Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z] IDSM-2 sensors impact of attack incident response plans individual management method information theft inline mode sensor operation capturing network traffic 2nd sensor failure inline on a stick inline prevention insecure management protocol installing IPS MC sensors integrated IPS software interfaces as sensor selection criteria Internet as security threat Internet perimeter firewall, role in layered defense Internet perimeter router, role in layered defense intrinsic IPS IP blocking IP logging IP spoofing IPS MC (IPS Management Center), installing IPSs hosts, classifying integrated software network management options network traffic, capturing phases of deployment finalizing the project predeployment planning sensor deployment tuning understanding the product response methods alerting actions blocking actions dropping actions logging actions sensors Cisco Catalyst 6500 series IDSM-2 Cisco IDS Network Module Cisco IOS IPS sensors Cisco IPS 4200 series appliance sensors Cisco product availability large deployments selecting location for placement small deployments signature updates |