Cisco 4215 - Intrusion Detection Sys Sensor Configuration Manual page 511

Configuration guide
Hide thumbs Also See for 4215 - Intrusion Detection Sys Sensor:
Table of Contents

Advertisement

Process whereby two protocol entities synchronize during connection establishment.
three-way
handshake
A value, either upper- or lower-bound that defines the maximum/minimum allowable condition before
threshold
an alarm is sent.
See TP.
Time Processor
Transport Layer Security. The protocol used over stream transports to negotiate the identity of peers
TLS
and establish encrypted communications.
Physical arrangement of network nodes and media within an enterprise networking structure.
topology
Time Processor. Processes events stored in a time-slice calendar. Its primary task is to make stale
TP
database entries expire and to calculate time-dependent statistics.
RFC 1006-defined method of demarking messages in a packet.
TPKT
Program available on many systems that traces the path a packet takes to a destination. It is used mostly
traceroute
to debug routing problems between hosts. A traceroute protocol is also defined in RFC 1393.
Inference of information from observable characteristics of data flow(s), even when the data is
traffic analysis
encrypted or otherwise not directly available. Such characteristics include the identities and locations
of the source(s) and destination(s), and the presence, amount, frequency, and duration of occurrence.
Analyzes traffic from nonstandard protocols, such as TFN2K, LOKI, and DDOS.
TRAFFIC.ICMP
engine
A component of the IPS.
Transaction Server
A component of the IPS.
Transaction Source
Message sent by an SNMP agent to an NMS, a console, or a terminal to indicate the occurrence of a
trap
significant event, such as a specifically defined condition or a threshold that was reached.
Analyzes traffic from nonstandard protocols, such as BO2K and TFN2K.
TROJAN engine
Physical and logical connection between two switches across which network traffic travels. A backbone
trunk
is composed of a number of trunks.
Certificate upon which a certificate user relies as being valid without the need for validation testing;
trusted certificate
especially a public-key certificate that is used to provide the first public key in a certification path.
Public key upon which a user relies; especially a public key that can be used as the first public key in
trusted key
a certification path.
Adjusting signature parameters to modify an existing signature.
tune
U
Unique Device Identifier. Provides a unique identity for every Cisco product. The UDI is composed of
UDI
the PID, VID, and SN. The UDI is stored in the Cisco IPS ID PROM.
78-16527-01
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 5.0
Glossary
GL-17

Advertisement

Table of Contents
loading

Table of Contents