T

TACACS+, 239

authentication, 240 authorization, 240-241 configuring, 241-244 features, 241

versus RADIUS, 245-246

TCP, 34

ARP, 38-39 DHCP, 40 FTP, 47-48 header format, 34 HSRP, 41

configuring, 44-45 enabling, 43 ICMP, 46-47 packets, 34-35 RARP, 39

services, filtering, 353-355 Telnet, 36-37, 47 TFTP, 47-48 TCP half close, 37 TCP intercept, enabling, 429 TCP load distribution, 360 TCP SYN Flood attacks, 419 TCP three-way handshake, 37 TCP/IP

FTP protocol

Active mode, 116-118 Passive mode, 118 vulnerabilities of, 417-418 TCP/IP model, comparing with OSI reference model, 18 teardrop attacks, 420

Telnet, 47

connections, establishing, 187 disabling login password, 113 requests, 36-37 test characters (ping), 46-47

defining download directory, 115 time sources (NTP)

configuring, 131-132 stratum, 130-131 TKIP (Temporal Key Integrity Protocol),

272, 275-276 topology table (EIGRP), 58 Totally stubby areas, 65 transform sets (IKE), defining, 266 transparent bridging, 23 transport layer (OSI model), 17 Transport mode (IPSec), 254 trap command (SNMP), 125 traps (SNMP), 124 triggered updates, 53 troubleshooting PIX Firewall log files,

374-375 trunks, 26

tuning IDS systems, 307-308 Tunnel mode (IPSec), 254 tunneling

IP GRE, 383-385 VPDNs, 276-277

configuring, 278-281 turning off debugging, 171

Was this article helpful?

0 0

Post a comment