Index
[
SYMBOL]
[
A]
[
B]
[
C]
[
D]
[
E]
[
F]
[
G]
[
H]
[
I]
[
L]
[
M]
[
N]
[
O]
[
P]
[
R]
[
S]
[
T]
[
U]
[
V]
[
W]
[
Z]
packet classification packet flow rules (ACLs) packet forwarding in MPLS packet sniffingpackets ARP, rate limiting RADIUS TACACS+ PACLs (per-port VLAN ACL) PAD PAM (Port-to-Application Mapping) pass phrases password cracking password policies password protection encryption ROMMON security strong passwords, creating password recovery password retry lockout, configuring passwords, OTP replay attacks, countering S/KEY PBR (policy-based routing) configuring PCV (Policy-Cenric View) PDIOO model PDLM (Packet Description Language Module) PDM (Cisco PIX Device Manager) PE (Provider Edge) routers PEAP (Protected EAP) enabling for 802.1x attack mitigation percentage-based policing and shaping perimeter security Personal Mode (WPA) physical security ping sweeps PKCS (Public-Key Cryptography Standards) PKI (Public Key Infrastructure) certificate enrollment plaintext platform management (Cisco Security Manager) point-to-point 802.1x solution, deploying policies configuring on Cisco Traffic Anomaly Detector policing Policy NAT Port ACLs port blocking port scanning port securityPort Security feature CAM table overflow attacks, mitigating MAC spoofing attacks, mitigatingport-level traffic control protected ports storm control ports required for CS-MARS operation posture states (Cisco NAC Framework solution) PPP (Point-to-Point Protocol), configuring AAA using RADIUS private IP addresses privilege levels procedures 2nd professional attackersprofiles IPsec SPC promiscuous mode (IPS sensor software) promiscuous PVLAN ports protect mode (port security) protected ports protocol compliance (Cisco Secure ACS), RADIUS protocol headers, IPsec VPN 2nd protocols in Cisco NAC Framework solution Proxy ARP PVLAN attacks, mitigating PVLAN edge PVLANs configuring port blocking port security configuring secondary VLANs support for on Catalyst switches