Index

A

acceptance as risk strategy 15, 317
access 
attacks 77
different, for different organizations 19–22
management, for PIX firewall 142–143
policies for firewall configurations 63
remote.  See remote access
rules in SonicWALL 162
Access Control Server (ACS) 39, 128, 436–444
ACLs (access control lists) 39
ActiveX, blocking 110
Adaptive Security Algorithm (ASA) 128–129
Adaptive Security Device Manager (ASDM) 126
Address Resolution Protocol (ARP) 417–419
addresses, IP.  See IP addresses
AH (Authentication Header) 40, 225–226, 269
alerts, ISA Server 196–197
ALF (Application Layer Filtering) 198–199
algorithms 
cryptographic in IPsec 233–234
Diffie-Hellman (DH) 234
message authentication 234
anti-spoofing, PIX firewalls 456
anti-virus scanning 27
anti-virus software  ...

Get Firewall Policies and VPN Configurations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.