Cisco Cisco Firepower Management Center 4000

Page of 1844
 
Glossary
GL-43
FireSIGHT System User Guide
 
virtual router
A group of 
s that route Layer 3 traffic. In a Layer 3 deployment, you can configure virtual 
routers to route packets by making packet forwarding decisions according to the destination IP address. 
You can define static routes, configure Routing Information Protocol (RIP) and Open Shortest Path First 
(OSPF) dynamic routing protocols, as well as implement Network Address Translation (
virtual switch
A group of 
s that process inbound and outbound traffic through your network. In a 
Layer 2 deployment, you can configure virtual switches on managed 
s to operate as standalone 
broadcast domains, dividing your network into logical segments. A virtual 
 uses the media access 
and control (MAC) address from a host to determine where to send packets.
VLAN
Virtual local area network. VLANs map hosts not by geographic location, but by some other criterion, 
such as by department or primary use. A monitored host’s 
 shows any VLAN information 
associated with the host. VLAN information is also included in 
s and 
s, 
as the innermost VLAN tag in the packet that triggered the event. You can filter intrusion policies by 
VLAN and target 
s by VLAN. In Layer 2 and Layer 3 deployments, you can 
configure 
s on managed 
to appropriately handle VLAN-tagged 
traffic.
VLAN tag object
A reusable 
 that represents an individual 
 tag.
VPN
A feature that allows you to build secure 
 tunnels between the 
s of Cisco managed 
s.
VPN license
A license that allows you to build secure 
 tunnels between the 
s.
VRT
See 
.
VRT’s Analysis Report
A record of the 
s analysis of a 
 submitted for 
, detailing the 
information presented in the 
, as well as additional information 
discovered during dynamic analysis.
vulnerability
A description of a specific compromise to which a 
 is susceptible. The 
 provides 
information on the vulnerabilities to which each of your hosts is vulnerable in the hosts’ 
In addition, you can use the vulnerabilities 
 to obtain an overall view of the vulnerabilities 
that the system has detected on your entire monitored network. If you deem a 
 or hosts no longer 
vulnerable to a specific compromise, you can deactivate, or mark as invalid, a specific vulnerability.