Previous Page Next Page

Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

CAA (Clean Access Agent)
cable-based failover
CBAC (Context-Based Access Control)
     audit trails
     configuring
     dynamic ACL entries
     embryonic sessions
     global timeouts/thresholds, configuring
     inspection rule, configuring
     interface, configuring
     IP access list, configuring
     packet inspection
     per-host DoS prevention
     session state table
     supported protocols
     threshold values
     timeout values
     traffic filtering
     traffic inspection
     verifying configuration
CDP (Cisco Discovery Protocol)
certificate enrollment (PKI)
challenge/response OTP
Chinese Wall security model
CIA model
CIDEE (Cisco Intrustion Detection Event Exchange)
Cisco AIP-SSM (ASA Advanced Inspection and Prevention Security Services Module)
Cisco Aironet Wireless LAN Access Point, configuring 802.1 authentication
Cisco AnyConnect VPN Client 2nd
Cisco ASA 5500 Series Adaptive Security appliances
     software
     SSH access
     Telnet access
Cisco ASDM (Adapative Security Device Manager)
     features
     operation 2nd
     supported firewalls and software versions
     Syslog to Access Rule Correlation
     user requirements
Cisco AutoMitigate
Cisco Catalyst switches
     802.1 authentication, configuring
    ACLs
         MAC ACLs
         Port ACLs
         Router ACLs
         VACLs
     advanced security features, CoPP
     FWSM module
         configuring
         installing
         OS software
    port-level traffic control
         protected ports
         storm control
     PVLANs
         configuring
         port blocking
         port security
     SUP 720, CPU rate limiters
Cisco Clean Access Manager
Cisco ContextCorrelation
Cisco DDoS Anomaly Detection and Mitigation solution 2nd
     anomaly detection and mitigation process
     Cisco Guard DDoS Mitigation
         configuring
         initializing
     Cisco Traffic Anomaly Detector
         configuring
         initializing
Cisco Easy VPN, implementing
Cisco FWSM (Firewall Services Module)
Cisco Guard DDoS Mitigation
     configuring
     initializing
Cisco IBNS (Identity-Based Networking Services)
     Cisco Secure ACS
     external database support
Cisco IDM (IPS Device Manager) 2nd
     system requirments
Cisco IDSM-2 (IDS Service Module)
Cisco IOS Firewalls
    advanced features
         e-mail inspection engine
         Firewall ACL Bypass
         HTTP inspection engine
         router-generated traffic inspection
         transparent IOS Firewall
         VFR
     CBAC
         audit trails
         configuring
         dynamic ACL entries
         embryonic sessions
         packet inspection
         per-host DoS prevention
         session state table
         supported protocols
         threshold values
         timeout values
         traffic filtering
         traffic inspection
Cisco IOS IPS
Cisco IOS Resilient Configuration
Cisco IOS Software, Auto-Secure feature
Cisco IPS 4200 Series sensors
Cisco IPS appliance
     IPS inline interface pair mode, configuring
     IPS inline VLAN pair mode, configuring
Cisco IPS Sensor OS Software
     AD
     blocking
     communication protocols
     interface modes
     interface roles
     IPS events
         action responses
     IPS rate limiting
     RR
     security policies
     sensor software partitions
     signatures
     TR
     user roles
     virtualization
Cisco IPS-AIM
Cisco NAC appliance [See also Cisco NAC Framework solution.]
     comparing with NAC framework
     components
     deployment scenarios
Cisco NAC Framework solution
     components of
     concentrator support
     deployment scenarios
     mechanics of
     posture states
     protocols
     router support
     security policy enforcement
         NAC-L2-802.1x
         NAC-L2-IP
         NAC-L3-IP
     switch support
     wireless access point support
     wireless LAN controllers support
Cisco Network Intrusion Prevenion solutions
     Cisco AIP-SSM
     Cisco I0S IPS
     Cisco IDSM-2
     Cisco IPS 4200 Series sensors
     Cisco IPS-AIM
     Cisco IPS Sensor OS software
         AD
         blocking
         communication protocols
         interface modes
         interface roles
         IPS event actions
         IPS events
         IPS rate limiting
         RR
         security policies
         sensor software partitions
         signatures
         TR
         user roles
         virtualization
     deploying
    high availability
         fail-open mechanism
         failover
         load-balancing
Cisco PIX 500
     SSH access
     Telnet access
Cisco PIX 500 Series Security appliances
     software
Cisco SDM (Cisco Router and Security Device Manager)
Cisco SDN (Self-Defending Network) solutions 2nd
     Cisco NAC
Cisco Secure ACS 2nd
     AAA client server model, AAA server
     configuring
         for RADIUS-enabled token server 2nd
         for RSA SecurID token server
     Dowloadable IP ACLs feature
     MAR
     NAC support
     NAF
     NAP
     NAR
     protocol compliance, RADIUS
     RAC
     shell command authorization sets
     SPC
     two-factor authentication systems, support for
Cisco Secure ACS SE (Cisco Secure ACS Solution Engine)
Cisco SecureVector
Cisco Security Appliance
     ACLs
