O
Object
Objects represent reusable information, such as network addresses, individual users and user
groups, and commonly used configuration data. In NSM, objects are shared objects, meaning
they are shared between the global domain and all subdomains. Objects are the building
blocks of the NSM management system.
Object Manager
A module of the NSM User Interface that contains the objects used in your NSM system. An
object is a re-usable, basic NSM building block that contains specific information; you use
objects to create device configurations, policies, and VPNs. All objects are shared, meaning
that they can be shared by all devices and policies in the domain.
OnsSite Administrator
The person who installs a configlet using Rapid Deployment.
Open Shortest Path
First (OSPF)
A dynamic routing protocol intended to operate within a single Autonomous System.
P
Packet Filtering
Packet filtering is a router/firewall process that uses access control lists (ACL) to restrict flow
of information based on protocol characteristics such as source/destination IP address,
protocol, or port used. Generally, packet-filtering routers do not track sessions except when
doing NAT (which tracks the session for NAT purposes).
PDP
Packet Data Protocol.
PDP Context
A user session on a GPRS network.
PDU
Protocol Data Unit.
Peer
See Neighbor.
Ping of Death
The ping of death is an intentionally oversized or irregular ICMP packet that can trigger a Denial
of Service condition, freezing, or other adverse system reactions. You can configure a security
device to detect and reject oversized or irregular packet sizes.
PLMN
Public Land Mobile Network. A public network dedicated to the operation of mobile radio
communications.
Point-to-Multipoint
Network
A non-broadcast network where OSPF treats connections between routers as point-to-point
links. There is no election of a designated router and no LSA generated for the network. A router
in a point-to-multipoint network sends Hello packets to all neighbors with which it can directly
communicate.
Point-to-Point
Network
Joins two routers over a Wide Area Network (WAN). An example of a point-to-point network
is two security devices connected via an IPSec VPN tunnel. On point-to-point networks, the
OSPF router dynamically detects neighbor routers by sending Hello packets to the multicast
address 224.0.0.5.
Copyright © 2010, Juniper Networks, Inc.
838
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...