Cisco IPS-4255-K9 - Intrusion Protection Sys 4255 Installation Manual page 383

Intrusion prevention system appliance and module installation guide for ips 7.0
Table of Contents

Advertisement

A log of the binary packets to and from a designated address. Iplogs are created when the log Event
iplog
Action is selected for a signature. Iplogs are stored in a libpcap format, which can be read by WireShark
and TCPDUMP.
IP spoofing attack occurs when an attacker outside your network pretends to be a trusted user either by
IP spoofing
using an IP address that is within the range of IP addresses for your network or by using an authorized
external IP address that you trust and to which you want to provide access to specified resources on
your network. Should an attacker get access to your IPSec security parameters, that attacker can
masquerade as the remote user authorized to connect to the corporate network.
IP version 6. Replacement for the current version of IP (version 4). IPv6 includes support for flow ID
IPv6
in the packet header, which can be used to identify flows. Formerly called IPng (next generation).
Inter-Switch Link. Cisco-proprietary protocol that maintains VLAN information as traffic flows
ISL
between switches and routers.
J
Java Web Start provides a platform-independent, secure, and robust deployment technology. It enables
Java Web Start
developers to deploy full-featured applications to you by making the applications available on a
standard web server. With any web browser, you can launch the applications and be confident you
always have the most-recent version.
Java Network Launching Protocol. Defined in an XML file format specifying how Java Web Start
JNLP
applications are launched. JNLP consists of a set of rules defining how exactly the launching
mechanism should be implemented.
K
Knowledge Base. The sets of thresholds learned by Anomaly Detection and used for worm virus
KB
detection.
See KB.
Knowledge Base
L
Link Aggregation Control Protocol. LACP aids in the automatic creation of EtherChannel links by
LACP
exchanging LACP packets between LAN ports. This protocol is defined in IEEE 802.3ad.
Local Area Network. Refers to the Layer 2 network domain local to a given host. Packets exchanged
LAN
between two hosts on the same LAN do not require Layer 3 routing.
A processor in the IPS. Processes layer 2-related events. It also identifies malformed packets and
Layer 2 Processor
removes them from the processing path.
A component of the IPS. Writes all the log messages of the application to the log file and the error
Logger
messages of the application to the Event Store.
OL-18504-01
Cisco Intrusion Prevention System Appliance and Module Installation Guide for IPS 7.0
Glossary
GL-11

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents