Cisco IPS-4255-K9 - Intrusion Protection Sys 4255 Installation Manual page 377

Intrusion prevention system appliance and module installation guide for ips 7.0
Table of Contents

Advertisement

The secret binary data used to convert between clear text and cipher text. When the same cipher key is
cipher key
used for both encryption and decryption, it is called symmetric. When it is used for either encryption
or decryption (but not both), it is called asymmetric.
Cisco system software that provides common functionality, scalability, and security for all products
Cisco IOS
under the CiscoFusion architecture. Cisco IOS allows centralized, integrated, and automated
installation and management of internetworks while supporting a wide variety of protocols, media,
services, and platforms.
command-line interface. A shell provided with the sensor used for configuring and controlling the
CLI
sensor applications.
A component of the IPS. Shares information with other devices through a global correlation database
CollaborationApp
to improve the combined efficacy of all the devices.
The interface on the sensor that communicates with the IPS manager and other network devices. This
command and
interface has an assigned IP address.
control interface
In SNMP, a logical group of managed devices and NMSs in the same administrative domain.
community
Spans multiple packets in a single session. Examples include most conversation attacks such as FTP,
composite attack
Telnet, and most Regex-based attacks.
ARC blocks traffic from a given source IP address to a given destination IP address and destination
connection block
port.
A terminal or laptop computer used to monitor and control the sensor.
console
An RJ45 or DB9 serial port on the sensor that is used to connect to a console device.
console port
When ARC opens a Telnet or SSH session with a network device, it uses one of the routing interfaces
control interface
of the device as the remote IP address. This is the control interface.
CT. An IPS message containing a command addressed to a specific application instance. Example
control transaction
control transactions include start, stop, getConfig.
A component of the IPS. Accepts control transactions from a remote client, initiates a local control
Control Transaction
transaction, and returns the response to the remote client.
Server
A component of the IPS. Waits for control transactions directed to remote applications, forwards the
Control Transaction
control transactions to the remote node, and returns the response to the initiator.
Source
A piece of information sent by a web server to a web browser that the browser is expected to save and
cookie
send back to the web server whenever the browser makes additional requests of the web server.
Cisco Security Agent Management Center. CSA MC receives host posture information from the CSA
CSA MC
agents it manages. It also maintains a watch list of IP addresses that it has determined should be
quarantined from the network.
Cisco Security Manager, the provisioning component of the Cisco Self-Defending Networks solution.
CSM
CS-Manager is fully integrated with CS-MARS.
OL-18504-01
Cisco Intrusion Prevention System Appliance and Module Installation Guide for IPS 7.0
Glossary
GL-5

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents