• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/54

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

54 Cards in this Set

  • Front
  • Back
Initializes the system, starts and stops the other applications, configures the OS, and
performs upgrades
MainApp—
Allows sensors to send control transactions. This
is used to enable the master blocking sensor capability of Attack Response Controller (formerly
known as Network Access Controller).
ctlTransSource (Control Transaction server)—
An indexed store used to store IPS events (error, status, and alert system
messages) that is accessible through the CLI, IDM, IME, ASDM, or SDEE.
Event Store—
This IPS app handles bypass and physical settings and defines paired interfaces. Physical
settings are speed, duplex, and administrative state.
InterfaceApp—
This IPS app writes all the log messages of the application to the log file and the error messages of
the application to the Event Store.
Logger—
—Manages
remote network devices (firewalls, routers, and switches) to provide blocking capabilities when
an alert event has occurred.
Attack Response Controller (formerly known as Network Access Controller)
creates and applies ACLs on the controlled network device or
uses the shun command (firewalls).
Attack Response Controller (formerly known as Network Access Controller)
This app on the IPS sends SNMP traps when triggered by alert, status, and error events.
NotificationApp—
provide information about
the general health of the sensor.
SNMP GETs
—Provides a web interface and communication with other IPS
devices through the SDEE protocol using several servlets to provide IPS services.
Web Server (HTTP SDEE server)
Remote Cisco IPS applications (other sensors, management applications, and third-party software) communicate with
sensors through this protocol.
SDEE
Verifies that users are authorized to perform CLI, IDM, IME, ASDM, or
SDEE actions.
AuthenticationApp—
Performs packet capture and analysis.
SensorApp (Analysis Engine)—
Interfaces with MainApp and SensorApp using various interprocess
communication technologies including IDAPI control transactions, semaphores, shared memory,
and file exchange.
CollaborationApp—
needs question
semaphore
All Cisco IPS applications communicate with each other through this common API
IDAPI
needs question
API
The Cisco IPS has three partitions
application partition
Maintenance partition
Recovery partition
A special purpose IPS image used to reimage the application partition of
the IDSM2. When you reimage this partition, all configuration settings are lost.
Maintenance partition
A special purpose image used for recovery of the sensor. Booting into this partition enables you to completely reimage the application partition. Network settings are
preserved, but all other configuration is lost.
recovery partition
Since there is no FTP capability on the Cisco sensor, you can use this tool to remotely copy files
SCP
Installing and uninstalling IPS software upgrade is handled by this component of the Cisco IPs architecture
MainApp
Gathering stats and reporting the health and security monitoring status of the CIsco IPS is done by this architectural component
MainApp
Each IPS event is stored here with a time stamp and a unique, monotonic, ascending ID.
in Event Store
What happens when the Ciscp IPS event store reaches its configured size?
When the
circular Event Store has reached its configured size, the oldest event or events are overwritten by the new
event being stored.
This IPS application is the only application that writes a;ert event into the Event Store
SensorApp is the only application that writes alert events into the Event Store

http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_system_architecture.pdf
The following are examples of ?
Request to update the configuration data of an application instance
• Request for the diagnostic data of an application instance
• Request to reset the diagnostic data of an application instance
Control transactions

http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_system_architecture.pdf
IPS data is represented in the format
IPS data is represented in XML format as an XML document. The system stores user-configurable
parameters in several XML files.
This IPS event —Alert event messages that report when a signature is triggered by network activity.
evAlert

http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_system_architecture.pdf
Status event messages that report the status and actions of the IPS applications.
evStatus—

http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_system_architecture.pdf
— Error event messages that report errors that occurred while attempting response actions.
evError

http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_system_architecture.pdf
Log transaction messages that report the control transactions processed by each
sensor application.
evLogTransaction—

http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_system_architecture.pdf
Block request messages that report when ARC issues a block request.
evShunRqst—


http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_system_architecture.pdf
allows the sensor to send alerts and system error messages as SNMP traps.
NotificationApp
an application that forwards locally initiated remote control transactions to their
remote destinations using HTTP protocol.
CtlTransSource is
a loop that waits on remote
control transactions that are directed to CtlTransSource.
The transactionHandlerLoop method is
the IPS application that starts and stops blocking on routers, switches, and firewalls, and rate
limits traffic on routers running Cisco IOS 12.3.
ARC is
ARC can simultaneously control up to how many interfaces
250 interfaces.
When the sensor shuts down, ARC writes all blocks and rate limits (with starting timestamps) to this local file
a local
file (nac.shun.txt) that is maintained by ARC.
What happens to the existing active TCP connections if the block command specifies only the source address?
If the block command specifies only the source IP address, existing active TCP connections are not
broken, but all incoming packets from the blocked host are dropped.
When you configure a firewall to use NAT or PAT and the sensor is checking packets on the firewall
outside network, if you detect a host attack that originates on the firewall inside network, the sensor tries
to block this address which is provided by the firewall.
When you configure a firewall to use NAT or PAT and the sensor is checking packets on the firewall
outside network, if you detect a host attack that originates on the firewall inside network, the sensor tries
to block the translated address provided by the firewall.
To view an existing VACL on a catalyst switch:
show security acl info acl_name
To block an address (address_spec is the same as used by router ACLs):
set security acl ip acl_name deny address_spec
To map a VACL to a VLAN:
set sec acl acl_name vlans
To clear a single VACL:
clear security acl map acl_name

http://www.cisco.com/en/US/docs/security/ips/7.0/configuration/guide/cli/cli_system_architecture.pdf
Logger writes the log messages to this circular text file
/usr/cids/idsRoot/log/main.log,
This IPS component configures and controls IPS AAA and password management.
AuthenticationApp
needs question
Pluggable Authentication Modules (PAM).
needs question
You can use the show ssh server-key and show tls fingerprint to display the key fingerprints of the
sensor.
switches set to this VTPM mode do not participate in VTP.
VTP Transparent mode
A switch operating in this VTP mode does not advertise its VLAN configuration and does not synchronize its VLAN configuration based on received advertisements, but these switches do forward VTP advertisements that they receive out their trunk ports in VTP Version 2.
VTP Transparent mode
In this VTP mode, switches behave the same as in VTP transparent mode with the exception that VTP advertisements are not forwarded.
off - vtp mode
Switches in this VTP mode, advertise their VLAN configuration to other switches in the same VTP domain and synchronize their VLAN configuration with other switches based on advertisements received over trunk links.
VTP server mode
This is the default VTP mode
VTP server mode