Cisco Systems IPS 7.1 Home Security System User Manual


  Open as PDF
of 1042
 
Glossary
GL-17
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
RAM
random-access memory. Volatile memory that can be read and written by a microprocessor.
RAS
Registration, Admission, and Status Protocol. Protocol that is used between endpoints and the
gatekeeper to perform management functions. RAS signaling function performs registration,
admissions, bandwidth changes, status, and disengage procedures between the VoIP gateway and the
gatekeeper.
RBCP
Router Blade Control Protocol. RBCP is based on SCP, but modified specifically for the router
application. It is designed to run over Ethernet interfaces and uses 802.2 SNAP encapsulation for
messages.
reassembly
The putting back together of an IP datagram at the destination after it has been fragmented either at the
source or at an intermediate node.
recovery package
An IPS package file that includes the full application image and installer used for recovery on sensors.
regex
See regular expression.
regular expression
A mechanism by which you can define how to search for a specified sequence of characters in a data
stream or file. Regular expressions are a powerful and flexible notation almost like a
mini-programming language that allow you to describe text. In the context of pattern matching, regular
expressions allow a succinct description of any arbitrary pattern.
Remote
Authentication Dial
In User Service
See RADIUS.
repackage release
A release that addresses defects in the packaging or the installer.
reputation
Similar to human social interaction, reputation is an opinion toward a device on the Internet. It enables
the installed base of IPS sensors in the field to collaborate using the existing network infrastructure. A
network device with reputation is most probably malicious or infected.
risk rating
RR. A risk rating is a value between 0 and 100 that represents a numerical quantification of the risk
associated with a particular event on the network. The risk of the attack accounts for the severity,
fidelity, relevance, and asset value of the attack, but not any response or mitigation actions. This risk is
higher when more damage could be inflicted on your network.
RMA
Return Materials Authorization. The Cisco program for returning faulty hardware and obtaining a
replacement.
ROMMON
Read-Only-Memory Monitor. ROMMON lets you TFTP system images onto the sensor for recovery
purposes.
round-trip time
See RTT.
RPC
remote-procedure call. Technological foundation of client/server computing. RPCs are procedure calls
that are built or specified by clients and are executed on servers, with the results returned over the
network to the clients.
RSM
Router Switch Module. A router module that is installed in a Catalyst 5000 switch. It functions exactly
like a standalone router.