Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 858

Table of Contents

Advertisement

Network and Security Manager Administration Guide
Adjacencies
Advanced Encryption
Standard (AES)
Advertisement
Aggregate State
Aggregation
Aggregator
Aggressive Aging
Antivirus (AV)
Scanning
APN
Application Layer
Gateway (ALG)
Area
808
When two routers can exchange routing information with one another, they are considered to
have constructed an adjacency. Point-to-point networks have only two routers so those routers
automatically form an adjacency. But point-to-multipoint networks are a series of several
point-to-point networks. When routers pair in this more complex networking scheme, they are
considered to be adjacent to one another.
AES is a 128-bit encryption key standard. Use AES in your VPNs when you need greater
interoperability with other network security devices.
A method a router uses to announce itself to other devices on the network, transmitting basic
information including IP address, network mask, and other data.
A router is in an aggregate state when it is one of multiple virtual BGP routing instances bundled
into one address.
The process of combining several different routes in such a way that only a single route
advertises itself. This technique minimizes the size of the routing table for the router.
An object used to bundle multiple routes under one common route generalized according to
the value of the network mask.
A mechanism to accelerate the timeout process when the number of sessions in the session
table surpasses a specified high-watermark threshold. When the number of sessions in the
table dips below a specified low-watermark threshold, the timeout process returns to normal.
A mechanism for detecting and blocking viruses in File Transfer Protocol (FTP), Internet
Message Access Protocol (IMAP), Simple Mail Transfer Protocol (SMTP), Hypertext Transfer
Protocol (HTTP)—including HTTP webmail—and Post Office Protocol version 3 (POP3) traffic.
Juniper Networks offers an internal AV scanning solution.
Access Point Name. An APN is an IE included in the header of a GTP packet that provides
information on how to reach a network. It is composed of two elements: a network ID and an
operator ID.
On a security device, an ALG is a software component that is designed to manage specific
protocols such as SIP or FTP. The ALG intercepts and analyzes the specified traffic, allocates
resources, and defines dynamic policies to permit the traffic to pass securely trough the security
device.
The most fundamental ordering method in the OSPF routing protocol. An OSPF area divides
the internetwork into smaller, more manageable constituent pieces. This technique reduces
the amount of information that each router must store and maintain about all the other routers.
When a router in the area needs information about another device in or out of the area, it
contacts a special router that stores this information. This router is called the Area Border
Router (ABR) and contains all essential device information. In addition, the ABR area border
router filters all information coming into the area to avoid bogging down other routers in the
area with information they may not need.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents