351
Glossary
MAC (Media Access
Control)
On a network, a computer's unique hardware number. The MAC address is used by the
Media Access Control sublayer of the Data Link Control (DLC) layer of telecommunication
protocols. There is a different MAC sublayer for each physical device type. The data-link
layer is the protocol layer in a program that handles the moving of data in and out across a
physical link in a network.
malicious code
Programs such as viruses, worms, logic bombs, and Trojan horses that are surreptitiously
inserted into programs to destroy data, run destructive or intrusive programs, or
otherwise compromise the security or integrity of the victim's computer data.
malware
Programs and files that are created to do harm. Malware includes computer viruses,
worms, and Trojan horses.
manipulation
The insertion of arbitrary streams of data without the user noticing.
menu bar
The horizontal area at the top of a window containing all of the commands appropriate to
the selected console view tab.
MIB (Management
Information Base)
A database of objects that can be monitored by a network management system. Both
SNMP and RMON use standardized MIB formats that allow any SNMP and RMON tools to
monitor any device defined by an MIB.
middleware
An application that connects two otherwise separate applications.
MIME (Multipurpose
Internet Mail
Extensions)
A protocol used for transmitting documents with different formats via the Internet.
mirror port
See
interface, monitoring
.
mode
A system state in which a single action or a series of actions are performed. A mode has an
On condition and an Off condition. For example,
in-line
mode for interfaces in a Symantec
Network Security 7100 Series appliance is On if a security administrator configures those
interfaces for in-line mode, and does the proper cabling of the ports. Using in-line mode,
the appliance is placed into the network path, and can block malicious traffic.
monitoring
The viewing of activity in a security environment, generally in real-time. Monitoring
allows security administrators to view the content of applications that are being used.
monitoring interface
See
interface, monitoring
.
MSA
See
Symantec Network Security Smart Agents
.
multicast
To simultaneously send the same message to a select group of recipients on a network, as
opposed to broadcasting to all recipients on a network. Sometimes used synonymously as
narrowcast.
multiuser
Of, or pertaining to, the ability of multiple, concurrent users to log on and run applications
from a single server.
name server
A computer running a program that converts domain names into appropriate IP addresses
and vice versa.
Summary of Contents for 10521146 - Network Security 7120
Page 1: ...Symantec Network Security Administration Guide...
Page 12: ...12 Contents Index...
Page 14: ...14...
Page 70: ...70...
Page 110: ...110 Populating the topology database Adding nodes and objects...
Page 158: ...158 Responding Managing flow alert rules...
Page 188: ...188...
Page 242: ...242 Reporting Playing recorded traffic...
Page 268: ...268 Managing log files Exporting data...
Page 316: ...316 Advanced configuration Configuring advanced parameters...
Page 318: ...318...
Page 338: ...338 SQL reference Using MySQL tables...
Page 366: ...366 Glossary...
Page 392: ...392 Index...