Index - McAfee M-1250 - Network Security Platform Configuration Manual

Ips configuration guide version 5.1
Hide thumbs Also See for M-1250 - Network Security Platform:
Table of Contents

Advertisement

Index

A
Access List .................................................. See ACL
ACL .............................................................. 102, 104
ACL groups ............................. 107, 108, 110, 111
ACL Syslog Forwarder ............................ 117, 118
assigning ACLs .............................. 211, 212, 215
exporting ACLs................................................ 117
importing ACLs................................................ 117
ACL editor ............................................................ 120
ACL logging.......................................................... 124
Age Of Alerts ........................................................ 167
Alert Filter Editor ...................................... 94, 99, 188
alert frequency ..................................................... 163
alert threshold capacity ........................................ 164
application anomaly ............................................. 282
attack description ................................................. 281
Attack Description button ..................................... 281
Attack Encyclopedia............................................. 281
attack types .......................................................... 282
Audit log comments.......................................... 30, 31
average alert rate ................................................. 163
B
Back Door ............................................................ 283
Brute Force .......................................................... 283
Buffer Overflow .................................................... 283
C
capacity planning ................................................. 161
Command Shell.................................................... 283
Configuration reports............................................ 231
Configuring L3 ACLs ............................................ 122
conventions ............................................................. vi
CVE...................................................................... 281
D
database alert threshold ...................................... 164
database sizing .................................................... 164
deny action........................................................... 124
DoS ...................................................................... 258
learning mode; ................................................ 259
threshold mode; .............................................. 259
DoS detection .............................................. 259, 265
E
enable port settings...................................... 243, 245
Evasion Attempt................................................... 283
F
Fingerprinting ....................................................... 283
flow correlation..................................................... 282
I
Impact Category........................................... 281, 282
Impact Subcategory ..................................... 281, 283
Implementation of L3 ACLs.................................. 122
inbound ............................................................ 10, 11
intelligence gathering ........................................... 282
interface level....................................................... 241
interfaces
assigning policies to interfaces ............... 257, 266
assigning policies to sub-interfaces ................ 276
CIDR blocks .................................................... 248
creating policies to monitor interfaces............. 257
creating policies to monitor sub-interfaces..... 278,
280
VLAN IDs ........................................................ 263
Interfaces node .................................... 248, 249, 250
IPv6...................................................................... 202
iv_packetlog table ................................................ 167
L
L3 ACLs ............................................... 121, 122, 124
L3-ICMP............................................................... 122

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security platform

Table of Contents