Cisco Cisco Firepower Management Center 4000
Glossary
GL-43
FireSIGHT System User Guide
virtual router
A group of
s that route Layer 3 traffic. In a Layer 3 deployment, you can configure virtual
routers to route packets by making packet forwarding decisions according to the destination IP address.
You can define static routes, configure Routing Information Protocol (RIP) and Open Shortest Path First
(OSPF) dynamic routing protocols, as well as implement Network Address Translation (
You can define static routes, configure Routing Information Protocol (RIP) and Open Shortest Path First
(OSPF) dynamic routing protocols, as well as implement Network Address Translation (
virtual switch
A group of
s that process inbound and outbound traffic through your network. In a
Layer 2 deployment, you can configure virtual switches on managed
s to operate as standalone
broadcast domains, dividing your network into logical segments. A virtual
uses the media access
and control (MAC) address from a host to determine where to send packets.
VLAN
Virtual local area network. VLANs map hosts not by geographic location, but by some other criterion,
such as by department or primary use. A monitored host’s
such as by department or primary use. A monitored host’s
shows any VLAN information
associated with the host. VLAN information is also included in
s and
s,
as the innermost VLAN tag in the packet that triggered the event. You can filter intrusion policies by
VLAN and target
VLAN and target
s by VLAN. In Layer 2 and Layer 3 deployments, you can
configure
s to appropriately handle VLAN-tagged
traffic.
VLAN tag object
A reusable
that represents an individual
tag.
VPN
A feature that allows you to build secure
tunnels between the
s of Cisco managed
s.
VPN license
A license that allows you to build secure
tunnels between the
s.
VRT
See
.
VRT’s Analysis Report
A record of the
’s analysis of a
submitted for
, detailing the
information presented in the
, as well as additional information
discovered during dynamic analysis.
vulnerability
A description of a specific compromise to which a
is susceptible. The
provides
information on the vulnerabilities to which each of your hosts is vulnerable in the hosts’
In addition, you can use the vulnerabilities
to obtain an overall view of the vulnerabilities
that the system has detected on your entire monitored network. If you deem a
or hosts no longer
vulnerable to a specific compromise, you can deactivate, or mark as invalid, a specific vulnerability.