DHCP (Dynamic Host
Configuration
Protocol)
DHCP is used to dynamically assign IP addresses to networked computers.
Directive
A directive is a command sent by NSM to your managed devices. Directives include importing,
updating, rebooting, and so on. When you send a command to a device or group of devices,
NSM creates a job for that command and displays information about that job in the Job
Manager.
Distributed Denial of
Service (DDoS) Attack
A DoS attack (typically a flood) from multiple source points. A DDoS attacks is more effective
than a DoS attack, as it is no longer one computer against one server in an effort to overwhelm
the server.
DM (Data Model)
A Data Model is an XML file that contains configuration data for an individual device. The DM
is stored in the Device Server; when you create, update, or import a device, the GUI Server edits
the Abstract Data Model (ADM) to reflect the changes, then translates that information to
the DM.
DMI
Device Management Interface—A common, secure management interface used by all device
families added to NSM in release 2008.1 and later releases. DMI is based on a common protocol
and device-specific schemas for configuration, inventory management, logging, and status
monitoring. DMI schemas can be updated without the need to upgrade NSM.
DNS
The Domain Name System maps domain names to IP addresses.
Domain
A domain is a logical grouping of devices, their policies, and their access privileges. A domain
can contain devices, templates, objects, policies, VPNs, administrators, activities, authentication
servers, groups—a representation of the all or a subset of the physical devices and functionality
on your network. The domain above a domain is the parent domain, and the domain below a
domain is the child domain. Domains at the same level are considered peer domains.
Domain Menu
The Domain Menu is the pull-down menu above the navigation tree where domains and
subdomains are selected.
Dynamic Routing
A routing method which adjusts to changing network circumstances by analyzing incoming
routing update messages. If the message indicates that a network change has occurred, the
routing software recalculates routes and sends out new routing update messages. These
messages populate the network, directing routers to rerun their algorithms and change their
routing tables accordingly. There are two common forms of dynamic routing, including Distance
Vector Routing and Link State Routing.
829
Copyright © 2010, Juniper Networks, Inc.
Appendix A: Glossary
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...