[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]
n to 1 attacks ( many-to-one )
n to n attacks (many-to-many)
NAC
block actions 2nd
NAC (Network Access Controller) 2nd
names
sensors
changing
naming
update files 2nd
views
NAT address option (Enter Sensor Information page)
navigation
IEV (IDS Event Viewer)
alarm information, viewing
Expand Whole Details option
views, closing
views, columns 2nd
views, creating 2nd
views, data sources
views, deleting
views, displaying
views, naming
views, Realtime Dashboard 2nd
views, Realtime Graph data 2nd
views, signature grouping
views, Statistic Graph data 2nd
NetRangers. [See standalone sensor appliances]
Network Access Controller (NAC) 2nd
Network Administrator authorization role (CiscoWorks)
Network Administrator user authentication role (CiscoWorks)
network intrusions
false negatives
false positives
signatures 2nd 3rd
heuristic-based 2nd
profile-based (anomaly) intrustion detection
protocol decode-based analysis 2nd
signature-based (misuse) intrusion detection
signature-based (misuse) intrusion detection, pattern matching 2nd
network intrustions
false negatives
false positives
Network Operator authorization role (CiscoWorks)
Network Operator user authentication role (CiscoWorks)
network protocols
selecting signature engines
network security 2nd 3rd 4th
active defense system 2nd
attack management protocols 2nd 3rd
attack responses 2nd
attack taxonomy 2nd
application attacks 2nd
IP spoofing 2nd
man-in-the-middle attacks
packet sniffers 2nd
password attacks 2nd
viruses 2nd
attacks
access
DoS (denial-of-service) 2nd 3rd
ICMP-based
reconnaissance
Cisco Security Wheel 2nd
steps
steps, environment monitoring
steps, environment security
steps, environment testing
steps, security policy improvement
Cisco Threat Response
external threats
HIPS (host-focused intrusion protection system) 2nd 3rd
CSA MC (Cisco Securty Agent Management Center)
Security Agent
internal threats
management
CSA MC (Cisco Security Agent Management)
IDM
IEV 2nd
VPN (Virtual Private Network)/VMS (Security Management Solution) 2nd
NIDS (network-focused intrusion detection) 2nd 3rd 4th
4200 Series Sensor Appliances
Firewall Sensor PIX (Private Internet Exchange) IDS
Router Sensor IOS (Internetwork Operating System) IDS
Switch Sensor IDS Module (IDSM2) 2nd
structured threats
triggers 2nd
heuristic-based signatures 2nd
profile-based (anomaly) intrusion detection
protocol decode-based analysis 2nd
signature-based (misuse) intrusion detection
signature-based (misuse) intrusion detection, pattern matching
signature-based (misuse) intrusion detection, stateful pattern matching
unstructured threats
Network Security Database (NSDB) 2nd
Related Vulnerability page 2nd 3rd
Signature Information page 2nd
User Notes page
network security policy
functions 2nd
RFC 2196 [quote]Site Security Handbook[quote]
Network Settings dialog box
network signatures
updating
Security Monitor
network topologies
blocking
network-focused intrusion detection (NIDS) 2nd 3rd 4th
4200 Series Sensor Appliances
Firewall Sensor PIX (Private Internet Exchange) IDS
Router Sensor IOS (Internetwork Operating System) IDS
Switch IDS Module (IDSM2) 2nd
NetworkAccess service level 2nd 3rd
networkParams option (services host configuration level)
networks
entry points
blocking
internal
global sensing configurations
multiple
sensor applicance placement
signatures
updating 2nd
never-block addresses (blocking configurations) 2nd
New, Devices command (File menu)
New, Filter command (File menu)
New, View command (File menu)
NIDS (network-focused intrusion detection) 2nd 3rd 4th
4200 Series Sensor Appliances
Firewall Sensor PIX (Private Internet Exchange) IDS
Router Sensor IOS (Internetwork Operating System) IDS
Switch Sensor IDS Module (IDSM2) 2nd
NM-CIDS sensor module 2nd
no shutdown command
Notifiy via email option (Choose the Actions page)
NSDB (Network Security Database) 2nd
Related Vulnerability page 2nd 3rd
Signature Information page 2nd
User Notes page
Number of IP log files option (Automatic IP Logging page)