McAfee M-1250 Network Protection - Page 31

Alert Result Status graph, Cold Start Drop Action

Page 31 highlights

Index 1 10/100 monitoring port functionality 7 A Access List See ACL ACL 18 Administrative Status 8 Alert Result Status graph 17 B blocking DoS traffic 17, 18 blocking exploit attacks 17 bypass mode 5 Bypass Switch 5 C cabling failover pair 7 Cold Start Drop Action 20 configuring policies for failover pair 13 conventions v D detection mode 17 downloading configuration 12 dropping attack packets 16 F fail-closed 5 fail-closed dongle 7 fail-open behavior 6 fail-open functionality 5 fail-open with external hardware 5 fail-open with the Layer 2 Passthru (L2 4 failover pair node 11 failover port 7 false positives 14 Fast Ethernet Ports 6, 7 G Gigabit Ethernet Ports 6, 7 Gigabit fail-open implementation 5 H heartbeat 4 I inline fail-open mode 8 in-line mode 1 M monitoring ports 8 N noise 14 noise-to-incorrect-identification ratio 14 O optimal high availability strategy 3 P packet scrubbing 1 policy tuning 13 port configuration 7, 8 R renegotiation 5 S sensor outage 5 software fail-open 5 T technical support viii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32

Index
1
10/100 monitoring port functionality
.........................
7
A
Access List
..................................................
See ACL
ACL
........................................................................
18
Administrative Status
...............................................
8
Alert Result Status graph
.......................................
17
B
blocking DoS traffic
..........................................
17, 18
blocking exploit attacks
..........................................
17
bypass mode
............................................................
5
Bypass Switch
..........................................................
5
C
cabling failover pair
..................................................
7
Cold Start Drop Action
...........................................
20
configuring policies for failover pair
........................
13
conventions
..............................................................
v
D
detection mode
.......................................................
17
downloading configuration
.....................................
12
dropping attack packets
.........................................
16
F
fail-closed
.................................................................
5
fail-closed dongle
.....................................................
7
fail-open behavior
.....................................................
6
fail-open functionality
...............................................
5
fail-open with external hardware
..............................
5
fail-open with the Layer 2 Passthru (L2)
..................
4
failover pair node
....................................................
11
failover port
..............................................................
7
false positives
........................................................
14
Fast Ethernet Ports
..............................................
6, 7
G
Gigabit Ethernet Ports
..........................................
6, 7
Gigabit fail-open implementation
.............................
5
H
heartbeat
..................................................................
4
I
inline fail-open mode
................................................
8
in-line mode
.............................................................
1
M
monitoring ports
.......................................................
8
N
noise
......................................................................
14
noise-to-incorrect-identification ratio
......................
14
O
optimal high availability strategy
..............................
3
P
packet scrubbing
......................................................
1
policy tuning
...........................................................
13
port configuration
.................................................
7, 8
R
renegotiation
............................................................
5
S
sensor outage
..........................................................
5
software fail-open
.....................................................
5
T
technical support
....................................................
viii