Cisco Cisco Firepower Management Center 4000
Glossary
GL-39
FireSIGHT System User Guide
SVID
See
switch
that acts as a multiport bridge. Using
, the system identifies switches
as bridges. In addition, you can configure managed
s as
es, performing packet
switching between two or more networks.
switched interface
An interface that you want to use to switch traffic in a Layer 2 deployment. You can set up physical
switched interfaces for handling untagged
switched interfaces for handling untagged
traffic, and logical switched interfaces for handling
traffic with designated VLAN tags.
system policy
Settings that are likely to be similar for multiple
s in a deployment, such as mail relay host
preferences and time synchronization settings. Use the
to
a system policy to itself
table view
A type of
page that displays
information, with one column for each of the fields in the
database table. When performing event analysis, you can use
s to constrain the events
you want to investigate before moving to the table view that shows you the details about the events you
are interested in. The table view is often the next-to-last page in workflows delivered with the system.
are interested in. The table view is often the next-to-last page in workflows delivered with the system.
tag (application)
See
.
tap mode
An advanced
option available on 3D9900 and Series 3 devices where a copy of each packet is
analyzed and the network traffic flow is undisturbed instead of passing through the
. Because you
are working with copies of packets rather than the packets themselves, the device cannot affect the
packet stream even if you configure access control and intrusion policies to drop, modify, or block
traffic.
packet stream even if you configure access control and intrusion policies to drop, modify, or block
traffic.
target device
See
task queue
A queue of jobs that the
needs to perform. When you
, install software updates,
and perform other long-running jobs, the jobs are queued and their status reported on the Task Status
page. The Task Status page provides a detailed list of jobs and refreshes every ten seconds to update their
status.
page. The Task Status page provides a detailed list of jobs and refreshes every ten seconds to update their
status.
third-party vulnerability
Vulnerability data obtained from a third party. If your organization can write scripts or create command
line import files to
line import files to
data from third-party
s, you can use the
data to augment the system’s vulnerability data.