Cisco IPS-4240-K9 - Intrusion Protection Sys 4240 Installation Manual page 180

Intrusion prevention system appliances and modules 5.0
Hide thumbs Also See for IPS-4240-K9 - Intrusion Protection Sys 4240:
Table of Contents

Advertisement

Glossary
Designates an ACL from which Network Access Controller should read the ACL entries, and where it
Pre-ACL
places entries before any deny entries for the addresses being blocked.
A passive interface for monitoring packets of the network segment. The sensing interface does not have
promiscuous mode
an IP address assigned to it and is therefore invisible to attackers.
Q
ITU-T specification for signaling to establish, maintain, and clear ISDN network connections.
Q.931
R
Refers to mounting a sensor in an equipment rack.
rack mounting
random-access memory. Volatile memory that can be read and written by a microprocessor.
RAM
Registration, Admission, and Status Protocol. Protocol that is used between endpoints and the
RAS
gatekeeper to perform management functions. RAS signalling function performs registration,
admissions, bandwidth changes, status, and disengage procedures between the VoIP gateway and the
gatekeeper.
The putting back together of an IP datagram at the destination after it has been fragmented either at the
reassembly
source or at an intermediate node.
An IPS image file that includes the full application image and installer used for recovery on sensors.
recovery partition
image
Remote Data Exchange Protocol version 2. The published specification for remote data exchange over
RDEP2
the command and control network using HTTP and TLS.
See regular expression.
regex
A mechanism by which you can define how to search for a specified sequence of characters in a data
regular expression
stream or file. Regular expressions are a powerful and flexible notation almost like a
mini-programming language that allow you to describe text. In the context of pattern matching, regular
expressions allow a succinct description of any arbitrary pattern.
Read-Only-Memory Monitor. ROMMON lets you TFTP system images onto the sensor for recovery
ROMMON
purposes.
remote-procedure call. Technological foundation of client/server computing. RPCs are procedure calls
RPC
that are built or specified by clients and are executed on servers, with the results returned over the
network to the clients.
Risk Rating. An RR is a value between 0 and 100 that represents a numerical quantification of the risk
RR
associated with a particular event on the network.
Router Switch Module. A router module that is installed in a Catalyst 5000 switch. It functions exactly
RSM
like a standalone router.
Installing Cisco Intrusion Prevention System Appliances and Modules 5.0
GL-12
78-16124-01

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents