IP Address
Each node on a TCP/IP network usually has an IP address. The IP address has a network
number portion and a host number portion:
•
Class A, >32,768 nodes, address format: nnn.hhh.hhh.hhh
•
Class B, 256-32,768 nodes, address format: nnn.nnn.hhh.hhh
•
Class C, <256 nodes, address format: nnn.nnn.nnn.hhh
This address format is called decimal dot format. The \"n\" represents a digit of a network
number and \"h\" represents a digit of a host number; for example, 128.11.2.30. If you are sending
data outside of your network, such as to the Internet, you need to obtain the network number
from a central authority, currently the Network Information Center. See also Subnet Mask.
IP Gateway
Also called a router, an IP gateway is a program or a special-purpose device that transfers IP
datagrams from one network to another until the final destination is reached.
IP Pool Objects
An IP Pool object represents a range of IP addresses. Use IP Pool object to configure a DHCP
server for your managed devices.
IP Security (IPSec)
IPSec is a security standard maintained by the Internet Engineering Task Force (IETF). The
IPSec protocol suite provides everything you need for secure communications—authentication,
integrity, and confidentiality—and makes key exchange practical even in larger networks. See
also DES-CBC, ESP/AH.
IP Sweep
An IP sweep is similar to a port scan attack. Attackers perform IP sweeps by sending ICMP
echo requests (or pings) to different destination addresses and wait for replies that indicate
the IP address of a target. If a remote host pings 10 addresses in 0.3 seconds, the security
device flags the event as an IP sweep attack and drops the connection to prevent replies.
IP Tracking
A mechanism for monitoring configured IP addresses to see if they respond to ping or ARP
requests. You can configure IP tracking with NSRP to determine device or VSD group failover.
You can also configure IP tracking on a device interface to determine if the interface is up or
down.
ISAKMP. The Internet Security Association and Key Management Protocol (ISAKMP) provides
a framework for Internet key management and provides the specific protocol support for
negotiation of security attributes. By itself, it does not establish session keys, however it can
be used with various session key establishment protocols to provide a complete solution to
Internet key management.
J
Job Manager
The Job Manager is a module of the NSM User Interface. Job Manager tracks the progress of
the command as it travels to the device and back to the management server.
JSRP
Junos Services Redundancy Protocol.—A process that controls chassis clustering of Junos
devices.
Copyright © 2010, Juniper Networks, Inc.
834
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...