Symantec 10521146 - Network Security 7120 Administration Manual page 372

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

372 Index
clustering with software nodes 65
deleting nodes 277
deployment checklist 43
documentation 20
enabling blocking rules 123
fail-open 39
management via consoles 39
monitoring interfaces 96
node status indicator 79
parameters 309
powering off 54
queries from TrackBack 94
shutting down from the serial console 51
single-node deployment 62
applying
flow data collection 219
incident view during failover 292
LiveUpdates 271
parameters to nodes 309, 310
parameters to sensors 309
policies after failure 299
policies to interfaces 115
response rules to Decoy Server events 285
sensor parameters to objects 161
signature variables 185
applying user-defined signatures 181
architecture
about the core 25
about the management and detection 32
about the node 34
FlowChaser 37
archive
clearing automatically 250
archiving
configuring automatic 248
log files 249
logs 246
assigning
monitoring groups 67
attack responses. See responses
attacks
categories 136
flood-based 142
fragmentation 230
syn floods 149
target IP address 202, 204
traffic 249
Auto Update tab
about 113
automated
response architecture 131
availability
for single nodes 288
monitoring node 287
B
backing up
cluster-wide data 282
configurations 298
LiveUpdate configurations 274
on the Network Security console 298
protection policies 128
refreshing the configuration list 300
response rules database 135
Symantec Network Security 297
using compact flash 302
via compact flash 40
watchdog process 289
Bad Service Saturation Alert Threshold
setting sensor parameters 166
basic parameters
configuring 310
basic setup
advanced tuning 309
blocking
about 38
automatically 124, 126
disabling 123
enabling 123
in LiveUpdate 124, 126
overriding globally 115
bypass unit. See in-line
C
cancelling
changes to topology tree 82
LiveUpdate schedules 274
policy applications 117
reverting signature variables 186
checklist
appliance-specific deployment 43
general deployment 42
cleartext
preventing passwords in 149
cloning
protection policies 121

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents