Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT REV 1 Manual page 123

Strm log management users guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT REV 1:
Table of Contents

Advertisement

Event Processor
Fully Qualified
Domain Name
(FQDN)
Fully Qualified
Network Name
(FQNN)
FQDN
FQNN
gateway
Host Context
ICMP
IDS
Internet Control
Message Protocol
(ICMP)
Internet Protocol (IP)
Internet Service
Provider (ISP)
interval
Intrusion Detection
System (IDS)
Intrusion Prevention
System (IPS)
Processes flows collected from one or more Event Collector(s). The events are
bundled once again to conserve network usage. Once received, the Event
Processor correlates the information from STRM and distributed to the appropriate
area, depending on the type of event.
The portion of an Internet Uniform Resource Locator (URL) that fully identifies the
server program that an Internet request is addressed to.
Full path name of a certain point in the network hierarchy. For example, Company
A's hierarchy has a department object that contains a marketing object. Therefore,
the FQNN is CompanyA.Department.Marketing.
See Fully Qualified Domain Name.
See Fully Qualified Network Name.
A device that communicates with two protocols and translates services between
them.
Monitors all STRM components to ensure that each component is operating as
expected.
See Internet Control Message Protocol.
See Intrusion Detection System.
An Internet network-layer protocol between a host and gateway.
The method or protocol by which data is sent from one computer to another on the
Internet. Each computer (known as a host) on the Internet has at least one IP
address that uniquely identifies it from all other systems on the Internet. An IP
address includes a network address and a host address. An IP address can also
be divided by using classless addressing or subnetting.
An Internet Service Provider (ISP) provides users access to the Internet and other
related services.
The default time period in the system. Affects the update intervals of the graphs
and how much time each flow log file contains.
An application or device that identifies suspicious activity on the network.
Application that reacts to network intrusions. Offense Resolution is an IPS.
STRM Log Management Users Guide
G
117
LOSSARY

Advertisement

Table of Contents
loading

Table of Contents