Chapter 7 - Administering a Secure Network

cloud computing
A pay-per-use computing model in which customers pay only for the computer resources that they need, and the resources can be easily scaled.
disabling unused ports
A security technique to turn off ports on a network device that are not required.
File Transfer Protocol (FTP)
An unsecure TCP/IP protocol that is commonly used for transferring files.
floor guard
A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
FTP using Secure Sockets Layer (FTPS)
A TCP/IP protocol that uses Secure Sockets Layer/Transport Layer Security (SS/TLS) to encrypt commands sent over the control port (Port 21) in an FTP session.
IEEE 802.1x
A standard that blocks all traffic on a port-by-port basis until the client is authenticated using credentials store on an authentication server.
Internet Control Message Protocol (ICMP)
A TCP/IP protocol that is used by devices to communicate updates or error information to other devices.
Internet Protocol version 6 (IPv6)
The next generation of the IP protocol that addresses weaknesses of IPv4 and provides several significant improvements.
IP telephony
Using a data-based IP network to add digital voice clients and new voice applications onto the IP network.
loop protection
Preventing broadcast storms by using the IEEE 802.1d standard spanning-tree algorithm (STA).
MAC limiting and filtering
A security technique to limit the number of media access control (MAC) addresses allowed on a single port.
rule-based management
The process of administration that relies on following procedural and technical rules.
Secure Copy Protocol (SCP)
A TCP/IP protocol used mainly on UNIX and Linux devices that securely transports files by encrypting files and commands.
Secure FTP (SFTP)
A secure TCP/IP protocol that is used for transporting files by encrypting and compressing all data and commands.
Simple Network Management Protocol (SNMP)
A TCP/IP protocol that exchanges management information between networked devices. It allows network administrators to remotely monitor, manage, and configure devices on