Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 903

Table of Contents

Advertisement

Appendix A: Glossary
Signaling Message
Any GTP-PDU except the G-PDU. GTP signalling messages are exchanged between GSN pairs
in a path. The signaling messages are used to transfer GSN capability information between
GSN pairs and to create, update and delete GTP tunnels.
Source
SIBR allows the security device to forward traffic based on the source interface (the interface
Interface-Based
on which the data packet arrives on the security device).
Routing (SIBR)
Source Route
The source route is a option in the IP header. An attacker can use the source route option to
enter a network with a false IP address and have data sent back to the attacker's real address.
Stateful Inspection
A firewall process that checks the TCP header for information on the session's state. The
process checks whether it is initializing (SYN), ongoing (SYN/ACK), or terminating (FIN). A
stateful inspection firewall tracks each session flowing through it, dropping packets from
unknown sessions that appear to be part of an ongoing or illegal sessions. All security devices
are stateful inspectors.
Static Routing
User-defined routes that cause packets moving between a source and a destination to take
a specified path. Static routing algorithms are table mappings established by the network
administrator prior to the beginning of routing. These mappings do not change unless the
network administrator alters them. Algorithms that use static routes are simple to design and
work well in environments where network traffic is relatively predictable and where network
design is relatively simple.
Status Bar
The status bar is the lower section of the NSM UI. The status bar displays supplemental
information.
Subdomain
A subdomain is a domains under the global domain.
Subinterface
A subinterface is a logical division of a physical interface that borrows the bandwidth it needs
from the physical interface from which it stems. A subinterface is an abstraction that functions
identically to an interface for a physically present port and is distinguished by 802.1Q VLAN
tagging.
Subnet Mask
A subnet mask enables you to define subnetworks. For example, if you have a class B network,
a subnet mask of 255.255.255.0 specifies that the first two portions of the decimal dot format
are the network number, while the third portion is a subnet number. The fourth portion is the
host number. If you do not want to have a subnet on a class B network, you would use a subnet
mask of 255.255.0.0. A network can be subnetted into one or more physical networks which
form a subset of the main network. The Subnet Mask is the part of the IP address which is
used to represent a subnetwork within a network. Using Subnet Masks enables you to use
network address space which is normally unavailable and ensures that network traffic does
not get sent to the whole network unless intended. See also IP Address.
Super Admin(istrator)
The super administrator is the default administrator for all domains. The superadmin has
immutable powers. You cannot change or delete permissions for the super administrator; you
can, however, change the password for the super administrator.
Copyright © 2010, Juniper Networks, Inc.
853

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents