Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 862

Table of Contents

Advertisement

Network and Security Manager Administration Guide
Configuration Group
CRC Errors
D
Data Encryption
Standard
Data Encryption
Standard-Cipher Block
Chaining (DES-CBC)
Default Route
Delta
Demilitarized Zone
Denial of Service
(DoS) Attack
Device Administrator
Device Discovery Rules
Device Editor
Device Monitor
Device Server
812
A collection of configuration statements whose inheritance can be directed in the rest of the
device configuration. The same group can be applied to different sections of the configuration,
and different sections of one group's configuration statements can be inherited in different
places in the configuration.
CRC errors indicate the number of packets generating a cyclic redundancy code error processed
through the security device over the selected interface.
DES is a 40- and 56-bit encryption algorithm developed by the National Institute of Standards
and Technology (NIST). DES is a block encryption method originally developed by IBM. It has
since been certified by the U.S. government for transmission of any data that is not classified
top secret. DES uses an algorithm for private-key encryption.
DES-CBC is used to encrypt single DES keys.
A "catch all" routing table entry that defines the forwarding of traffic for destination networks
that are not explicitly defined in the routing table. The destination network for the default route
is represented by the network address 0.0.0.0/0.
A delta is a difference, or discrepancy. Example: the differences between the configuration
running on the physical device and the difference between the configuration in NSM are known
as deltas.
A DMZ is an area between two networks that are controlled by different companies. A DMZ
ethernet can be external or internal; external DMZ ethernets link regional networks with routers.
A DoS attack is designed to disrupt a network service. Typically, an attacker sends a flood of
information to overwhelm a service's system resources, causing the server to ignore valid
network requests. Other DoS attacks can cause the service process to crash.
A device administrator is the person who uses WebUI or CLI to manage a single security device.
Sets of rules that define subnets or ranges of IP addresses to scan for EX Series devices in your
network.
A set of NSM screens used for displaying and editing the configuration of a device.
The Device Monitor displays information about individual devices, their configuration and
connection status, and memory usage.
The Device Server is the component of the NSM management system that handles
communication between the GUI Server and the device, collects data from the managed
devices on your network, formats configuration information sent to your managed device, and
consolidates log and event data.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents