Index
Symbols and Numbers
/?, route
* (asterisk), wildcard
- (dash), IP routing
# (pound sign), Hosts table
2.4 GHz
2.4 GHz/5 GHz
-537
5GHz
-537
10Base2. See thinnet
10Base5. See thicknet
10BaseFL
10BaseT
10GBaseER
10GBaseEW
10GBaseGR
10GBaseLR
10GBaseLW
10GBaseSR
10GBaseSW
10GBaseT
25-pair cable
40 MHz
100BaseFX
100BaseTX
100-Megabit Ethernet
110 block
568A
568B
1000BaseCX
1000BaseLX
1000BaseSX
1000BaseT
A
-A
-a
AAA. See authentication, authorization, and accounting
ABRs. See area border routers
AC. See alternating current
access control lists (ACLs)
firewalls
port numbers
stateful firewalls
access links
access lists
Access Point mode, WAP
access points (AP)
configuration
DHCP
installing
rogue
access ports
accounts
anonymous
automatic account lockouts
security policy
user
ACK (acknowledgment)
ACLs. See access control lists
active detection
ActiveX attacks
AD. See administrative distance
ad hoc mode, wireless networks
add
address learning
Address Resolution Protocol (ARP)
IP routing
Proxy ARP
AD-IDS. See anomaly-detection IDS
administrative distance (AD)
administrator training
ADSL. See Asymmetric Digital Subscriber Line
Advanced Encryption Standard (AES)
AES-Counter Mode CBC-MAC Protocol (AES-CCMP)
agents
aggregate rate
AH. See Authentication Header
alias record
alternating current (AC)
Angry IP
anomaly-detection IDS (AD-IDS)
anonymous accounts
antenna
troubleshooting
wireless
antivirus engine
antivirus programs
antivirus scan
anycast
AP. See access points
APIPA. See Automatic Private IP Addressing
applications
bandwidth
server logs
Application layer, OSI
firewalls
application server
application-layer attacks
application-specific integrated circuit (ASIC)
area border routers (ABRs)
ARP. See Address Resolution Protocol
arp
arp -a
ARPAnet
AS. See autonomous system
ASBR. See autonomous system border router
ASIC. See application-specific integrated circuit
Asymmetric Digital Subscriber Line (ADSL)
Asynchronous Transfer Mode (ATM)
Attachment Unit Interface (AUI)
attenuation
AUI. See Attachment Unit Interface
authentication
authorization, and accounting (AAA)
CHAP
EAP
FTP
Kerberos
MAC
MS-CHAP
NAC
PKI
RADIUS
RIPv280
TACACS+
wireless networks
Authentication Header (AH)
authenticator
auto-detect mechanism
automatic account lockouts
Automatic Private IP Addressing (APIPA)
autonomous system (AS)
BGP
EIGRP
autonomous system border router (ASBR)
autorooters
B
backbone
collapsed
networks
OSPF
backdoors
background checks
backups
badges
bandwidth
Bandwidth on Demand Interoperability Group (BONDING)
BASE. See Basic Analysis and Security Engine
baselines
Basic Analysis and Security Engine (BASE)
Basic Rate Interface (BRI)
basic service area (BSA)
basic service set (BSS)
Basic Service Set Identifiers (BSSIDs)
beacons
Bearer channels
Berkeley Software Distribution (BSD)
BGP. See Border Gateway Protocol
binary numbers
bit
black box
black hole
block acknowledgment
blocking state
Bluetooth
BNC. See British Naval Connector
BONDING. See Bandwidth on Demand Interoperability Group
boot-sector viruses
Border Gateway Protocol (BGP)
bottlenecks
bounce
BPDUs. See Bridge Protocol Data Units
BPL. See Broadband over Power Line
BRI. See Basic Rate Interface
bridges
collision domain
Layer
multicast packets
Bridge Protocol Data Units (BPDUs)
Bridging mode, WAP
British Naval Connector (BNC)
Broadband over Power Line (BPL)
broadband services
broadcasts
Layer IPv198
Layer IPv4
broadcast address
broadcast domains
Ethernet
VLAN
broadcast storm
brute-force attacks
BSA. See basic service area
BSD. See Berkeley Software Distribution
BSS. See basic service set
BSSIDs. See Basic Service Set Identifiers
buffer
Buffer Full
buffer overflow
burst
bus topology
butt set
byte
C
-c
CA. See certificate authority
cables. See also specific cable types
properties
troubleshooting
wiring standards
cable modem
cable stripper/snips
cable testers
caching engines
caching proxy server
call setup
cameras, security policy
canonical name (CNAME)
CARP. See Common Address Redundancy Protocol
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Category 2 twisted-pair cable
Category 3 twisted-pair cable
Category 4 twisted-pair cable
Category 5 twisted-pair cable
Category 5e twisted-pair cable
Category 6 twisted-pair cable
Category 6a twisted-pair cable
CATV. See community antenna television
CCEVS. See Common Criteria Evaluation and Validation Scheme
Cd
cellular WAN
central office (CO)
central processing unit (CPU)
centralized WAN
certificate authority (CA)
certifiers
Challenge Handshake Authentication Protocol (CHAP)
change
change management
channels
EtherChannel
side channel attack
T-series connections
WAP
wireless networks
channel bonding
channel service unit/data service unit (CSU/DSU)
CHAP. See Challenge Handshake Authentication Protocol
CIDR. See Classless Internet Domain Routing
CIR. See committed information rate
circuit switching
cladding
Class A network address
Class B network address
Class C network address
Class D network address
Class E network address
classful routing
Classless Internet Domain Routing (CIDR)
IPv200
NAT
subnet mask
classless routing
clean-desk policy
client machines
client mode, VTP
client-server
CLNS. See Connectionless Network Service
cloud computing
CNAME. See canonical name
CO. See central office
coaxial cable
collapsed backbone
collisions
collision domains
Ethernet
routers
switches
collision events
collision light
.com
committed information rate (CIR)
Common Address Redundancy Protocol (CARP)
Common Criteria Evaluation and Validation Scheme (CCEVS)
communication satellite (comsat)
community antenna television (CATV)
compression
comsat. See communication satellite
Connectionless Network Service (CLNS)
connectionless protocol
connection-oriented communication
connectivity software
connectivity testing
content filtering
Content Security Control (CSC)
continuity testers
convergence
routing tables
Spanning Tree Protocol
CPE. See customer premises equipment
CPU. See central processing unit
CRC. See cyclic redundancy check
crossover cable
crosstalk
CSC. See Content Security Control
CSMA/CD. See Carrier Sense Multiple Access with Collision Detection
CSU/DSU. See channel service unit/data service unit
customer premises equipment (CPE)
cyclic redundancy check (CRC)
frames
IP routing
D
-d
D channel
DA. See Destination Address
data communication equipment (DCE)
Data Encryption Standard (DES)
data frame
Data Link Connection Identifiers (DLCIs)
Data Link layer, OSI
encapsulation
Ethernet
frames
IP routing
data over cable service interface specification (DOCSIS)
data packets
data steam
data terminal equipment (DTE)
datagrams
DB-69
dBi. See decibel isotropic
DCE. See data communication equipment
DDos. See distributed denial of service attacks
decibel isotropic (dBi)
decimal numbers
decompression
decryption
dedicated lines
de-encapsulation
default gateway
DHCP
incorrect
IP routing
ping
default routes
delay
delete
delivery protocol
demarc
demarc extension
demilitarized zone (DMZ)
firewalls
IDS/IPS
route
security policy
denial of service attack (DoS)
ACLs
DDos
DoS/SYN flood attack
firewalls
Dense Wavelength Division Multiplexing (DWDM)
Department of Defense (DoD)
OSI
port scanners
TCP/IP
DES. See Data Encryption Standard
destination
Destination Address (DA)
Destination Unreachable
DFS. See Dynamic Frequency Selection
DHCP. See Dynamic Host Configuration Protocol
Diffie-Hellmann algorithm
Diffusing Update Algorithm (DUAL)
dig
Digital, Intel, and Xerox (DIX)
digital certificates
digital ID
Digital Signal 0 (DS0)
Digital Signal 1 (DS1)
Digital Signal 3 (DS3)
digital subscriber line (DSL). See also specific DSL types
digital subscriber line access multiplexer (DSLAM)
Dijkstra algorithm
DIP. See dual inline package
Direct Sequence Spread Spectrum (DSSS)
directional antennas
Directory Service
disabled state, Spanning Tree Protocol
discontiguous networks
distance vector (DV)
EIGRP
RIPv280
routing protocols
distributed denial of service attacks (DDos)
distributed WAN
distribution list
distribution network
distribution system (DS)
diversity
DIX. See Digital, Intel, and Xerox
DLCIs. See Data Link Connection Identifiers
.dll
DMZ. See demilitarized zone
DNS. See Domain Name Service
DNS Server
DOCSIS. See data over cable service interface specification
DoD. See Department of Defense
Domain Name Service (DNS)
certifiers
DHCP
DMZ
incorrect
IP address
ipconfig
network reconnaissance
port scanners
tracert
door locks
DoS. See denial of service attack
DOS commands
DoS/SYN flood attack
dropped packets
DS. See distribution system
DS0. See Digital Signal 0
DS1. See Digital Signal 1
DS3. See Digital Signal 3
DSL. See digital subscriber line
DSLAM. See digital subscriber line access multiplexer
DSSS. See Direct Sequence Spread Spectrum
DTE. See data terminal equipment
DTP. See Dynamic Trunking Protocol
DUAL. See Diffusing Update Algorithm
dual inline package (DIP)
dumb terminals
DV. See distance vector
DWDM. See Dense Wavelength Division Multiplexing
dynamic ARP table entries
dynamic DNS
Dynamic Frequency Selection (DFS)
Dynamic Host Configuration Protocol (DHCP)
APIPA
certifiers
DSL
evil twin
ipconfig
Parameter Request List
protocol analyzers
Scope Options
server logs
WAP
dynamic IP routing
dynamic NAT
dynamic packet filtering
dynamic state list
Dynamic Trunking Protocol (DTP)
dynamic VLAN
E
-e
EAP. See Extensible Authentication Protocol
EAR. See Export Administration Regulations
echo
echo request payload
.edu
EEOC. See equipment exceeds operator capability
EGPs. See exterior gateway protocols
EIA/TIA. See Electronic Industries Association/Telecommunications Industry Alliance
EIGRP. See Enhanced Interior Gateway Routing Protocol
electromagnetic interference (EMI)
Electronic Industries Association/Telecommunications Industry Alliance (EIA/TIA)
email server
email virus
emergency virus scan
EMI. See electromagnetic interference
Encapsulating Security Payload (ESP)
encapsulation
IP
OSI
encryption
AES
DES
devices
OSI Presentation layer
passwords
PGP
public key
security filtering
SSL
symmetrical key
3DES
VPN concentrator
wireless networks
wireless NICs
endpoints
end-user training
Enhanced Interior Gateway Routing Protocol (EIGRP)
AD
DV
IP routing
IS-IS
LS
multicast
RIPv280
v
VLSM
environment
environmental monitors
equipment access
equipment exceeds operator capability(EEOC)
ESP. See Encapsulating Security Payload
ESS. See extended service set
ESSIDs. See Extended Service Set Identifiers
eth_addr
EtherChannel
Ethernet. See also specific Ethernet types
addressing
broadcast domain
channel bonding
collision domain
CSMA/CD
frames
full duplex
half duplex
MMF
OSI
Data Link layer,
Physical layer
RJ-102
SMF
specifications
switches
Type
UTP
crossover cable
ETSi. See European Telecommunications Standards Institute
European Telecommunications Standards Institute (ETSi)
Event Viewer
evil twin
Evolved High Speed Packet Access (HSPA+)
.exe
exit interviews
expansion slots
Export Administration Regulations (EAR)
extended ACLs
extended demark
extended service set (ESS)
Extended Service Set Identifiers (ESSIDs)
Extensible Authentication Protocol (EAP)
exterior gateway protocols (EGPs)
extranet VPN
F
-f
F connector
Fast Ethernet
fault tolerance
fax server
FCC. See Federal Communications Commission
FCS. See Frame Check Sequence
feasible successor
Federal Communications Commission (FCC)
FEP. See fluoroethylenepropylene
fiber to premises
fiber-optic cable
FIFO. See first-in, first-out
File Replication Service
file server
File Transfer Protocol (FTP)
application-layer attacks
bounce
DMZ
DNS
firewalls
OSI Application layer
password encryption
proxy
troubleshooting
file viruses
firewalls
ACLs
DMZ
IP spoofing attacks
OSI
Application layer,
Network layer,
protocol switching
scanning services
security policy
technologies
first-in, first-out (FIFO)
flat network
flow control
fluoroethylenepropylene (FEP, Teflon)
forward/filter decisions
forward/filter table
forwarding state
FQDN. See fully qualified domain name
fractional T1 (FT1)
frames
CRC
Ethernet
IP routing
OSI
Data Link layer
Physical layer
Spanning Tree Protocol
switches
Frame Check Sequence (FCS)
frame filtering
Frame Relay
frequency
FT1. See fractional T1
FTP. See File Transfer Protocol
ftp
FTP PORT
full duplex
Ethernet
OSI Session layer
TCP
fully qualified domain name (FQDN)
G
-g
-g host-list
gateway
gateways, . See also default gateway; specific gateway protocols
BPL
encryption
incorrect
GB. See gigabyte
Generic Routing Encapsulation (GRE)
GetRequest
Gigabit Ethernet
gigabyte (GB)
G/L. See Global/Local bit
global address, NAT
global unicast address, IPv204
Global/Local bit (G/L)
.gov
GRE. See Generic Routing Encapsulation
guards
H
-h maximum_hops
H.464
half duplex
Ethernet
NICs
OSI Session layer
switches
wireless networks
handshake
CHAP
MS-CHAP
three-way handshake
hardware address
hardware broadcasts. See Layer 2
hashing functions
HDLC. See High-Level Data Link Control
HDSL. See high bit-rate digital subscriber line
headend
hello packets
heuristic scanning
hexadecimal numbers
HFC. See hybrid fiber-coaxial
HIDS. See host-based IDS
hierarchical addressing
high availability
high bit-rate digital subscriber line (HDSL)
High Speed Serial Data Connector (HSSDC)
High-Level Data Link Control (HDLC)
honeynets
honeypot
hops
hop count
DV
OSPF
RIP
RIPv280
hosts
duplex
networks
VLSM
workstations
host address
host-based firewalls
host-based IDS (HIDS)
hostname
Hosts table
Host-to-Host layer, DoD model
hotfixes
HSPA+. See Evolved High Speed Packet Access
HSSDC. See High Speed Serial Data Connector
HTML
HTTP. See Hypertext Transfer Protocol
HTTPS. See Hypertext Transfer Protocol Secure
hubs
collision domains
full duplex
LAN
OSI Physical layer
switches
humidity
hybrid fiber-coaxial (HFC)
hybrid IP routing
hybrid mesh topology
hybrid topology
Hypertext Transfer Protocol (HTTP)
application-layer attacks
DMZ
DNS
firewalls
IP routing
IPv202
netstat
OSI Application layer
port numbers
proxy
Telnet
Hypertext Transfer Protocol Secure (HTTPS)
I
-i address
-i TTL
IBSS. See independent basic service set
ICA. See Independent Computing Architecture
ICMP. See Internet Control Message Protocol
ICSA. See International Computer Security Association
ID Ten T error (ID10T)
IDC. See insulation displacement connector
IDF. See intermediate distribution frame
IDS. See intrusion detection system
IE. See Internet Explorer
IEC. See International Electrotechnical Commission
IEEE. See Institute of Electrical and Electronics Engineers
IETF. See Internet Engineering Task Force
if
if_addr
ifconfig
I/G. See Individual/Group bit
IGMP. See Internet Group Management Protocol
IGPs. See interior gateway protocols
IGRP. See Interior Gateway Routing Protocol
IMAP. See Internet Message Access Protocol
inbound ACLs
incident response
independent basic service set (IBSS)
Independent Computing Architecture (ICA)
Individual/Group bit (I/G)
inet_addr
infrastructure mode, wireless networks
inherent attenuation
injectors, PoE
inside global address, NAT
inside local address, NAT
Institute of Electrical and Electronics Engineers (IEEE)
802
802.1D
802.1Q
802.1w
802.
802.3ab
802.3af
802.3an
802.3at
802.3u
802.
802.11a
802.11b
802.11g
802.11h
802.11n
803.3z
insulation displacement connector (IDC)
.int
Integrated Services Digital Networks (ISDN)
interior gateway protocols (IGPs)
BGP
IS-IS
Interior Gateway Routing Protocol (IGRP)
intermediate distribution frame (IDF)
Intermediate System-to-Intermediate System (IS-IS)
internal routing protocols
International Computer Security Association (ICSA)
International Electrotechnical Commission (IEC)
International Organization for Standardization (ISO)
Internet
Internet Control Message Protocol (ICMP)
ACLs
IP routing
ping
traceroute
Internet Engineering Task Force (IETF)
Internet Explorer (IE)
Internet Group Management Protocol (IGMP)
Internet layer, DoD model
Internet Message Access Protocol (IMAP)
Internet Options, Security tab
Internet Protocol (IP), . See also specific IP topics and processes
ACLs
CLNS
encapsulation
OSPF
SOHO
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
CLNS
IP routing
ipconfig
OSPF
routing protocols
SOHO
Internet Security Association and Key Management Protocol (ISAKMP)
Internet service providers (ISPs)
BGP
cable modem
CIDR
internetwork
devices
DV
routers
routing tables
SOHO
switches
Internetwork Package Exchange (IPX)
Inter-Switch Link (ISL)
intranet
intrusion detection system (IDS)
packet sniffers
intrusion prevention system (IPS)
packet sniffers
inverse multiplexing
IP. See Internet Protocol
IP address
ACLs
arp -a
BGP
DHCP
DNS
DOS commands
evil twin
hierarchical addressing
incorrect
network configuration
NICs
port security
private
problem determination
Smurf attacks
static
subnets
switches
troubleshooting
v
VLSM
WAP
IP header
IP proxy
IP routing, . See also specific routing types
ARP
CRC
default gateway
Destination Unreachable
dynamic
FCS
frames
hardware address
HTTP
HTTPS
hybrid
ICMP
MAC address
OSI
Data Link layer
Network layer
Physical layer
packets
packet switching
process
Registry
static
IP Security (IPSec)
IP spoofing attack
IP stack
ipconfig
ipconfig/all
ipconfig/release
ipconfig/renew
IPS. See intrusion prevention system
IPSec. See IP Security
IPv4. See Internet Protocol version 4
IPv6. See Internet Protocol version 6
IPX. See Internetwork Package Exchange
ISAKMP. See Internet Security Association and Key Management Protocol
ISDN. See Integrated Services Digital Networks
IS-IS. See Intermediate System-to-Intermediate System
ISL. See Inter-Switch Link
ISO. See International Organization for Standardization
isotropic antennas
ISPs. See Internet service providers
J
-j host-list
jitter
K
-k host-list
Kerberos
Kevlar
L
-l size
L2F. See Layer 2 Forwarding
L2TP. See Layer 2 Tunneling Protocol
LAN. See local area network
LAN Manager
latching
latency
latency sensitivity
Layer 2
bridges
broadcasts, IPv198
port security
Spanning Tree Protocol
switches
Layer 2 Forwarding (L2F)
Layer 2 Tunneling Protocol (L2TP)
Layer 3
broadcasts, IPv4
port security
switches, routers
layered architecture, OSI
LC. See Local Connector
Lcd
LDAP. See Lightweight Directory Access Protocol
learning state
leased lines
least significant bit (LSB)
LEDs. See light-emitting diodes
Length, IEEE 802.100
light-emitting diodes (LEDs)
Lightweight Directory Access Protocol (LDAP)
Link Aggregation
link light
link state (LS)
link state advertisements (LSAs)
link state packets (LSPs)
link-local address
listening state
LLC. See Logical Link Control
load balancing
load testing
local address
local area network (LAN). See also Small Office, Home Office; virtual local area network; wireless local area network
IP routing
packet switching
RJ-61
routers
switches
bridges
VLSM
VPN
Local Connector (LC)
local loop
logging, NIDS
logical address
Logical Link Control (LLC)
logical network diagrams
LogMein
Long Term Evolution (LTE)
loop avoidance
loopback plug
LS. See link state
Ls
LSAs. See link state advertisements
LSB. See least significant bit
LSPs. See link state packets
LTE. See Long Term Evolution
M
MAC. See Media Access Control
macro viruses
magnetic flux
mail exchanger (MX)
mail relay
mail server
main distribution frame (MDF)
mainframes
man-in-the-middle attacks
mask netmask
maximum burst rate (MBR)
maximum transmission unit (MTU)
MB. See megabyte
MBR. See maximum burst rate
MD5. See Message-Digest algorithm 5
MDF. See main distribution frame
MD-IDS. See misuse-detection IDS
MDI/MDI-X. See medium dependent interface/medium dependent interface-crossover
mechanical transfer registered jack (MTRJ)
Media Access Control (MAC)
address
ARP
arp -a
bridges
DHCP
IP routing
ipconfig
IPv202
port security
PPPoE
switches
TKIP
VLAN
authentication
forward/filter table
media converters
medium dependent interface/medium dependent interface-crossover (MDI/MDI-X)
meet-in-the-middle attack
megabyte (MB)
mesh topology
Message-Digest algorithm 5 (MD5)
metric
metric metric
mget
Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)
microwave radio relay
.mil
Mills, David
MILNET
MIMO. See multiple-input multiple-output
misuse-detection IDS (MD-IDS)
MLS. See multilayer switch
MMF. See multimode fiber
mobility
modems. See also cable modem
modulation technique
monitor viewing
MPLS. See MultiProtocol Label Switching
MS-CHAP. See Microsoft Challenge Handshake Authentication Protocol
Mtr
MTRJ. See mechanical transfer registered jack
MTU. See maximum transmission unit
multicast packets
bridges
EIGRPv291
IPv199
IPv204
RIPng
routers
switches
multifactor authentication
multilayer switch (MLS)
multimedia
multimeter
multimode fiber (MMF)
multipartite viruses
multiple barrier system
multiple-input multiple-output (MIMO)
MultiProtocol Label Switching (MPLS)
MX. See mail exchanger
N
-N
-n
-n count
NaaS. See network as a service
NAC. See Network Access Control
name resolution
NAT. See Network Address Translation
National Fire Protection Association (NFPA)
National Institute of Standards and Technology (NIST)
National Security Agency (NSA)
nbtstat
NCP. See Network Control Protocol
near-end crosstalk (NEXT)
neighbor table
neighbor-discovery process
NESSUS
.net
NetBIOS. See Network Basic Input/Output System
netstat
NetWare
networks, . See also specific network types and devices
backbone
bus topology
client-server
configuration
devices
documentation
environment
firewalls
hosts
hybrid topology
LAN
mesh topology
monitoring performance
MPLS
operating system
peer-to-peer
physical media
physical topology
selection,
point-to-multipoint topology
point-to-point topology
policies
procedures
ring topology
security threat mitigation
security threats
segments
SOHO,
troubleshooting,
servers
star topology
troubleshooting
WAN
workstations
Network Access Control (NAC)
Network Access layer, DoD model
network address
Class A
Class B
Class C
Class D
Class E
Network Address Translation (NAT)
configuration
IPv200
WAP
network analyzer
network as a service (NaaS)
Network Basic Input/Output System (NetBIOS)
Network Control Protocol (NCP)
Network Interface Cards (NICs)
crossover cable
duplex
firewalls
half duplex
IP address
packet sniffers
ping
wireless
xDSL
network interface device (NID)
Network layer, OSI
encapsulation
firewalls
IP routing
SOHO
network management stations (NMSs)
Network Mapper (NMAP)
Network Monitor
network reconnaissance
network scanners
Network Time Protocol (NTP)
network-based firewalls
network-based IDS (NIDS)
NEXT. See near-end crosstalk
next-hop address
next-hop router
NFPA. See National Fire Protection Association
nibble
NICs. See Network Interface Cards
NID. See network interface device
NIDS. See network-based IDS
NIST. See National Institute of Standards and Technology
NMAP. See Network Mapper
NMSs. See network management stations
noise immunity
nonces
notification
Novell
NSA. See National Security Agency
nslookup
NTP. See Network Time Protocol
O
OC. See optical carrier
octet
OE. See operator error
OFDM. See Orthogonal Frequency Division Multiplexing
OLT. See optical line termination
omni directional antennas
on-access virus scan
on-demand virus scan
one-to-many address
ONUs. See optical network units
open access mode, WLAN
open impedance mismatch
open relay
Open Shortest Path First (OSPF)
IP routing
IS-IS
LS
RIPv280
v
VLSM
Open Systems Interconnection (OSI)
Application layer
firewalls,
connection-oriented communication
Data Link layer
encapsulation
Ethernet,
frames
IP routing
routers
DoD model
encapsulation
flow control
layered architecture
MLS
Network layer
encapsulation
firewalls,
IP routing
SOHO
PDU
Physical layer
encapsulation
Ethernet
frames
hubs,
IP routing
Presentation layer
reference model
Session layer
TCP/IP
Transport layer
ACK,
encapsulation
port numbers,
reliable networking,
windows
operating system
operator error (OE)
optical carrier (OC)
optical line termination (OLT)
optical network units (ONUs)
optical time-domain reflectometer (OTDR)
.org
organizationally unique identifier (OUI)
Orthogonal Frequency Division Multiplexing (OFDM)
OS/299
OSI. See Open Systems Interconnection
OSPF. See Open Shortest Path First
OTDR. See optical time-domain reflectometer
OUI. See organizationally unique identifier
outbound ACLs
out-of-order delivery
outside global address, NAT
outside local address, NAT
overhead
overloading
P
-p
netstat
route
-p period
packets. See also specific packet types
dynamic filtering
IP routing
NAT
OSI Network layer
PDUs
TKIP
VLAN
Packet InterNet Groper. See ping
packet shaping
packet sniffers
packet switching
Frame Relay
IP routing
LAN
SOHO
packet-filter firewalls
PANs. See personal area networks
PAP. See Password Authentication Protocol
partial mesh topology
passive detection
Passive Optical Network (PON)
passphrase
passwords
automatic account lockouts
encryption
security policy
WAP
password attacks
Password Authentication Protocol (PAP)
PAT. See Port Address Translation
patch cable
patches
security policy
pathping
payload protocol
PDUs. See Protocol Data Units
PEBCAK. See problem exists between chair and keyboard
peer-to-peer networks
penetration
personal area networks (PANs)
PGP. See Pretty Good Privacy
phishing
physical barriers
Physical layer, OSI
encapsulation
Ethernet
frames
hubs
IP routing
physical network diagrams
physical security
physical topology, networks
selection
ping
Ping of Death
PKI. See Public Key Infrastructure
plain old telephone service (POTS)
ADSL
ISDN
PSTN
plennum-rated coating
PoE. See Power over Ethernet
point of presence (POP)
pointer record (PTR)
point-to-multipoint topology
point-to-point connection
point-to-point link
Point-to-Point Protocol (PPP)
Point-to-Point Protocol over Ethernet (PPPoE)
DSL
point-to-point topology
Point-to-Point Tunneling Protocol (PPTP)
policies
networks
security
polyvinyl chloride (PVC)
PON. See Passive Optical Network
POP. See point of presence; Post Office Protocol
ports
access ports
IDS
routers
security
speed
switches
trunk ports
USB
WAN
Port Address Translation (PAT)
port duplex mismatch
port mirroring
port numbers
ACLs
OSI Transport layer
port scanners
port sweeping
port-redirection attacks
Post Office Protocol (POP)
POTS. See plain old telephone service
Power over Ethernet (PoE)
power switch
powers of 214
PPP. See Point-to-Point Protocol
PPPoE. See Point-to-Point Protocol over Ethernet
PPTP. See Point-to-Point Tunneling Protocol
preamble
prefix routing
Presentation layer, OSI
Pre-Shared Key (PSK)
Pretty Good Privacy (PGP)
Primary Rate Interface (PRI)
print server
private cloud
private IP address
private network
private side firewalls
proactive defense
problem exists between chair and keyboard (PEBCAK)
procedures
networks
security
Process/Application layer, DoD model
protocol analyzers
Protocol Data Units (PDUs)
protocol switching
Proxy ARP
proxy server
PSK. See Pre-Shared Key
PSTN. See Public Switched Telephone Network
PTR. See pointer record
public cloud
public key encryption
Public Key Infrastructure (PKI)
public side firewalls
Public Switched Telephone Network (PSTN)
punch-down tool
PVC. See polyvinyl chloride
Pwd
Q
-q num-queries
quality of service (QoS)
R
-R
-r
-r count
rack-mounted switches
radio frequency interference (RFI)
RADIUS. See Remote Authentication Dial In User Service
Rapid Spanning Tree Protocol (RSTP)
RARP. See Reverse Address Resolution Protocol
RAS. See Remote Access Services
rate limiting
RDC. See Remote Desktop Connection
RDP. See Remote Desktop Protocol
Real-time Transport Protocol (RTP)
Recommended Standard 232 (RS-232)
recording equipment
reference model, OSI
registered jack (RJ)
RJ-
RJ-
Registry
regulations
reliable networking
remote access
remote access server
Remote Access Services (RAS)
Remote Authentication Dial In User Service (RADIUS)
PPPoE
VPN concentrator
Remote Desktop Connection (RDC)
Remote Desktop Protocol (RDP)
Remote Desktop Services
remote-access VPN
repeaters
replay attacks
Requests for Comments (RFCs)
resistance-to-change syndrome
Reverse Address Resolution Protocol (RARP)
reverse lookup zone
RFCs. See Requests for Comments
RFI. See radio frequency interference
RG-58
RG-58 A/U
RG-58 U
RG-57
RG-58
ring topology
RIP. See Routing Information Protocol
RIPng. See Routing Information Protocol next generation
RIPv2. See Routing Information Protocol version 2
Rivest, Shamir, and Adleman (RSA)
RJ. See registered jack
RJ-
RJ-
rogue access points
rootkit
round-robin load balancing
route
routers, . See also IP routing
ABRs
ACLs
ASBR
broadcasts
collision domains
CPU
Internet
internetwork
IP routing
LAN
missing routes
next-hop
OSI
Data Link layer
Network layer
point-to-point topology
ports
QoS
security zones
SOHO
subnets
traceroute
WAN
route-update packets
routing by rumor
routing flow tree
Routing Information Protocol (RIP)
AD
convergence
IP routing
OSPF
Routing Information Protocol next generation (RIPng)
Routing Information Protocol version 2 (RIPv2)
routing loops
routing protocols, . See also specific protocols
AD
classes
DV
hybrid IP routing
IPv
LS
routing tables
convergence
EIGRP
internetwork
SOHO
RS-232. See Recommended Standard 232
RSA. See Rivest, Shamir, and Adleman
RST (reset packet)
RSTP. See Rapid Spanning Tree Protocol
RTP. See Real-time Transport Protocol
S
-S
-s
-s count
-S srcaddr
SA. See Source Address
SaaS. See software as a service
Sarbanes-Oxley Act of 2002 (Sar-Ox)
SAs. See security associations
SATAN. See Security Administrator Tool for Analyzing Networks
SC. See subscriber connector
scanning services
schematics
Scope Options
SCP. See Secure Copy Protocol
SDH. See Synchronous Digital Hierarchy
SDSL. See symmetric digital subscriber line
Secure Copy Protocol (SCP)
Secure File Transfer Protocol (SFTP)
Secure Shell (SSH)
SFTP
Telnet
Secure Sockets Layer (SSL)
tunneling
VPN concentrator
Secure Sockets Layer Virtual Private Network (SSL VPN)
security
antivirus programs
DSL
hardware/software
patches and upgrades
physical
policies
procedures
server logs
threats
mitigation,
wireless networks,
training
wireless networks
Security Administrator Tool for Analyzing Networks (SATAN)
security associations (SAs)
security audits
security filtering
ACLs
encryption
remote access
tunneling
Security Services Module (SSM)
Security Set Identifier (SSID)
evil twin
WAP
war driving
Security tab, Internet Options
security zones
segments
networks
SOHO,
troubleshooting,
OSI
connection-oriented communication
flow control
PDU
TCP
UDP
sendmail
serial cables
servers. See also specific server types
server logs
server mode, VTP
service level agreement (SLA)
service packs
Service Set Identifiers (SSIDs)
Session Initiation Protocol (SIP)
Session layer, OSI
session secret
SetRequest
SFD. See start frame delimiter
SFF. See small form factor
SFTP. See Secure File Transfer Protocol
shared keys
shielded twisted-pair (STP)
short circuits
Shortest Path First (SPF). See also Open Shortest Path First
show ip route
show mac address-table
shunning
side channel attack
signal degradation
signature identification
Simple Mail Transfer Protocol (SMTP)
proxy
Simple Network Management Protocol (SNMP)
simplex
single sign-on
single-mode fiber (SMF)
10GBase-LW
1000BaseLX
SIP. See Session Initiation Protocol
site-to-site VPN
SLA. See service level agreement
small form factor (SFF)
Small Office, Home Office (SOHO)
smart antennas
smart jack
SmartDraw
SMF. See single-mode fiber
SMTP. See Simple Mail Transfer Protocol
Smurf attacks
SNAT. See static NAT
SNMP. See Simple Network Management Protocol
Snort
social engineering
software address
software as a service (SaaS)
SOHO. See Small Office, Home Office
SONET. See Synchronous Optical Network
Source Address (SA)
SPAN. See Switch Port Analyzer
spanning trees
Spanning Tree Protocol (STP)
spanning-tree algorithm (STA)
spatial multiplexing
SPF. See Shortest Path First
split pairs
splitters
SQL injection attacks
SSH. See Secure Shell
SSID. See Security Set Identifier
SSIDs. See Service Set Identifiers
SSL. See Secure Sockets Layer
SSL VPN. See Secure Sockets Layer Virtual Private Network
SSM. See Security Services Module
ST. See straight tip
STA. See spanning-tree algorithm
Stacheldraht
standard ACLs
star topology
start frame delimiter (SFD)
state table
state transitions
stateful firewalls
stateful packet inspection
stateless firewall
static ARP table entries
static IP addressing
static IP routing
static NAT (SNAT)
static VLAN
steady state
STP. See shielded twisted-pair
straight tip (ST)
straight-through cable
strong passwords
subnets
autonomous systems
Class B network address
Class C network address
IP address
VLSM
subnet masks
CIDR
Class C network address
DHCP
EIGRP
route
VLSM
subscriber connector (SC)
supplicant
surge protectors
swipe mechanisms
switches. See also specific switch and switching types
address learning
broadcast domain
collision domains
Ethernet
forward/filter decisions
half duplex
hubs
internetwork
LAN
bridges
Layer
Layer routers
loop avoidance
MAC address
multicast packets
nbtstat
netstat
networks before
PoE
ports
port mirroring
PSTN
rack-mounted
services
SPAN
Spanning Tree Protocol
VLAN
VTP
wireless networks, troubleshooting
Switch Port Analyzer (SPAN)
symmetric digital subscriber line (SDSL)
symmetrical key encryption
SYN (synchronize)
SYN flood
DoS/SYN flood attack
SYN/ACK (synchronize- acknowledgment)
Synchronous Digital Hierarchy (SDH)
Synchronous Optical Network (SONET)
Syslog
T
-t
T1
crossover cable
WAN connection
T
TA. See terminal adapter
TACACS+. See Terminal Access Control Access-Control System Plus
tapping
TCP. See Transmission Control Protocol
TCP/IP. See Transmission Control Protocol/Internet Protocol
TDM. See time-division multiplexing
TDR. See time-domain reflectometer
Teflon. See fluoroethylenepropylene
telephony server
Telnet
telnet
temperature
Temporal Key Integrity Protocol (TKIP)
Terminal Access Control Access-Control System Plus (TACACS+)
terminal adapter (TA)
Terminal Services Client (TSC)
TFN. See Tribe Flood Network
TFN2K. See Tribe Flood Network 2000
TFTP. See Trivial File Transfer Protocol
thicknet
thin client
thin computing
thin protocol. See User Datagram Protocol
thinnet
Third Generation Partnership Project 2 (3GPP2)
thrashing
3DES. See Triple Data Encryption Standard
3GPP2. See Third Generation Partnership Project 2
three-way handshake
throughput
testing
Time to Live (TTL)
time-division multiplexing (TDM)
time-domain reflectometer (TDR)
TLS. See Transport Layer Security
Token Ring
toll network
toner probe
topology table
TPC. See Transmit Power Control
Traceroute
traceroute
tracert
tracking
traffic contract
traffic shaping
transceivers
Transmission Control Protocol (TCP)
connection-oriented communication
DNS
full duplex
OSI Transport layer
port numbers
port scanners
segments
stateful firewalls
throughput testers
UDP
Transmission Control Protocol/Internet Protocol (TCP/IP)
ACLs
ARP
DoD model
FTP
history
IGMP
IPSec
L2TP
nbtstat
netstat
network segments
OSI
Application layer
windows
ping
protocol switching
subnets
SYN flood
Telnet
traceroute
transmission speeds
cables
DSL
WAN
Transmit Power Control (TPC)
transparent bridging
transparent mode, VTP
Transport layer, OSI
ACK
encapsulation
port numbers
reliable networking
Transport Layer Security (TLS)
traps
Tribe Flood Network (TFN)
Tribe Flood Network 2000 (TFN2K)
Triple Data Encryption Standard (3DES)
Trivial File Transfer Protocol (TFTP)
Trojan horse
troubleshooting
ARP
cables
connectivity software
FTP
Hosts table
ifconfig
IP address
ipconfig
Mtr
nbtstat
networks
segments,
nslookup
ping
protocol analyzers
route
steps
Telnet
throughput testers
tips
tools
traceroute
wireless networks
workstations
trunk ports
trusted network
Trusted Sites
trust-exploitation attacks
TSC. See Terminal Services Client
T-series WAN connections
TTL. See Time to Live
tunneling
IPSec
L2TP
PPTP
security filtering
SSL
SSL VPN
VPN
twisted-pair cable
Type, Ethernet
U
UDP. See User Datagram Protocol
unicast
UNII. See Unlicensed National Information Infrastructure
uninterruptible power supply (UPS)
unique local address
Universal Serial Bus (USB)
Unlicensed National Information Infrastructure (UNII)
unreliable protocol
unshielded twisted-pair (UTP)
connecting
Ethernet
crossover cable
ISDN
PSTN
wiring schematics
xDSL
untrusted network
upgrades
UPS. See uninterruptible power supply
uptime
USB. See Universal Serial Bus
user accounts
User Datagram Protocol (UDP)
DHCP
DNS
netstat
OSI Transport layer
packet sniffers
port numbers
port scanners
RIPng
segments
throughput testers
UTP. See unshielded twisted-pair
V
-v
-v TOS
Variable Length Subnet Mask (VLSM)
VDSL. See very high bit-range digital subscriber line
very high bit-range digital subscriber line (VDSL)
video
virtual circuits
virtual desktops
virtual local area network (VLAN)
broadcast domains
dynamic
identifying
incorrect
ipconfig
membership
QoS
static
switches
trunk ports
voice
virtual machines (VMs)
virtual networks
Virtual Private Network (VPN), . See also VPN concentrator
packet sniffers
tunneling
virtual servers
virtual switches
viruses
virus definition files
VLAN. See virtual local area network
VLAN Management Policy Server (VMPS)
VLAN Trunking Protocol (VTP)
VLSM. See Variable Length Subnet Mask
VMPS. See VLAN Management Policy Server
VMs. See virtual machines
Voice over IP (VoIP)
bandwidth
network configuration
PoE
switches
voice VLAN
VoIP. See Voice over IP
voltage event recorder
volt/ohm meter (VOM)
VPN. See Virtual Private Network
VPN concentrator
VTP. See VLAN Trunking Protocol
vulnerability scanners
W
-w timeout
WAN. See wide area network
WAP. See wireless access points
war chalking
war driving
Wavelength Division Multiplexing (WDM)
Web proxy server
web server
well-known port numbers
WEP. See Wired Equivalent Privacy
wide area network (WAN)
broadband services
cellular
connection types
demarc
IP routing
network segments
protocols
subnets
VLSM
VPN
wireless
wiring
Wi-Fi
Wi-Fi Alliance
Wi-Fi Protected Access (WPA)
cracking
WAP
WiMAX. See World Wide Interoperability for Microwave Access
windows, OSI
Windows Internet Naming Service (WINS)
Windows Update
WINS. See Windows Internet Naming Service
wire crimper
Wired Equivalent Privacy (WEP)
cracking
WAP
wireless access points (WAP)
configuration
DHCP
installing
wireless antennas
wireless local area network (WLAN)
history
IEEE 802.
ipconfig
wireless networks
ad hoc mode
authentication
components
infrastructure mode
installing
security
security threats
signal degradation
switches, troubleshooting
transmission media
troubleshooting
wireless NICs
wireless WAN
wire-map testers
Wireshark
wiring. See also cables
EIA/TIA
schematics
security policy
standards
WAN
WLAN. See wireless local area network
WLAN Association (WLANA)
workgroups
workstations
World Wide Interoperability for Microwave Access (WiMAX)
worms
WPA. See Wi-Fi Protected Access
X
xDSL
Z
Zimmerman, Phil
zones
firewalls
security