I
ICMP Flood
An ICMP flood contains ICMP pings so numerous that they overload a system with echo
requests, causing the system to expend all its resources responding until it can no longer
process valid network traffic. If you set a threshold to invoke ICMP flood attack protection
when exceeded, ICMP flood attacks are recorded as statistics.
IE
Information Element.
IKE Proposal Objects
An IKE proposal is a set of encryption keys and authentication algorithms that is used to
negotiate a VPN connection. An IKE proposal object is a representation of an IKE proposal in
the NSM UI.
Import Rules
When you have two or more virtual routers on a security device, you can configure import rules
on one virtual router that define which routes are allowed to learned from another virtual router.
If you do not configure any import rules for a virtual router, all routes that are exported to that
virtual router are accepted. See also Export Rules.
IMSI
International Mobile Station Identity.
In-Device Policy
Management
Mode of policy management done through the Device Editor on a specific device and not
through the central NSM Policy Manager. If you select this method to manage policies on a J
Series or SRX Series device, the NSM Policy Manager, Object Manager, and VPN Manager are
all disabled for that device.
Infranet Controller
The policy management component of Juniper Networks UAC solution.
Infranet Enforcer
The policy enforcement point or firewall within a Juniper Networks UAC solution.
Internet Control
Message Protocol
(ICMP)
ICMP is a network-layer protocol that does not carry user data, but does encapsulate its
messages in IP datagrams. ICMP provides a query and response system (with error-reporting)
used to determine if another system on the network can receive and send data. An ICMP echo
request is also known as a
ping
.
Internet Key Exchange
IKE is a method for exchanging keys for encryption and authentication over an unsecured
medium, such as the Internet.
Internet Protocol (IP)
IP is an Internet standard protocol that defines a basic unit of data called a datagram. A
datagram is used in a connectionless, best-effort, delivery system. The Internet protocol defines
how information gets passed between systems across the Internet.
833
Copyright © 2010, Juniper Networks, Inc.
Appendix A: Glossary
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...