Log ID
A log ID is a unique ID for the log entry, derived from the combination of the date and log
number.
Log Investigator
The Log Investigator is a module of the NSM User Interface. The Log Investigator contains
tools for analyzing your log entries in depth. Use the Log Investigator to manipulate and change
constraints on log information, correlate log entries visually and rapidly, and filter log entries
while maintaining the broader picture.
Log Viewer
The Log Viewer is a module of the NSM User Interface. The Log Viewer displays log entries
that your security devices generate based on criteria that you defined in your security policies,
on the Device Server, and in the device configuration. Logs appear in table format; each row
contains a single log, and each column defines specific information for a log.
Loopback Interface
A logical interface that emulates a physical interface on the security device, but is always in
the up state as long as the device is up. You must assign an IP address to a loopback interface
and bind it to a security zone.
M
Main Display Area
The main display area displays the content for the currently selected module or module
contents.
Management System
The management system includes the GUI Server and Device Server. You can deploy the GUI
Server and Device Server on separate servers; however, the combination of the two servers is
known as the management system.
Mapped IP Address
A MIP is a direct one-to-one mapping of traffic destined for one IP address to another IP
address.
MCC
Mobile Country Code.
MD5
Message Digest (version) 5 is an algorithm that produces a 128-bit message digest (or hash)
from a message of arbitrary length. The resulting hash is used to verify authenticity.
Media Gateway
Control Protocol
(MGCP)
MGCP is a text-based, application layer protocol that can be used for call setup and call control.
The protocol is based on a master/slave call control architecture: the media gateway controller
(call agent) maintains call control intelligence, and media gateways carry out the instructions
from the call agent.
Member AS
The name of the autonomous system being included in a BGP confederation.
Menu Bar
The menu bar is the upper section of the NSM UI. The menu bar contains accessible commands.
Metric
A value associated with a route that the virtual router uses to select the active route when
there are multiple routes to the same destination network with the same preference value.
The metric value for connected routes is always 0. The default metric value for static routes
is 1, but you can specify a different value when defining a static route.
MNC
Mobile Network Code.
Copyright © 2010, Juniper Networks, Inc.
846
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...