         object groups
     Adaptive Security Algorithm
     Cisco AnyConnect VPN Client
     EIGRP, configuring
     failover
         configuring
     IP routing
         default routes
         ECMP forwarding
         static route tracking
         static routes
     MPF, configuring
     OS software
     OSPF, configuring
     redundant interfaces, configuring
     RIP, configuring
     Routed Firewall mode
     security contexts
         configuring
         routed mode
         transparent mode
     Transparent Firewall mode
Cisco Security Manager
     client/server requirements
     configuration views
     cross launching
     device management
     features
     firewall management system
     IPS management
     platform management
     RBAC
     supported devices
     traffic flow requirements
     VPN management
     workflow mode
Cisco Traffic Anomaly Detector
     configuring
     initializing
Cisco Trust and Identity Management Solutions
     Cisco IBNS
         Cisco Secure ACS
         external database support
Cisco Unitifed Wireless Network solution
Clark-Wilson security model
classes of IP addresses
classification ACLs
Clean Access Server
clear-text passwords
client authentication
Client mode (Cisco Easy VPN)
client/server requirements, Cisco Security Manager
clientless Citrix support (SSL VPN)
Clientless Mode (SSL VPN)
COBIT (Control Objectives for Information and Related Technology)
     versus ISO/IEC 27002
"Code of Practice for Information Security Management,"
color-aware policing
Command and Control interface (IPS)
command authorization, configuring with TACACS+
commands
     show interfaces rate-limit
     switcheport port-security
community PVLAN ports
comparing
     Cisco NAC appliance and NAC framework solution
     EAP technologies
     hardware- and software-based firewalls
     L2 and L3 VPNs
     MPLS VPN and IPsec VPN
     RADIUS and TACACS+
     VPLS and VPWS
components
     of Cisco NAC appliance
     of Cisco NAC Framework solution 2nd
     of CSA
concentrators supported on Cisco NAC Framework solution
confidentiality
configuration views (Cisco Security Manager)
configuring
     AAA server groups
     ACLs
         classfication ACLs
         directionality
         distibuted time-based
         dynamic
         established
         extended
         iACLs
         named
         rACLs
         reflexive
         standard
         time-based
         transit ACLs
         Turbo ACLs
         VACLs
     CAR
     CBAC
         global timeouts/thresholds
         inspection rule
         interface
         IP access list
         verifying configuration
     Cisco Aironet Wireless Access Points, 802.1x authentication
     Cisco Catalyst switches, 802.1x authentication 2nd
     Cisco DDoS Anomaly Detection and Mitigation solution, Cisco Traffic Anomaly Detector
     Cisco Guard DDoS Mitigation, Cisco Traffic Anomaly Detector
     Cisco IOS GET VPN
    Cisco IPS appliance
         IPS inline interface pair mode
         IPS inline VLAN pair mode
     Cisco Secure ACS
    Cisco Security Appliance
         EIGRP
         failover, configuring
         OSPF
         redundant interfaces
         RIP
     command authorization with TACACS+
     CoPP
     CSA, parameters
     CS-MARS, parameters
     custom signatures
     DHCP Snooping
    DMVPN
         DHDD topology
         DHSD topology
         hierarchical topology
         MHSD topology
         server load-balancing topology
         SHSD topology
     ECMP forwarding
     FWSM
     interactive device access via VTY
     IP Source Guard
     IP source tracking
     IPS blocking
     L2VPN
     L3VPN
    login authentication
         password retry lockout
         with TACACS+
     MPF
     MQC
     NBAR
     NetFlow
     PBR
     port security
     PPP, AAA using RADIUS
     PVLANs
     security contexts
     SSL VPN
     TCP Intercept
     traffic policing
     uRPF
     ZFW
connectionless VPN
connection-oriented VPN
console port, interactive device access
CONTINUE response (TACACS+)
control plane
CoPP (Control Plane Policing)
     configuring
correlation
CPL (Cisco Policy Language), configuring ZFW
CPU rate limiters
cross launching
crypto map table
crypto socket table
cryptographic VPN technologies
cryptography 2nd
     asymmetric key cryptography 2nd
     symmetric key cryptography
cryptosystems
CSA (Cisco Security Agent)
     access control process
     agent kit management 2nd
     components
     configuration parameters
     correlation
     functional roles 2nd
     global correlation
     group management
     host management
     rule modules
CSA MC (Management Console)
     Agent User Interface control page
     CSA agent kit management 2nd
     CSA group management
     CSA host management
CS-MARS (Cisco Security Monitoring, Analysis, and Response System)
     device support list
     event processing
     false positive processing
     features
     GC deployment
     incidents
     initializing
     levels of operation
     mitigation devices
     network mapping
     reporting devices
     rules
     security threat mitigation
     sessions
     software versioning
     standalone deployment
     topological awareness
     traffic flows
     web-based management interface
custom signatures, configuring

Previous Page Next Page