Users Guide

1056 OMNM 6.5.3 User Guide
Glossary
OAM Operation, Administration and Maintenance
OCC See Creation Center, (OCC).
OEC See Execution Center (OEC).
OID Object ID.
OID Object ID.
OMC See Management Center, Oware (OMC).
Onboarding A process used to implement network services.
OpenStack An open-source cloud operating system that controls large pools of compute, storage, and
networking resources. The OpenStack system is often deployed as an infrastructure-as-a-
service (IaaS).
Orchestration The automated arrangement, coordination, and management of computer systems,
middleware, and services.
OSPF Open Shortest Path First routing protocol.
Oware Oware is an Internet infrastructure software product that delivers advanced user, content
and network aware Internet Commerce Systems. Oware allows users to quickly render
Internet Commerce Systems that have inherent knowledge of user profiles, content, and
network resources, enabling a class-of-service based Internet.
Package The container for Oware elements.
Parameter Event An event with rule parameters.
Persistent Data Data stored in the database for future use. (As opposed to transient data).
Pessimistic
Locking
A pessimistic locking scheme denies all access (create, read, write, update) to database
items already being read by other users.
Policy A rule made up of conditions and actions and associated with a profile. Policy objects
contain business rules for performing configuration changes in the network for controlling
Quality of Service and Access to network resources. Policy can be extended to perform
other configuration functions, including routing behavior, VLAN membership, and VPN
security.
Policy
Enforcement
Points (PEP)
In a policy enforced network, a policy enforcement point represents a security appliance
used to protect one or more endpoints. PEPs are also points for monitoring the health and
status of a network. PEPs are generally members of a policy group.
Policy routing Routing scheme that forwards packets to specific interfaces based on user-configured
policies. Such policies might specify that traffic sent from a particular network should be
routed through interface, while all other traffic should be routed through another
interface.
Policy Rules In a policy enforced network (PEN), policy rules determine how the members and
endpoint groups of a policy group communicate.
PPTP (Point-to-
Point Tunneling
Protocol)
Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables the secure
transfer of data from a remote client to a private enterprise server by creating a virtual
private network (VPN) across TCP/IP-based data networks. PPTP supports on-demand,
multi-protocol, virtual private networking over public networks, such as the Internet.