Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 867

Table of Contents

Advertisement

I
ICMP Flood
IE
IKE Proposal Objects
Import Rules
IMSI
In-Device Policy
Management
Infranet Controller
Infranet Enforcer
Internet Control
Message Protocol
(ICMP)
Internet Key Exchange
Internet Protocol (IP)
Copyright © 2010, Juniper Networks, Inc.
An ICMP flood contains ICMP pings so numerous that they overload a system with echo
requests, causing the system to expend all its resources responding until it can no longer
process valid network traffic. If you set a threshold to invoke ICMP flood attack protection
when exceeded, ICMP flood attacks are recorded as statistics.
Information Element.
An IKE proposal is a set of encryption keys and authentication algorithms that is used to
negotiate a VPN connection. An IKE proposal object is a representation of an IKE proposal in
the NSM UI.
When you have two or more virtual routers on a security device, you can configure import rules
on one virtual router that define which routes are allowed to learned from another virtual router.
If you do not configure any import rules for a virtual router, all routes that are exported to that
virtual router are accepted. See also Export Rules.
International Mobile Station Identity.
Mode of policy management done through the Device Editor on a specific device and not
through the central NSM Policy Manager. If you select this method to manage policies on a J
Series or SRX Series device, the NSM Policy Manager, Object Manager, and VPN Manager are
all disabled for that device.
The policy management component of Juniper Networks UAC solution.
The policy enforcement point or firewall within a Juniper Networks UAC solution.
ICMP is a network-layer protocol that does not carry user data, but does encapsulate its
messages in IP datagrams. ICMP provides a query and response system (with error-reporting)
used to determine if another system on the network can receive and send data. An ICMP echo
request is also known as a ping.
IKE is a method for exchanging keys for encryption and authentication over an unsecured
medium, such as the Internet.
IP is an Internet standard protocol that defines a basic unit of data called a datagram. A
datagram is used in a connectionless, best-effort, delivery system. The Internet protocol defines
how information gets passed between systems across the Internet.
Appendix A: Glossary
817

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents