General Checklist; General Software And Appliance Checklist - Symantec 10521146 - Network Security 7120 Administration Manual

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

42 Getting started

General checklist

General checklist

General software and appliance checklist

This section provides a broad outline of the basic steps to set up a core Symantec
Network Security intrusion detection system for the first time. It also describes
additional deployment options that are unique to the 7100 Series appliance.
This section describes the following topics:
General software and appliance checklist
Additional appliance-specific checklist
To set up a new Symantec Network Security intrusion detection system for the
first time, consider the following:
Preparing to set up Symantec Network Security
Deployment Plan: Decide how to deploy a Symantec Network Security
intrusion detection system. Some things to consider might include:
What kinds of traffic flow do you expect on your network?
Which devices or elements of your network will you monitor?
Will you deploy Symantec Network Security as single peer software or
appliance nodes, or as a cluster of interacting nodes?
Will you establish failover redundancy with standby nodes?
Licensing: Obtain a Symantec license for each software and appliance node.
Installation: Install Symantec Network Security.
User accounts: One SuperUser default account is created at installation. You
can add more accounts at any time after installation.
Setting up Symantec Network Security
After installation, use the following tools to get your Symantec Network
Security intrusion detection system started:
Create network topology database: Provide detailed information about your
Symantec Network Security intrusion detection system by populating the
topology tree on the Devices tab.
Establish protection policy: Establish blocking and/or alerting triggers so
that Symantec Network Security automatically responds to intrusions at the
point of entry.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents