Index

Symbols and Numbers

/?, route

* (asterisk), wildcard

- (dash), IP routing

# (pound sign), Hosts table

2.4 GHz

2.4 GHz/5 GHz

-537

5GHz

-537

10Base2. See thinnet

10Base5. See thicknet

10BaseFL

10BaseT

10GBaseER

10GBaseEW

10GBaseGR

10GBaseLR

10GBaseLW

10GBaseSR

10GBaseSW

10GBaseT

25-pair cable

40 MHz

100BaseFX

100BaseTX

100-Megabit Ethernet

110 block

568A

568B

1000BaseCX

1000BaseLX

1000BaseSX

1000BaseT

A

-A

-a

AAA. See authentication, authorization, and accounting

ABRs. See area border routers

AC. See alternating current

access control lists (ACLs)

firewalls

port numbers

stateful firewalls

access links

access lists

Access Point mode, WAP

access points (AP)

configuration

DHCP

installing

rogue

access ports

accounts

anonymous

automatic account lockouts

security policy

user

ACK (acknowledgment)

ACLs. See access control lists

active detection

ActiveX attacks

AD. See administrative distance

ad hoc mode, wireless networks

add

address learning

Address Resolution Protocol (ARP)

IP routing

Proxy ARP

AD-IDS. See anomaly-detection IDS

administrative distance (AD)

administrator training

ADSL. See Asymmetric Digital Subscriber Line

Advanced Encryption Standard (AES)

AES-Counter Mode CBC-MAC Protocol (AES-CCMP)

agents

aggregate rate

AH. See Authentication Header

alias record

alternating current (AC)

Angry IP

anomaly-detection IDS (AD-IDS)

anonymous accounts

antenna

troubleshooting

wireless

antivirus engine

antivirus programs

antivirus scan

anycast

AP. See access points

APIPA. See Automatic Private IP Addressing

applications

bandwidth

server logs

Application layer, OSI

firewalls

application server

application-layer attacks

application-specific integrated circuit (ASIC)

area border routers (ABRs)

ARP. See Address Resolution Protocol

arp

arp -a

ARPAnet

AS. See autonomous system

ASBR. See autonomous system border router

ASIC. See application-specific integrated circuit

Asymmetric Digital Subscriber Line (ADSL)

Asynchronous Transfer Mode (ATM)

Attachment Unit Interface (AUI)

attenuation

AUI. See Attachment Unit Interface

authentication

authorization, and accounting (AAA)

CHAP

EAP

FTP

Kerberos

MAC

MS-CHAP

NAC

PKI

RADIUS

RIPv280

TACACS+

wireless networks

Authentication Header (AH)

authenticator

auto-detect mechanism

automatic account lockouts

Automatic Private IP Addressing (APIPA)

autonomous system (AS)

BGP

EIGRP

autonomous system border router (ASBR)

autorooters

B

backbone

collapsed

networks

OSPF

backdoors

background checks

backups

badges

bandwidth

Bandwidth on Demand Interoperability Group (BONDING)

BASE. See Basic Analysis and Security Engine

baselines

Basic Analysis and Security Engine (BASE)

Basic Rate Interface (BRI)

basic service area (BSA)

basic service set (BSS)

Basic Service Set Identifiers (BSSIDs)

beacons

Bearer channels

Berkeley Software Distribution (BSD)

BGP. See Border Gateway Protocol

binary numbers

bit

black box

black hole

block acknowledgment

blocking state

Bluetooth

BNC. See British Naval Connector

BONDING. See Bandwidth on Demand Interoperability Group

boot-sector viruses

Border Gateway Protocol (BGP)

bottlenecks

bounce

BPDUs. See Bridge Protocol Data Units

BPL. See Broadband over Power Line

BRI. See Basic Rate Interface

bridges

collision domain

Layer

multicast packets

Bridge Protocol Data Units (BPDUs)

Bridging mode, WAP

British Naval Connector (BNC)

Broadband over Power Line (BPL)

broadband services

broadcasts

Layer IPv198

Layer IPv4

broadcast address

broadcast domains

Ethernet

VLAN

broadcast storm

brute-force attacks

BSA. See basic service area

BSD. See Berkeley Software Distribution

BSS. See basic service set

BSSIDs. See Basic Service Set Identifiers

buffer

Buffer Full

buffer overflow

burst

bus topology

butt set

byte

C

-c

CA. See certificate authority

cables. See also specific cable types

properties

troubleshooting

wiring standards

cable modem

cable stripper/snips

cable testers

caching engines

caching proxy server

call setup

cameras, security policy

canonical name (CNAME)

CARP. See Common Address Redundancy Protocol

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

Category 2 twisted-pair cable

Category 3 twisted-pair cable

Category 4 twisted-pair cable

Category 5 twisted-pair cable

Category 5e twisted-pair cable

Category 6 twisted-pair cable

Category 6a twisted-pair cable

CATV. See community antenna television

CCEVS. See Common Criteria Evaluation and Validation Scheme

Cd

cellular WAN

central office (CO)

central processing unit (CPU)

centralized WAN

certificate authority (CA)

certifiers

Challenge Handshake Authentication Protocol (CHAP)

change

change management

channels

EtherChannel

side channel attack

T-series connections

WAP

wireless networks

channel bonding

channel service unit/data service unit (CSU/DSU)

CHAP. See Challenge Handshake Authentication Protocol

CIDR. See Classless Internet Domain Routing

CIR. See committed information rate

circuit switching

cladding

Class A network address

Class B network address

Class C network address

Class D network address

Class E network address

classful routing

Classless Internet Domain Routing (CIDR)

IPv200

NAT

subnet mask

classless routing

clean-desk policy

client machines

client mode, VTP

client-server

CLNS. See Connectionless Network Service

cloud computing

CNAME. See canonical name

CO. See central office

coaxial cable

collapsed backbone

collisions

collision domains

Ethernet

routers

switches

collision events

collision light

.com

committed information rate (CIR)

Common Address Redundancy Protocol (CARP)

Common Criteria Evaluation and Validation Scheme (CCEVS)

communication satellite (comsat)

community antenna television (CATV)

compression

comsat. See communication satellite

Connectionless Network Service (CLNS)

connectionless protocol

connection-oriented communication

connectivity software

connectivity testing

content filtering

Content Security Control (CSC)

continuity testers

convergence

routing tables

Spanning Tree Protocol

CPE. See customer premises equipment

CPU. See central processing unit

CRC. See cyclic redundancy check

crossover cable

crosstalk

CSC. See Content Security Control

CSMA/CD. See Carrier Sense Multiple Access with Collision Detection

CSU/DSU. See channel service unit/data service unit

customer premises equipment (CPE)

cyclic redundancy check (CRC)

frames

IP routing

D

-d

D channel

DA. See Destination Address

data communication equipment (DCE)

Data Encryption Standard (DES)

data frame

Data Link Connection Identifiers (DLCIs)

Data Link layer, OSI

encapsulation

Ethernet

frames

IP routing

data over cable service interface specification (DOCSIS)

data packets

data steam

data terminal equipment (DTE)

datagrams

DB-69

dBi. See decibel isotropic

DCE. See data communication equipment

DDos. See distributed denial of service attacks

decibel isotropic (dBi)

decimal numbers

decompression

decryption

dedicated lines

de-encapsulation

default gateway

DHCP

incorrect

IP routing

ping

default routes

delay

delete

delivery protocol

demarc

demarc extension

demilitarized zone (DMZ)

firewalls

IDS/IPS

route

security policy

denial of service attack (DoS)

ACLs

DDos

DoS/SYN flood attack

firewalls

Dense Wavelength Division Multiplexing (DWDM)

Department of Defense (DoD)

OSI

port scanners

TCP/IP

DES. See Data Encryption Standard

destination

Destination Address (DA)

Destination Unreachable

DFS. See Dynamic Frequency Selection

DHCP. See Dynamic Host Configuration Protocol

Diffie-Hellmann algorithm

Diffusing Update Algorithm (DUAL)

dig

Digital, Intel, and Xerox (DIX)

digital certificates

digital ID

Digital Signal 0 (DS0)

Digital Signal 1 (DS1)

Digital Signal 3 (DS3)

digital subscriber line (DSL). See also specific DSL types

digital subscriber line access multiplexer (DSLAM)

Dijkstra algorithm

DIP. See dual inline package

Direct Sequence Spread Spectrum (DSSS)

directional antennas

Directory Service

disabled state, Spanning Tree Protocol

discontiguous networks

distance vector (DV)

EIGRP

RIPv280

routing protocols

distributed denial of service attacks (DDos)

distributed WAN

distribution list

distribution network

distribution system (DS)

diversity

DIX. See Digital, Intel, and Xerox

DLCIs. See Data Link Connection Identifiers

.dll

DMZ. See demilitarized zone

DNS. See Domain Name Service

DNS Server

DOCSIS. See data over cable service interface specification

DoD. See Department of Defense

Domain Name Service (DNS)

certifiers

DHCP

DMZ

incorrect

IP address

ipconfig

network reconnaissance

port scanners

tracert

door locks

DoS. See denial of service attack

DOS commands

DoS/SYN flood attack

dropped packets

DS. See distribution system

DS0. See Digital Signal 0

DS1. See Digital Signal 1

DS3. See Digital Signal 3

DSL. See digital subscriber line

DSLAM. See digital subscriber line access multiplexer

DSSS. See Direct Sequence Spread Spectrum

DTE. See data terminal equipment

DTP. See Dynamic Trunking Protocol

DUAL. See Diffusing Update Algorithm

dual inline package (DIP)

dumb terminals

DV. See distance vector

DWDM. See Dense Wavelength Division Multiplexing

dynamic ARP table entries

dynamic DNS

Dynamic Frequency Selection (DFS)

Dynamic Host Configuration Protocol (DHCP)

APIPA

certifiers

DSL

evil twin

ipconfig

Parameter Request List

protocol analyzers

Scope Options

server logs

WAP

dynamic IP routing

dynamic NAT

dynamic packet filtering

dynamic state list

Dynamic Trunking Protocol (DTP)

dynamic VLAN

E

-e

EAP. See Extensible Authentication Protocol

EAR. See Export Administration Regulations

echo

echo request payload

.edu

EEOC. See equipment exceeds operator capability

EGPs. See exterior gateway protocols

EIA/TIA. See Electronic Industries Association/Telecommunications Industry Alliance

EIGRP. See Enhanced Interior Gateway Routing Protocol

electromagnetic interference (EMI)

Electronic Industries Association/Telecommunications Industry Alliance (EIA/TIA)

email server

email virus

emergency virus scan

EMI. See electromagnetic interference

Encapsulating Security Payload (ESP)

encapsulation

IP

OSI

encryption

AES

DES

devices

OSI Presentation layer

passwords

PGP

public key

security filtering

SSL

symmetrical key

3DES

VPN concentrator

wireless networks

wireless NICs

endpoints

end-user training

Enhanced Interior Gateway Routing Protocol (EIGRP)

AD

DV

IP routing

IS-IS

LS

multicast

RIPv280

v

VLSM

environment

environmental monitors

equipment access

equipment exceeds operator capability(EEOC)

ESP. See Encapsulating Security Payload

ESS. See extended service set

ESSIDs. See Extended Service Set Identifiers

eth_addr

EtherChannel

Ethernet. See also specific Ethernet types

addressing

broadcast domain

channel bonding

collision domain

CSMA/CD

frames

full duplex

half duplex

MMF

OSI

Data Link layer,

Physical layer

RJ-102

SMF

specifications

switches

Type

UTP

crossover cable

ETSi. See European Telecommunications Standards Institute

European Telecommunications Standards Institute (ETSi)

Event Viewer

evil twin

Evolved High Speed Packet Access (HSPA+)

.exe

exit interviews

expansion slots

Export Administration Regulations (EAR)

extended ACLs

extended demark

extended service set (ESS)

Extended Service Set Identifiers (ESSIDs)

Extensible Authentication Protocol (EAP)

exterior gateway protocols (EGPs)

extranet VPN

F

-f

F connector

Fast Ethernet

fault tolerance

fax server

FCC. See Federal Communications Commission

FCS. See Frame Check Sequence

feasible successor

Federal Communications Commission (FCC)

FEP. See fluoroethylenepropylene

fiber to premises

fiber-optic cable

FIFO. See first-in, first-out

File Replication Service

file server

File Transfer Protocol (FTP)

application-layer attacks

bounce

DMZ

DNS

firewalls

OSI Application layer

password encryption

proxy

troubleshooting

file viruses

firewalls

ACLs

DMZ

IP spoofing attacks

OSI

Application layer,

Network layer,

protocol switching

scanning services

security policy

technologies

first-in, first-out (FIFO)

flat network

flow control

fluoroethylenepropylene (FEP, Teflon)

forward/filter decisions

forward/filter table

forwarding state

FQDN. See fully qualified domain name

fractional T1 (FT1)

frames

CRC

Ethernet

IP routing

OSI

Data Link layer

Physical layer

Spanning Tree Protocol

switches

Frame Check Sequence (FCS)

frame filtering

Frame Relay

frequency

FT1. See fractional T1

FTP. See File Transfer Protocol

ftp

FTP PORT

full duplex

Ethernet

OSI Session layer

TCP

fully qualified domain name (FQDN)

G

-g

-g host-list

gateway

gateways, . See also default gateway; specific gateway protocols

BPL

encryption

incorrect

GB. See gigabyte

Generic Routing Encapsulation (GRE)

GetRequest

Gigabit Ethernet

gigabyte (GB)

G/L. See Global/Local bit

global address, NAT

global unicast address, IPv204

Global/Local bit (G/L)

.gov

GRE. See Generic Routing Encapsulation

guards

H

-h maximum_hops

H.464

half duplex

Ethernet

NICs

OSI Session layer

switches

wireless networks

handshake

CHAP

MS-CHAP

three-way handshake

hardware address

hardware broadcasts. See Layer 2

hashing functions

HDLC. See High-Level Data Link Control

HDSL. See high bit-rate digital subscriber line

headend

hello packets

heuristic scanning

hexadecimal numbers

HFC. See hybrid fiber-coaxial

HIDS. See host-based IDS

hierarchical addressing

high availability

high bit-rate digital subscriber line (HDSL)

High Speed Serial Data Connector (HSSDC)

High-Level Data Link Control (HDLC)

honeynets

honeypot

hops

hop count

DV

OSPF

RIP

RIPv280

hosts

duplex

networks

VLSM

workstations

host address

host-based firewalls

host-based IDS (HIDS)

hostname

Hosts table

Host-to-Host layer, DoD model

hotfixes

HSPA+. See Evolved High Speed Packet Access

HSSDC. See High Speed Serial Data Connector

HTML

HTTP. See Hypertext Transfer Protocol

HTTPS. See Hypertext Transfer Protocol Secure

hubs

collision domains

full duplex

LAN

OSI Physical layer

switches

humidity

hybrid fiber-coaxial (HFC)

hybrid IP routing

hybrid mesh topology

hybrid topology

Hypertext Transfer Protocol (HTTP)

application-layer attacks

DMZ

DNS

firewalls

IP routing

IPv202

netstat

OSI Application layer

port numbers

proxy

Telnet

Hypertext Transfer Protocol Secure (HTTPS)

I

-i address

-i TTL

IBSS. See independent basic service set

ICA. See Independent Computing Architecture

ICMP. See Internet Control Message Protocol

ICSA. See International Computer Security Association

ID Ten T error (ID10T)

IDC. See insulation displacement connector

IDF. See intermediate distribution frame

IDS. See intrusion detection system

IE. See Internet Explorer

IEC. See International Electrotechnical Commission

IEEE. See Institute of Electrical and Electronics Engineers

IETF. See Internet Engineering Task Force

if

if_addr

ifconfig

I/G. See Individual/Group bit

IGMP. See Internet Group Management Protocol

IGPs. See interior gateway protocols

IGRP. See Interior Gateway Routing Protocol

IMAP. See Internet Message Access Protocol

inbound ACLs

incident response

independent basic service set (IBSS)

Independent Computing Architecture (ICA)

Individual/Group bit (I/G)

inet_addr

infrastructure mode, wireless networks

inherent attenuation

injectors, PoE

inside global address, NAT

inside local address, NAT

Institute of Electrical and Electronics Engineers (IEEE)

802

802.1D

802.1Q

802.1w

802.

802.3ab

802.3af

802.3an

802.3at

802.3u

802.

802.11a

802.11b

802.11g

802.11h

802.11n

803.3z

insulation displacement connector (IDC)

.int

Integrated Services Digital Networks (ISDN)

interior gateway protocols (IGPs)

BGP

IS-IS

Interior Gateway Routing Protocol (IGRP)

intermediate distribution frame (IDF)

Intermediate System-to-Intermediate System (IS-IS)

internal routing protocols

International Computer Security Association (ICSA)

International Electrotechnical Commission (IEC)

International Organization for Standardization (ISO)

Internet

Internet Control Message Protocol (ICMP)

ACLs

IP routing

ping

traceroute

Internet Engineering Task Force (IETF)

Internet Explorer (IE)

Internet Group Management Protocol (IGMP)

Internet layer, DoD model

Internet Message Access Protocol (IMAP)

Internet Options, Security tab

Internet Protocol (IP), . See also specific IP topics and processes

ACLs

CLNS

encapsulation

OSPF

SOHO

Internet Protocol version 4 (IPv4)

Internet Protocol version 6 (IPv6)

CLNS

IP routing

ipconfig

OSPF

routing protocols

SOHO

Internet Security Association and Key Management Protocol (ISAKMP)

Internet service providers (ISPs)

BGP

cable modem

CIDR

internetwork

devices

DV

routers

routing tables

SOHO

switches

Internetwork Package Exchange (IPX)

Inter-Switch Link (ISL)

intranet

intrusion detection system (IDS)

packet sniffers

intrusion prevention system (IPS)

packet sniffers

inverse multiplexing

IP. See Internet Protocol

IP address

ACLs

arp -a

BGP

DHCP

DNS

DOS commands

evil twin

hierarchical addressing

incorrect

network configuration

NICs

port security

private

problem determination

Smurf attacks

static

subnets

switches

troubleshooting

v

VLSM

WAP

IP header

IP proxy

IP routing, . See also specific routing types

ARP

CRC

default gateway

Destination Unreachable

dynamic

FCS

frames

hardware address

HTTP

HTTPS

hybrid

ICMP

MAC address

OSI

Data Link layer

Network layer

Physical layer

packets

packet switching

process

Registry

static

IP Security (IPSec)

IP spoofing attack

IP stack

ipconfig

ipconfig/all

ipconfig/release

ipconfig/renew

IPS. See intrusion prevention system

IPSec. See IP Security

IPv4. See Internet Protocol version 4

IPv6. See Internet Protocol version 6

IPX. See Internetwork Package Exchange

ISAKMP. See Internet Security Association and Key Management Protocol

ISDN. See Integrated Services Digital Networks

IS-IS. See Intermediate System-to-Intermediate System

ISL. See Inter-Switch Link

ISO. See International Organization for Standardization

isotropic antennas

ISPs. See Internet service providers

J

-j host-list

jitter

K

-k host-list

Kerberos

Kevlar

L

-l size

L2F. See Layer 2 Forwarding

L2TP. See Layer 2 Tunneling Protocol

LAN. See local area network

LAN Manager

latching

latency

latency sensitivity

Layer 2

bridges

broadcasts, IPv198

port security

Spanning Tree Protocol

switches

Layer 2 Forwarding (L2F)

Layer 2 Tunneling Protocol (L2TP)

Layer 3

broadcasts, IPv4

port security

switches, routers

layered architecture, OSI

LC. See Local Connector

Lcd

LDAP. See Lightweight Directory Access Protocol

learning state

leased lines

least significant bit (LSB)

LEDs. See light-emitting diodes

Length, IEEE 802.100

light-emitting diodes (LEDs)

Lightweight Directory Access Protocol (LDAP)

Link Aggregation

link light

link state (LS)

link state advertisements (LSAs)

link state packets (LSPs)

link-local address

listening state

LLC. See Logical Link Control

load balancing

load testing

local address

local area network (LAN). See also Small Office, Home Office; virtual local area network; wireless local area network

IP routing

packet switching

RJ-61

routers

switches

bridges

VLSM

VPN

Local Connector (LC)

local loop

logging, NIDS

logical address

Logical Link Control (LLC)

logical network diagrams

LogMein

Long Term Evolution (LTE)

loop avoidance

loopback plug

LS. See link state

Ls

LSAs. See link state advertisements

LSB. See least significant bit

LSPs. See link state packets

LTE. See Long Term Evolution

M

MAC. See Media Access Control

macro viruses

magnetic flux

mail exchanger (MX)

mail relay

mail server

main distribution frame (MDF)

mainframes

man-in-the-middle attacks

mask netmask

maximum burst rate (MBR)

maximum transmission unit (MTU)

MB. See megabyte

MBR. See maximum burst rate

MD5. See Message-Digest algorithm 5

MDF. See main distribution frame

MD-IDS. See misuse-detection IDS

MDI/MDI-X. See medium dependent interface/medium dependent interface-crossover

mechanical transfer registered jack (MTRJ)

Media Access Control (MAC)

address

ARP

arp -a

bridges

DHCP

IP routing

ipconfig

IPv202

port security

PPPoE

switches

TKIP

VLAN

authentication

forward/filter table

media converters

medium dependent interface/medium dependent interface-crossover (MDI/MDI-X)

meet-in-the-middle attack

megabyte (MB)

mesh topology

Message-Digest algorithm 5 (MD5)

metric

metric metric

mget

Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)

microwave radio relay

.mil

Mills, David

MILNET

MIMO. See multiple-input multiple-output

misuse-detection IDS (MD-IDS)

MLS. See multilayer switch

MMF. See multimode fiber

mobility

modems. See also cable modem

modulation technique

monitor viewing

MPLS. See MultiProtocol Label Switching

MS-CHAP. See Microsoft Challenge Handshake Authentication Protocol

Mtr

MTRJ. See mechanical transfer registered jack

MTU. See maximum transmission unit

multicast packets

bridges

EIGRPv291

IPv199

IPv204

RIPng

routers

switches

multifactor authentication

multilayer switch (MLS)

multimedia

multimeter

multimode fiber (MMF)

multipartite viruses

multiple barrier system

multiple-input multiple-output (MIMO)

MultiProtocol Label Switching (MPLS)

MX. See mail exchanger

N

-N

-n

-n count

NaaS. See network as a service

NAC. See Network Access Control

name resolution

NAT. See Network Address Translation

National Fire Protection Association (NFPA)

National Institute of Standards and Technology (NIST)

National Security Agency (NSA)

nbtstat

NCP. See Network Control Protocol

near-end crosstalk (NEXT)

neighbor table

neighbor-discovery process

NESSUS

.net

NetBIOS. See Network Basic Input/Output System

netstat

NetWare

networks, . See also specific network types and devices

backbone

bus topology

client-server

configuration

devices

documentation

environment

firewalls

hosts

hybrid topology

LAN

mesh topology

monitoring performance

MPLS

operating system

peer-to-peer

physical media

physical topology

selection,

point-to-multipoint topology

point-to-point topology

policies

procedures

ring topology

security threat mitigation

security threats

segments

SOHO,

troubleshooting,

servers

star topology

troubleshooting

WAN

workstations

Network Access Control (NAC)

Network Access layer, DoD model

network address

Class A

Class B

Class C

Class D

Class E

Network Address Translation (NAT)

configuration

IPv200

WAP

network analyzer

network as a service (NaaS)

Network Basic Input/Output System (NetBIOS)

Network Control Protocol (NCP)

Network Interface Cards (NICs)

crossover cable

duplex

firewalls

half duplex

IP address

packet sniffers

ping

wireless

xDSL

network interface device (NID)

Network layer, OSI

encapsulation

firewalls

IP routing

SOHO

network management stations (NMSs)

Network Mapper (NMAP)

Network Monitor

network reconnaissance

network scanners

Network Time Protocol (NTP)

network-based firewalls

network-based IDS (NIDS)

NEXT. See near-end crosstalk

next-hop address

next-hop router

NFPA. See National Fire Protection Association

nibble

NICs. See Network Interface Cards

NID. See network interface device

NIDS. See network-based IDS

NIST. See National Institute of Standards and Technology

NMAP. See Network Mapper

NMSs. See network management stations

noise immunity

nonces

notification

Novell

NSA. See National Security Agency

nslookup

NTP. See Network Time Protocol

O

OC. See optical carrier

octet

OE. See operator error

OFDM. See Orthogonal Frequency Division Multiplexing

OLT. See optical line termination

omni directional antennas

on-access virus scan

on-demand virus scan

one-to-many address

ONUs. See optical network units

open access mode, WLAN

open impedance mismatch

open relay

Open Shortest Path First (OSPF)

IP routing

IS-IS

LS

RIPv280

v

VLSM

Open Systems Interconnection (OSI)

Application layer

firewalls,

connection-oriented communication

Data Link layer

encapsulation

Ethernet,

frames

IP routing

routers

DoD model

encapsulation

flow control

layered architecture

MLS

Network layer

encapsulation

firewalls,

IP routing

SOHO

PDU

Physical layer

encapsulation

Ethernet

frames

hubs,

IP routing

Presentation layer

reference model

Session layer

TCP/IP

Transport layer

ACK,

encapsulation

port numbers,

reliable networking,

windows

operating system

operator error (OE)

optical carrier (OC)

optical line termination (OLT)

optical network units (ONUs)

optical time-domain reflectometer (OTDR)

.org

organizationally unique identifier (OUI)

Orthogonal Frequency Division Multiplexing (OFDM)

OS/299

OSI. See Open Systems Interconnection

OSPF. See Open Shortest Path First

OTDR. See optical time-domain reflectometer

OUI. See organizationally unique identifier

outbound ACLs

out-of-order delivery

outside global address, NAT

outside local address, NAT

overhead

overloading

P

-p

netstat

route

-p period

packets. See also specific packet types

dynamic filtering

IP routing

NAT

OSI Network layer

PDUs

TKIP

VLAN

Packet InterNet Groper. See ping

packet shaping

packet sniffers

packet switching

Frame Relay

IP routing

LAN

SOHO

packet-filter firewalls

PANs. See personal area networks

PAP. See Password Authentication Protocol

partial mesh topology

passive detection

Passive Optical Network (PON)

passphrase

passwords

automatic account lockouts

encryption

security policy

WAP

password attacks

Password Authentication Protocol (PAP)

PAT. See Port Address Translation

patch cable

patches

security policy

pathping

payload protocol

PDUs. See Protocol Data Units

PEBCAK. See problem exists between chair and keyboard

peer-to-peer networks

penetration

personal area networks (PANs)

PGP. See Pretty Good Privacy

phishing

physical barriers

Physical layer, OSI

encapsulation

Ethernet

frames

hubs

IP routing

physical network diagrams

physical security

physical topology, networks

selection

ping

Ping of Death

PKI. See Public Key Infrastructure

plain old telephone service (POTS)

ADSL

ISDN

PSTN

plennum-rated coating

PoE. See Power over Ethernet

point of presence (POP)

pointer record (PTR)

point-to-multipoint topology

point-to-point connection

point-to-point link

Point-to-Point Protocol (PPP)

Point-to-Point Protocol over Ethernet (PPPoE)

DSL

point-to-point topology

Point-to-Point Tunneling Protocol (PPTP)

policies

networks

security

polyvinyl chloride (PVC)

PON. See Passive Optical Network

POP. See point of presence; Post Office Protocol

ports

access ports

IDS

routers

security

speed

switches

trunk ports

USB

WAN

Port Address Translation (PAT)

port duplex mismatch

port mirroring

port numbers

ACLs

OSI Transport layer

port scanners

port sweeping

port-redirection attacks

Post Office Protocol (POP)

POTS. See plain old telephone service

Power over Ethernet (PoE)

power switch

powers of 214

PPP. See Point-to-Point Protocol

PPPoE. See Point-to-Point Protocol over Ethernet

PPTP. See Point-to-Point Tunneling Protocol

preamble

prefix routing

Presentation layer, OSI

Pre-Shared Key (PSK)

Pretty Good Privacy (PGP)

Primary Rate Interface (PRI)

print

print server

private cloud

private IP address

private network

private side firewalls

proactive defense

problem exists between chair and keyboard (PEBCAK)

procedures

networks

security

Process/Application layer, DoD model

protocol analyzers

Protocol Data Units (PDUs)

protocol switching

Proxy ARP

proxy server

PSK. See Pre-Shared Key

PSTN. See Public Switched Telephone Network

PTR. See pointer record

public cloud

public key encryption

Public Key Infrastructure (PKI)

public side firewalls

Public Switched Telephone Network (PSTN)

punch-down tool

PVC. See polyvinyl chloride

Pwd

Q

-q num-queries

quality of service (QoS)

R

-R

-r

-r count

rack-mounted switches

radio frequency interference (RFI)

RADIUS. See Remote Authentication Dial In User Service

Rapid Spanning Tree Protocol (RSTP)

RARP. See Reverse Address Resolution Protocol

RAS. See Remote Access Services

rate limiting

RDC. See Remote Desktop Connection

RDP. See Remote Desktop Protocol

Real-time Transport Protocol (RTP)

Recommended Standard 232 (RS-232)

recording equipment

reference model, OSI

registered jack (RJ)

RJ-

RJ-

Registry

regulations

reliable networking

remote access

remote access server

Remote Access Services (RAS)

Remote Authentication Dial In User Service (RADIUS)

PPPoE

VPN concentrator

Remote Desktop Connection (RDC)

Remote Desktop Protocol (RDP)

Remote Desktop Services

remote-access VPN

repeaters

replay attacks

Requests for Comments (RFCs)

resistance-to-change syndrome

Reverse Address Resolution Protocol (RARP)

reverse lookup zone

RFCs. See Requests for Comments

RFI. See radio frequency interference

RG-58

RG-58 A/U

RG-58 U

RG-57

RG-58

ring topology

RIP. See Routing Information Protocol

RIPng. See Routing Information Protocol next generation

RIPv2. See Routing Information Protocol version 2

Rivest, Shamir, and Adleman (RSA)

RJ. See registered jack

RJ-

RJ-

rogue access points

rootkit

round-robin load balancing

route

routers, . See also IP routing

ABRs

ACLs

ASBR

broadcasts

collision domains

CPU

Internet

internetwork

IP routing

LAN

missing routes

next-hop

OSI

Data Link layer

Network layer

point-to-point topology

ports

QoS

security zones

SOHO

subnets

traceroute

WAN

route-update packets

routing by rumor

routing flow tree

Routing Information Protocol (RIP)

AD

convergence

IP routing

OSPF

Routing Information Protocol next generation (RIPng)

Routing Information Protocol version 2 (RIPv2)

routing loops

routing protocols, . See also specific protocols

AD

classes

DV

hybrid IP routing

IPv

LS

routing tables

convergence

EIGRP

internetwork

SOHO

RS-232. See Recommended Standard 232

RSA. See Rivest, Shamir, and Adleman

RST (reset packet)

RSTP. See Rapid Spanning Tree Protocol

RTP. See Real-time Transport Protocol

S

-S

-s

-s count

-S srcaddr

SA. See Source Address

SaaS. See software as a service

Sarbanes-Oxley Act of 2002 (Sar-Ox)

SAs. See security associations

SATAN. See Security Administrator Tool for Analyzing Networks

SC. See subscriber connector

scanning services

schematics

Scope Options

SCP. See Secure Copy Protocol

SDH. See Synchronous Digital Hierarchy

SDSL. See symmetric digital subscriber line

Secure Copy Protocol (SCP)

Secure File Transfer Protocol (SFTP)

Secure Shell (SSH)

SFTP

Telnet

Secure Sockets Layer (SSL)

tunneling

VPN concentrator

Secure Sockets Layer Virtual Private Network (SSL VPN)

security

antivirus programs

DSL

hardware/software

patches and upgrades

physical

policies

procedures

server logs

threats

mitigation,

wireless networks,

training

wireless networks

Security Administrator Tool for Analyzing Networks (SATAN)

security associations (SAs)

security audits

security filtering

ACLs

encryption

remote access

tunneling

Security Services Module (SSM)

Security Set Identifier (SSID)

evil twin

WAP

war driving

Security tab, Internet Options

security zones

segments

networks

SOHO,

troubleshooting,

OSI

connection-oriented communication

flow control

PDU

TCP

UDP

sendmail

serial cables

servers. See also specific server types

server logs

server mode, VTP

service level agreement (SLA)

service packs

Service Set Identifiers (SSIDs)

Session Initiation Protocol (SIP)

Session layer, OSI

session secret

SetRequest

SFD. See start frame delimiter

SFF. See small form factor

SFTP. See Secure File Transfer Protocol

shared keys

shielded twisted-pair (STP)

short circuits

Shortest Path First (SPF). See also Open Shortest Path First

show ip route

show mac address-table

shunning

side channel attack

signal degradation

signature identification

Simple Mail Transfer Protocol (SMTP)

proxy

Simple Network Management Protocol (SNMP)

simplex

single sign-on

single-mode fiber (SMF)

10GBase-LW

1000BaseLX

SIP. See Session Initiation Protocol

site-to-site VPN

SLA. See service level agreement

small form factor (SFF)

Small Office, Home Office (SOHO)

smart antennas

smart jack

SmartDraw

SMF. See single-mode fiber

SMTP. See Simple Mail Transfer Protocol

Smurf attacks

SNAT. See static NAT

SNMP. See Simple Network Management Protocol

Snort

social engineering

software address

software as a service (SaaS)

SOHO. See Small Office, Home Office

SONET. See Synchronous Optical Network

Source Address (SA)

SPAN. See Switch Port Analyzer

spanning trees

Spanning Tree Protocol (STP)

spanning-tree algorithm (STA)

spatial multiplexing

SPF. See Shortest Path First

split pairs

splitters

SQL injection attacks

SSH. See Secure Shell

SSID. See Security Set Identifier

SSIDs. See Service Set Identifiers

SSL. See Secure Sockets Layer

SSL VPN. See Secure Sockets Layer Virtual Private Network

SSM. See Security Services Module

ST. See straight tip

STA. See spanning-tree algorithm

Stacheldraht

standard ACLs

star topology

start frame delimiter (SFD)

state table

state transitions

stateful firewalls

stateful packet inspection

stateless firewall

static ARP table entries

static IP addressing

static IP routing

static NAT (SNAT)

static VLAN

steady state

STP. See shielded twisted-pair

straight tip (ST)

straight-through cable

strong passwords

subnets

autonomous systems

Class B network address

Class C network address

IP address

VLSM

subnet masks

CIDR

Class C network address

DHCP

EIGRP

route

VLSM

subscriber connector (SC)

supplicant

surge protectors

swipe mechanisms

switches. See also specific switch and switching types

address learning

broadcast domain

collision domains

Ethernet

forward/filter decisions

half duplex

hubs

internetwork

LAN

bridges

Layer

Layer routers

loop avoidance

MAC address

multicast packets

nbtstat

netstat

networks before

PoE

ports

port mirroring

PSTN

rack-mounted

services

SPAN

Spanning Tree Protocol

VLAN

VTP

wireless networks, troubleshooting

Switch Port Analyzer (SPAN)

symmetric digital subscriber line (SDSL)

symmetrical key encryption

SYN (synchronize)

SYN flood

DoS/SYN flood attack

SYN/ACK (synchronize- acknowledgment)

Synchronous Digital Hierarchy (SDH)

Synchronous Optical Network (SONET)

Syslog

T

-t

T1

crossover cable

WAN connection

T

TA. See terminal adapter

TACACS+. See Terminal Access Control Access-Control System Plus

tapping

TCP. See Transmission Control Protocol

TCP/IP. See Transmission Control Protocol/Internet Protocol

TDM. See time-division multiplexing

TDR. See time-domain reflectometer

Teflon. See fluoroethylenepropylene

telephony server

Telnet

telnet

temperature

Temporal Key Integrity Protocol (TKIP)

Terminal Access Control Access-Control System Plus (TACACS+)

terminal adapter (TA)

Terminal Services Client (TSC)

TFN. See Tribe Flood Network

TFN2K. See Tribe Flood Network 2000

TFTP. See Trivial File Transfer Protocol

thicknet

thin client

thin computing

thin protocol. See User Datagram Protocol

thinnet

Third Generation Partnership Project 2 (3GPP2)

thrashing

3DES. See Triple Data Encryption Standard

3GPP2. See Third Generation Partnership Project 2

three-way handshake

throughput

testing

Time to Live (TTL)

time-division multiplexing (TDM)

time-domain reflectometer (TDR)

TLS. See Transport Layer Security

Token Ring

toll network

toner probe

topology table

TPC. See Transmit Power Control

Traceroute

traceroute

tracert

tracking

traffic contract

traffic shaping

transceivers

Transmission Control Protocol (TCP)

connection-oriented communication

DNS

full duplex

OSI Transport layer

port numbers

port scanners

segments

stateful firewalls

throughput testers

UDP

Transmission Control Protocol/Internet Protocol (TCP/IP)

ACLs

ARP

DoD model

FTP

history

IGMP

IPSec

L2TP

nbtstat

netstat

network segments

OSI

Application layer

windows

ping

protocol switching

subnets

SYN flood

Telnet

traceroute

transmission speeds

cables

DSL

WAN

Transmit Power Control (TPC)

transparent bridging

transparent mode, VTP

Transport layer, OSI

ACK

encapsulation

port numbers

reliable networking

Transport Layer Security (TLS)

traps

Tribe Flood Network (TFN)

Tribe Flood Network 2000 (TFN2K)

Triple Data Encryption Standard (3DES)

Trivial File Transfer Protocol (TFTP)

Trojan horse

troubleshooting

ARP

cables

connectivity software

FTP

Hosts table

ifconfig

IP address

ipconfig

Mtr

nbtstat

networks

segments,

nslookup

ping

protocol analyzers

route

steps

Telnet

throughput testers

tips

tools

traceroute

wireless networks

workstations

trunk ports

trusted network

Trusted Sites

trust-exploitation attacks

TSC. See Terminal Services Client

T-series WAN connections

TTL. See Time to Live

tunneling

IPSec

L2TP

PPTP

security filtering

SSL

SSL VPN

VPN

twisted-pair cable

Type, Ethernet

U

UDP. See User Datagram Protocol

unicast

UNII. See Unlicensed National Information Infrastructure

uninterruptible power supply (UPS)

unique local address

Universal Serial Bus (USB)

Unlicensed National Information Infrastructure (UNII)

unreliable protocol

unshielded twisted-pair (UTP)

connecting

Ethernet

crossover cable

ISDN

PSTN

wiring schematics

xDSL

untrusted network

upgrades

UPS. See uninterruptible power supply

uptime

USB. See Universal Serial Bus

user accounts

User Datagram Protocol (UDP)

DHCP

DNS

netstat

OSI Transport layer

packet sniffers

port numbers

port scanners

RIPng

segments

throughput testers

UTP. See unshielded twisted-pair

V

-v

-v TOS

Variable Length Subnet Mask (VLSM)

VDSL. See very high bit-range digital subscriber line

very high bit-range digital subscriber line (VDSL)

video

virtual circuits

virtual desktops

virtual local area network (VLAN)

broadcast domains

dynamic

identifying

incorrect

ipconfig

membership

QoS

static

switches

trunk ports

voice

virtual machines (VMs)

virtual networks

Virtual Private Network (VPN), . See also VPN concentrator

packet sniffers

tunneling

virtual servers

virtual switches

viruses

virus definition files

VLAN. See virtual local area network

VLAN Management Policy Server (VMPS)

VLAN Trunking Protocol (VTP)

VLSM. See Variable Length Subnet Mask

VMPS. See VLAN Management Policy Server

VMs. See virtual machines

Voice over IP (VoIP)

bandwidth

network configuration

PoE

switches

voice VLAN

VoIP. See Voice over IP

voltage event recorder

volt/ohm meter (VOM)

VPN. See Virtual Private Network

VPN concentrator

VTP. See VLAN Trunking Protocol

vulnerability scanners

W

-w timeout

WAN. See wide area network

WAP. See wireless access points

war chalking

war driving

Wavelength Division Multiplexing (WDM)

Web proxy server

web server

well-known port numbers

WEP. See Wired Equivalent Privacy

wide area network (WAN)

broadband services

cellular

connection types

demarc

IP routing

network segments

protocols

subnets

VLSM

VPN

wireless

wiring

Wi-Fi

Wi-Fi Alliance

Wi-Fi Protected Access (WPA)

cracking

WAP

WiMAX. See World Wide Interoperability for Microwave Access

windows, OSI

Windows Internet Naming Service (WINS)

Windows Update

WINS. See Windows Internet Naming Service

wire crimper

Wired Equivalent Privacy (WEP)

cracking

WAP

wireless access points (WAP)

configuration

DHCP

installing

wireless antennas

wireless local area network (WLAN)

history

IEEE 802.

ipconfig

wireless networks

ad hoc mode

authentication

components

infrastructure mode

installing

security

security threats

signal degradation

switches, troubleshooting

transmission media

troubleshooting

wireless NICs

wireless WAN

wire-map testers

Wireshark

wiring. See also cables

EIA/TIA

schematics

security policy

standards

WAN

WLAN. See wireless local area network

WLAN Association (WLANA)

workgroups

workstations

World Wide Interoperability for Microwave Access (WiMAX)

worms

WPA. See Wi-Fi Protected Access

X

xDSL

Z

Zimmerman, Phil

zones

firewalls

security

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset