Symantec 10521146 - Network Security 7120 Administration Manual page 351

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

MAC (Media Access
Control)
malicious code
malware
manipulation
menu bar
MIB (Management
Information Base)
middleware
MIME (Multipurpose
Internet Mail
Extensions)
mirror port
mode
monitoring
monitoring interface
MSA
multicast
multiuser
name server
On a network, a computer's unique hardware number. The MAC address is used by the
Media Access Control sublayer of the Data Link Control (DLC) layer of telecommunication
protocols. There is a different MAC sublayer for each physical device type. The data-link
layer is the protocol layer in a program that handles the moving of data in and out across a
physical link in a network.
Programs such as viruses, worms, logic bombs, and Trojan horses that are surreptitiously
inserted into programs to destroy data, run destructive or intrusive programs, or
otherwise compromise the security or integrity of the victim's computer data.
Programs and files that are created to do harm. Malware includes computer viruses,
worms, and Trojan horses.
The insertion of arbitrary streams of data without the user noticing.
The horizontal area at the top of a window containing all of the commands appropriate to
the selected console view tab.
A database of objects that can be monitored by a network management system. Both
SNMP and RMON use standardized MIB formats that allow any SNMP and RMON tools to
monitor any device defined by an MIB.
An application that connects two otherwise separate applications.
A protocol used for transmitting documents with different formats via the Internet.
See
interface,
monitoring.
A system state in which a single action or a series of actions are performed. A mode has an
On condition and an Off condition. For example,
Network Security 7100 Series appliance is On if a security administrator configures those
interfaces for in-line mode, and does the proper cabling of the ports. Using in-line mode,
the appliance is placed into the network path, and can block malicious traffic.
The viewing of activity in a security environment, generally in real-time. Monitoring
allows security administrators to view the content of applications that are being used.
See
interface,
monitoring.
See
Symantec Network Security Smart Agents
To simultaneously send the same message to a select group of recipients on a network, as
opposed to broadcasting to all recipients on a network. Sometimes used synonymously as
narrowcast.
Of, or pertaining to, the ability of multiple, concurrent users to log on and run applications
from a single server.
A computer running a program that converts domain names into appropriate IP addresses
and vice versa.
in-line
mode for interfaces in a Symantec
.
Glossary
351

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents