Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 859

Table of Contents

Advertisement

Area Border Router
Area Range
AS
AS Number
AS Path Access List
AS Path Attribute
Class
AS Path String
Atomic Aggregate
Atomic Configuration
Attack Objects
Attack Protection
Audit Log Target
Audit Log Viewer
Authentication
Copyright © 2010, Juniper Networks, Inc.
A router with at least one interface in Area 0 and at least one interface in another area.
A sequence of IP addresses defined by a lower limit and upper limit that indicates a series of
addresses of devices that exist within an area.
See Autonomous System.
The identification number of the local autonomous system mapped to a BGP routing instance.
The ID number can be any valid integer.
An access list used by a BGP routing instance to permit or deny packets sent by neighbor
routing instances to the current virtual routing instance.
The BGP provides four classes of path attributes. Well-Known Discretionary, Optional Transitive,
and Optional Non-Transitive.
A string that acts as an identifier for an AS path. It is configured alongside an AS Path access
list ID.
An object used by a BGP router to inform other BGP routers that the local system selected a
generalized route.
Atomic configuration is a fail-safe feature in ScreenOS 5.x. For devices running ScreenOS 5.x,
if the configuration deployment fails for any reason, the device automatically uses the last
installed stable configuration. Additionally, if the configuration deployment succeeds, but the
device loses connectivity to the management system, the device rolls back to the last installed
configuration. This minimizes downtime and ensures that NSM always maintains a stable
connection to the managed device.
An attack object contains attack patterns for known attacks that attackers can use to
compromise your network. Use attack objects in your firewall rules to enable your security
devices to detect known attacks and prevent malicious traffic from entering your network.
Attack Protection is defined by the DI Profile used in a firewall rule.
An Audit Log Target is a directive that was sent to a security device.
The Audit Log Viewer is a module of the NSM User Interface. The Audit Log Viewer records
administrative actions. Each audit log includes the date and time the administrative action
occurred, the NSM administrator who performed the action, and the domain (global or a
subdomain) in which the action occurred.
Authentication ensures that digital data transmissions are delivered to the intended receiver.
Authentication also assures the receiver of the integrity of the message and its source (where
or whom it came from). The simplest form of authentication requires a username and password
to gain access to a particular account. Authentication protocols can also be based on secret-key
encryption, such as DES, or on public-key systems using digital signatures.
Appendix A: Glossary
809

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents