Previous Page Next Page

Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

S/KEY
Safe Blueprint
script kiddies
SDEE (Security Device Event Exchange)
SDM (Cisco Router and Security Device Manager)
     features
     monitor mode
     one-step lockdown feature
     operation
     router security audit feature
     supported rotuers and IOS versions
     system requirements
SDN (Cisco Self-Defending Network)
     Cisco NAC
secondary VLANs
secure VPN 2nd [See also IPsec VPN.]
     anti-replay service
     IKE
     IKEv2
     ISAKMP profiles
     phase 1 negotiation
     phase 2 negotiation
     profiles
     protocol headers
     RFCs 2nd
security contexts
     configuring
     routed mode
     transparent mode
security incident response
     IRT
         5-step reaction process
security levels
security models 2nd
security policies 2nd 3rd 4th
     device security policy
         security checklist
     enforcement, Cisco NAC Framework solution
         NAC-L2-802.1x
         NAC-L2-IP 2nd
         NAC-L3-IP 2nd
security violation modes (port security)
security wheel
security zones
sensing interface (IPS)
server groups, configuring
service engine
services
     accounting
     authentication
     authorization
sessions, CS-MARS
SFR (Signature Fidelity Rating)
SHA (Secure Hash Algorithm)
shared-key authentication
shell command authorization sets
shift in security paradigm
show interfaces rate-limit command
SHSD (single hub single DMVPN) topology
shutdown mode (port security)
signature engines
signatureless endpoint security
signatures
     custom, configuring
single-channel TCP/UDP inspection
site-to-site IPsec VPNs, implementing
SLB (server load-balancing) topology, configuring
SLIP-PPP banner messages
smart cards
smurf attacks, characterizing 2nd
SNMP (Simple Network Management Protocol)
software versioning, CS-MARS
software-based firewalls versus hardware-based
source routing
source tracking
SOX (Sarbanes-Oxley Act)
     Cisco solutions for
     penalties for violations
     requirements
SPC (Shared Profile Components)
SPI (stateful packet inspection)
spread-spectrum technology
SSH (Secure Shell)
     device access from Cisco PIX 500, ASA 5500
     device access, configuring
SSID (Service Set Identifiers)
SSL VPNs
     access methods
     Cisco AnyConnect VPN Client
     Citrix support
     configuring
     deployment options
     features
     versus IPsec VPNs
standalone deployment, CS-MARS
standard ACLs
standards 2nd
state engine
stateful failover mode
stateful packet inspection
static identity NAT
static NAT, configuring
static PAT
static route tracking
static routes
static WEP
STM (security threat mitigation) systems, CS-MARS
storm control
STP
     BPDU guard
     EtherChannel Guard
     Loop Guard
     Root Guard
STP attacks, mitigating
stream cipher
string engine
subnet masks
SUP 720, CPU rate limiters
supplicant (IEEE 802.1x)
supported devices on Cisco Security Manager
supported firewalls on Cisco ASDM
supported routers on Cisco SDM
SVTI (static VTI)
sweep engine
switches supported on Cisco NAC Framework solution
switchport port-security command
symmetric key cryptography
SYN attacks, characterizing 2nd
Syslog to Access Rule Correlation (Cisco ASDM)
system requirements
     for Cisco IDM
     for Cisco SDM

Previous Page Next Page