Index

Numerics

3DES, 130–131

limitations of, 132

strengths of, 131

802.11b standard, 278

APs, associating, 304

enhancing security, 311–312

hacking tools

AirSNORT, 282, 288, 297, 310, 313, 316–317

NetStumbler, 313–315

packet sniffers, 315–316

SSIDs, 303–304

WEP, 302–306

limitations of, 306

802.11g standard, 279, 282

A

AAA, 115

accounting, 117–118

authentication, 116

authorization, 116

aaa new-model command, 218

acceptable use policies, 54–55

confidential information, 57

passwords, specifying criteria for, 57–58

prohibited activities, 59–62

access control, 86

accounting, 117–118

ACLs, 89–90, 199

applying to vty ports, 227

deny statements, 94

grocery list analogy, 91–94

implicit deny statements, 196

limitations of, 95

lock and key, 199

permit statement, ...

Get Network Security First-Step now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.