GL-1
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01

GLOSSARY

Revised: April 25, 2013
Numerals
3DES
Triple Data Encryption Standard. A stronger version of DES, which is the default encryption method
for SSH version 1.5. Used when establishing an SSH session with the sensor. It can be used when the
sensor is managing a device.
802.x
A set of IEEE standards for the definition of LAN protocols.
A
AAA
authentication, authorization, and accounting. Pronounced “triple a.” The primary and recommended
method for access control in Cisco devices.
ACE
Access Control Entry. An entry in the ACL that describes what action should be taken for a specified
address or protocol. The sensor adds/removes ACE to block hosts.
ACK
acknowledgement. Notification sent from one network device to another to acknowledge that som e
event occurred (for example, the receipt of a message).
ACL
Access Control List. A list of ACEs that control the flow of data through a router. There are two ACLs
per router interface for inbound data and outbound data. Only one ACL per direction can be active at a
time. ACLs are identified by number or by name. ACLs can be standar d, enhanced, or extended. You
can configure the sensor to manage ACLs.
ACS server
Cisco Access Control Server. A RADIUS security server that is the centralized control point for
managing network users, network administrators, and network inf rastructure resources.
action
The response of the sensor to an event. An action only happens if the event is not filtered. Examples
include TCP reset, block host, block connection, IP logging, and cap turing the alert trigger packet.
active ACL
The ACL created and maintained by ARC and applied to the ro uter block interfaces.
adaptive security
appliance
ASA. Combines firewall, VPN concentrator, and intrusion prevention software functionality into one
software image. You can configure the adaptive security appliance in single mode or multi-mode.
AIC engine
Application Inspection and Control engine. Provides deep analysis of web traffic. It provides granular
control over HTTP sessions to prevent abuse of the HTTP protocol. It allows administrative control
over applications that try to tunnel over specified ports, such as instant messaging, and tunneling
applications, such as gotomypc. It can also inspect FTP traffic and control the commands being issued.