Glossary
GL-3
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 5.0
78-16527-01
benign trigger
A situation in which a signature is fired correctly, but the source of the traffic is nonmalicious.
BIOS
Basic Input/Output System The program that starts the sensor and communicates between the devices
in the sensor and the system.
block
The ability of the sensor to direct a network device to deny entry to all packets from a specified network
host or network.
block interface
The interface on the network device that the sensor manages.
BO2K
BackOrifice 2000. A windows back door Trojan that runs over TCP and UDP.
Bpdu
Bridge Protocol Data Unit. Spanning-Tree Protocol hello packet that is sent out at configurable
intervals to exchange information among bridges in the network.
bypass mode
Mode that lets packets continue to flow through the sensor even if the sensor fails. Bypass mode is only
applicable to inline-paired interfaces.
C
CA
certification authority. Entity that issues digital certificates (especially X.509 certificates) and vouches
for the binding between the data items in a certificate. Sensors use self-signed certificates.
CA certificate
Certificate for one CA issued by another CA.
certificate
Digital representation of user or device attributes, including a public key, that is signed with an
authoritative private key.
cidDump
A script that captures a large amount of information including the IPS processes list, log files, OS
information, directory listings, package information, and configuration files.
CIDEE
Cisco Intrusion Detection Event Exchange. Specifies the extensions to SDEE that are used by Cisco
IPS systems. The CIDEE standard specifies all possible extensions that may be supported by Cisco IPS
systems.
CIDS header
The header that is attached to each packet in the IPS system. It contains packet classification, packet
length, checksum results, timestamp, and the receive interface.
Cisco IOS
Cisco system software that provides common functionality, scalability, and security for all products
under the CiscoFusion architecture. Cisco IOS allows centralized, integrated, and automated
installation and management of internetworks while supporting a wide variety of protocols, media,
services, and platforms.
cipher key
The secret binary data used to convert between clear text and cipher text. When the same cipher key is
used for both encryption and decryption, it is called symmetric. When it is used for either encryption
or decryption (but not both), it is called asymmetric.
CLI
command-line interface. A shell provided with the sensor used for configuring and controlling the
sensor applications.
command and
control interface
The interface on the sensor that communicates with the IPS manager and other network devices. This
interface has an assigned IP address.