Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 237

Table of Contents

Advertisement

Local To Remote
(L2R)
logic unit
Magistrate
magnitude
NAT
NetFlow
Network Address
Translation (NAT)
network hierarchy
network layer
network objects
Network Surveillance
Internal traffic from a local network to a remote network.
Sentry component that includes specific algorithms used to test objects.
Provides the core processing components of the SIM option. The Magistrate
provides views, reports, alerts, and analysis of network traffic and security events.
The Magistrate processes the event against the defined custom rules to create an
offense.
Specifies the relative importance of the offense. The magnitude bar provides a
visual representation of all the correlated variables of the offense, attacker, target,
or network. Variables include Relevance, Severity, and Credibility. The magnitude
of an offense is determined by several tests that performed on an offense every
time it has been scheduled for re-evaluation, usually because a events have been
added or the minimum time for scheduling has occurred.
NAT translates an IP address in one network to a different IP address in another
network.
A proprietary accounting technology developed by Cisco Systems
monitors traffic flows through a switch or router, interprets the client, server,
protocol, and port used, counts the number of bytes and packets, and sends that
data to a NetFlow collector. You can configure STRM to accept NDE's and thus
become a NetFlow collector.
See NAT.
Contains each component of your network, and identifies which objects belong
within other objects. The accuracy and completeness of this hierarchy is essential
to traffic analysis functions. The network hierarchy provides for storage of flow
logs, databases, and TopN files.
Layer 3 in the Open System Interconnection (OSI) architecture; the layer that
establishes a path between open systems.
Components of your network hierarchy. You can add layers to the hierarchy by
adding additional network objects and associating them to already defined objects.
(Objects that contain other objects are called groups.)
An emerging category of network security solutions that provides a comprehensive
view of all activity on the network. An NSI solution does not replace firewall, IDS, or
antivirus solutions, but integrates and correlates the data from these to provide an
unfiltered view of all activity on the network. An NSI solution significantly reduces
false positives and negatives associated with other security technologies, and
provides extensive correlation, and forensic capabilities for preventing internal and
external intrusions.
STRM Users Guide
G
231
LOSSARY
®
Inc. that

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents