Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 907

Table of Contents

Advertisement

VPN Manager
W
WebTrends
Windows Internet
Naming Service
(WINS)
WinNuke Attack
Worm
X
XAuth
Z
Zone
Copyright © 2010, Juniper Networks, Inc.
VPN Manager is a module of the NSM User Interface. Use VPN Manager to design a system
level VPN and automatically set up all connections, tunnels, and rules for all devices in the
VPN.
A product offered by NetIQ that allows you to create customized reports based on the logs
generated by a security device. When you use WebTrends, you can display the information
you need in a graphical format.
WINS is a service for mapping IP addresses to NetBIOS computer names on Windows NT
server-based networks. A WINS server maps a NetBIOS name used in a Windows network
environment to an IP address used on an IP-based network.
A WinNuke attack can crash any computer on the Internet running Windows by introducing a
NetBIOS anomaly that forces Windows to restart. You can configure the security device to
scan any incoming Microsoft NetBIOS Session Service packets, modify them, and record the
event as a WinNuke attack.
A worm is a self-replicating attack program. Worms differ from typical viruses in that they are
completely automatic—no attacker interaction is required. When the worm locates a vulnerable
target, it immediately and automatically infects the new host with its malicious code. The
newly infected host repeats the process and attempts to infect more hosts.
A protocol composed of two components—remote VPN user authentication (username plus
password) and TCP/IP address assignments (IP address, netmask, DNS server, and WINS
server assignments).
A zone can be a segment of network space to which security measures are applied (a security
zone), a logical segment to which a VPN tunnel interface is bound (a tunnel zone), or either a
physical or a logical entity that performs a specific function (a function zone).
Appendix A: Glossary
857

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents