Glossary
GL-17
Installing Cisco Intrusion Prevention System Appliances and Modules 5.0
78-16124-01
threshold
A value, either upper- or lower-bound that defines the maximum/minimum allowable condition before
an alarm is sent.
Time Processor
See TP.
TLS
Transport Layer Security. The protocol used over stream transports to negotiate the identity of peers
and establish encrypted communications.
topology
Physical arrangement of network nodes and media within an enterprise networking structure.
TP
Time Processor. Processes events stored in a time-slice calendar. Its primary task is to make stale
database entries expire and to calculate time-dependent statistics.
TPKT
RFC 1006-defined method of demarking messages in a packet.
traceroute
Program available on many systems that traces the path a packet takes to a destination. It is used mostly
to debug routing problems between hosts. A traceroute protocol is also defined in RFC 1393.
traffic analysis
Inference of information from observable characteristics of data flow(s), even when the data is
encrypted or otherwise not directly available. Such characteristics include the identities and locations
of the source(s) and destination(s), and the presence, amount, frequency, and duration of occurrence.
TRAFFIC.ICMP
engine
Analyzes traffic from nonstandard protocols, such as TFN2K, LOKI, and DDOS.
Transaction Server
A component of the IPS.
Transaction Source
A component of the IPS.
trap
Message sent by an SNMP agent to an NMS, a console, or a terminal to indicate the occurrence of a
significant event, such as a specifically defined condition or a threshold that was reached.
TROJAN engine
Analyzes traffic from nonstandard protocols, such as BO2K and TFN2K.
trunk
Physical and logical connection between two switches across which network traffic travels. A backbone
is composed of a number of trunks.
trusted certificate
Certificate upon which a certificate user relies as being valid without the need for validation testing;
especially a public-key certificate that is used to provide the first public key in a certification path.
trusted key
Public key upon which a user relies; especially a public key that can be used as the first public key in
a certification path.
tune
Adjusting signature parameters to modify an existing signature.
U
UDI
Unique Device Identifier. Provides a unique identity for every Cisco product. The UDI is composed of
the PID, VID, and SN. The UDI is stored in the Cisco IPS ID PROM.
Содержание AIP-SSM-10
Страница 8: ...Contents viii Installing Cisco Intrusion Prevention System Appliances and Modules 5 0 78 16124 01 ...
Страница 188: ...Glossary GL 20 Installing Cisco Intrusion Prevention System Appliances and Modules 5 0 78 16124 01 ...
Страница 196: ...Index IN 8 Installing Cisco Intrusion Prevention System Appliances and Modules 5 0 78 16124 01 ...