O'Reilly logo

Network Security First-Step by Tom Thomas

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

Numerics

3DES, 130–131

limitations of, 132

strengths of, 131

802.11b standard, 278

APs, associating, 304

enhancing security, 311–312

hacking tools

AirSNORT, 282, 288, 297, 310, 313, 316–317

NetStumbler, 313–315

packet sniffers, 315–316

SSIDs, 303–304

WEP, 302–306

limitations of, 306

802.11g standard, 279, 282

A

AAA, 115

accounting, 117–118

authentication, 116

authorization, 116

aaa new-model command, 218

acceptable use policies, 54–55

confidential information, 57

passwords, specifying criteria for, 57–58

prohibited activities, 59–62

access control, 86

accounting, 117–118

ACLs, 89–90, 199

applying to vty ports, 227

deny statements, 94

grocery list analogy, 91–94

implicit deny statements, 196

limitations of, 95

lock and key, 199

permit statement, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required