Adjacencies
When two routers can exchange routing information with one another, they are considered to
have constructed an adjacency. Point-to-point networks have only two routers so those routers
automatically form an adjacency. But point-to-multipoint networks are a series of several
point-to-point networks. When routers pair in this more complex networking scheme, they are
considered to be adjacent to one another.
Advanced Encryption
Standard (AES)
AES is a 128-bit encryption key standard. Use AES in your VPNs when you need greater
interoperability with other network security devices.
Advertisement
A method a router uses to announce itself to other devices on the network, transmitting basic
information including IP address, network mask, and other data.
Aggregate State
A router is in an aggregate state when it is one of multiple virtual BGP routing instances bundled
into one address.
Aggregation
The process of combining several different routes in such a way that only a single route
advertises itself. This technique minimizes the size of the routing table for the router.
Aggregator
An object used to bundle multiple routes under one common route generalized according to
the value of the network mask.
Aggressive Aging
A mechanism to accelerate the timeout process when the number of sessions in the session
table surpasses a specified high-watermark threshold. When the number of sessions in the
table dips below a specified low-watermark threshold, the timeout process returns to normal.
Antivirus (AV)
Scanning
A mechanism for detecting and blocking viruses in File Transfer Protocol (FTP), Internet
Message Access Protocol (IMAP), Simple Mail Transfer Protocol (SMTP), Hypertext Transfer
Protocol (HTTP)—including HTTP webmail—and Post Office Protocol version 3 (POP3) traffic.
Juniper Networks offers an internal AV scanning solution.
APN
Access Point Name. An APN is an IE included in the header of a GTP packet that provides
information on how to reach a network. It is composed of two elements: a network ID and an
operator ID.
Application Layer
Gateway (ALG)
On a security device, an ALG is a software component that is designed to manage specific
protocols such as SIP or FTP. The ALG intercepts and analyzes the specified traffic, allocates
resources, and defines dynamic policies to permit the traffic to pass securely trough the security
device.
Area
The most fundamental ordering method in the OSPF routing protocol. An OSPF area divides
the internetwork into smaller, more manageable constituent pieces. This technique reduces
the amount of information that each router must store and maintain about all the other routers.
When a router in the area needs information about another device in or out of the area, it
contacts a special router that stores this information. This router is called the Area Border
Router (ABR) and contains all essential device information. In addition, the ABR area border
router filters all information coming into the area to avoid bogging down other routers in the
area with information they may not need.
Copyright © 2010, Juniper Networks, Inc.
834
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...