Glossary
GL-6
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
CSA MC
Cisco Security Agent Management Center. CSA MC receives host posture information from the CSA
agents it manages. It also maintains a watch list of IP addresses that it has determined should be
quarantined from the network.
CSM
Cisco Security Manager, the provisioning component of the Cisco Self-Defending Networks solution.
CS-Manager is fully integrated with CS-MARS.
CS-MARS
Cisco Security Monitoring, Analysis and Reporting System. The monitoring component of the Cisco
Self-Defending Networks solution. CS-MARS is fully integrated with CS-Manager
cut-through
architecture
Cut-through architecture is one method of design for packet-switching systems. When a packet arrives
at a switch, the switch starts forwarding the packet almost immediately, reading only the first few bytes
in the packet to learn the destination address. This technique improves performance
CVE
Common Vulnerabilities and Exposures. A list of standardized names for vulnerabilities and other
information security exposures maintained at http://cve.mitre.org/.
D
darknets
A virtual private network where users connect only to people they trust. In its most general meaning, a
darknet can be any type of closed, private group of people communicating, but the name is most often
used specifically for file-sharing networks. Darknet can be used to refer collectively to all covert
communication networks.
Database Processor
A processor in the IPS. Maintains the signature state and flow databases.
datagram
Logical grouping of information sent as a network layer unit over a transmission medium without prior
establishment of a virtual circuit. IP datagrams are the primary information units in the Internet. The
terms cell, frame, message, packet, and segment also are used to describe logical information groupings
at various layers of the OSI reference model and in various technology circles.
DCE
data circuit-terminating equipment (ITU-T expansion). Devices and connections of a communications
network that comprise the network end of the user-to-network interface. The DCE provides a physical
connection to the network, forwards traffic, and provides a clocking signal used to synchronize data
transmission between DCE and DTE devices. Modems and interface cards are examples of DCE.
DCOM
Distributed Component Object Model. Protocol that enables software components to communicate
directly over a network. Developed by Microsoft and previously called Network OLE, DCOM is
designed for use across multiple network transports, including such Internet protocols as HTTP.
DDoS
Distributed Denial of Service. An attack in which a multitude of compromised systems attack a single
target, thereby causing denial of service for users of the targeted system. The flood of incoming
messages to the target system essentially forces it to shut down, thereby denying service to the system
to legitimate users.
Deny Filters
Processor
A processor in the IPS. Handles the deny attacker functions. It maintains a list of denied source IP
addresses.
DES
Data Encryption Standard. A strong encryption method where the strength lies in a 56-bit key rather
than an algorithm.
destination address
Address of a network device that is receiving data.