CCNP BCMSN Exam Certification Guide (3rd Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

same-security access 2nd

saving

     firewall crash information

     running configuration to Flash

     running configuration to Flash memory 2nd

     running configuration to TFTP server 2nd

scheduling

     firewall reloads 2nd 3rd

screen paging

     disabling

SDF (signature definition file)

SDM

     installing signature update files 2nd

SDM (Security Device Manager)

searching

     for regular expressions 2nd

     regular expressions 2nd

security contexts

security levels

     assigning to interfaces

security policies

     defining in MPF 2nd

securitywheel [security wheel]

selecting

     startup configuration 2nd 3rd

sending

     Syslog messages with TCP

sensors

     adding to CiscoWorks VMS 2nd

    Cisco Firewall

         supported signatures 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

     displaying audit statistics 2nd

     displaying total IDS activity 2nd

    embedded

         configuring 2nd 3rd 4th 5th 6th 7th 8th 9th

         examples of 2nd 3rd

         monitoring

    router IDS

         supported signatures 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

server reactivation policies

     defining

service contact port

service object groups

     defining 2nd 3rd

service policies

     displaying

setting

     clock manually 2nd 3rd 4th 5th

     clock with NTP 2nd 3rd 4th 5th 6th 7th

severity level 1 alerts 2nd 3rd

severity level 2 critical messages 2nd

severity level 3 error messages 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

severity level 4 warning messages 2nd 3rd 4th 5th 6th

severity level 5 notifications 2nd 3rd 4th 5th 6th 7th

severity level 6 informational messages 2nd 3rd 4th 5th 6th 7th 8th 9th

severity level 7 debugging messages 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

severity levels 2nd 3rd 4th

     changing

     setting for message logging 2nd

shared tree

shared trees

     PIM shared trees

sharing

     inside context interfaces 2nd 3rd

show admin-context command 2nd

show arp command

show blocks command 2nd

show failover command 2nd 3rd 4th 5th 6th 7th

show flash command

show fragment command

show interface command 2nd

show ip audit statistics command 2nd

show ip ips signature command

show ip urlfilter config command 2nd

show logging command 2nd 3rd 4th

show memory detail command

show mode command

show priority-queue statistics command

show resource allocation command

show route command

show service-policy command

show traffic command 2nd

show version command 2nd 3rd 4th

show xlate command 2nd 3rd 4th 5th 6th

shunning traffic 2nd 3rd 4th

     example 2nd

shuns

     removing from firewall

     verifying connectivity 2nd

signature definitions

     locating

signature updates

     applying 2nd 3rd

signatures

     details, displaying

     disabling 2nd

     for Cisco Firewall sensors 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

     for router IDS sensors 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

     policies, defining

     signature ID numbers 2nd 3rd

simple translation

simple translation entries

SIMS (Security Information Management Solution)

single-context mode

site-local addresses

SMR

     example configuration 2nd

SMR (stub multicast router)

SNMP

     configuring 2nd 3rd 4th 5th

     MIBs 2nd

     monitoring firewall activity

     traps 2nd

SNMP inspection

     configuring 2nd

SNMP support

software load balancing

     IOS FWLB 2nd

         configuring 2nd 3rd 4th 5th 6th 7th 8th 9th

         displaying information 2nd 3rd 4th

         example 2nd 3rd 4th 5th 6th 7th

source address

     spoofing

Sparse Mode (PIM)

specifications of Cisco firewalls 2nd

spoofed IP addresses

     preventing 2nd 3rd

SPT (shortest path tree)

SPT switchover

SSH

     accessing firewall user interface 2nd 3rd 4th

startup configuration

    configuration commands

         merging with running configuration commands 2nd 3rd 4th 5th 6th

     displaying

    environment variable

         displaying

     erasing configuration commands from

     managing

     selecting 2nd 3rd

stateful failover

     configuring 2nd 3rd 4th

     monitoring 2nd

stateful inspection 2nd

     CBAC 2nd 3rd 4th

         configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

         example of 2nd

         monitoring blocked traffic 2nd

         monitoring connection tear down

     of ICMP 2nd

         case study 2nd

     of TCP 2nd 3rd 4th

         TCP normalization 2nd

     of UDP 2nd 3rd 4th

     packet classifiers

stateful inspection resources

     checking 2nd

stateless backup

stateless failover

static address translation 2nd

static ARP entries

     clearing

     configuring

static NAT 2nd 3rd

     configuring on IOS firewall 2nd 3rd 4th 5th

     entries, configuring 2nd 3rd

     example of 2nd

static routes

     configuring 2nd 3rd

     removing

sticky connections

stratum 2nd

structure

     of PIX 7.x Flash memory hierarchy 2nd

structure of Flash memory in PIX 6.x

stub routers

subinterface number

submitting

     traffic for application inspection 2nd 3rd 4th

supported translation types 2nd

synchronizing

     time stamps on logging messages 2nd

syntax errors

Syslog

     ACL-related messages

    alerts

         enabling

     CBAC-related messages 2nd

    firewall logs

         collecting

    firewall throughput

         checking

     PFSS

     URL filtering messages 2nd

     verifying logging on embedded IDS sensors 2nd 3rd

     viewing recent messages 2nd

Syslog messages

     sending with TCP

syslog messages

     severity level 1 alerts 2nd 3rd

     severity level 2 critical messages 2nd

     severity level 3 error messages 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

     severity level 4 warning messages 2nd 3rd 4th 5th 6th

     severity level 5 notifications 2nd 3rd 4th 5th 6th 7th

     severity level 6 informational messages 2nd 3rd 4th 5th 6th 7th 8th 9th

     severity level 7 debugging messages 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

Syslog servers

     optimizing 2nd 3rd

system execution space 2nd

     features 2nd

system messages

     EMBLEM format

     format 2nd

system name (contexts)

     displaying

system resources

     checking

    failover performance

         checking 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    firewall CPU load

         checking 2nd 3rd 4th 5th 6th

    firewall interface throughput

         checking 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    firewall memory usage

         checking 2nd 3rd 4th

    firewall throughput

         checking 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    inspection engine activity

         checking 2nd

    stateful inspection resources

         checking 2nd

Категории