Symantec 10521146 - Network Security 7120 Administration Manual page 299

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

Reapplying policy assignments after failure
In a cluster, the master node stores the definitions of protection policies that
you apply to slave nodes. If the master node fails or is demoted, the link is
broken between applied policies and their definitions. Slave nodes sometimes
then appear to have viable policies applied that in reality are disabled. Prevent
losing policies through failure by backing up the master node. Prevent losing
policies when demoting by reapplying policy definitions to the new master node.
See
"Setting policies to interfaces"
Copying Symantec Network Security configurations
The Network Security console provides a way to copy a configuration of
Symantec Network Security easily.
To copy a configuration
1
In the Network Security console, click Admin > Node > Manage Backups.
2
In Select Node, choose a node from the pull-down list, and click OK.
3
In Backups, click an existing backup configuration.
4
In Actions, click Secure Copy.
5
Provide the following information:
Filename: Enter the name of the backup file.
Host Name: Enter the name of the host to copy to.
Directory: Enter the directory.
User Name: Enter the user name.
6
Click OK to copy the configuration to the desired location and exit.
Note: SuperUsers and Administrators can copy a configuration; StandardUsers
and RestrictedUsers cannot. See
about permissions.
Deleting Symantec Network Security configurations
The Network Security console provides a way to delete an existing configuration
of Symantec Network Security easily.
To delete a configuration
1
In the Network Security console, click Admin > Node > Manage Backups.
2
In Select Node, choose a node from the pull-down list, and click OK.
on page 115.
"User groups reference"
Advanced configuration
Backing up and restoring
on page 319 for more
299

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents