Symantec 10521146 - Network Security 7120 Administration Manual page 313

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

To configure node parameters
1
Click Configuration > Node > Network Security Parameters.
2
In Select Node, choose the node from the pull-down list, and click OK.
3
In the left pane, click Event Destination Hashes.
4
In the lower right pane, enter the value.
5
Click Apply.
6
In Apply Changes To, select the node or subset of nodes that you want to
apply the parameter to.
7
Click OK to save the changes to this sensor and close.
Caution: Take note of the following precautions:
Before making such changes, we recommend that you consult our
support team at
Make sure that the system has enough RAM to support this advanced
parameter.
Restart Symantec Network Security for changes to this parameter to
take effect.
Setting Event Queue Length
Event Queue Length prevents the system from becoming overloaded during a
denial-of-service attack. This parameter indicates the length of the event queue
by setting the maximum number of elements that can wait in line in a particular
hash bucket. This controls the rate that event data enters the system.
The default value is set to 10 for optimum performance, and you do not need to
change it under most circumstances. If a network experiences a high rate of DoS
or other flood attacks, an increased number of event queues can prevent event
expiration. Because there is little or no difference between individual events
related to a flood incident, no critical information is lost by expiring the events.
To configure node parameters
1
Click Configuration > Node > Network Security Parameters.
2
In Select Node, choose the node from the pull-down list, and click OK.
3
In the left pane, click Event Queue Length.
4
In the lower right pane, enter the value.
http://www.symantec.com/techsupp/enterprise
Advanced configuration
Configuring advanced parameters
313

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents