Glossary

KB

Knowledge Base. The sets of thresholds learned by Anomaly Detection and used for worm virus

 

detection.

Knowledge Base

See KB.

L

LACP

Link Aggregation Control Protocol. LACP aids in the automatic creation of EtherChannel links by

 

exchanging LACP packets between LAN ports. This protocol is defined in IEEE 802.3ad.

LAN

Local Area Network. Refers to the Layer 2 network domain local to a given host. Packets exchanged

 

between two hosts on the same LAN do not require Layer 3 routing.

Layer 2 Processor

A processor in the IPS. Processes layer 2-related events. It also identifies malformed packets and

 

removes them from the processing path.

Logger

A component of the IPS. Writes all the log messages of the application to the log file and the error

 

messages of the application to the Event Store.

logging

Gathers actions that have occurred in a log file. Logging of security information is performed on two

 

levels: logging of events (such as IPS commands, errors, and alerts), and logging of individual IP

 

session information.

LOKI

Remote access, back door Trojan, ICMP tunneling software. When the computer is infected, the

 

malicious code creates an ICMP tunnel that can be used to send small payload ICMP replies.

M

MainApp

The main application in the IPS. The first application to start on the sensor after the operating system

 

has booted. Reads the configuration and starts applications, handles starting and stopping of

 

applications and node reboots, handles software upgrades.

maintenance

The bootable disk partition on IDSM2, from which an IPS image can be installed on the application

partition

partition. No IPS capability is available while the IDSM2 is booted into the maintenance partition.

maintenance

The bootable software image installed on the maintenance partition on an IDSM2. You can install the

partition image

maintenance partition image only while booted into the application partition.

major update

A base version that contains major new functionality or a major architectural change in the product.

Malware

Malicious software that is installed on an unknowing host.

manufacturing

Full IPS system image used by manufacturing to image sensors.

image

 

master blocking

A remote sensor that controls one or more devices. Blocking forwarding sensors send blocking requests

sensor

to the master blocking sensor and the master blocking sensor executes the blocking requests.

 

Cisco Intrusion Prevention System Appliance and Module Installation Guide for IPS 7.1

GL-12

OL-24002-01

Page 428
Image 428
Cisco Systems IPS4520K9 manual GL-12

IPS4520K9 specifications

Cisco Systems has long been a leading player in network security, and its IPS (Intrusion Prevention System) series is a testament to its commitment to safeguarding digital environments. Among its notable offerings are the IPS4510K9 and IPS4520K9 models, both designed to provide advanced threat protection for mid-sized to large enterprise networks.

The Cisco IPS4510K9 and IPS4520K9 are distinguished by their cutting-edge features that help organizations defend against a myriad of cyber threats. These systems utilize a multi-layered approach to security, integrating intrusion prevention, advanced malware protection, and comprehensive visibility across the network.

One of the primary characteristics of the IPS4510K9 is its high performance. It boasts a throughput of up to 1 Gbps, making it suitable for environments that demand rapid data processing and real-time responses to threats. The IPS4520K9, on the other hand, enhances that capability with improved throughput of up to 2 Gbps, accommodating larger enterprises with heavier network traffic. These models are equipped with powerful processors that support complex signature matching and can intelligently distinguish between legitimate traffic and potential threats.

In addition to performance, both models are designed with scalability in mind. They can be easily integrated into existing Cisco infrastructures. This facilitates a seamless enhancement of security without causing significant interruptions to ongoing operations. Moreover, they offer flexible deployment options, allowing organizations to operate them inline or out of band depending on their specific needs.

The Cisco IPS4510K9 and IPS4520K9 leverage advanced detection technologies, utilizing a variety of signature types and heuristic analysis to detect known and unknown threats effectively. They are equipped with real-time alerting and reporting capabilities, giving security teams immediate visibility into potential breaches and enabling them to respond swiftly.

Furthermore, both models support a range of management options through the Cisco Security Manager, allowing for centralized administration, streamlined policy management, and enhanced monitoring capabilities. Automated updates ensure the systems remain current with the latest threat intelligence, vital for staying ahead of evolving cyber threats.

In summary, the Cisco Systems IPS4510K9 and IPS4520K9 represent powerful solutions for organizations seeking robust intrusion prevention capabilities. With their high performance, scalability, and advanced detection technologies, these systems are essential tools in the ever-changing landscape of cybersecurity, providing enterprises with the peace of mind needed to operate securely in today's digital world.