This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
IndexNote to the reader: Throughout this index boldfaced page numbers indicate primary discussions of a topic. Italicized page numbers indicate illustrations.
ACK (acknowledgment), 34, 37–39, 462ACLs. See access control listsactive detection, 429ActiveX attacks, 425AD. See administrative distancead hoc mode, wireless networks,
AD-IDS. See anomaly-detection IDSadministrative distance (AD), 275–277, 280administrator training, 437ADSL. See Asymmetric Digital Subscriber LineAdvanced Encryption Standard (AES), 382,
388, 607AES-Counter Mode CBC-MAC Protocol
(AES-CCMP), 366, 367
137550bindex.indd 729 12/20/11 4:22 PM
COPYRIG
HTED M
ATERIAL
730 agents – black hole
agents, 163aggregate rate, 93AH. See Authentication Headeralias record, 133alternating current (AC), 587Angry IP, 575, 575–576anomaly-detection IDS (AD-IDS), 468anonymous accounts, 394antenna
troubleshooting, 609wireless, 349–351
antivirus engine, 440antivirus programs, 439–441antivirus scan, 440–441anycast, 202, 204AP. See access pointsAPIPA. See Automatic Private IP Addressingapplications
130, 144, 302area border routers (ABRs), 288ARP. See Address Resolution Protocolarp, 530–533arp -a, 236ARPAnet, 157–158AS. See autonomous systemASBR. See autonomous system border routerASIC. See application-specific integrated circuitAsymmetric Digital Subscriber Line (ADSL),
392, 501Asynchronous Transfer Mode (ATM), 487,
508–509Attachment Unit Interface (AUI), 102–103attenuation, 71, 102, 606AUI. See Attachment Unit Interfaceauthentication, 400–406
autonomous system border router (ASBR), 289autorooters, 425
Bbackbone
collapsed, 299networks, 20, 20–21OSPF, 288
backdoors, 425background checks, 433backups, 434badges, 433bandwidth, 492, 653–654Bandwidth on Demand Interoperability Group
(BONDING), 505BASE. See Basic Analysis and Security Enginebaselines, 163, 645–647Basic Analysis and Security Engine (BASE),
573Basic Rate Interface (BRI), 504basic service area (BSA), 352basic service set (BSS), 352Basic Service Set Identifiers (BSSIDs), 608beacons, 422Bearer channels, 505Berkeley Software Distribution (BSD), 158BGP. See Border Gateway Protocolbinary numbers, 94–98bit, 94, 190black box, 452black hole, 621
137550bindex.indd 730 12/20/11 4:22 PM
block acknowledgment – CHAP 731
block acknowledgment, 345blocking state, 310Bluetooth, 487, 497BNC. See British Naval ConnectorBONDING. See Bandwidth on Demand
285–286bottlenecks, 646bounce, 426, 609BPDUs. See Bridge Protocol Data UnitsBPL. See Broadband over Power LineBRI. See Basic Rate Interfacebridges, 120, 300, 303
broadcast storm, 307, 308, 622brute-force attacks, 426BSA. See basic service areaBSD. See Berkeley Software DistributionBSS. See basic service setBSSIDs. See Basic Service Set Identifiersbuffer, 35Buffer Full, 175buffer overflow, 421burst, 507bus topology, 12, 13butt set, 584byte, 94, 95, 190, 550
C-c, 543–544CA. See certificate authority
cables. See also specific cable typesproperties, 71–72troubleshooting, 604–609wiring standards, 72–78
cable modem, 499, 499, 501–503cable stripper/snips, 586cable testers, 77, 577, 577–579caching engines, 657–658caching proxy server, 135call setup, 168cameras, security policy, 433canonical name (CNAME), 133CARP. See Common Address Redundancy
ProtocolCarrier Sense Multiple Access with Collision
62, 103Category 6 twisted-pair cable, 59, 103Category 6a twisted-pair cable, 59CATV. See community antenna televisionCCEVS. See Common Criteria Evaluation and
channel bonding, 101, 101, 101, 101channel service unit/data service unit (CSU/
DSU), 44, 76, 79, 488–489CHAP. See Challenge Handshake
Authentication Protocol
137550bindex.indd 731 12/20/11 4:22 PM
732 CIDR – decimal numbers
CIDR. See Classless Internet Domain RoutingCIR. See committed information ratecircuit switching, 491cladding, 63Class A network address, 193–194, 215, 217Class B network address, 194–195, 215, 216,
226–234Class C network address, 195–196, 215,
217–226, 219, 220–221, 221Class D network address, 196Class E network address, 196classful routing, 279, 281Classless Internet Domain Routing (CIDR),
routing tables, 278, 279Spanning Tree Protocol, 311, 311
CPE. See customer premises equipmentCPU. See central processing unitCRC. See cyclic redundancy checkcrossover cable, 74, 75–76, 76, 640, 641crosstalk, 58, 605–606CSC. See Content Security ControlCSMA/CD. See Carrier Sense Multiple Access
with Collision DetectionCSU/DSU. See channel service unit/data
service unitcustomer premises equipment (CPE), 488cyclic redundancy check (CRC), 179
frames, 182IP routing, 258, 259, 261
D-d, 531D channel, 505DA. See Destination Addressdata communication equipment (DCE), 44Data Encryption Standard (DES), 387data frame, 42Data Link Connection Identifiers (DLCIs), 508Data Link layer, OSI, 42, 42–44
data over cable service interface specification (DOCSIS), 502
data packets, 40, 100data steam, 180–181data terminal equipment (DTE), 44, 507datagrams, 179DB-9, 69dBi. See decibel isotropicDCE. See data communication equipmentDDos. See distributed denial of service attacksdecibel isotropic (dBi), 350decimal numbers, 94–98
Department of Defense (DoD), 159, 430OSI, 158–159, 159port scanners, 576TCP/IP, 158–159, 160
DES. See Data Encryption Standarddestination, 539Destination Address (DA), 99–100Destination Unreachable, 175, 259, 261DFS. See Dynamic Frequency SelectionDHCP. See Dynamic Host Configuration
ProtocolDiffie-Hellmann algorithm, 388Diffusing Update Algorithm (DUAL), 283, 291dig, 533Digital, Intel, and Xerox (DIX), 101digital certificates, 473digital ID, 388Digital Signal 0 (DS0), 492–493Digital Signal 1 (DS1), 493Digital Signal 3 (DS3), 494digital subscriber line (DSL), 61, 487, 499, 499,
500–501. See also specific DSL types
digital subscriber line access multiplexer (DSLAM), 500
distributed denial of service attacks (DDos), 417, 418
distributed WAN, 9distribution list, 455distribution network, 501distribution system (DS), 352diversity, 347DIX. See Digital, Intel, and XeroxDLCIs. See Data Link Connection Identifiers.dll, 418DMZ. See demilitarized zoneDNS. See Domain Name ServiceDNS Server, 652DOCSIS. See data over cable service interface
specificationDoD. See Department of DefenseDomain Name Service (DNS), 89, 130–135,
door locks, 433DoS. See denial of service attackDOS commands, 236–237DoS/SYN flood attack, 416, 417, 454dropped packets, 655DS. See distribution systemDS0. See Digital Signal 0DS1. See Digital Signal 1DS3. See Digital Signal 3
137550bindex.indd 733 12/20/11 4:22 PM
734 DSL – equipment access
DSL. See digital subscriber lineDSLAM. See digital subscriber line access
multiplexerDSSS. See Direct Sequence Spread SpectrumDTE. See data terminal equipmentDTP. See Dynamic Trunking ProtocolDUAL. See Diffusing Update Algorithmdual inline package (DIP), 605dumb terminals, 7DV. See distance vectorDWDM. See Dense Wavelength Division
equipment exceeds operator capability (EEOC) – forwarding state 735
equipment exceeds operator capability (EEOC), 602
ESP. See Encapsulating Security PayloadESS. See extended service setESSIDs. See Extended Service Set Identifierseth_addr, 531EtherChannel, 101Ethernet. See also specific Ethernet types
hardware broadcasts. See Layer 2hashing functions, 382HDLC. See High-Level Data Link ControlHDSL. See high bit-rate digital subscriber lineheadend, 501hello packets, 286, 291heuristic scanning, 439hexadecimal numbers, 94–98HFC. See hybrid fiber-coaxialHIDS. See host-based IDShierarchical addressing, 191–198high availability, 657high bit-rate digital subscriber line (HDSL),
500–501High Speed Serial Data Connector
(HSSDC), 103High-Level Data Link Control (HDLC), 491honeynets, 471honeypot, 471, 471hops, 175hop count, 40, 275, 290
