Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT REV 1 Manual page 126

Strm log management users guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT REV 1:
Table of Contents

Advertisement

120
G
LOSSARY
severity
Simple Network
Management
Protocol (SNMP)
SNMP
subnet
subnet mask
TACACS
TCP
TCP flags
TCP resets
Time Series
TopN Time Series
Transmission
Control Protocol
(TCP)
you to detect specific, specialized events and forward notifications to either the
Offense Manager or log file, e-mail a user, or resolve the event or offense, if the
Offense Resolution option is active.
Indicates the amount of threat an attacker poses in relation to how prepared the
target is for the attack. This value is mapped to an event category that is correlated
to the offense.
A network management protocol used to monitor IP routers, other network
devices, and the networks to which they attach.
See Simple Network Management Protocol.
A network subdivided into networks or subnets. When subnetting is used, the host
portion of the IP address is divided into a subnet number and a host number. Hosts
and routers identify the bits used for the network and subnet number through the
use of a subnet mask.
A bit mask that is logically ANDed with the destination IP address of an IP packet
to determine the network address. A router routes packets using the network
address.
Terminal Access Controller Access Control System (TACACS) is an authentication
protocol that allows remote server access to forward a user's logon password to an
authentication server to determine whether access can be allowed to a given
system. TACACS+ uses TCP.
See Transmission Control Protocol.
A type of marker that can be added to a packet to alert the system of abnormal
activity. Only a few specific combinations of flags are valid and typical, in normal
traffic. Abnormal combinations of flags often indicate an attack or an abnormal
network condition.
For TCP-based applications, STRM can issue a TCP reset to either the client or
server in a conversation. This stops the communications between the client and
the server.
A reporting chart that graphs data based on time. This chart focuses on the
networks or IP address data information from the selected networks.
A reporting graph option that focuses on the top N networks or IP address data
information, based on time, for the data you are graphing.
A reliable stream service that operates at the transport-layer Internet protocol,
which ensures successful end-to-end delivery of data packets without error.
STRM Log Management Users Guide

Advertisement

Table of Contents
loading

Table of Contents