Cisco IPS 7.1 Installation Manual page 429

Intrusion prevention system appliance and module
Table of Contents

Advertisement

The overall structure of a computer or communication system. The architecture influences the
architecture
capabilities and limitations of the system.
Address Resolution Protocol. Internet protocol used to map an IP address to a MAC address. Defined
ARP
in RFC 826.
Adaptive Security Device Manager. A web-based application that lets you configure and manage your
ASDM
adaptive security device.
Abstract Syntax Notation 1. Standard for data presentation.
ASN.1
Version information associated with a group of IDIOM default configuration settings. For example,
aspect version
Cisco Systems publishes the standard set of attack signatures as a collection of default settings with the
S aspect. The S-aspect version number is displayed after the S in the signature update package file
name. Other aspects include the Virus signature definitions in the V-aspect and IDIOM signing keys in
the key-aspect.
Represents exploits contained within a single packet. For example, the "ping of death" attack is a
atomic attack
single, abnormally large ICMP packet.
There are two Atomic engines: Atomic IP inspects IP protocol packets and associated Layer-4 transport
Atomic engine
protocols, and Atomic ARP inspects Layer-2 ARP protocol.
An assault on system security that derives from an intelligent threat, that is, an intelligent act that is a
attack
deliberate attempt (especially in the sense of method or technique) to evade security services and
violate the security policy of a system.
ARR. A weight associated with the relevancy of the targeted OS. The attack relevance rating is a
attack relevance
derived value (relevant, unknown, or not relevant), which is determined at alert time. The relevant OSes
rating
are configured per signature.
ASR. A weight associated with the severity of a successful exploit of the vulnerability. The attack
attack severity
rating
severity rating is derived from the alert severity parameter (informational, low, medium, or high) of the
signature. The attack severity rating is configured per signature and indicates how dangerous the event
detected is.
Process of verifying that a user has permission to use the system, usually by means of a password key
authentication
or certificate.
A component of the IPS. Authorizes and authenticates users based on IP address, password, and digital
AuthenticationApp
certificates.
In normal autostate mode, the Layer 3 interfaces remain up if at least one port in the VLAN remains
autostate
up. If you have appliances, such as load balancers or firewall servers that are connected to the ports in
the VLAN, you can configure these ports to be excluded from the autostate feature to make sure that
the forwarding SVI does not go down if these ports become inactive.
Anti-Virus.
AV
OL-24002-01
Cisco Intrusion Prevention System Appliance and Module Installation Guide for IPS 7.1
Glossary
GL-3

Advertisement

Table of Contents
loading

Table of Contents