Cisco IPS-4240-K9 - Intrusion Protection Sys 4240 Installation Manual page 186

Intrusion prevention system appliances and modules 5.0
Hide thumbs Also See for IPS-4240-K9 - Intrusion Protection Sys 4240:
Table of Contents

Advertisement

Glossary
User Datagram Protocol. Connectionless transport layer protocol in the TCP/IP protocol stack. UDP is
UDP
a simple protocol that exchanges datagrams without acknowledgments or guaranteed delivery,
requiring that error processing and retransmission be handled by other protocols. UDP is defined in
RFC 768.
To direct a router to remove a previously applied block.
unblock
Uninterruptable Power Source.
UPS
Coordinated Universal Time. Time zone at zero degrees longitude. Formerly called Greenwich Mean
UTC
Time (GMT) and Zulu time.
V
VLAN ACL. An ACL that filters all packets (both within a VLAN and between VLANs) that pass
VACL
through a switch. Also known as security ACLs.
Version identifier. Part of the UDI.
VID
A logical grouping of sensing interfaces and the configuration policy for the signature engines and
virtual sensor
alarm filters to apply to them. In other words, multiple virtual sensors running on the same appliance,
each configured with different signature behavior and traffic feeds. IPS 5.x supports only one virtual
sensor.
Hidden, self-replicating section of computer software, usually malicious logic, that propagates by
virus
infecting—that is, inserting a copy of itself into and becoming part of—another program. A virus
cannot run by itself; it requires that its host program be run to make the virus active.
A signature update specifically addressing viruses.
virus update
Virtual Local Area Network. Group of devices on one or more LANs that are configured (using
VLAN
management software) so that they can communicate as if they were attached to the same wire, when
in fact they are located on a number of different LAN segments. Because VLANs are based on logical
instead of physical connections, they are extremely flexible.
CiscoWorks VPN/Security Management Solution. A suite of network security applications that
VMS
combines web-based tools for configuring, monitoring, and troubleshooting enterprise VPN, firewalls,
network intrusion detection systems and host-based intrusion prevention systems.
Voice over IP. The capability to carry normal telephony-style voice over an IP-based internet with
VoIP
POTS-like functionality, reliability, and voice quality. VoIP enables a router to carry voice traffic (for
example, telephone calls and faxes) over an IP network. In VoIP, the DSP segments the voice signal into
frames, which then are coupled in groups of two and stored in voice packets. These voice packets are
transported using IP in compliance with ITU-T specification H.323.
Virtual Private Network(ing). Enables IP traffic to travel securely over a public TCP/IP network by
VPN
encrypting all traffic from one network to another. A VPN uses "tunneling" to encrypt all information
at the IP level.
One or more attributes of a computer or a network that permit a subject to initiate patterns of misuse
vulnerability
on that computer or network.
Installing Cisco Intrusion Prevention System Appliances and Modules 5.0
GL-18
78-16124-01

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents