Configuration Group
A collection of configuration statements whose inheritance can be directed in the rest of the
device configuration. The same group can be applied to different sections of the configuration,
and different sections of one group’s configuration statements can be inherited in different
places in the configuration.
CRC Errors
CRC errors indicate the number of packets generating a cyclic redundancy code error processed
through the security device over the selected interface.
D
Data Encryption
Standard
DES is a 40- and 56-bit encryption algorithm developed by the National Institute of Standards
and Technology (NIST). DES is a block encryption method originally developed by IBM. It has
since been certified by the U.S. government for transmission of any data that is not classified
top secret. DES uses an algorithm for private-key encryption.
Data Encryption
Standard-Cipher Block
Chaining (DES-CBC)
DES-CBC is used to encrypt single DES keys.
Default Route
A “catch all” routing table entry that defines the forwarding of traffic for destination networks
that are not explicitly defined in the routing table. The destination network for the default route
is represented by the network address 0.0.0.0/0.
Delta
A delta is a difference, or discrepancy. Example: the differences between the configuration
running on the physical device and the difference between the configuration in NSM are known
as deltas.
Demilitarized Zone
A DMZ is an area between two networks that are controlled by different companies. A DMZ
ethernet can be external or internal; external DMZ ethernets link regional networks with routers.
Denial of Service
(DoS) Attack
A DoS attack is designed to disrupt a network service. Typically, an attacker sends a flood of
information to overwhelm a service’s system resources, causing the server to ignore valid
network requests. Other DoS attacks can cause the service process to crash.
Device Administrator
A device administrator is the person who uses WebUI or CLI to manage a single security device.
Device Discovery Rules
Sets of rules that define subnets or ranges of IP addresses to scan for EX Series devices in your
network.
Device Editor
A set of NSM screens used for displaying and editing the configuration of a device.
Device Monitor
The Device Monitor displays information about individual devices, their configuration and
connection status, and memory usage.
Device Server
The Device Server is the component of the NSM management system that handles
communication between the GUI Server and the device, collects data from the managed
devices on your network, formats configuration information sent to your managed device, and
consolidates log and event data.
Copyright © 2010, Juniper Networks, Inc.
838
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...