Cisco Cisco Firepower Management Center 4000

Page of 1844
 
Glossary
GL-39
FireSIGHT System User Guide
 
SVID
See 
switch
 that acts as a multiport bridge. Usin
, the system identifies switches 
as bridges. In addition, you can configure managed 
s a
es, performing packet 
switching between two or more networks.
switched interface
An interface that you want to use to switch traffic in a Layer 2 deployment. You can set up physical 
switched interfaces for handling untagged 
 traffic, and logical switched interfaces for handling 
traffic with designated VLAN tags.
system policy
Settings that are likely to be similar for multiple 
s in a deployment, such as mail relay host 
preferences and time synchronization settings. Use the 
 to 
 a system policy to itself 
and its managed 
table view
A type of 
 page that displays 
 information, with one column for each of the fields in the 
database table. When performing event analysis, you can use 
s to constrain the events 
you want to investigate before moving to the table view that shows you the details about the events you 
are interested in. The table view is often the next-to-last page in workflows delivered with the system.
tag (application)
See 
.
tap mode
An advanced 
 option available on 3D9900 and Series 3 devices where a copy of each packet is 
analyzed and the network traffic flow is undisturbed instead of passing through the 
. Because you 
are working with copies of packets rather than the packets themselves, the device cannot affect the 
packet stream even if you configure access control and intrusion policies to drop, modify, or block 
traffic.
target device
See 
task queue
A queue of jobs that the 
 needs to perform. When you 
, install software updates, 
and perform other long-running jobs, the jobs are queued and their status reported on the Task Status 
page. The Task Status page provides a detailed list of jobs and refreshes every ten seconds to update their 
status.
third-party vulnerability
Vulnerability data obtained from a third party. If your organization can write scripts or create command 
line import files to 
 
 data from third-party 
s, you can use the 
 
feature to import third-party 
 data to augment the system’s vulnerability data.