CCNP BCMSN Exam Certification Guide (3rd Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

maintenance partition

managing

     Flash memory 2nd

         FWSM 2nd 3rd

         PIX 6.x 2nd

         PIX 7.x 2nd 3rd

     startup configuration

manipulating

     ACLs 2nd

manually forcing failover role change

manually resetting failed firewall units 2nd

manually setting internal clock 2nd 3rd 4th 5th

manually testing logging message generation 2nd

mapping

     physical interfaces to contexts 2nd 3rd

     physical interfaces to logical interfaces (contexts)

mapping agents

medium-security interfaces

    inbound access

         configuring 2nd

Membership Report messages

memory

    Flash

         checking system integrity

         copying files to/from

         creating directories in

         formatting

         removing directories from

    Flash memory

         deleting files from

         downloading operating system image 2nd 3rd 4th

         identifying operating system image 2nd

         managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

         renaming files in

         upgrading operating system image 2nd 3rd 4th 5th 6th

memory usage

     checking 2nd 3rd 4th

merged configuration commands

merging

     startup and running configuration commands 2nd 3rd 4th 5th 6th

message logging 2nd

     ACL-related Syslog messages

     analyzing firewall logs 2nd 3rd 4th

     CBAC-related Syslog messages 2nd

     destinations, verifying 2nd

     logging ACL activity 2nd 3rd

     manually testing 2nd

     pruning messages 2nd

     URL filtering Syslog messages 2nd

messages

     heartbeat

     ICMP 2nd 3rd

     IGMP Membership Report

     logging 2nd

         setting severity levels 2nd

         time stamp synchronization 2nd

    severity levels

         changing

    syslog

         severity level 1 alerts 2nd 3rd

         severity level 2 critical messages 2nd

         severity level 3 error messages 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

         severity level 4 warning messages 2nd 3rd 4th 5th 6th

         severity level 5 notifications 2nd 3rd 4th 5th 6th 7th

         severity level 6 informational messages 2nd 3rd 4th 5th 6th 7th 8th 9th

         severity level 7 debugging messages 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    system messages

         format 2nd

MGCP map

     configuring 2nd

MIBs 2nd

     monitoring firewall activity

     objects

mode multiple command

modifying

     message severity levels

monitor

    screen length

         changing

     URL filtering 2nd

monitoring

     ACLs 2nd 3rd

     active shun activity

     address translations 2nd 3rd 4th 5th

     administrative sessions 2nd

     capture sessions 2nd

     CBAC operation

         blocked traffic 2nd

     connections 2nd 3rd 4th 5th 6th

     embedded IDS sensors

    firewall acivity with SNMP

         traps

     firewall activity with SNMP

     firewall configuration changes 2nd

     stateful failover 2nd

    xlate entries

         based on local address

monitors

     adjusting terminal screen width

more command

MOTD banners

     configuring on user interface 2nd

MPF (Modular Policy Framework)

    security policies

         defining 2nd

MSS (maximum segment size)

     configuring

MTU

     interface configuration 2nd

multicast

    IGMP

         configuring 2nd 3rd 4th

         verifying operation 2nd

     PIM 2nd

         configuring 2nd 3rd 4th 5th 6th 7th

         verifying operation 2nd 3rd 4th 5th

     PIM-SM 2nd 3rd 4th 5th

         RP designation 2nd

    routing

         IGMP

         multicast trees

         RPF

    SMR

         configuring 2nd 3rd 4th

         example configuration 2nd

multicast addressing

     OUI values

multicast groups

multicast trees

multiple context mode

     initiating 2nd

multiple-context mode

     classifiers

     configuring 2nd 3rd 4th

     navigating multiple security contexts 2nd

     resource allocation 2nd

Категории