Glossary
GL-24
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
virtual sensor
A logical grouping of sensing interfaces and the configuration policy for the signature engines and
alarm filters to apply to them. In other words, multiple virtual sensors running on the same appliance,
each configured with different signature behavior and traffic feeds.
virtualized sensing
interface
A virtualized interface has been divided into subinterfaces each of which consists of a g roup of VLANs.
You can associate a virtual sensor with one or more subinterfaces so that different intrusion prevention
policies can be assigned to those subinterfaces. You can virtualize both physical and inline interfaces.
virus
Hidden, self-replicating sectio n of computer software, usually malicious logic, that propagates by
infecting—that is, inserting a copy of itself into and becoming part of—another program. A virus
cannot run by itself; it requires that its host program be run to make the virus active.
virus update
A signature update specifically addressing viruses.
VLAN
Virtual Local Area Network. Group of devices on one or more LA Ns that are configured (using
management software) so that they can communicate as if they were attached to the same wire, when
in fact they are located on a number of different LAN segments. Because VLANs are based on logic al
instead of physical connections, they are extremely flexible.
VTP
VLAN Trunking Protocol. Cisco Layer 2 messaging protocol that manages the addition, deletion , and
renaming of VLANs on a network-wide basis.
VMS
CiscoWorks VPN/Security Management Solution. A suite of network security applications that
combines web-based tools for configuring, monitoring, and troubleshooting enterprise VPN, firewalls,
network intrusion detection systems and host-based intrusion prevention systems.
VoIP
Voice over IP. The capability to carry normal telephony-style voice over an IP-based internet with
POTS-like functionality, reliability, and voice quality. VoIP enables a router to carry voice traffic (for
example, telephone calls and faxes) over an IP network. In VoIP, the DSP segments the voice signal into
frames, which then are coupled in groups of two and stored in voice packets. These voice packets are
transported using IP in compliance with ITU-T specification H.323.
VPN
Virtual Private Network(ing). Enables IP traffic to travel securely over a public TCP/IP network by
encrypting all traffic from one network to another. A VPN uses “tunneling” to encrypt all information
at the IP level.
VTP
VLAN Trunking Protocol. A Cisco Layer 2 messaging protocol that man ages the addition, deletion,
and renaming of VLANs on a network-wide basis.
vulnerability
One or more attributes of a computer or a network that permit a subject to initiate patterns of misuse
on that computer or network.
W
WAN
wide-area network. Data communications network that serves users across a broad geographic area and
often uses transmission devices provided by common carriers. Frame Relay, SMDS, and X.25 are
examples of WANs.
watch list rating
WLR. A weight associated with the CSAM C watch list in the range of 0 to 100 (CSA MC only uses
the range 0 to 35).