Cisco IPS-4255-K9 Installation Guide - Page 387

passive, fingerprinting, PASV Port Spoof, patch release, PIX Firewall, Post-ACL, Pre-ACL

Page 387 highlights

Glossary passive fingerprinting Passive OS Fingerprinting PASV Port Spoof PAT patch release PAWS PCI PDU PEP PER PFC PID ping PIX Firewall PKI POST Post-ACL Pre-ACL Act of determining the OS or services available on a system from passive observation of network interactions. The sensor determines host operating systems by inspecting characteristics of the packets exchanged on the network. An attempt to open connections through a firewall to a protected FTP server to a non-FTP port. This happens when the firewall incorrectly interprets an FTP 227 passive command by opening an unauthorized connection. Port Address Translation. A more restricted translation scheme than NAT in which a single IP address and different ports are used to represent the hosts of a network. Release that addresses defects identified in the update (minor, major, or service pack) binaries after a software release (service pack, minor, or major update) has been released. Protection Against Wrapped Sequence. Protection against wrapped sequence numbers in high performance TCP networks. See RFC 1323. Peripheral Component Interface. The most common peripheral expansion bus used on Intel-based computers. protocol data unit. OSI term for packet. See also BPDU and packet. Cisco Product Evolution Program. PEP is the UDI information that consists of the PID, the VID, and the SN of your sensor. PEP provides hardware version and serial number visibility through electronic query, product labels, and shipping items. packed encoding rules. Instead of using a generic style of encoding that encodes all types in a uniform way, PER specializes the encoding based on the date type to generate much more compact representations. Policy Feature Card. An optional card on a Catalyst 6000 supervisor engine that supports VACL packet filtering. Product Identifier. The orderable product identifier that is one of the three parts of the UDI. The UDI is part of the PEP policy. packet internet groper. Often used in IP networks to test the reachability of a network device. It works by sending ICMP echo request packets to the target host and listening for echo response replies. Private Internet Exchange Firewall. A Cisco network security device that can be programmed to block/enable addresses and ports between networks. Public Key Infrastructure. Authentication of HTTP clients using the clients X.509 certificates. Power-On Self Test. Set of hardware diagnostics that runs on a hardware device when that device is powered up. Designates an ACL from which ARC should read the ACL entries, and where it places entries after all deny entries for the addresses being blocked. Designates an ACL from which ARC should read the ACL entries, and where it places entries before any deny entries for the addresses being blocked. OL-18504-01 Cisco Intrusion Prevention System Appliance and Module Installation Guide for IPS 7.0 GL-15

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412

Glossary
GL-15
Cisco Intrusion Prevention System Appliance and Module Installation Guide for IPS 7.0
OL-18504-01
passive
fingerprinting
Act of determining the OS or services available on a system from passive observation of network
interactions.
Passive OS
Fingerprinting
The sensor determines host operating systems by inspecting characteristics of the packets exchanged
on the network.
PASV Port Spoof
An attempt to open connections through a firewall to a protected FTP server to a non-FTP port. This
happens when the firewall incorrectly interprets an FTP 227
passive
command by opening an
unauthorized connection.
PAT
Port Address Translation. A more restricted translation scheme than NAT in which a single IP address
and different ports are used to represent the hosts of a network.
patch release
Release that addresses defects identified in the update (minor, major, or service pack) binaries after a
software release (service pack, minor, or major update) has been released.
PAWS
Protection Against Wrapped Sequence. Protection against wrapped sequence numbers in high
performance TCP networks. See
RFC 1323
.
PCI
Peripheral Component Interface. The most common peripheral expansion bus used on Intel-based
computers.
PDU
protocol data unit. OSI term for packet. See also BPDU and packet.
PEP
Cisco Product Evolution Program. PEP is the UDI information that consists of the PID, the VID, and
the SN of your sensor. PEP provides hardware version and serial number visibility through electronic
query, product labels, and shipping items.
PER
packed encoding rules. Instead of using a generic style of encoding that encodes all types in a uniform
way, PER specializes the encoding based on the date type to generate much more compact
representations.
PFC
Policy Feature Card. An optional card on a Catalyst 6000 supervisor engine that supports VACL packet
filtering.
PID
Product Identifier. The orderable product identifier that is one of the three parts of the UDI. The UDI
is part of the PEP policy.
ping
packet internet groper. Often used in IP networks to test the reachability of a network device. It works
by sending ICMP echo request packets to the target host and listening for echo response replies.
PIX Firewall
Private Internet Exchange Firewall. A Cisco network security device that can be programmed to
block/enable addresses and ports between networks.
PKI
Public Key Infrastructure. Authentication of HTTP clients using the clients X.509 certificates.
POST
Power-On Self Test. Set of hardware diagnostics that runs on a hardware device when that device is
powered up.
Post-ACL
Designates an ACL from which ARC should read the ACL entries, and where it places entries after all
deny entries for the addresses being blocked.
Pre-ACL
Designates an ACL from which ARC should read the ACL entries, and where it places entries before
any deny entries for the addresses being blocked.