Index
[
SYMBOL]
[
A]
[
B]
[
C]
[
D]
[
E]
[
F]
[
G]
[
H]
[
I]
[
L]
[
M]
[
N]
[
O]
[
P]
[
R]
[
S]
[
T]
[
U]
[
V]
[
W]
[
Z]
S/KEY Safe Blueprint script kiddies SDEE (Security Device Event Exchange)SDM (Cisco Router and Security Device Manager) features monitor mode one-step lockdown feature operation router security audit feature supported rotuers and IOS versions system requirements SDN (Cisco Self-Defending Network) Cisco NAC secondary VLANs
secure VPN 2nd
[See also
IPsec VPN.]
anti-replay service IKE IKEv2 ISAKMP profiles phase 1 negotiation phase 2 negotiation profiles protocol headers RFCs 2nd security contexts configuring routed mode transparent mode security incident response IRT 5-step reaction process security levels security models 2nd security policies 2nd 3rd 4th device security policy security checklist enforcement, Cisco NAC Framework solution NAC-L2-802.1x NAC-L2-IP 2nd NAC-L3-IP 2nd security violation modes (port security) security wheel security zones sensing interface (IPS) server groups, configuring service engineservices accounting authentication authorization sessions, CS-MARS SFR (Signature Fidelity Rating) SHA (Secure Hash Algorithm) shared-key authentication shell command authorization sets shift in security paradigm show interfaces rate-limit command SHSD (single hub single DMVPN) topology shutdown mode (port security) signature engines signatureless endpoint security signatures custom, configuring single-channel TCP/UDP inspection site-to-site IPsec VPNs, implementing SLB (server load-balancing) topology, configuring SLIP-PPP banner messages smart cards smurf attacks, characterizing 2nd SNMP (Simple Network Management Protocol) software versioning, CS-MARS software-based firewalls versus hardware-based source routing source tracking SOX (Sarbanes-Oxley Act) Cisco solutions for penalties for violations requirements SPC (Shared Profile Components) SPI (stateful packet inspection) spread-spectrum technologySSH (Secure Shell) device access from Cisco PIX 500, ASA 5500 device access, configuring SSID (Service Set Identifiers)SSL VPNs access methods Cisco AnyConnect VPN Client Citrix support configuring deployment options features versus IPsec VPNs standalone deployment, CS-MARS standard ACLs standards 2nd state engine stateful failover mode stateful packet inspection static identity NAT static NAT, configuring static PAT static route tracking static routes static WEP STM (security threat mitigation) systems, CS-MARS storm controlSTP BPDU guard EtherChannel Guard Loop Guard Root Guard STP attacks, mitigating stream cipher string engine subnet masks SUP 720, CPU rate limiters supplicant (IEEE 802.1x) supported devices on Cisco Security Manager supported firewalls on Cisco ASDM supported routers on Cisco SDM SVTI (static VTI) sweep engine switches supported on Cisco NAC Framework solution switchport port-security command symmetric key cryptography SYN attacks, characterizing 2nd Syslog to Access Rule Correlation (Cisco ASDM)system requirements for Cisco IDM for Cisco SDM