Security Device
A security device enables access to your network components and protects your network
against malicious traffic. NSM can manage security devices running ScreenOS 5.x and ScreenOS
6.0.x. All devices from NetScreen-5XT to the NetScreen-5400 are supported, except the
NetScreen-5, NetScreen-10, and NetScreen-1000. NSM also supports the NetScreen-5GT
running ScreenOS 4.0-DIAL2. NSM can also manage vsys configurations, NSRP clusters, and
extranet devices.
Security Parameters
Index
The SPI is a hexadecimal value which uniquely identifies each tunnel. It also tells the security
device which key to use to decrypt packets.
Security Policies
A security policy defines access to your network, including permitted services, users, and time
periods. Use security policies to control the shape of your network traffic as it passes through
the firewall, or log specific network events.
Security Zone
A security zone is a collection of one or more network segments requiring the regulation of
inbound and outbound traffic via access policies.
Server Manager
The Server Manager is a module of the NSM User Interface. Server Manager contains server
objects that represent your management system components. Use Server Manager to manage
and monitor the individual server processes that comprise your NSM system.
Service Object
Service objects represent the IP traffic types for existing protocol standards. Security devices
monitor and manage network traffic using these protocols. NSM includes predefined service
objects for most standard services. You can also create custom service objects to represent
services that are not included in the list of predefined service objects, or to represent a custom
service running on your network.
Session Description
Protocol (SDP)
SDP session descriptions appear in many SIP messages and provide information that a system
can use to join a multimedia session. SDP might include information such as IP addresses,
port numbers, times, dates, and information about the media stream.
Session Initiation
Protocol (SIP)
SIP is an IETF (Internet Engineering Task Force)-standard protocol for initiating, modifying,
and terminating multimedia sessions over the Internet. Such sessions might include
conferencing, telephony, or multimedia, with features such as instant messaging and
application-level mobility in network environments.
SGSN
Serving GPRS Support Node.
SHA-1
Secure Hash Algorithm-1, an algorithm that produces a 160-bit hash from a message of arbitrary
length. (It is generally regarded as more secure than MD5 because of the larger hashes it
produces.)
Shared Objects
A shared object is an object that can be shared across domains.
Short Frame
A short frame contains less than 64 bytes of data.
Copyright © 2010, Juniper Networks, Inc.
842
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...