Appendix A Glossary; Network And Security Manager (Nsm) Term Definitions - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

APPENDIX A
Glossary

Network and Security Manager (NSM) Term Definitions

A
Access List
Access-Challenge
Action (Deep
Inspection)
Action (firewall)
Activate Device Wizard
Add Device Wizard
Address Object
Address Shifting
Address Spoofing
Copyright © 2010, Juniper Networks, Inc.
Network and Security Manager (NSM) Term Definitions on page 807
A list of network prefixes that are compared to a given route. If the route matches a network
prefix defined in the access list, the route is either permitted or denied.
An additional condition required for a successful Telnet login by an authentication user via a
RADIUS server.
A DI action is performed by a security device when the permitted traffic matches the attack
object specified in the rule. Deep Inspection actions include drop connection, drop packet, close
client, and so on.
A firewall action is performed by a security device when the device receives traffic that matches
the direction, source, destination, and service. Firewall actions include permit, deny, reject.
The Activate Device wizard guides you through activating a modeled device in the NSM User
Interface.
The Add Device wizard guides you through importing or modeling a new device to the NSM
User Interface.
An address object represents a component of your network, such as a workstation, router,
switch, subnetwork, or any other object that is connected to your network. Use address book
objects to specify the network components you want to protect.
A mechanism for creating a one-to-one mapping between any original address in one range
of addresses and a specific translated address in a different range.
Address Spoofing is a technique for creating packets with a source IP address that is not the
actual interface address. Attackers may use spoofed IP address to perform DDoS attacks
while disguising their true address, or to take advantage of a trusted relationship between two
hosts. To guard against spoofing attacks, configure a security device to check its own route
table. If the IP address is not in the route table, the security device denies the traffic.
807

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents