IP Address
Each node on a TCP/IP network usually has an IP address. The IP address has a network
number portion and a host number portion:
•
Class A, >32,768 nodes, address format: nnn.hhh.hhh.hhh
•
Class B, 256-32,768 nodes, address format: nnn.nnn.hhh.hhh
•
Class C, <256 nodes, address format: nnn.nnn.nnn.hhh
This address format is called decimal dot format. The \"n\" represents a digit of a network
number and \"h\" represents a digit of a host number; for example, 128.11.2.30. If you are sending
data outside of your network, such as to the Internet, you need to obtain the network number
from a central authority, currently the Network Information Center. See also Subnet Mask.
IP Gateway
Also called a router, an IP gateway is a program or a special-purpose device that transfers IP
datagrams from one network to another until the final destination is reached.
IP Pool Objects
An IP Pool object represents a range of IP addresses. Use IP Pool object to configure a DHCP
server for your managed devices.
IP Security (IPSec)
IPSec is a security standard maintained by the Internet Engineering Task Force (IETF). The
IPSec protocol suite provides everything you need for secure communications—authentication,
integrity, and confidentiality—and makes key exchange practical even in larger networks. See
also DES-CBC, ESP/AH.
IP Sweep
An IP sweep is similar to a port scan attack. Attackers perform IP sweeps by sending ICMP
echo requests (or pings) to different destination addresses and wait for replies that indicate
the IP address of a target. If a remote host pings 10 addresses in 0.3 seconds, the security
device flags the event as an IP sweep attack and drops the connection to prevent replies.
IP Tracking
A mechanism for monitoring configured IP addresses to see if they respond to ping or ARP
requests. You can configure IP tracking with NSRP to determine device or VSD group failover.
You can also configure IP tracking on a device interface to determine if the interface is up or
down.
ISAKMP. The Internet Security Association and Key Management Protocol (ISAKMP) provides
a framework for Internet key management and provides the specific protocol support for
negotiation of security attributes. By itself, it does not establish session keys, however it can
be used with various session key establishment protocols to provide a complete solution to
Internet key management.
J
Job Manager
The Job Manager is a module of the NSM User Interface. Job Manager tracks the progress of
the command as it travels to the device and back to the management server.
JSRP
Junos Services Redundancy Protocol.—A process that controls chassis clustering of Junos
devices.
Copyright © 2010, Juniper Networks, Inc.
844
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...