Owner's Manual
Glossary
187
ProSafe Network Management Software NMS200
ICMP NMS200 uses the Internet Control Message Protocol (ICMP) to poll for status using
ping and echo requests of managed devices. When it polls a managed device using
ICMP, if the device is operationally up, ICMP returns a response time and record of
any dropped packets. NMS200 uses this information to monitor device status and
measure average response time and packet loss percentage for managed devices.
NMS200 only uses ICMP to poll devices for status, average response time, and
p
acket loss percentage. Other information displayed comes from SNMP requests.
ISATAP The Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) is an IPv6 transition
mechanism which is defined as a tunneling IPv6 interface and is meant to transmit
IPv6 packets between dual-stack nodes on top of an IPv4 network.
Key In cryptography, a key is a variable value that is applied using an algorithm to a string
or block of une
ncrypted text to produce encrypted text. The length of the key generally
determines how difficult it will be to decrypt the text in a given message.
Key Management The establishment and enforcement of message encryption and authentication
procedures, in order to provide privacy-enhanced mail (PEM) services for electronic
mail transfer over the Internet.
Managed Object A network device managed by the system.
Mediation Communication between this application and external system
s or devices, for
example, printers. Mediation services let this application treat these devices as
objects.
Mediation Agent Any communication to and from equipment is handled by the Mediation Agent. This
communication includes SNMP requests, ASCII requests, and unsolicited ASCII
messages. In addition, the Mediation Agent receives and translates emitted SNMP
traps and converts them into events.
MEG Maintenance Entity Group
MEP Maintenance End Point
MIB Management Information Base. A virtual dat
abase (repository) of equipment
containing object characteristics and parameters that can be monitored by the network
management system.
MIBs describe objects managed using SNMP. MIB-I refers to the in
itial MIB definition,
and MIB-II refers to the current definition. Each MIB object stores values like
sysUpTime, bandwidth utilization, or sysContact. Most network devices can support
several different types of MIBs. While most devices support the standard MIB-II MIBs,
they may also support any of a number of additional MIBs that you may want to
monitor.
OAM Operation, Administration and Maintenance
OID Object ID.
OSPF Open Shortest Path First routing protocol.
Policy A rule made up of conditions and actions and
associated with a profile. Policy objects
contain business rules for performing configuration changes in the network for
controlling Quality of Service and Access to network resources. Policy can be
extended to perform other configuration functions, including routing behavior, VLAN
membership, and VPN security.