C

[ LiB ]
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

cables
        rollover
capture functions
        interfaces (VACL) 2nd
                enabling 2nd
capture ports
       ACLs (access control lists)
                assigning
CaptureProducer servlet
capturing traffic
        Catalyst 6500 advanced configurations 2nd
                multiple sensor/multiple VLAN
                single sensor/multiple VLAN
                single sensor/single VLAN
                trunk port configurations 2nd 3rd 4th
        mls ip ids command
                Catalyst IOS (Internetwork operating system) configurations
                Catalyst operating system (OS) configurations 2nd 3rd 4th 5th
        overview 2nd 3rd
       RSPAN (Remote SPAN)
                switch configurations, 4000/6500 2nd 3rd 4th 5th 6th 7th 8th 9th
        sensoring monitoring ports
        SPAN (Switched Port Analyzer) 2nd 3rd
                switch configurations
                switch configurations, 2900XL/3500XL 2nd
                switch configurations, 2950/3550 2nd
                switch configurations, 4000/4500/6500 2nd 3rd
        SPAN (Switched Port Analyzer), creating
        VACLs (VLAN access control lists) configurations
                Catalyst IOS (Internetwork operating system) 2nd 3rd 4th 5th 6th
                Catalyst operating system (OS) 2nd 3rd 4th 5th 6th
cards
        Accelerator (XL) 2nd 3rd
Catalyst 6000 VACL
        blocking configurations 2nd 3rd
Catalyst 6500
        advanced configurations 2nd
                multiple sensor/multiple VLAN
                single sensor/multiple VLAN
                single sensor/single VLAN
                trunk port configurations 2nd 3rd 4th
Catalyst IOS (Internetwork operating system)
        6500 switches 2nd 3rd 4th 5th 6th
        configuring
        RSPAN (Remote SPAN) configurations
                destination sessions, sources/destinations 2nd
                source sessions, sources/destinations 2nd
                VLAN 2nd 3rd
Catalyst operating system (OS)
        6500 switches 2nd 3rd 4th 5th 6th
        configuring 2nd 3rd 4th 5th
        RSPAN (Remote SPAN) configurations 2nd
                destination ports 2nd
                source ports 2nd
                VLAN 2nd 3rd 4th
       switch configurations
                2900XL/3500XL
                2950/3550 2nd
                4000/4500/6500 2nd 3rd
                4000/6500 2nd 3rd 4th 5th 6th 7th 8th 9th
categories
        signature engines 2nd
                atomic 2nd
                atomic, Atomic.ARP 2nd
                atomic, Atomic.ICMP 2nd
                atomic, Atomic.IPOptions 2nd
                atomic, Atomic.L3.IP 2nd
                atomic, Atomic.TCP 2nd 3rd
                atomic, Atomic.UDP 2nd
                flood 2nd
                flood, Flood.Host.ICMP
                flood, Flood.Host.UDP 2nd
                flood, Flood.Net.Engine 2nd
                OTHER 2nd
                Service 2nd
                Service, Service.DNS
                Service, Service.FTP
                Service, Service.Generic
                Service, Service.HTTP
                Service, Service.IDENT
                Service, Service.MSSQL
                Service, Service.NTP
                Service, Service.RPC
                Service, Service.SMB 2nd
                Service, Service.SNMP
                Service, Service.SSH
                State
                State, State.String
                State, State.String.Ciscologin
                State, State.String.Lprformat
                State, State.String.SMTP
                String
                String, parameters
                Sweep 2nd
                Sweep, Sweep.Host.ICMP 2nd
                Sweep, Sweep.Host.TCP 2nd
                Sweep, Sweep.Multi 2nd
                Sweep, Sweep.OTHER.TCP 2nd
                Sweep, Sweep.Port.TCP 2nd
                Sweep, Sweep.Port.UDP
                Traffic.ICMP 2nd
                Trojan 2nd
CBAC ( context-based access control)
        ACL (access control lists) compatibility
CCO login option (Add User page)
CCO password option (Add User page)
Cells (Display Preferences)
Cells option (Your Preferences page)
certificates
       self-signed X.509
                generating
certification exams
       Cisco IDS (Intrusion Detection System) software
                formats
                layout/design 2nd 3rd
                practice exams 2nd
                question handling strategies 2nd 3rd 4th
                resources
                testing facilities 2nd
                time management 2nd
Changing display preferences option (Event Viewer)
channels
       alarms
                virtualAlarm 2nd
ChokeThreshold master signature parameter
ChokeThreshold parameter
Choose the Actions page 2nd 3rd 4th
cidWebServer 2nd
        servlets 2nd 3rd 4th
Cisco ID option (Related Vulnerability page)
Cisco IDS (Intrusion Detection System) software
        formats
        layout/design 2nd 3rd
        practice exams 2nd
        question handling strategies 2nd 3rd 4th
        resources
        testing facilities 2nd
        time management 2nd
Cisco Secure Access Server (CSACS)
Cisco Secure Encyclopedia (CSEC) 2nd
Cisco Secure Intrusion Detection System (CSIDS)
Cisco Secure Posture Assessment (SPA)
Cisco Security Agent Management Center (CSA MC) 2nd 3rd
Cisco Security Wheel 2nd
        steps
                environment monitoring
                environment security
                environment testing
                security policy improvement
Cisco Threat Response
Cisco Web site
CiscoWorks
        IDS MC logins
                Add User page 2nd
                authorization roles 2nd
                interface 2nd
                launching
        passwords/usernames
        Security Monitor logins
                adding users 2nd
                launching
                user authentication roles 2nd
CiscoWorks Common Services
        IDS MC installations
classes
        signatures
clear events command 2nd
clear security acl capture-ports command 2nd
clear trunk command 2nd
CLI
        (command-line interface) 2nd
        accessing
                console ports
                keyboards/ monitors
                SSH (Secure Shell) 2nd
                Telnet 2nd
        backup-config files
                erasing
        commands 2nd
                clear events 2nd
                clock set
                copy 2nd 3rd 4th
                erase 2nd
                hostname 2nd
                recover
                reset
                setup 2nd 3rd
        current-config files
                erasing
        image recovery 2nd
        IP logging commands
                iplog 2nd 3rd
                iplog-status 2nd
        keyboard commands 2nd 3rd
        levels
                global configuration (Level 2) 2nd
                interface configuration
                interface configuration;command and control interface level 2nd
                interface configuration;interface group configuration level 2nd
                interface configuration;sensing interface level 2nd
                privileged Exec (Level 1) 2nd
                services configuration level (Level 3) 2nd
                services configuration level (Level 3), NetworkAccess service level 2nd 3rd
                services configuration level (Level 3), service alarm-channel-configuration level 2nd 3rd 4th 5th
                services configuration level (Level 3), service virtual-sensor-configuration level 2nd
                services configuration level (Level 3), services host configuration level 2nd 3rd 4th 5th
                services configuration level (Level 3), WebServer service level 2nd
        practice labs 2nd 3rd 4th 5th
        service pack updates 2nd
        show commands
                show events
                show interfaces 2nd 3rd
                show statistics 2nd 3rd
                show tech-support 2nd
                show version 2nd
        signature updates 2nd
        SSH (Secure Shell) commands
                ssh-authorized-key
                ssh- generate-key 2nd
                ssh-host 2nd 3rd
                tls generate-key
       user accounts
                privilege levels
                privilege levels, administrator
                privilege levels, changing
                privilege levels, operator
                privilege levels, service
                privilege levels, viewer
        user commands
                password command 2nd
                privilege command
                show user all command
                show user command 2nd
                username command
CLI (command-line interface)
        accessing
client access
        IDS MC installations 2nd
        Security Monitor 2nd
client browsers
        IDM (IDS Device Manager)
clock set command
collapsing columns
        Event Viewer
Collpasing columns option (Event Viewer)
columns
       manipulating
                Event Viewer 2nd
        views 2nd
command
        switchport capture 2nd
command and control (int1) interface
        IDS-4215 standalone sensor appliance 2nd
command and control interface
        sensor applicances
command and control interface level 2nd
Command timeout option (Your Preferences page)
Command Timeout value (Actions Display Preferences)
command-line interface (CLI)
        accessing
command-line interface. 2nd [See CLI]
command-line prompts
        changing
commands 2nd
        action 2nd
        clear events 2nd
        clear security acl capture-ports 2nd
        clear trunk 2nd
        clock set
        command and control interface level
        commit security acl 2nd
        copy 2nd 3rd 4th
       Devices menu
                Sensor Group
                Sensor, Add
                Sensors, Add
        downgrade
       Edit menu
                Application Settings
        erase 2nd
       File menu
                Database Administration, Data Source Information
                Database Administration, Export Database Tables
                New, Devices
                New, Filter
                New, View
        global configuration CLI level (Level 2)
        hostname 2nd
        interface 2nd
        interface configuration CLI level
        interface vlan
        ip access-list 2nd
        ip access-list extended 2nd
        IP logging
                iplog 2nd 3rd
                iplog-status 2nd
       keyboards
                CLI (command-line interface) 2nd 3rd
        match
        mls id ids
                Catalyst IOS (Internetwork operating system) configurations
                Catalyst operating system (OS) configurations 2nd 3rd 4th 5th
        monitor session 2nd 3rd 4th 5th 6th
        NetworkAccess service level 2nd
        no shutdown
        port monitor
        privilege 2nd
        privileged Exec CLI level
        recover
       Reports menu
                View
        reset
       roles
                sensor user accounts (IDS) 2nd
        set port dot1qtunnel
        set rspan destination 2nd
        set rspan source 2nd
        set security acl capture-ports 2nd 3rd
        set security acl ip 2nd 3rd 4th
        set security acl map 2nd
        set span 2nd 3rd 4th
        set trunk 2nd
        set vlan 2nd
        setup 2nd 3rd
                sensor settings, configuring 2nd 3rd 4th
        show
                show events
                show interfaces 2nd 3rd
                show statistics 2nd 3rd
                show tech-support 2nd
                show version 2nd
        show settings 2nd 3rd
        show users 2nd
        shun 2nd
        SSH (Secure Shell)
                ssh-authorized-key
                ssh-generate-key 2nd
                ssh-host 2nd 3rd
                tls generate-key
       Tools menu
                Realtime Dashboard, Launch Dashboard
                Realtime Graph
        upgrade
        user
                password commands 2nd
                privilege commands
                show user all commands
                show user commands 2nd
                username commands
        username 2nd
        vlan 2nd 3rd
        vlan access-map 2nd
        vlan filter 2nd
        WebServer service level
Comment option (Specify the Trigger Condition page)
commit security acl command 2nd
communication properties
        Security Monitor
communication protocols
        PostOffice protocol
        RDEP 2nd
communication requirements
        blocking devices 2nd
communications
        IDS (Intrustion Detection System)
                data extraction 2nd
                data extraction, event messages
                data extraction, IP log messages
                data extraction, PostOffice protocol 2nd
                data extraction, RDEP (Remote Data Exchange Protocol) 2nd
                managed devices 2nd
                management 2nd
       secure
                ssh-host command
Communications protocol radio buttons option (Device Properties dialog box)
compatibility
        ACL (access control list)
configuration files
        copying
Configuration tab sheet (IDM)
configurations
       advanced
                Catalyst 6500 2nd
                Catalyst 6500, multiple sensor/multiple VLAN
                Catalyst 6500, single sensor/multiple VLAN
                Catalyst 6500, single sensor/single VLAN
                Catalyst 6500, trunk port configurations 2nd 3rd 4th
       application settings
                IEV (IDS Event Viewer) 2nd
                IEV (IDS Event Viewer);Data Archival Setup 2nd
                IEV (IDS Event Viewer);Refresh Cycle 2nd
        backup-config files
                erasing
        current-config files
                erasing
        global sensing
                internal networks
                IP packet reassembly 2nd
        IDS MC
                logging
                logging, automatic 2nd 3rd 4th
                logging, event 2nd 3rd
                RDEP (Remote Data Exchange Protocol)
                RDEP (Remote Data Exchange Protocol), allowed hosts
                RDEP (Remote Data Exchange Protocol), settings
        IEV (IDS Event Viewer) 2nd
        managed devices 2nd 3rd
       manual
                ACL (access control list)
        master blocking sensors 2nd
        PuTTY Configuration
        Security Monitor
                connections, monitoring
                devices, importing 2nd
                devices;adding
                devices;IOS 2nd
                devices;PostOffice 2nd
                devices;RDEP 2nd
                events, monitoring 2nd 3rd 4th 5th 6th
                statistics, monitoring 2nd 3rd
        Sensor blocking 2nd
                managed devices, Cisco Catalyst 6000 VACL 2nd 3rd
                managed devices, Cisco IOS Routers 2nd 3rd 4th 5th
                managed devices, Cisco PIX Firewall 2nd 3rd 4th
                never-block addresses 2nd
       sensors
                deploying 2nd
                deploying, generating configurations
                deploying, pending configurations
                deploying, submit configurations 2nd 3rd
        signatures 2nd
                custom 2nd
                filter exceptions 2nd
                filtering 2nd 3rd
                response actions 2nd
       SPAN (Switched Port Analyzer)
                switches
                switches, 2900XL/3500XL 2nd
                switches, 2950/3550 2nd
                switches, 4000/4500/6500 2nd 3rd
       threshol
                signatures
        VACLs (VLAN access control lists)
                Catalyst IOS (Internetwork operating system) 2nd 3rd 4th 5th 6th
                Catalyst operating system (OS) 2nd 3rd 4th 5th 6th
Confirm password option (Add User page) 2nd 3rd
connections
        embryonic
        IDS (Intrustion Detection System)
                cidWebServer 2nd
                NAC (Network Access Controller) 2nd
                sensorApp 2nd
                sensorApp, VirtualAlarm process
                sensorApp, VirtualSensor process 2nd
                SSH (Secure Shell)
                Telnet
        IDS MC
       monitoring
                Security Monitor
Consequences option (Related Vulnerability page)
Console interface
        IDS-4215 standalone sensor appliance
        IDS-4235 standalone sensor appliance
        IDS-4250XL standalone sensor appliance
console ports
        CLI (command-line interface) access
Content value (Sort By Display Preferences)
context data buffers
        IEV (IDS Event Viewer)
context-based access control (CBAC)
        ACL (access control lists) compatibility
continuous streaming
        events 2nd
Copnsole interface
        IDS-4250 standalone sensor appliance
copy command 2nd 3rd 4th
Count value (Sort By Display Preferences)
Countermeasures option (Related Vulnerability page)
counters
       alarms
                parameters 2nd 3rd
Creating graphs option (Event Viewer)
critical hosts
        blocking
CSA MC (Cisco Security Agent Management Center) 2nd 3rd
CSACS (Cisco Secure Access Server)
CSEC (Cisco Secure Encyclopedia) 2nd
CSIDS (Cisco Secure Intrustion Detection System)
current-config files
        erasing
custom ICMP signatures
        creating
custom signatures 2nd
        creating 2nd
        signature tuning 2nd
custom-reporting (Security Monitor)
CVE ID option (Related Vulnerability page)

[ LiB ]


CSIDS Exam Cram 2 (Exam 642-531)
CSIDS Exam Cram 2 (Exam 642-531)
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 213

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net