Cisco Cisco FirePOWER Appliance 7030
GL-9
FireSIGHT System User Guide
G L O S S A R Y
7000 Series
A group of
s. The devices in this series include the 70xx Family (the
3D7010/7020/7030 models) and the 71xx Family (3D7110/7120/3D7115/3D7125 and AMP7150
models).
models).
8000 Series
A group of
s. The devices in this series include the 81xx Family (the
3D8120/8130/8140 and AMP8150 models), the 82xx Family (the 3D8250/8260/8270/8290 models),
and the 83xx Family (the 3D8350/8360/8370/8390 models). 8000 Series devices are generally more
powerful than
and the 83xx Family (the 3D8350/8360/8370/8390 models). 8000 Series devices are generally more
powerful than
devices.
access control
A feature of the FireSIGHT System that allows you to specify, inspect, and log the traffic that
traverses your network. Access control includes the
traverses your network. Access control includes the
features, and also determines the traffic you can inspect with the
feature.
access control policy
A
that you
to managed
s to perform
on the network traffic
monitored by those devices. An access control policy may include multiple
also specifies a
, which determines the handling and logging of traffic that does not
meet the criteria of any of those rules. An access control policy can also specify
, and other advanced settings.
access control rule
A set of conditions the FireSIGHT System uses to examine your monitored network traffic and which
allows you to achieve granular
allows you to achieve granular
. Access control rules, which populate an
, may perform simple IP address matching, or may characterize complex
s involving
different users,
s, ports, and URLs. The
determines how the
system handles traffic that meets the rule’s conditions. Other rule settings determine how (and
whether) the connection is logged, and whether an
whether) the connection is logged, and whether an
inspects matching
traffic.
access control rule action
A setting that determines how the system handles network traffic that meets the conditions of an
); for
HTTP traffic you can provide users with the option to bypass the block. You can also trust traffic to
pass without further inspection, allow matching traffic, which optionally can be inspected with an
pass without further inspection, allow matching traffic, which optionally can be inspected with an
and
, or continue to monitor the traffic with additional access control rules.