O
Object
Objects represent reusable information, such as network addresses, individual users and user
groups, and commonly used configuration data. In NSM, objects are shared objects, meaning
they are shared between the global domain and all subdomains. Objects are the building
blocks of the NSM management system.
Object Manager
A module of the NSM User Interface that contains the objects used in your NSM system. An
object is a re-usable, basic NSM building block that contains specific information; you use
objects to create device configurations, policies, and VPNs. All objects are shared, meaning
that they can be shared by all devices and policies in the domain.
OnsSite Administrator
The person who installs a configlet using Rapid Deployment.
Open Shortest Path
First (OSPF)
A dynamic routing protocol intended to operate within a single Autonomous System.
P
Packet Filtering
Packet filtering is a router/firewall process that uses access control lists (ACL) to restrict flow
of information based on protocol characteristics such as source/destination IP address,
protocol, or port used. Generally, packet-filtering routers do not track sessions except when
doing NAT (which tracks the session for NAT purposes).
PDP
Packet Data Protocol.
PDP Context
A user session on a GPRS network.
PDU
Protocol Data Unit.
Peer
See Neighbor.
Ping of Death
The ping of death is an intentionally oversized or irregular ICMP packet that can trigger a Denial
of Service condition, freezing, or other adverse system reactions. You can configure a security
device to detect and reject oversized or irregular packet sizes.
PLMN
Public Land Mobile Network. A public network dedicated to the operation of mobile radio
communications.
Point-to-Multipoint
Network
A non-broadcast network where OSPF treats connections between routers as point-to-point
links. There is no election of a designated router and no LSA generated for the network. A router
in a point-to-multipoint network sends Hello packets to all neighbors with which it can directly
communicate.
Point-to-Point
Network
Joins two routers over a Wide Area Network (WAN). An example of a point-to-point network
is two security devices connected via an IPSec VPN tunnel. On point-to-point networks, the
OSPF router dynamically detects neighbor routers by sending Hello packets to the multicast
address 224.0.0.5.
Copyright © 2010, Juniper Networks, Inc.
848
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...