Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual page 317

Implementation guide
Table of Contents

Advertisement

Troubleshooting communication problems between the management server and the client
Checking the connection between the management server and the
Table 24-1
client
What to check
Look on the client to see if
the client connects to the
management server
Test the connectivity
between the client and the
management server
Check for any network
problems
Check the debug logs on the
client
Troubleshooting installation and communication problems
Solution
You can download and view the troubleshooting file on the
client to verify the communication settings.
See
How to determine whether the client is connected and
protected"
on page 318.
See
Viewing the client connection status on the client"
on page 318.
See
Investigating protection problems using the
troubleshooting file on the client"
You can perform several tasks to check the connectivity
between the client and the management server.
Ping the management server from the client computer.
See
Using the ping command to test the connectivity
to the management server"
Use a Web browser on the client computer to connect to
the management server.
You should verify that there are no network problems by
checking the following items:
Test the connectivity between the client and the
management server first. If the client computer cannot
ping or Telnet to the management server, verify network
connections and services for the client.
Check the client's routing path.
Check that the management server does not have a
network problem.
Check that the Symantec Endpoint Protection firewall
(or any third-party firewall) does not cause any network
problems.
You can use the debug log on the client to determine if the
client has communication problems.
See
Checking the debug log on the client computer"
on page 320.
See
Checking the inbox logs on the management server"
on page 321.
on page 319.
on page 320.
317

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents