About Deployment - Symantec 10268947 - Network Security 7160 User Manual

User guide
Table of Contents

Advertisement

40 Getting Started

About deployment

About deployment
To change login account passphrases
1
In the Network Security console, click Admin > Change Current
Passphrase.
2
In Change Passphrase for <user>, enter the existing passphrase.
3
Enter a new passphrase from 6 to 16 characters, inclusive, and confirm it.
4
Click OK to save and close.
Note: If a non-SuperUser uses an incorrect passphrase, an Incorrect
Username or Passphrase message appears. If this happens multiple times
(as specified by the Maximum Login Failures parameter), the user can be
locked out. Even if the correct passphrase is used at that point, access is
denied. Contact the SuperUser to create a new passphrase.
Note: Both StandardUsers and RestrictedUsers can modify their own
passphrases, but cannot add, edit, or delete those of other users.
Both software and appliance nodes can be deployed singly or clustered:
Single-node deployment: A peer relationship between one or more
individual single nodes, viewed from one or more independent Network
Security consoles.
Cluster deployment: A hierarchical relationship between one master node
and up to 120 slave nodes that synchronize to the master node.
Both software and appliance nodes can be deployed using passive mode; only
7100 Series appliances can be deployed using in-line mode:
In-line deployment: Only the Symantec Network Security 7100 Series
appliance can be deployed in-line at this time. In-line mode enables multiple
features such as the ability to block specified traffic from entering the
network.
Passive deployment: Both software and appliance nodes can be deployed in
passive mode, and positioned near the network, where they do not impede
network performance as a point of failure. No service is ever lost, even if the
node fails. The possibility of failure can be mitigated by failover groups that
maintain the availability of all nodes.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents