Signaling Message
Any GTP-PDU except the G-PDU. GTP signalling messages are exchanged between GSN pairs
in a path. The signaling messages are used to transfer GSN capability information between
GSN pairs and to create, update and delete GTP tunnels.
Source
Interface-Based
Routing (SIBR)
SIBR allows the security device to forward traffic based on the source interface (the interface
on which the data packet arrives on the security device).
Source Route
The source route is a option in the IP header. An attacker can use the source route option to
enter a network with a false IP address and have data sent back to the attacker’s real address.
Stateful Inspection
A firewall process that checks the TCP header for information on the session’s state. The
process checks whether it is initializing (SYN), ongoing (SYN/ACK), or terminating (FIN). A
stateful inspection firewall tracks each session flowing through it, dropping packets from
unknown sessions that appear to be part of an ongoing or illegal sessions. All security devices
are stateful inspectors.
Static Routing
User-defined routes that cause packets moving between a source and a destination to take
a specified path. Static routing algorithms are table mappings established by the network
administrator prior to the beginning of routing. These mappings do not change unless the
network administrator alters them. Algorithms that use static routes are simple to design and
work well in environments where network traffic is relatively predictable and where network
design is relatively simple.
Status Bar
The status bar is the lower section of the NSM UI. The status bar displays supplemental
information.
Subdomain
A subdomain is a domains under the global domain.
Subinterface
A subinterface is a logical division of a physical interface that borrows the bandwidth it needs
from the physical interface from which it stems. A subinterface is an abstraction that functions
identically to an interface for a physically present port and is distinguished by 802.1Q VLAN
tagging.
Subnet Mask
A subnet mask enables you to define subnetworks. For example, if you have a class B network,
a subnet mask of 255.255.255.0 specifies that the first two portions of the decimal dot format
are the network number, while the third portion is a subnet number. The fourth portion is the
host number. If you do not want to have a subnet on a class B network, you would use a subnet
mask of 255.255.0.0. A network can be subnetted into one or more physical networks which
form a subset of the main network. The Subnet Mask is the part of the IP address which is
used to represent a subnetwork within a network. Using Subnet Masks enables you to use
network address space which is normally unavailable and ensures that network traffic does
not get sent to the whole network unless intended. See also IP Address.
Super Admin(istrator)
The super administrator is the default administrator for all domains. The superadmin has
immutable powers. You cannot change or delete permissions for the super administrator; you
can, however, change the password for the super administrator.
853
Copyright © 2010, Juniper Networks, Inc.
Appendix A: Glossary
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...