Dell OpenManage Network Manager Client Manual page 377

Web client guide 5.1
Hide thumbs Also See for OpenManage Network Manager:
Table of Contents

Advertisement

In network security, a filter is a program or section of code that is designed to
F
ILTER
examine each input or output request for certain qualifying criteria and then process or for-
ward it accordingly.
Graphical User Interface
GUI —
The Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) is an IPv6 tran-
ISATAP —
sition mechanism which is defined as a tunneling IPv6 interface and is meant to transmit
IPv6 packets between dual-stack nodes on top of an IPv4 network.
In cryptography, a key is a variable value that is applied using an algorithm to a string
K
EY
or block of unencrypted text to produce encrypted text. The length of the key generally
determines how difficult it will be to decrypt the text in a given message.
The establishment and enforcement of message encryption and
K
M
EY
ANAGEMENT
authentication procedures, in order to provide privacy-enhanced mail (PEM) services for
electronic mail transfer over the Internet.
A network device managed by the system.
M
O
ANAGED
BJECT
Communication between this application and external systems or devices, for
M
EDIATION
example, printers. Mediation services let this application treat these devices as objects.
Any communication to and from equipment is handled by the Media-
M
A
EDIATION
GENT
tion Agent. This communication includes SNMP requests, ASCII requests, and unsolicited
ASCII messages. In addition, the Mediation Agent receives and translates emitted SNMP
traps and converts them into events.
Maintenance Entity Group
MEG —
Maintenance End Point
MEP —
Management Information Base. A database (repository) of equipment containing
MIB —
object characteristics and parameters that can be monitored by the network management
system.
Operation, Administration and Maintenance
OAM —
Object ID.
OID —
Open Shortest Path First routing protocol.
OSPF —
A rule made up of conditions and actions and associated with a profile. Policy
P
OLICY
objects contain business rules for performing configuration changes in the network for con-
trolling Quality of Service and Access to network resources. Policy can be extended to per-
form other configuration functions, including routing behavior, VLAN membership, and
VPN security.
P
E
P
OLICY
NFORCEMENT
OINTS
point represents a security appliance used to protect one or more endpoints. PEPs are also
points for monitoring the health and status of a network. PEPs are generally members of a
policy group.
In a policy enforced network, a policy enforcement
(PEP) —
| Glossary
377

Advertisement

Table of Contents
loading

This manual is also suitable for:

Openmanage network manager 5.1

Table of Contents