Index
Numerics
3DES, 130–131
limitations of, 132
strengths of, 131
802.11b standard, 278
APs, associating, 304
enhancing security, 311–312
hacking tools
AirSNORT, 282, 288, 297, 310, 313, 316–317
NetStumbler, 313–315
packet sniffers, 315–316
SSIDs, 303–304
WEP, 302–306
limitations of, 306
A
AAA, 115
accounting, 117–118
authentication, 116
authorization, 116
aaa new-model command, 218
acceptable use policies, 54–55
confidential information, 57
passwords, specifying criteria for, 57–58
prohibited activities, 59–62
access control, 86
accounting, 117–118
applying to vty ports, 227
deny statements, 94
grocery list analogy, 91–94
implicit deny statements, 196
limitations of, 95
lock and key, 199
permit statement, ...
Get Network Security First-Step now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.