MaxTech XT7800 Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Téléviseurs et moniteurs MaxTech XT7800. Symbols A - Pearsoncmg Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 44
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
I
N
D
E
X
Symbols
# (pound sign), 178
? (question mark), 174
A
access
access lists.
See
ACLs
dialup, sensor deployment, 724
maps, VLANs, 729–730
restrictions, 74
telecommuters, 725–726
Access Control Lists.
See
ACLs
accessList command, 189, 288
access-list-number parameter, ip access-list
command, 152
access-log parameter, ip access-list command,
152
AccountName parameter, SERVICE.SMB
signature engine, 467
accounts, attacks, 16
acl_name parameter, set security acl ip command,
148
AclDataSource parameter, SERVICE.SYSLOG
signature engine, 469
AclFilterName parameter, SERVICE.SYSLOG
signature engine, 469
ACLs (Access Control List), 59, 116, 147
active, 378
configuring VACLs, 147–152
IDSM-2, 728–729
IP blocking, 385–387
existing ACLs, 388–389
external
versus
internal interfaces, 387
versus
VA CLs, 388
multiple IDSM-2, 732
action command, 729
actions, CTR, 663
Actions group box, Event Viewer preferences,
637–638
active ACLs, 378
active defenses, 88–92
active hosts, 515
activity bars, IDM, 226
ad hoc attacks, 14
Address Resolution Protocol (ARP), 19, 333
addresses, IP, IEV filtering, 240–241.
See also
IP
addresses
Admin User ID parameter, protected host, 688
administration (Security Monitor), 645
database maintenance, 645–648
Event Viewer preferences, 649
sensors, 307
diagnostic information, 308–310
rebooting, 310–311
system information, 307
sources, 136
System Configuration, 648–649
tools, reconnaissance attack, 19
Administration privilege, Users, 704
Administration tab, IDM, 223
administrators
CLI tasks, 183
CLI user roles, 176
networks, limiting access, 36
roles, user accounts, 125
Advanced Configuration privilege, Users, 704
agent kits, 533
controlling IP address registration, 536
creating, 533–534
installation, 491
software updates, 536–538
Agent Service Control rule, CSA policies, 525
1443fmfIX.fm Page 785 Friday, January 9, 2004 4:34 PM
Vue de la page 0
1 2 3 4 5 6 ... 43 44

Résumé du contenu

Page 1

I N D E X Symbols # (pound sign), 178? (question mark), 174 A accessaccess lists. See ACLsdialup, sensor deployment, 724maps, VLANs, 729–730

Page 2

794 exporting table, 273–274importing log files, 272–273Security Monitor administration, 645–648sensors, 107date, IEV filters, 243–244day parameterclo

Page 3

795 dialup access, sensor deployment, 724digital subscriber lines (DSLs), 3Direction parameterSERVICE.FTP signature engine, 456SERVICE.IDENT signatur

Page 4

796 special characters, 77Unicode, 78TTL manipulation, 79Even Severity Indicator options, Event Viewer preferences, 639–640Event Log Management, CSA

Page 5

797 exclusive security stance, 40exit command, 174Expanded Details Dialog table, 254, 258–259expansion boundaries, Event Viewer, 633Exploit Signature

Page 6

798 G Gap parameter, FLOOD.NET signature engine, 451Gigabit Ethernet, 101global configuration modes, CLI, 179global sensinginternal networks, 317–318

Page 7

799 Host Detail report, CSA MC, 538host groups, 509configuring, 509–514Hosts menu option, 514active hosts, 515last poll time, 516protected hosts, 515

Page 8 - Console transition

800 IDAPI (Intrusion Detection Application Program Interface), 121–122IDIOM (Intrusion Detection Interaction and Operations Messages), 123IDM (IDS D

Page 9

801 IDS Alarm Source Report, 651IDS Alarm Source/Destination Pair Report, 650IDS Alarms by Day Report, 650IDS Alarms by Hour Report, 650IDS Alarms by

Page 10

802 traffic capture, 203traffic flow, 204internal ports, 728multiple IDSM-2, 730–732assigning capture ports, 734–736committing VACLs to hardware, 733de

Page 11

803 Ignore Broadcast zone, Quick Start Wizard, 681ignore DNS activity policy, CTR, 666ignore threat response activity policy, CTR, 666Immediate prope

Page 12

786 agents, 28aggregation switches, 133Alarm Aggregation table, 258alarm status, 261–262content data buffer, 263–264Expanded Details Dialog table, 2

Page 13

804 TLS protocol, 227–229TOC, 224tools bar, 225IDS MC, 585–586configuration tasks, 586–587content area, 588instructions box, 588object bar, 588object

Page 14

805 IP blocking, 377–378ACLs, 386–387existing ACLs, 388–389external versus internal interfaces, 387 versus VA CLs, 388common terms, 378–379configu

Page 15

806 IsInvalidDataPacket parameter, SERVICE.NTP signature engine, 463IsInvalidPacket parameter, SERVICE.SNMP signature engine, 467isl parameter, set

Page 16

807 M MAC (Media Access Control), 132MacFlip parameter, ATOMIC.ARP signature engine, 442mailing lists, improving network security, 48mainApp process,

Page 17

808 MinUDPLength parameter, ATOMIC.UDP signature engine, 448Miscellaneous signature engines, 437misuse detection, 65–66benefits, 66drawbacks, 66–67m

Page 18

809 Network Administrator user role, CiscoWorks, 493, 574network interface card (NIC), 70Network Interface Control rule, CSA policies, 526Network Ope

Page 19

810 NTP (Network Time Protocol), 302ntPassword 4.0, 21 O obfuscation techniques, 77hexadecimal values, 78special characters, 77Unicode, 78object bar

Page 20

811 SERVICE.RPC signature engine, 464–465SERVICE.SMB signature engine, 467SERVICE.SNMP signature engine, 467SERVICE.SSH signature engine, 468SERVICE.

Page 21

812 CTR, 665–666security, 9Policies parameter, Event Sets menu option, 506Policy Detail report, CSA MC, 538Policy Feature Card (PFC), 143, 198Policy

Page 22

813 protected attributes, signature engine parameter, 438protected domains, CTR, 664, 690–691protected hosts, CTR, 664, 687–689protected systems, CTR

Page 23

787 anonymous shares, 16Anonymous Users, privilege hierarchy, 36antispoofing mechanisms, IP blocking, 382–383any keyword, 149appliances, 162Cisco SAFE

Page 24

814 recover command, 168, 556refresh cycle, IEV preferences, 268–269RegexString parameterSTATE.STRING signature engine, 470String signature engine,

Page 25 - NTBugtraq

815 UNIX, 525UNIX-specific, 526Windows, 525Windows-specific, 525–526rx parametermonitor session command, 140set rspan command, 144set span command, 1

Page 26 - NTP (Network Time Protocol)

816 deleting columns, 630–631deleting rows, 630–631display preferences, 636–640expanding columns, 634–635expansion boundary, 633freezing, 635–636movin

Page 27

817TLS protocol, 227–229TOC, 224tools bar, 225IDS appliances, 162CLI, 173–183hardware considerations, 167–170IDS 4210, 162–163IDS 4215, 163–164IDS 423

Page 28

818 traffic devices, 131hubs, 131–132network tap, 133RSPAN, 143–145SPAN, 135–142switches, 134–135VA CLs, 145–153troubleshooting, 557show events comman

Page 29

819set security acl map command, 150, 208–210, 734set span command, 141–142set span switch command, 206set trunk command, parameters, 155, 212, 736set

Page 30

820 SERVICE.IDENT signature engine, 461–462SERVICE.MSSQL signature engine, 462SERVICE.NTP signature engine, 462–464SERVICE.RPC signature engine, 464–4

Page 31

821Cisco updates, 716–717configuring, 350–351customizing, 358, 736–737attack type, 360functionality verification, 360–361inspection criteria, 360networ

Page 32

822 source vlan parameter, monitor session command, 139source_IP parameter, ip access-list command, 152source_wildcard parameter, ip access-list comma

Page 33

823Sweep signature engines, 437, 473–474SWEEP.HOST.ICMP, 474SWEEP.HOST.TCP, 474–476SWEEP.MULTI, 476SWEEP.OTHER.TCP, 476–478SWEEP.PORT.TCP, 478–480SWEE

Page 34

788 ASIC (application-specific integrated circuit), 143asym TCP reassembly mode, 326Atomic signature engines, 437, 441–442ATOMIC.ARP, 442–443ATOMIC.I

Page 35

824 TcpInterest parameter, SWEEP.MULTI signature engine, 476Technical Assistance Center (TAC), 562, 674telecommuters, sensor deployment, 725–726teleph

Page 36

825TrafficFlowTimeout parameter, OTHER signature engine, 453training, avoiding attacks, 64transaction messages, RDEP operations, 124Transaction Server

Page 37 - Source tab, Alarm Filter tabs

826 UUDP (User Datagram Protocol), 384udp | 17 parameter, set security acl ip command, 148UdpInterest parameter, SWEEP.MULTI signature engine, 476Unde

Page 38

827VVA CLs (VLAN Access Control Lists), 145, 198, 207capture, IDSM support, 199committing to hardware, 733configuring with CatOS, 146–147assigning cap

Page 39 - TcpFlags parameter

828 VPN/Security Management Solution (VMS), 100, 281, 583VPNs (virtual private networks), 40–41endpoint defining with encryption, 41–42untrusted links

Page 40

789 AVVID (Architecture for Voice, Video, and Integrated Display), 34, 50, 571architecture, 50clients, 51communication, 52intelligent network service

Page 41

790 certificates, sensors, 296generating host certificate, 298trusted hosts, 296–298viewing server certificate, 299ChokeThreshold parameter, master s

Page 42 - UDP (User Datagram Protocol)

791 command and control ports, 203IDSM-2, Catalyst 6500 configuration, 205–206IDSM-2 initialization, 202commandsaction, 729clear trunk, 735CLI modes,

Page 43

792 Console transition, STATE.STRING.CISCOLOGIN signature engine, 472content addressable memory (CAM), 134content areaIDM, 226IDS MC interface, 588S

Page 44

793 ctlTransSource application, software architecture, 120CTR (Cisco Threat Response), 85, 98, 661alarms, 692–693Alarm Filter pane, 695Alarm Filter

Commentaires sur ces manuels

Pas de commentaire