Cisco Systems IPS 7.1 Home Security System User Manual


  Open as PDF
of 1042
 
Glossary
GL-24
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
virus
Hidden, self-replicating section of computer software, usually malicious logic, that propagates by
infecting—that is, inserting a copy of itself into and becoming part of—another program. A virus
cannot run by itself; it requires that its host program be run to make the virus active.
virus update
A signature update specifically addressing viruses.
VLAN
Virtual Local Area Network. Group of devices on one or more LANs that are configured (using
management software) so that they can communicate as if they were attached to the same wire, when
in fact they are located on a number of different LAN segments. Because VLANs are based on logical
instead of physical connections, they are extremely flexible.
VTP
VLAN Trunking Protocol. Cisco Layer 2 messaging protocol that manages the addition, deletion, and
renaming of VLANs on a network-wide basis.
VMS
CiscoWorks VPN/Security Management Solution. A suite of network security applications that
combines web-based tools for configuring, monitoring, and troubleshooting enterprise VPN, firewalls,
network intrusion detection systems and host-based intrusion prevention systems.
VoIP
Voice over IP. The capability to carry normal telephony-style voice over an IP-based Internet with
POTS-like functionality, reliability, and voice quality. VoIP enables a router to carry voice traffic (for
example, telephone calls and faxes) over an IP network. In VoIP, the DSP segments the voice signal into
frames, which then are coupled in groups of two and stored in voice packets. These voice packets are
transported using IP in compliance with ITU-T specification H.323.
VPN
Virtual Private Network(ing). Enables IP traffic to travel securely over a public TCP/IP network by
encrypting all traffic from one network to another. A VPN uses “tunneling” to encrypt all information
at the IP level.
VTP
VLAN Trunking Protocol. A Cisco Layer 2 messaging protocol that manages the addition, deletion,
and renaming of VLANs on a network-wide basis.
vulnerability
One or more attributes of a computer or a network that permit a subject to initiate patterns of misuse
on that computer or network.
W
WAN
wide-area network. Data communications network that serves users across a broad geographic area and
often uses transmission devices provided by common carriers. Frame Relay, SMDS, and X.25 are
examples of WANs.
watch list rating
WLR. A weight associated with the CSA MC watch list in the range of 0 to 100 (CSA MC only uses
the range 0 to 35).
Web Server
A component of the IPS. Waits for remote HTTP client requests and calls the appropriate servlet
application.
WHOIS
A TCP-based query/response protocol used for querying an official database to determine the owner of
a domain name or an IP address.