Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 231

Table of Contents

Advertisement

A
Autonomous System
Number
active sub-filters
Address Resolution
Protocol (ARP)
alert
anomaly
anomaly sentry
application signature
application view
ARP
ARP Redirect
ASN
G
LOSSARY
Collection of IP networks that all adhere to the same specific and clearly defined
routing policy. An AS number (ASN) is a unique ID number assigned to each
Autonomous System.
Displays any filtering that has been applied to grouped data found in the Search
Flows results table. This box appears between the Change To box and Format box
when using the View Flows function.
A protocol for mapping an Internet Protocol (IP) address to a physical machine
address recognized in the local network. For example, in IP Version 4, an address
is 32 bits long. In an Ethernet LAN, however, addresses for attached devices are
48 bits long.
A message sent or event generated in response to a monitored condition. For
example, an alert informs you if a policy has been breached or the network is
under attack.
A deviation from expected behavior of the network.
Monitors your deployment for any abnormal activity. The algorithm detects the
existence of new or unknown traffic, which is traffic that suddenly ceases or a
percentage change in the amount of time an object is active.
A unique set of characteristics or properties, derived by the examination of packet
payload, used to identify a specific application.
A Global View that allows you to view client and server network activity by
application.
See Address Resolution Protocol.
ARP allows a host to determine the address of other devices on the LAN or VLAN.
A host can use ARP to identify the default gateway (router) or path off to the VLAN.
ARP Redirect allows STRM to notify a host if a problem exists with sending traffic
to a system. This renders the host and network unusable until the user intervenes.
See Autonomous System Number.
STRM Users Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents