Symantec 10521146 - Network Security 7120 Administration Manual page 352

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

352 Glossary
near real-time
network
network tap
network worm
NIC
NIDS (network-based
intrusion detection
system)
NNTP (Network News
Transfer Protocol)
node, active
node, master
node, network
node, Network Security The main component of Symantec Network Security that includes comprehensive
node, standby
node, slave
The timely action in response to an event, incident, or alert.
A group of computers and associated devices that are connected by communications
facilities (both hardware and software) to share information and peripheral devices such
as printers and modems.
See
interface,
monitoring.
A program or command file that uses a computer network as a means for adversely
affecting a system's integrity, reliability, or availability. A network worm can attack from
one system to another by establishing a network connection. It is usually a self-contained
program that does not need to attach itself to a host file to infiltrate network after
network.
See
Ethernet interface
and
A type of intrusion detection system that works at the network level by monitoring
packets on the network and gauging whether a hacker is attempting to sending a large
number of connection requests to a computer on the network, indicating an attempt
either to break into a system or cause a denial of service attack. Unlike other intrusion
detection systems, a NIDS is able to monitor numerous computers at once.
The predominant protocol used by computers (servers and clients) for managing the notes
posted on newsgroups. NNTP replaced the original Usenet protocol, UNIX-to-UNIX.
The primary node in a watchdog process or failover group, from which all activity
predominates. See also
node,
A primary Symantec Network Security installation that ranks above all other Network
Security nodes in a group or cluster. By default, the first Network Security installation is
designated as a master node, and all other Network Security nodes within the cluster are
designated as slave nodes. Changes to a master node are propagated to the slave nodes in a
cluster.
See object.
detection, analysis, and response functionality. Network Security nodes can be
administered via the Network Security console, and can be deployed singly or grouped for
cross-node correlation.
The standby node or nodes in a watchdog process or failover group serve as a backup if
your active master node fails or is shut down for servicing.
A Symantec Network Security installation that ranks below a master Network Security
node in a group or cluster. By default, the first Symantec Network Security installation is
designated as a master node, and all other Network Security nodes within the cluster are
designated as slave nodes. The slave nodes receive updates to their topology, response
policy, and configuration databases from a master Network Security software node in the
cluster.
gigabit Ethernet
interface.
standby.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents