Guide to network defense and countermeasure Ch 4

Access control entry

An individual rule in an ACL

Access control list

A group of rules that permit or deny passage of packets through a router based on parameters such as source and destination IP address, port address, protocol time to live, IP options, and TCP flags

Address resolution protocol (ARP)

A networking protocol that resolves IP addresses to MAC addresses

Antispoofing

Measures to address digital attacks in which false source and destination addresses are used to bypass a routers packet filters

ARP tabel

A network system tool that lists the MAC and IP address resolutions of other devices on the network, making the resolution process more efficient

Authentication, authorization, and accounting logging (AAA)

The process of verifying users identities, establishing their level of access, and recording their activity with the use of a RADIUS or TACACS+ server

Auxiliary port

The port on a Cisco device that permits dial-in access to the device

Banner

A message, usually a warning about appropriate use, presented to users of a digital system before authentication

Buffered logging

The process of outputting logged data to a cisco routers RAN

Cisco internet work operating system (IOS)

The operating system used on Cisco devices such as routers,switches, and firewalls

Console port

The port on a Cisco device that permits direct physical access from a nearby computer using the serial RS-232 protocol

Convergence

A state in which all routers on a network have up-to-date routing tables

Default routes

Manual entries in a routers routing table that specify how to handle packets that are not routable

Distance-vector routing protocol

A protocol that uses simple distance measurements such as hops to determine the best route for a packet

Dynamic routes

Entries in a routers routing table that are generated automatically by communication through protocols with other routers on the network

Inverse mask

The number in an access control list that specifies which part of an IP address is considered significant

Link-state routing protocol

A routing protocol that uses complex calculations to determine the best route for a packet

Logging

The process of recording activity on a computing device

Metrics

Cost values that help routers assess the desirability of a link

Named ACLs

An advancement over extended and standard ACLs that allow filtering packets based on IP options and TCP flags, and that permit insertion and modification of ACE's

Remote authentication dial-in user service (RADIUS)

An authentication, authorization, and accounting service protocol

Rollover cable

A cable used to connect to a Cisco CON port from a computer's COM port via the serial RS-232 protocol

Route summerizarion

The process of shortening the network identifier in a subnet mask to allow one network route to represent multiple network routes. (Supernetting)

Routed protocol

A networking protocol used to transport data packets

Routing

The process of transporting packets of information across a network from the source node to the destination node

Routing protocol

A protocol used by routers to share their routing tables with each other

Routing table

The information about accessible networks that is maintained by a router

Secure Shell (SSH)

A protocol used to secure remote sessions by using asymmetric encryption

Simple network management protocol (SNMP)

A protocol used to monitor the status of network devices

SNMP trap logging

A specific parameter of network activity to monitor

Standard ACLs

Access control lists that are limited in filtering parameters to a source IP address or network

Static routes

Manual entries in a routers routing table by an administrator

Stub network

A network segment on a larger network edge; a dead-end segment

Stub router

A router that connects a stub network to the larger network

Super netting

Another term for route summarization

Syslog server

A log management service

Terminal access controller access control system plus (TACACS+)

An authentication, authorization, and accounting service protocol

Variable length subnet masking (VLSM)

The process of adjusting the subnet mask within a single network to allocate IP addresses more efficiently

Virtual terminal

Virtual session access points for simultaneous access to a Cisco device