index_S

 


Index


[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

searching patterns,
Secure Shell (SSH), 2nd
security
    IPS
         bypasses,
         configuring,
         deploying,
         hardware,
         hybrid IPS/IDS solutions,
         meta-event generators,
         monitoring,
         overview of,
         protocols,
         risk rating,
         terminology,
         triggers,
     NSDB
Security Monitor
     configuring
         adding devices,
         event notification,
         Event Viewer,
         importing devices,
         monitoring devices,
     managing
         data, 2nd
         Event Viewer preferences,
         system configuration,
     reports
selecting
     event types
     IP blocking
     signature engines
     strong passwords
senior user accounts, configuring,
Sensor Setup (IDM),
sensors,
     analysis engines
     clocks
     configuring
     events
         filtering actions,
         overriding actions,
         Target Value Rating,
         variables, 2nd
     hosts
     IDS evasion
         encryption,
         flooding,
         fragmentation,
         obfuscation,
         TTL manipulation,
     IDSM
         Catalyst 6500 switches,
         configuring IDSM-2,
         deploying IDSM-2,
         features of,
         managing (IDSM-2),
         ports (IDSM-2),
         traffic flow (IDSM-2),
         troubleshooting (IDSM-2),
     interfaces
     IPS
         bypasses,
         Cisco IDS 4200 switches,
         Cisco IDSM-2 (for Catalyst 6500),
         configuring,
         deploying,
         firewalls,
         hardware,
         hybrid IPS/IDS solutions,
         IDM [See also IDM]
         initializing,
         inline sensor support,
         installing,
         meta-event generators,
         monitoring,
         network module for access routers,
         overview of,
         protocols,
         risk rating,
         routers,
         terminology,
         triggers,
     maintenance 2nd
         automatic software updates,
         CLI software installations,
         downgrading images,
         IDM software installations,
         image recovery,
         licenses,
         resetting,
         restoring configurations,
         saving current configurations,
         updating software,
     optimizing
         configuring IP log settings,
         enforcing application policies,
         reassembly options,
     responses
         inline actions,
         IP blocking, 2nd
         logging actions,
         manual blocking,
         Master Blocking Sensors,
         TCP reset,
     signatures
         configuring, 2nd
         customizing,
         FTP/HTTP policy enforcement,
         groups,
         managing alarms,
         MEG,
         optimizing configuration,
         tuning,
     virtual
servers
     IPS deployment
     NTP
     requirements
Service accounts, creating,
Service mode (CLI command mode),
service notification command,
service packs,
Service role,
services, viewing signatures,
session command,
session slot command,
set security acl command,
set vlan command,
setup command,
severity (event),
show commands
     show configuration command
     show events command
     show interfaces command
     show inventory command
     show module command
     show module switch command
     show port command
     show statistics command
     show tech-support command 2nd
     show trunk command
     show version command
shun command,
shutting down NM-CIDS,
Signature Configuration option (IDM),
Signature Definition category (IDM),
signature fidelity ratings,
Signature Variables option (IDM),
signature-definition mode,
signatures
     Cisco IPS 2nd
         AIC FTP engines,
         AIC HTTP engines,
         atomic engines,
         engines,
         flood engines,
         Meta Signature engines,
         Normalizer Signature engines,
         parameters,
         service signature engines,
         state signature engines,
         String signature engines,
         Sweep signature engines,
         Trojan horse signature engines,
     cloning
     connections
     creating
     defining
     editing
     enabling
     engines
     fields
     filtering
     functionality
     IPS
         configuring, 2nd
         customizing,
         FTP/HTTP policy enforcement,
         groups,
         managing alarms,
         MEG,
         optimizing configuration,
         tuning,
     parameters
     responses
         inline actions,
         IP blocking, 2nd
         logging actions,
         manual blocking,
         Master Blocking Sensors,
         TCP reset,
     retiring
     selecting
     testing
Simple Mail Transport Protocol,
Simple Network Management Protocol (SNMP),
single sensors, configuring,
SMTP (Simple Mail Transport Protocol),
sniffing networks,
SNMP (Simple Network Management Protocol),
software types,
Sort By group box (Event Viewer),
spam,
SPAN (Switched Port Analyzer),
     configuring
speed (interface),
spoofing, antispoofing mechanisms,
Spyware signatures, viewing,
SQL (Structured Query Language),
SSH (Secure Shell), 2nd
ssh host-key command,
ssh-known-hosts mode,
status
     fields (signatures)
     NM-CIDS
streams
     loose TCP
     strict TCP
strict TCP streams,
strings, matching,
Structured Query Language (SQL),
subcommands
     action
     match
summaries of alarms,
summertime settings, configuring,
Switched Port Analyzer (SPAN),
     configuring
switches
    Catalyst 6000
         as blocking devices,
         as IP blocking devices,
     IDSM
     traffic flow
switchport access vlan command,
switchport capture allowed vlan command,
switchport capture command,
switchport trunk command,
syntax for regular expressions,
system clocks, configuring,
system configuration [See configuration]
system requirements,

 


CCSP IPS Exam Certification Guide
CCSP IPS Exam Certification Guide
ISBN: 1587201461
EAN: 2147483647
Year: 2004
Pages: 119
Authors: Earl Carter

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net