Route Reflector
A router whose BGP configuration enables readvertising of routes between Interior BGP (IBGP)
neighbors or neighbors within the same BGP AS. A route reflector client is a device that uses
a route reflector to readvertise its routes to the entire AS. It also relies on that route reflector
to learn about routes from the rest of the network.
Routing Information
Protocol (RIP)
A dynamic routing protocol used within moderate-sized autonomous systems.
Routing Table
A list in a virtual router’s memory that contains a realtime view of all the connected and remote
networks to which a router is currently routing packets.
Rule
A rule is a statement that defines a specific type of network traffic. When traffic passes through
the security device, the device attempts to match that traffic against its list of rules. If a rule
is matched, the device performs the action defined in the rule against the matching traffic.
Rulebase
A rulebase contains rules. a rulebase provides a method of detecting and acting upon suspicious
traffic. A NSM security policy can contain three rulebases: Zone, Global, and Multicast.
Run Time Object
(RTO)
A code object created dynamically in memory during normal operation. Some examples of
RTOs are session table entries, ARP cache entries, certificates, DHCP leases, and IPSec Phase
2 security associations (SAs).
S
Scheduled Object
A schedule object defines a time interval that a firewall rule is in effect. You use a schedule
object in your firewall rule to determine when a device enforces that rule.
Secure Access Device
A Juniper Networks SSL VPN appliance.
Secure Copy (SCP)
A method of transferring files between a remote client and a security device using the SSH
protocol. The security device acts as an SCP server, accepting connections from SCP clients
on remote hosts.
Secure Server Protocol
(SSP)
For communication between the UI, the GUI Server, and the Device Server, NSM uses
SSP
, a
modified version of TCP that is more reliable than ordinary TCP, requires less CPU and memory
resources from servers, and reduces the number of acknowledgement packets on the network.
SSP uses AES encryption and SH1 authentication for all connections.
Secure Shell (SSH)
A protocol that allows device administrators to remotely manage the device in a secure manner.
You can run either an SSH version 1 or version 2 server on the security device.
Security Association
The security association combines the Security Parameters Index and a destination address.
Required for both Authentication Header and Encapsulating Security Payload protocols. See
also Security Parameters Index.
841
Copyright © 2010, Juniper Networks, Inc.
Appendix A: Glossary
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...