GTP Tunnel
A GTP tunnel in the GTP-U plane is defined for each PDP Context in the GSNs. A GTP tunnel
in the GTP-C plane is defined for all PDP Contexts with the same PDP address and APN (for
Tunnel Management messages) or for each MS (for messages not related to Tunnel
Management). A GTP tunnel is identified in each node with a TEID, an IP address and a UDP
port number. A GTP tunnel is necessary to forward packets between an external network and
an MS user.
GTP-C Message
GTP-Control Message. Control plane messages are exchanged between GSN pairs in a path.
The control plane messages are used to transfer GSN capability information between GSN
pairs, to create, update and delete GTP tunnels and for path management.
GTP-PDU
A GTP Protocol Data Unit is either a GTP-C message or a GTP-U message.
GTP-U Message
GTP-User Data message. User plane messages are exchanged between GSN pairs or GSN/RNC
pairs in a path. The user plane messages are used to carry user data packets, and signalling
messages for path management and error indication.
GUI Server
The GUI Server manages the system resources and data that drives NSM functionality. The
GUI Server contains the NSM databases, and centralizes information for devices, their
configurations, attack and server objects, and policies.
H
H.323
The H323 Application Layer Gateway (ALG) lets you to secure Voice-over-IP (VoIP)
communication between terminal hosts, such as IP phones and multimedia devices. In such
a telephony system, gatekeeper devices manage call registration, admission, and call status
for VoIP calls. Gatekeepers can reside in the two different zones, or in the same zone.
Hardened System
A hardened system is a secure server with all appropriate security patches and bug fixes; these
systems are designed to resist penetration.
Hello Interval
The amount of time that elapses between instances of Hello Packets.
Hello Packet
A Hello packet is a message sent out to the current network to announce the presence of the
current routing instance to the network. Hello packets aid in the discovery of neighbors and in
a router being able to connect to other devices on the network. When an OSPF interface is
created, the interface sends Hello packets to the network to announce itself.
Histogram
A histogram is a vertical graph that represents different amounts by thin, color-coded bands
or bars. These bars represent a frequency distribution; heights of the bars represent observed
frequencies.
HLR
Home Location Register.
Hold Time
In OSPF, the maximum amount of time between instances of initiating Shortest Path First
(SPF) computations. In BGP, the maximum amount of time that elapses between message
transmissions between a BGP speaker and its neighbor.
Copyright © 2010, Juniper Networks, Inc.
842
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...