Glossary
GL-16
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 5.0
78-16527-01
switch
Network device that filters, forwards, and floods frames based on the destination address of each frame.
The switch operates at the data link layer of the OSI model.
SYN flood
Denial of Service attack that sends a host more TCP SYN packets (request to synchronize sequence
numbers, used when opening a connection) than the protocol implementation can handle.
system image
The full IPS application and recovery image used for reimaging an entire sensor.
T
TAC
A Cisco Technical Assistance Center. There are four TACs worldwide.
Terminal Access Controller Access Control System Plus. Proprietary Cisco enhancement to Terminal
Access Controller Access Control System (TACACS). Provides additional support for authentication,
authorization, and accounting.
TCP
Transmission Control Protocol. Connection-oriented transport layer protocol that provides reliable
full-duplex data transmission. TCP is part of the TCP/IP protocol stack.
TCPDUMP
The TCPDUMP utility is a free network protocol analyzer for UNIX and Windows. It lets you examine
data from a live network or from a capture file on disk. You can use different options for viewing
summary and detail information for each packet. For more information, see
http://www.tcpdump.org/
.
TCP reset interface
The interface on the IDS-4250-XL and IDSM-2 that can send TCP resets. On most sensors the TCP
resets are sent out on the same sensing interface on which the packets are monitored, but on the
IDS-4250-XL and IDSM-2 the sensing interfaces cannot be used for sending TCP resets. On the
IDS-4250-XL the TCP reset interface is the onboard 10/100/100 TX interface, which is normally used
on the IDS-4250-TX appliance when the XL card is not present. On the IDSM-2 the TCP reset interface
is designated as port 1 with Catalyst software, and is not visible to the user in Cisco IOS software. The
TCP reset action is only appropriate as an action selection on those signatures that are associated with
a TCP-based service.
Telnet
Standard terminal emulation protocol in the TCP/IP protocol stack. Telnet is used for remote terminal
connection, enabling users to log in to remote systems and use resources as if they were connected to
a local system. Telnet is defined in RFC 854.
terminal server
A router with multiple, low speed, asynchronous ports that are connected to other serial devices.
Terminal servers can be used to remotely manage network equipment, including sensors.
TFN2K
Tribe Flood Network 2000. A common type of Denial of Service (DoS) attack that can take advantage
of forged or rapidly changing source IP addresses to allow attackers to thwart efforts to locate or filter
the attacks.
TFTP
Trivial File Transfer Protocol. Simplified version of FTP that lets files be transferred from one
computer to another over a network, usually without the use of client authentication (for example,
username and password).
Threat Response
Works with Cisco sensors to provide an efficient intrusion protection solution. Threat Response
virtually eliminates false alarms, escalates real attacks, and aids in the remediation of costly intrusions.