hostname – Institute of Electrical and Electronics Engineers (IEEE) 737
hostname, 536Hosts table, 535–536Host-to-Host layer, DoD model, 159,
168–173hotfixes, 437–439HSPA+. See Evolved High Speed Packet AccessHSSDC. See High Speed Serial Data ConnectorHTML, 32HTTP. See Hypertext Transfer ProtocolHTTPS. See Hypertext Transfer Protocol
Hypertext Transfer Protocol Secure (HTTPS), 164, 263, 382
I-i address, 537-i TTL, 527IBSS. See independent basic service setICA. See Independent Computing ArchitectureICMP. See Internet Control Message ProtocolICSA. See International Computer Security
AssociationID Ten T error (ID10T), 602IDC. See insulation displacement connector
IDF. See intermediate distribution frameIDS. See intrusion detection systemIE. See Internet ExplorerIEC. See International Electrotechnical
CommissionIEEE. See Institute of Electrical and Electronics
EngineersIETF. See Internet Engineering Task Forceif, 540if_addr, 531ifconfig, 525–526I/G. See Individual/Group bitIGMP. See Internet Group Management
ProtocolIGPs. See interior gateway protocolsIGRP. See Interior Gateway Routing ProtocolIMAP. See Internet Message Access Protocolinbound ACLs, 456incident response, 430independent basic service set (IBSS), 351Independent Computing Architecture
(ICA), 392Individual/Group bit (I/G), 98inet_addr, 531infrastructure mode, wireless networks,
352–353, 353inherent attenuation, 102injectors, PoE, 326, 326inside global address, NAT, 243inside local address, NAT, 243Institute of Electrical and Electronics Engineers
IP Security (IPSec), 384, 385, 473IP spoofing attack, 378–379, 424, 424, 454IP stack, 235, 537ipconfig, 502, 521–524ipconfig/all, 236, 522–524ipconfig/release, 517, 524ipconfig/renew, 517, 524IPS. See intrusion prevention systemIPSec. See IP SecurityIPv4. See Internet Protocol version 4IPv6. See Internet Protocol version 6IPX. See Internetwork Package ExchangeISAKMP. See Internet Security Association and
Key Management ProtocolISDN. See Integrated Services Digital
NetworksIS-IS. See Intermediate System-to-Intermediate
SystemISL. See Inter-Switch LinkISO. See International Organization for
Standardizationisotropic antennas, 350ISPs. See Internet service providers
L-l size, 527L2F. See Layer 2 ForwardingL2TP. See Layer 2 Tunneling ProtocolLAN. See local area networkLAN Manager, 299latching, 63latency, 144, 302, 609latency sensitivity, 653Layer 2
LC. See Local ConnectorLcd, 558LDAP. See Lightweight Directory
Access Protocollearning state, 310leased lines, 491least significant bit (LSB), 99LEDs. See light-emitting diodesLength, IEEE 802.3, 100light-emitting diodes (LEDs), 63, 119,
600–601
137550bindex.indd 739 12/20/11 4:22 PM
740 Lightweight Directory Access Protocol (LDAP) – microwave radio relay
Lightweight Directory Access Protocol (LDAP), 165
Link Aggregation, 101link light, 600–601link state (LS), 266, 266, 277, 283, 286–290link state advertisements (LSAs), 286link state packets (LSPs), 286link-local address, 204, 291listening state, 310LLC. See Logical Link Controlload balancing, 130, 275, 278, 657load testing, 651local address, 243, 262local area network (LAN), 3, 3–5. See also
Small Office, Home Office; virtual local area network; wireless local area network
IP routing, 254packet switching, 492RJ-11, 61routers, 4, 315, 451switches, 301
bridges, 303VLSM, 281VPN, 380–382
Local Connector (LC), 64, 65, 66local loop, 489logging, NIDS, 470logical address, 41, 254Logical Link Control (LLC), 43logical network diagrams, 645, 646LogMein, 519, 519Long Term Evolution (LTE), 503, 504loop avoidance, 307–309, 308loopback plug, 578, 578LS. See link stateLs, 558LSAs. See link state advertisementsLSB. See least significant bitLSPs. See link state packetsLTE. See Long Term Evolution
MMAC. See Media Access Controlmacro viruses, 420magnetic flux, 71–72mail exchanger (MX), 133mail relay, 434
