APPENDIX A
Glossary
•
Network and Security Manager (NSM) Term Definitions on page 833
Network and Security Manager (NSM) Term Definitions
A
Access List
A list of network prefixes that are compared to a given route. If the route matches a network
prefix defined in the access list, the route is either permitted or denied.
Access-Challenge
An additional condition required for a successful Telnet login by an authentication user via a
RADIUS server.
Action (Deep
Inspection)
A DI action is performed by a security device when the permitted traffic matches the attack
object specified in the rule. Deep Inspection actions include
drop connection
,
drop packet
,
close
client
, and so on.
Action (firewall)
A firewall action is performed by a security device when the device receives traffic that matches
the direction, source, destination, and service. Firewall actions include
permit
,
deny, reject
.
Activate Device Wizard
The Activate Device wizard guides you through activating a modeled device in the NSM User
Interface.
Add Device Wizard
The Add Device wizard guides you through importing or modeling a new device to the NSM
User Interface.
Address Object
An address object represents a component of your network, such as a workstation, router,
switch, subnetwork, or any other object that is connected to your network. Use address book
objects to specify the network components you want to protect.
Address Shifting
A mechanism for creating a one-to-one mapping between any original address in one range
of addresses and a specific translated address in a different range.
Address Spoofing
Address Spoofing is a technique for creating packets with a source IP address that is not the
actual interface address. Attackers may use spoofed IP address to perform DDoS attacks
while disguising their true address, or to take advantage of a trusted relationship between two
hosts. To guard against spoofing attacks, configure a security device to check its own route
table. If the IP address is not in the route table, the security device denies the traffic.
833
Copyright © 2010, Juniper Networks, Inc.
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...