Extreme Networks NG300 User Manual page 98

Software version 2.5
Hide thumbs Also See for NG300:
Table of Contents

Advertisement

Glossary
S (Continued)
snaring
SNMP
source
SPAN port
spoof count
spoof origin
spoof packet
spoof packets
spoofed as
sub-domain
suspect
SysLog
T
target
too many externals
100
A Sentriant NG uses a special technique to engage and hold TCP-
based attacks, thus preventing them from spreading. Snaring ties up
an attack thread so it cannot move to another computer, slowing or
even stopping the attack. This feature is enabled when deception is
turned on and if snaring is part of a configured personality.
Simple Network Management Protocol - Industry standard network
management protocol that is used to send alerts.
An IP Address that has originated traffic in a monitored network
segment and attempts to communicate with a target.
Switched Port Analyzer - Mirrors network traffic from a switched
segment onto a specified port for traffic monitoring purposes.
The number of spoof IP Addresses sent from a computer or device.
For example, a source IP Address of 1.1.1.2 has spoofed IP Addresses
of 2.2.2.1, 2.2.2.2, 2.2.2.3 and 2.2.2.4 totalling four (4).
The computer or location where a spoofed as IP Address or spoof
packet originated. In IP spoofing, an attacker gains unauthorized
access to a computer or a network by making it appear that a
malicious message has come from a known computer by "spoofing"
the IP Address of that machine.
A packet whose source IP has been changed but its MAC address
remains constant.
Packets that are sent out from the local network but have a false
source address. This could signal the presence of a virus, worm or a
rogue gateway.
The address that was given as the false source of a spoof packet.
A domain with a domain.
A suspect is a configurable priority level within the Sentriant NG. Any
configured rule can escalate a threat to a suspect level.
A method of collecting message logs from many systems. Each system
sends short text messages to a syslog recorder. The recording system
may record these in any desired manner including writing them to a
file, sending them on to other systems, and printing them out. The
Sentriant NG Manager uses SysLog for alerting users of activities on
Sentriant NGs.
The host or workstation that a source host attempts to communicate
with.
A local system on the network is contacting a large number of external
hosts. This could signal the presence of a virus or worm.
Sentriant NG Operation Console User Guide, Software Version 2.5

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sentriant ng operation console

Table of Contents