mail server, 6, 433, 456main distribution frame (MDF), 79mainframes, 7man-in-the-middle attacks, 427, 427mask netmask, 539maximum burst rate (MBR), 507maximum transmission unit (MTU), 103,
615, 621MB. See megabyteMBR. See maximum burst rateMD5. See Message-Digest algorithm 5MDF. See main distribution frameMD-IDS. See misuse-detection IDSMDI/MDI-X. See medium dependent
interface/medium dependent interface-crossover
mechanical transfer registered jack (MTRJ), 64–65, 65
.mil, 131Mills, David, 164MILNET, 158MIMO. See multiple-input multiple-outputmisuse-detection IDS (MD-IDS),
468–469, 469MLS. See multilayer switchMMF. See multimode fibermobility, 201modems, 434, 492. See also cable modemmodulation technique, 343monitor viewing, 433MPLS. See MultiProtocol Label SwitchingMS-CHAP. See Microsoft Challenge
Handshake Authentication ProtocolMtr, 536–537MTRJ. See mechanical transfer registered jackMTU. See maximum transmission unitmulticast packets
NFPA. See National Fire Protection Associationnibble, 94, 95NICs. See Network Interface CardsNID. See network interface deviceNIDS. See network-based IDSNIST. See National Institute of Standards
and TechnologyNMAP. See Network MapperNMSs. See network management stationsnoise immunity, 71–72nonces, 366–367notification, 432, 470Novell, 299–300NSA. See National Security Agencynslookup, 533–534NTP. See Network Time Protocol
OOC. See optical carrieroctet, 190OE. See operator errorOFDM. See Orthogonal Frequency Division
MultiplexingOLT. See optical line terminationomni directional antennas, 349–351on-access virus scan, 440–441on-demand virus scan, 440one-to-many address, 204ONUs. See optical network unitsopen access mode, WLAN, 363open impedance mismatch, 606open relay, 434Open Shortest Path First (OSPF), 40, 287–289,
581–582, 582.org, 131organizationally unique identifier (OUI), 98Orthogonal Frequency Division Multiplexing
(OFDM), 343OS/2, 299OSI. See Open Systems InterconnectionOSPF. See Open Shortest Path FirstOTDR. See optical time-domain reflectometerOUI. See organizationally unique identifieroutbound ACLs, 456out-of-order delivery, 655outside global address, NAT, 243outside local address, NAT, 243
overhead, 34overloading, 243, 244, 245
P-p
netstat, 551–553route, 538–539
-p period, 537packets, 179. See also specific packet types
selection, 18–21ping, 176, 235–236, 526–529Ping of Death, 415PKI. See Public Key Infrastructureplain old telephone service (POTS), 59, 487
ADSL, 501ISDN, 504PSTN, 489
plennum-rated coating, 56, 62PoE. See Power over Ethernetpoint of presence (POP), 489pointer record (PTR), 133point-to-multipoint topology, 17, 17, 18,
port scanners, 426, 574–576, 575port sweeping, 574port-redirection attacks, 427Post Office Protocol (POP), 162POTS. See plain old telephone servicePower over Ethernet (PoE), 324–326, 325power switch, 601–602powers of 2, 214PPP. See Point-to-Point ProtocolPPPoE. See Point-to-Point Protocol
over EthernetPPTP. See Point-to-Point Tunneling Protocolpreamble, 99prefix routing, 279Presentation layer, OSI, 33Pre-Shared Key (PSK), 367–368Pretty Good Privacy (PGP), 386–387,
389, 390Primary Rate Interface (PRI), 504print, 539print server, 6private cloud, 659private IP address, 196–198private network, 451private side firewalls, 125proactive defense, 429–430problem exists between chair and keyboard
(PEBCAK), 602procedures
networks, 648security, 436–441
Process/Application layer, DoD model, 158–168
protocol analyzers, 517–518, 579–580, 651Protocol Data Units (PDUs), 45, 178, 181protocol switching, 457–458, 458
137550bindex.indd 744 12/20/11 4:22 PM
Proxy ARP – routers 745
Proxy ARP, 622proxy server, 6, 135, 136, 460, 460–461PSK. See Pre-Shared KeyPSTN. See Public Switched Telephone NetworkPTR. See pointer recordpublic cloud, 659public key encryption, 388, 389Public Key Infrastructure (PKI), 401, 402public side firewalls, 125Public Switched Telephone Network (PSTN),
