Trails, audit, 34
Transport and network, 278–279
Transport layer, routers and, 140
Trust, high level of, 293
Trusted and untrusted networks, identifying, 142–145
creating trusted networks, 144–145
firewall stops here, 142–144
Trusted networks, creating, 144–145
Tunneling, 285–295
centralized security management, 293–294
DMZ (demilitarized zone) focus, 291–292
enterprise-class scalability, 294
enterprise intranets, 292–293
firewall, 287–289
firewall tunneling, 287–289
firewall tunneling security rules, 292–293
firewall tunneling technologies, 289–291
high-end firewall tunneling protection, 294–295
high level of trust, 293
increasing risk on extranets and intranets, 286
Internet security architecture technologies, 287–289
openness with protection of firewall tunneling
solution, 286–287
openness with protection of Internet security solu-
tions, 286–287
Tunneling protection, high-end firewall, 294–295
Tunneling security rules, firewall, 292–293
Tunneling technologies, firewall, 289–291
Two-router screened subnets, 209
Two routers, 207–208
Types drawbacks, firewall, 55
Types, understanding firewall, 55
UNIX, 121–124
navigating UNIX services, 122
services (LINUX), 122–124
UNIX services, negotiating, 122
Untrusted networks, identifying trusted and, 142–145
creating trusted networks, 144–145
firewall stops here, 142–144
Upgrading firewalls, 40
URL keyword blocking, 180–182
User accounts, 36
User VPN, remote, 96–97
Virtual private networks (VPNs), 3, 4, 34, 94–97
authenticating with RADIUS (remote access dial-in
user service) server, 97
encryption with, 290
PPTP (point-to-point tunneling protocol) VPN, 97
remote office VPN, 96
remote user VPN, 96–97
Viruses, 18–19, 66–67, 234–235
VPN alternative, 100–110
VPN Firewall Brick, Lucent, 88–90
VPN policy sample, 98
VPN technology security, 98–99
VPNs (virtual private networks), 3, 4, 34, 94–97
authenticating with RADIUS (remote access dial-in
user service) server, 97
encryption with, 290
PPTP (point-to-point tunneling protocol) VPN, 97
remote office VPN, 96
remote user VPN, 96–97
Vulnerabilities, scanning firewalls and fixing, 135–142
perimeter packet analysis, 140–142
tracing routes, 135–140
Vulnerabilities, scanning for, 124–129
searching for weaknesses, 124–129
Vulnerable services, protection from, 13
Weaknesses, searching for, 124–129
Web Access Control, 154–155
Web filtering, 178–182
Web, filtering, 244–246
Web filtering
content blocking, 178–179
URL keyword blocking, 180–182
web site content filtering, 179–180
Web hosting, firewalls and, 190
Web servers
in DMZs, 188
security of SQL and, 219–222
Web services management, complex, 159–173
deploying Real Audio, 170–172
FTP (File Transport Protocol), 161–165
handling port numbers, 165–170
Telnet, 161
Web site content filtering, 179–180
Windows, hardening of, 121
Windows services, navigating, 116–118
Worldwide survey of firewall products, 349–351
Worms, 67
Zero-day attacks, 65
418 Index

Get Firewalls now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.