemen, Joan, 250

DATA command (SMTP), 129

data encryption, 255-257

3DES, 250 AES, 250-251 DES, 248-250 Diffie-Hellman, 252-253 IPSec, 254 MD5, 251-252 principles of, 247-248 data link layer. See Layer 2 security data manipulation, 417

DDOS (Distributed Denial Of Service)

attacks, 420 debug all command, 179 debug commands, 175, 182

options, 177-178 debugging, turning off, 171 default services, disabling, 429 defining

HTTP port number, 121 TFTP download directory, 115 deploying NAT, 357

DES (Data Encryption Standard), 248-250 development of Ethernet, 20 of OSI reference model, 14 devices asynchronous communication, 80-81 broadcast domains, 23 firewalls, 352 VLANs, creating, 23 DHCP, 40

disabling, 427 leases, viewing, 40 starvation attacks, 207-208

DHCP snooping, 207 Diffie-Hellman protocol, 252-253 disabled state (spanning tree), 24 disabling, 427-429

DNS lookup on Cisco routers, 112 mask replies, 431 proxy ARP, 431 TCP/UDP small servers, 427 Telnet login password, 113 displaying configured policy routes, 174 router home page, 119 routing tables, 48-50 system log, 173 distance vector protocols loop avoidance techniques, 53 RIP, 52-53

configuring, 54-56 DLCIs (data-link connection identifiers), 79 DMZ, 351 DNS, 110-111

disabling lookup on Cisco routers, 112 enabling lookup on Cisco routers, 113 DNS poisoning, 420 DoS attacks, 418, 421

double tagging, 203

DRs (Designated Routers), 63

election process, disabling, 70 DSS (digital signatures), 382 dynamic crypto map entries, 266 Dynamic NAT, 359-360

0 0

Post a comment