Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 236

Table of Contents

Advertisement

230
G
LOSSARY
IP Multicast
IP network
IPS
ISP
IP TopN
IP tracking view
item
L2L
L2R
LAN
layers
LDAP
leaves
Lightweight Directory
Access Protocol
(LDAP)
Local Area Network
(LAN)
local network view
Local To Local (L2L)
IP Multicast reduces traffic on a network by delivering a single stream of
information to multiple users at one time.
A group of IP routers that route IP datagrams. These routers are sometimes
referred to as Internet gateways. Users access the IP network from a host. Each
network in the Internet includes some combination of hosts and IP routers.
See Intrusion Prevention System.
See Internet Service Provider.
Displays the top activity generators detected during the last polling period,
indicating the relative amount of activity that each is generating with a
thermometer-style bar. Up to five systems are shown.
Pre-defined custom view that allows you to track individual devices based on IP
addresses.
A Dashboard option that creates a customized portal that displays any permissible
view for monitoring purposes.
See Local To Local.
See Local To Remote.
See Local Area Network.
The property and measurement used in the Y-axis of the main STRM graph. The
current value being used to draw the graphs is displayed in red in the Layers box.
The values that can be used include bytes, packets, number of hosts, and others.
See Lightweight Directory Access Protocol.
Children or objects which are part of a parent group.
A set of protocols for accessing information directories. LDAP is based on the
standards contained within the X.500 standard, but is significantly simpler. And
unlike X.500, LDAP supports TCP/IP, which is necessary for any type of Internet
access to a directory server.
A non-public data network in which serial transmission is used for direct data
communication among data stations located on the user's premises.
View network activity by local network groups or sub-groups, defined by a single
combination of IP/CIDR network.
Internal traffic from one local network to another local network.
STRM Users Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents