300-710 SNCF Exam QuestionsBrowse all questions from this exam

300-710 SNCF Exam - Question 29


With Cisco FTD software, which interface mode must be configured to passively receive traffic that passes through the appliance?

Show Answer
Correct Answer: C

To passively receive traffic that passes through the Cisco FTD appliance, the interface mode that must be configured is tap mode. Tap mode allows the network traffic to flow undisturbed while making a copy of each packet for analysis. This ensures that the traffic is monitored without affecting its flow to its destination, meeting the requirement of passive monitoring.

Discussion

21 comments
Sign in to comment
SegaMasterSystemAdminOption: C
Jun 5, 2023

IDS is passive but IPS is not, with IPS the inline traffic can be dropped. I go with tap

trickbotOption: D
Feb 19, 2022

We're screwed with this question. The correct answer depends on whether the question is based on the FMC configuration Guide, or the FMC GUI user interface. If this question comes from the FMC configuration Guide, the answer could very well be D - IPS-only mode. According to the first sentence of the "INTERFACE MODES AND TYPES" section of The FMC configuration manual: "You can deploy FTD interfaces in two modes: Regular firewall mode and IPS-only mode." TAP mode would be an Advanced setting on an interface in IPS-only mode. If this question is based on the FMC GUI, then there are three modes available. Two mode choices on Firewall mode interfaces. Default is mode:none, but mode can be set to passive mode, or ERSPAN mode. There is one mode on an inline pair interface, "Tap mode" found in the advanced options. And to muddy the waters even more, ERSPAN could also be the correct answer because ERSPAN traffic is passive copies of traffic that doesnt go through the device, but the original traffic still has to go out somewhere, and that somewhere is probably through that ftd's firewall mode interfaces. I'm undecided between IPS-only mode, and TAP mode.

bassfunkOption: A
Aug 3, 2023

I wish there was a way to upload pics to these boards. I'm looking at the FMC right now and the only interface modes are passive, ERSPAN or none. I'm going with ERSPAN. Some of you might be going off of old guides based on older versions of the software. I'm using FMC7.2.

kakakayayaya
Jun 2, 2021

Tap fits better

Bobster02
Jun 5, 2021

100% TAP mode.

johanhc20Option: C
Jul 25, 2022

Correct C With tap mode, the FTD is deployed inline, but the network traffic flow is undisturbed. Instead, the FTD makes a copy of each packet so that it can analyze the packets. Note that rules of these types do generate intrusion events when they are triggered, and the table view of intrusion events indicates that the triggering packets would have dropped in an inline deployment. There are benefits to using tap mode with FTDs that are deployed inline

diqueOption: C
Sep 2, 2022

Correct answer: C

WeylandOption: D
Oct 3, 2022

From the start, only two answers are possible. B and D. There are only two interface modes on FTD, "You can deploy FTD interfaces in two modes: Regular firewall mode and IPS-only mode. You can include both firewall and IPS-only interfaces on the same device. IPS-only interfaces can be deployed as the following types: Inline Set, with optional Tap mode". So you could have IPS-only as inline with tap that would make it into IDS and therefore passive. Firewall interface mode can be deployed as Routed or Bridge Groups with BVI. Do your own reading here: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/interface_overview_for_firepower_threat_defense.html

Weyland
Oct 3, 2022

And you could also set an IPS-only interface to passive to boot.

Joninjimbo
Oct 24, 2023

Agree with D according to the Cisco docs. IPS-only mode selected means you can use inline tap which satisfies the question criteria. Updated link for version 7.0 here which still holds true: https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/interface_overview_for_firepower_threat_defense.html

Joe_BlueOption: C
Mar 11, 2023

The correct answer is C, tap. The tap mode is used for passive monitoring of traffic without affecting the traffic flow. The traffic is simply copied to the tap interface for analysis, while the original traffic continues to its destination.

saad_SEIUOption: A
Apr 10, 2023

I would go with ERSPAN, this is a Passive interface with encapsulating mode. TAP is a copy of the traffic.

Sarbi
Oct 6, 2021

Agreed It should be TAP mode

killian64
Jul 25, 2023

A - ERSPAN. If we're talking interface type, ERSPAN is the only option here. tap is a setting on on inline set (which isn't an interface type).

Silexis
Feb 7, 2025

ERSPAN is not of traffic passing through the appliance but a traffic received in IDS mode from different distant devices separated by Layer 3

achille5Option: A
Aug 3, 2023

https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/fpmc-config-guide-v622_chapter_01111001.html

achille5
May 21, 2024

https://rayka-co.com/lesson/cisco-firepower-deployment-modes/

GrandslamOption: D
Mar 22, 2022

Because the question is asking about traffic that goes through the firewall itself. AND that the firewall receives the data flow passively. BUT does NOT specify anything about the data being inspected. I would go with IPS-Mode. If the question asked about passively inspecting the traffic going through the appliance... I would have picked TAP.

Soter
Jul 6, 2022

of the "Interface modes" the only valid answers is "TAP" or "ERSPAN" Tap is passive and traffic is not going through the FTD, but with ERSPAN it does. Further there is no "IPS-only" mode on interface. if any discussion about "xxx-only" mode is shout be "IDS-only" mode and that would be a passive interface mode

Grandslam
Jul 12, 2022

With Cisco FTD software, ****which interface mode**** must be configured to passively receive traffic that passes through the appliance? You can deploy FTD interfaces in two modes: Regular firewall mode and IPS-only mode. D

BorZol
Sep 14, 2022

TAP interface is not copy any traffic to other interface. Just received it. (Passive) IPS-only the correct. —An inline set acts like a bump on the wire, and binds two interfaces together to slot into an existing network. This function allows the system to be installed in any network environment without the configuration of adjacent network devices. Inline interfaces receive all traffic unconditionally, but all traffic received on these interfaces is retransmitted out of an inline set unless explicitly dropped.

ureis
Apr 26, 2023

A TAP is a network device that copies and transfers traffic to another system. Unlike a SPAN port on a switch, which is configured at the software level, a network TAP is dedicated hardware that is designed to replicate and transfer traffic.

Marco_Vela03
May 17, 2023

D is correct, IPS-Only is an interface mode. Tap mode is a type of interface mode can be deployed: IPS-only interfaces can be deployed as the following types

Anonymous
Feb 13, 2024

I don't understand why Cisco exam is doing this tricky question. Although I don't like this kind of question, I think I am going to choose IPS-Only mode. like trickbot explained very well below. I am more focusing higher interface mode (firewall vs IPS-mode) although TAP and ERSPAN are also possible answers.

Doris8000
Aug 3, 2024

Agree it should be D as the TAP woulnd't let the traffic pass

xBojmir215xOption: D
Dec 26, 2024

It's gotta be D, IPS-only. Of the interface modes, there's Routed, Passive and ERSPAN. Tap is a mode that's used with inline tap or inline set. IPS-only is NOT an interface mode, however it can be configured to allow traffic to flow through an interface passively, as counterintuitive as that might seem.

Silexis
Feb 7, 2025

IPS is a deployment type and NOT an interface mode TAP is an interface deployment mode, of IPS

14a1949Option: D
Jan 7, 2025

For Cisco FTD software, the correct interface mode to passively receive traffic is IPS-only mode (option D). This mode allows the appliance to monitor and analyze traffic without actively participating in the traffic flow. Tap mode (option C) is another passive monitoring option, but it is typically used in inline deployments where the device is physically inserted into the network path. In contrast, IPS-only mode is specifically designed for passive monitoring without affecting the traffic flow.

Silexis
Feb 7, 2025

IPS is a deployment type and NOT an interface mode