Index
1
10/100 monitoring port functionality
.........................
7
A
Access List
..................................................
See ACL
ACL
........................................................................
18
Administrative Status
...............................................
8
Alert Result Status graph
.......................................
17
B
blocking DoS traffic
..........................................
17, 18
blocking exploit attacks
..........................................
17
bypass mode
............................................................
5
Bypass Switch
..........................................................
5
C
cabling failover pair
..................................................
7
Cold Start Drop Action
...........................................
20
configuring policies for failover pair
........................
13
conventions
..............................................................
v
D
detection mode
.......................................................
17
downloading configuration
.....................................
12
dropping attack packets
.........................................
16
F
fail-closed
.................................................................
5
fail-closed dongle
.....................................................
7
fail-open behavior
.....................................................
6
fail-open functionality
...............................................
5
fail-open with external hardware
..............................
5
fail-open with the Layer 2 Passthru (L2)
..................
4
failover pair node
....................................................
11
failover port
..............................................................
7
false positives
........................................................
14
Fast Ethernet Ports
..............................................
6, 7
G
Gigabit Ethernet Ports
..........................................
6, 7
Gigabit fail-open implementation
.............................
5
H
heartbeat
..................................................................
4
I
inline fail-open mode
................................................
8
in-line mode
.............................................................
1
M
monitoring ports
.......................................................
8
N
noise
......................................................................
14
noise-to-incorrect-identification ratio
......................
14
O
optimal high availability strategy
..............................
3
P
packet scrubbing
......................................................
1
policy tuning
...........................................................
13
port configuration
.................................................
7, 8
R
renegotiation
............................................................
5
S
sensor outage
..........................................................
5
software fail-open
.....................................................
5
T
technical support
....................................................
viii