I



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

IDSM-2 sensors
impact of attack
incident response plans
individual management method
information theft
inline mode sensor operation
     capturing network traffic 2nd
     sensor failure
inline on a stick
inline prevention
insecure management protocol
installing
     IPS MC
     sensors
integrated IPS software
interfaces as sensor selection criteria
Internet as security threat
Internet perimeter firewall, role in layered defense
Internet perimeter router, role in layered defense
intrinsic IPS
IP blocking
IP logging
IP spoofing
IPS MC (IPS Management Center), installing
IPSs
     hosts, classifying
     integrated software
     network management options
     network traffic, capturing
     phases of deployment
         finalizing the project
         predeployment planning
         sensor deployment
         tuning
         understanding the product
    response methods
         alerting actions
         blocking actions
         dropping actions
         logging actions
    sensors
         Cisco Catalyst 6500 series IDSM-2
         Cisco IDS Network Module
         Cisco IOS IPS sensors
         Cisco IPS 4200 series appliance sensors
         Cisco product availability
         large deployments
         selecting location for placement
         small deployments
     signature updates




Intrusion Prevention Fundamentals
Intrusion Prevention Fundamentals
ISBN: 1587052393
EAN: 2147483647
Year: N/A
Pages: 115

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net