I
ICMP Flood
An ICMP flood contains ICMP pings so numerous that they overload a system with echo
requests, causing the system to expend all its resources responding until it can no longer
process valid network traffic. If you set a threshold to invoke ICMP flood attack protection
when exceeded, ICMP flood attacks are recorded as statistics.
IE
Information Element.
IKE Proposal Objects
An IKE proposal is a set of encryption keys and authentication algorithms that is used to
negotiate a VPN connection. An IKE proposal object is a representation of an IKE proposal in
the NSM UI.
Import Rules
When you have two or more virtual routers on a security device, you can configure import rules
on one virtual router that define which routes are allowed to learned from another virtual router.
If you do not configure any import rules for a virtual router, all routes that are exported to that
virtual router are accepted. See also Export Rules.
IMSI
International Mobile Station Identity.
In-Device Policy
Management
Mode of policy management done through the Device Editor on a specific device and not
through the central NSM Policy Manager. If you select this method to manage policies on a J
Series or SRX Series device, the NSM Policy Manager, Object Manager, and VPN Manager are
all disabled for that device.
Infranet Controller
The policy management component of Juniper Networks UAC solution.
Infranet Enforcer
The policy enforcement point or firewall within a Juniper Networks UAC solution.
Internet Control
Message Protocol
(ICMP)
ICMP is a network-layer protocol that does not carry user data, but does encapsulate its
messages in IP datagrams. ICMP provides a query and response system (with error-reporting)
used to determine if another system on the network can receive and send data. An ICMP echo
request is also known as a
ping
.
Internet Key Exchange
IKE is a method for exchanging keys for encryption and authentication over an unsecured
medium, such as the Internet.
Internet Protocol (IP)
IP is an Internet standard protocol that defines a basic unit of data called a datagram. A
datagram is used in a connectionless, best-effort, delivery system. The Internet protocol defines
how information gets passed between systems across the Internet.
843
Copyright © 2010, Juniper Networks, Inc.
Appendix A: Glossary
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...