Configuration Group
A collection of configuration statements whose inheritance can be directed in the rest of the
device configuration. The same group can be applied to different sections of the configuration,
and different sections of one group’s configuration statements can be inherited in different
places in the configuration.
CRC Errors
CRC errors indicate the number of packets generating a cyclic redundancy code error processed
through the security device over the selected interface.
D
Data Encryption
Standard
DES is a 40- and 56-bit encryption algorithm developed by the National Institute of Standards
and Technology (NIST). DES is a block encryption method originally developed by IBM. It has
since been certified by the U.S. government for transmission of any data that is not classified
top secret. DES uses an algorithm for private-key encryption.
Data Encryption
Standard-Cipher Block
Chaining (DES-CBC)
DES-CBC is used to encrypt single DES keys.
Default Route
A “catch all” routing table entry that defines the forwarding of traffic for destination networks
that are not explicitly defined in the routing table. The destination network for the default route
is represented by the network address 0.0.0.0/0.
Delta
A delta is a difference, or discrepancy. Example: the differences between the configuration
running on the physical device and the difference between the configuration in NSM are known
as deltas.
Demilitarized Zone
A DMZ is an area between two networks that are controlled by different companies. A DMZ
ethernet can be external or internal; external DMZ ethernets link regional networks with routers.
Denial of Service
(DoS) Attack
A DoS attack is designed to disrupt a network service. Typically, an attacker sends a flood of
information to overwhelm a service’s system resources, causing the server to ignore valid
network requests. Other DoS attacks can cause the service process to crash.
Device Administrator
A device administrator is the person who uses WebUI or CLI to manage a single security device.
Device Discovery Rules
Sets of rules that define subnets or ranges of IP addresses to scan for EX Series devices in your
network.
Device Editor
A set of NSM screens used for displaying and editing the configuration of a device.
Device Monitor
The Device Monitor displays information about individual devices, their configuration and
connection status, and memory usage.
Device Server
The Device Server is the component of the NSM management system that handles
communication between the GUI Server and the device, collects data from the managed
devices on your network, formats configuration information sent to your managed device, and
consolidates log and event data.
Copyright © 2010, Juniper Networks, Inc.
838
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...