Planning The Deployment - Symantec 10521146 - Network Security 7120 Administration Manual

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

60 Getting started

Planning the deployment

Planning the deployment
To set the Lock LCD Screen parameter
1
Click Configuration > Node > Network Security Parameters.
2
In Select Node, choose the node from the pull-down list, and click OK.
3
In the left pane, under 7100 Series Parameters, click Lock LCD Screen.
4
In the right pane, do one of the following:
Click True to lock the LCD panel.
Click False to unlock the LCD panel.
5
Click Apply.
6
In Apply Changes To, select the node or subset of nodes to which you want
to apply the parameter.
7
Click OK to save the changes to this sensor and close.
Tracking user actions
Symantec Network Security logs all user actions on the Network Security
console that modify the configuration. When you set the operational log to
verbose mode, Symantec Network Security extends logging to include user
actions that do not affect the configuration. The log includes data specific to the
action, such as the date and time of the action, the username, query information,
whether the query is allowed or denied, and the type of action that was taken.
See
"Setting automatic logging levels"
See
"Archiving log files"
See
"About operational event notices"
Both software and appliance nodes can be deployed singly or clustered:
Single-node deployment: A peer relationship between one or more
individual single nodes, viewed from one or more independent Network
Security consoles.
Cluster deployment: A hierarchical relationship between one master node
and up to 120 slave nodes that synchronize to the master node.
Both software and appliance nodes can be deployed using passive mode; only
7100 Series appliances can be deployed using in-line mode:
In-line deployment: Only the Symantec Network Security 7100 Series
appliance can be deployed in-line at this time. In-line mode enables multiple
on page 248.
on page 249.
on page 199.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents