EasyManua.ls Logo

Source fire Sourcefire 3D System - Page 279

Default Icon
280 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Version 5.2 Sourcefire 3D System User Guide 279
virtual router
to
vulnerability database
Glossary
virtual router A group of routed interfaces that route Layer 3 traffic. In a Layer 3 deployment,
you can configure virtual routers to route packets by making packet forwarding
decisions according to the destination IP address. You can define static routes,
configure Routing Information Protocol (RIP) and Open Shortest Path First (OSPF)
dynamic routing protocols, as well as implement Network Address Translation
(NAT).
virtual switch A group of switched interfaces that process inbound and outbound traffic through
your network. In a Layer 2 deployment, you can configure virtual switches on
managed devices to operate as standalone broadcast domains, dividing your
network into logical segments. A virtual switch uses the media access and
control (MAC) address from a host to determine where to send packets.
VLAN Virtual local area network. VLANs map hosts not by geographic location, but by
some other criterion, such as by department or primary use. A monitored host’s
host profile shows any VLAN information associated with the host. VLAN
information is also included in intrusion events, as the innermost VLAN tag in the
packet that triggered the event. You can filter intrusion policies by VLAN and
target compliance white lists by VLAN. In Layer 2 and Layer 3 deployments, you
can configure virtual switches and virtual routers on managed devices to
appropriately handle VLAN-tagged traffic.
VPN A feature that allows you to build secure VPN tunnels among the virtual routers
on Sourcefire managed devices, or from managed devices to remote devices or
other third-party VPN endpoints.
VPN license A license that allows you to build secure VPN tunnels among the virtual routers
on Sourcefire managed devices, or from managed devices to remote devices or
other third-party VPN endpoints.
VRT See Sourcefire VRT.
vulnerability A description of a specific compromise to which a host is susceptible. The
Defense Center provides information on the vulnerabilities to which each of your
hosts is vulnerable in the hosts’ host profiles. In addition, you can use the
vulnerabilities network map to obtain an overall view of the vulnerabilities that the
system has detected on your entire monitored network. If you deem a host or
hosts no longer vulnerable to a specific compromise, you can deactivate, or mark
as invalid, a specific vulnerability.
vulnerability database Also called the VDB, a database of known vulnerabilities to which hosts may be
susceptible. The system correlates the operating system, application protocols,
and clients detected on each host with the VDB to help you determine whether a
particular host increases your risk of network compromise. VDB updates may
contain new and updated vulnerabilities, as well as new and updated application
detectors.

Table of Contents