177, 178reverse lookup zone, 134RFCs. See Requests for CommentsRFI. See radio frequency interferenceRG-6, 57, 58RG-58 A/U, 57RG-58 U, 57RG-59, 57RG-62, 58ring topology, 14–15, 15RIP. See Routing Information ProtocolRIPng. See Routing Information Protocol
next generationRIPv2. See Routing Information Protocol
version 2Rivest, Shamir, and Adleman (RSA), 382, 388,
391, 473RJ. See registered jackRJ-11, 60–61, 61RJ-45, 60–61, 61, 102, 500, 640rogue access points, 423rootkit, 425round-robin load balancing, 278route, 537–540routers, 4, 121–122. See also IP routing
sendmail, 425serial cables, 68–70servers, 5–6, 7. See also specific
server typesserver logs, 651–652server mode, VTP, 322, 323service level agreement (SLA), 656service packs, 438Service Set Identifiers (SSIDs), 608Session Initiation Protocol (SIP), 163Session layer, OSI, 33session secret, 367SetRequest, 638SFD. See start frame delimiterSFF. See small form factorSFTP. See Secure File Transfer Protocolshared keys, 360shielded twisted-pair (STP), 58, 72short circuits, 606Shortest Path First (SPF), 286. See also Open
Shortest Path Firstshow ip route, 255show mac address-table, 307shunning, 470side channel attack, 388signal degradation, 354–355signature identification, 466
SIP. See Session Initiation Protocolsite-to-site VPN, 382SLA. See service level agreementsmall form factor (SFF), 63–65Small Office, Home Office (SOHO), 121,
137–147, 501, 580smart antennas, 345smart jack, 80SmartDraw, 639, 644, 644, 645SMF. See single-mode fiberSMTP. See Simple Mail Transfer ProtocolSmurf attacks, 415–416, 416, 454SNAT. See static NATSNMP. See Simple Network Management
ProtocolSnort, 574social engineering, 427–428software address, 174software as a service (SaaS), 661SOHO. See Small Office, Home OfficeSONET. See Synchronous Optical NetworkSource Address (SA), 100SPAN. See Switch Port Analyzerspanning trees, 303Spanning Tree Protocol (STP), 309, 309–312,
311, 620–621spanning-tree algorithm (STA), 309spatial multiplexing, 346SPF. See Shortest Path Firstsplit pairs, 579, 606splitters, 501SQL injection attacks, 574SSH. See Secure ShellSSID. See Security Set IdentifierSSIDs. See Service Set IdentifiersSSL. See Secure Sockets LayerSSL VPN. See Secure Sockets Layer Virtual
Private NetworkSSM. See Security Services Module
137550bindex.indd 747 12/20/11 4:22 PM
748 ST – TCP
ST. See straight tipSTA. See spanning-tree algorithmStacheldraht, 417standard ACLs, 455star topology, 13–14, 14start frame delimiter (SFD), 99state table, 459, 462state transitions, 44stateful firewalls, 462–463stateful packet inspection, 462–463stateless firewall, 462–463static ARP table entries, 530static IP addressing, 168static IP routing, 255, 264–266, 265, 275static NAT (SNAT), 243, 245static VLAN, 317–318steady state, 257STP. See shielded twisted-pairstraight tip (ST), 63, 64straight-through cable, 75strong passwords, 398subnets
autonomous systems, 265Class B network address, 226–234Class C network address,
217–226, 219IP address, 212–234VLSM, 281
subnet masks, 214–215CIDR, 216–217, 225Class C network address,
trunk ports, 319–320, 320trusted network, 451Trusted Sites, 467, 467trust-exploitation attacks, 427TSC. See Terminal Services ClientT-series WAN connections, 492–495TTL. See Time to Livetunneling
untrusted network, 451upgrades, 437–439UPS. See uninterruptible power supplyuptime, 654USB. See Universal Serial Bususer accounts, 393–396User Datagram Protocol (UDP), 33, 169–170
virtual servers, 659virtual switches, 660viruses, 417–421virus definition files, 440VLAN. See virtual local area networkVLAN Management Policy Server
(VMPS), 318VLAN Trunking Protocol (VTP),
321–324, 323VLSM. See Variable Length Subnet MaskVMPS. See VLAN Management Policy ServerVMs. See virtual machinesVoice over IP (VoIP), 74, 163, 464, 501