Cisco IPS 7.1 Installation Guide Page 379

  • Download
  • Add to my manuals
  • Print
  • Page
    / 422
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 378
GL-1
Cisco Intrusion Prevention System Appliance Hardware Installation Guide for IPS 7.1
OL-24002-01
GLOSSARY
Revised: September 30, 2014
Numerals
3DES
Triple Data Encryption Standard. A stronger version of DES, which is the default encryption method
for SSH version 1.5. Used when establishing an SSH session with the sensor. It can be used when the
sensor is managing a device.
802.x
A set of IEEE standards for the definition of LAN protocols.
A
AAA
authentication, authorization, and accounting. Pronounced “triple a.” The primary and recommended
method for access control in Cisco devices.
ACE
Access Control Entry. An entry in the ACL that describes what action should be taken for a specified
address or protocol. The sensor adds/removes ACE to block hosts.
ACK
acknowledgment. Notification sent from one network device to another to acknowledge that some event
occurred (for example, the receipt of a message).
ACL
Access Control List. A list of ACEs that control the flow of data through a router. There are two ACLs
per router interface for inbound data and outbound data. Only one ACL per direction can be active at a
time. ACLs are identified by number or by name. ACLs can be standard, enhanced, or extended. You
can configure the sensor to manage ACLs.
ACS server
Cisco Access Control Server. A RADIUS security server that is the centralized control point for
managing network users, network administrators, and network infrastructure resources.
action
The response of the sensor to an event. An action only happens if the event is not filtered. Examples
include TCP reset, block host, block connection, IP logging, and capturing the alert trigger packet.
active ACL
The ACL created and maintained by ARC and applied to the router block interfaces.
adaptive security
appliance
ASA. Combines firewall, VPN concentrator, and intrusion prevention software functionality into one
software image. You can configure the adaptive security appliance in single mode or multi-mode.
AIC engine
Application Inspection and Control engine. Provides deep analysis of web traffic. It provides granular
control over HTTP sessions to prevent abuse of the HTTP protocol. It allows administrative control
over applications that try to tunnel over specified ports, such as instant messaging, and tunneling
applications, such as gotomypc. It can also inspect FTP traffic and control the commands being issued.
Page view 378
1 ... 378 379 380 ... 422

Comments to this Manuals

No comments