Configuration Group
A collection of configuration statements whose inheritance can be directed in the rest of the
device configuration. The same group can be applied to different sections of the configuration,
and different sections of one group’s configuration statements can be inherited in different
places in the configuration.
CRC Errors
CRC errors indicate the number of packets generating a cyclic redundancy code error processed
through the security device over the selected interface.
D
Data Encryption
Standard
DES is a 40- and 56-bit encryption algorithm developed by the National Institute of Standards
and Technology (NIST). DES is a block encryption method originally developed by IBM. It has
since been certified by the U.S. government for transmission of any data that is not classified
top secret. DES uses an algorithm for private-key encryption.
Data Encryption
Standard-Cipher Block
Chaining (DES-CBC)
DES-CBC is used to encrypt single DES keys.
Default Route
A “catch all” routing table entry that defines the forwarding of traffic for destination networks
that are not explicitly defined in the routing table. The destination network for the default route
is represented by the network address 0.0.0.0/0.
Delta
A delta is a difference, or discrepancy. Example: the differences between the configuration
running on the physical device and the difference between the configuration in NSM are known
as deltas.
Demilitarized Zone
A DMZ is an area between two networks that are controlled by different companies. A DMZ
ethernet can be external or internal; external DMZ ethernets link regional networks with routers.
Denial of Service
(DoS) Attack
A DoS attack is designed to disrupt a network service. Typically, an attacker sends a flood of
information to overwhelm a service’s system resources, causing the server to ignore valid
network requests. Other DoS attacks can cause the service process to crash.
Device Administrator
A device administrator is the person who uses WebUI or CLI to manage a single security device.
Device Discovery Rules
Sets of rules that define subnets or ranges of IP addresses to scan for EX Series devices in your
network.
Device Editor
A set of NSM screens used for displaying and editing the configuration of a device.
Device Monitor
The Device Monitor displays information about individual devices, their configuration and
connection status, and memory usage.
Device Server
The Device Server is the component of the NSM management system that handles
communication between the GUI Server and the device, collects data from the managed
devices on your network, formats configuration information sent to your managed device, and
consolidates log and event data.
Copyright © 2010, Juniper Networks, Inc.
828
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...