Intrusion Prevention Fundamentals

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

IDSM-2 sensors

impact of attack

incident response plans

individual management method

information theft

inline mode sensor operation

     capturing network traffic 2nd

     sensor failure

inline on a stick

inline prevention

insecure management protocol

installing

     IPS MC

     sensors

integrated IPS software

interfaces as sensor selection criteria

Internet as security threat

Internet perimeter firewall, role in layered defense

Internet perimeter router, role in layered defense

intrinsic IPS

IP blocking

IP logging

IP spoofing

IPS MC (IPS Management Center), installing

IPSs

     hosts, classifying

     integrated software

     network management options

     network traffic, capturing

     phases of deployment

         finalizing the project

         predeployment planning

         sensor deployment

         tuning

         understanding the product

    response methods

         alerting actions

         blocking actions

         dropping actions

         logging actions

    sensors

         Cisco Catalyst 6500 series IDSM-2

         Cisco IDS Network Module

         Cisco IOS IPS sensors

         Cisco IPS 4200 series appliance sensors

         Cisco product availability

         large deployments

         selecting location for placement

         small deployments

     signature updates

Категории