Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z] cabling, sensors capabilities of Cisco IPS network components of IPSs attack prevention regulatory compliance capturing network traffic devices for with IPSs for Inline mode for promiscuous mode with RSPAN with SPAN with VACLs characteristics of attacks CIH virus Loveletter virus Morris worm Nimda worm replacement login attack SQL Slammer worm of signatures Chernobyl child processes CIH virus Cisco Catalyst 6500 series IDSM-2 Cisco IDS Network Module Cisco IOS IPS sensors Cisco IPS 4200 series appliance sensors classifying IPS hosts client-server architecture client-server computing clipboard collaboration between layers COM (Component Object Model) communications, securing management communication comparing IPS and IDS functionality complexity of attacks conducting pilot tests configuration updates configuring policy groups secondary policy groups sensors corporate security policies default policy configuration, customizing reviewing correlation tools criteria for sensor selection form factor interfaces processing capacity CS-MARs (Cisco Security Monitoring, Analysis and Response System) CSA (Cisco Security Agent) phases of deployment conducting pilot tests finalizing the project full deployment implementing management predeployment planning selection and classification of target hosts tuning understanding the product CSA MC (CSA Management Center), organizational units customizing default corporate security policy configuration |