About Topology Mapping - Symantec 10521146 - Network Security 7120 Administration Manual

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

74 Populating the topology database
About the network topology

About topology mapping

Viewing object details
When you select an object in the Devices tab, the right pane displays
information about that object. Depending on the selected object, the following
information can appear in the right pane:
Device Type: Displays the type of device selected.
IP address: Displays the IP address of the selected device, or the
management IP address for a device with multiple IP addresses.
Node Number: Displays the node number assigned to the software or
appliance node, between 1 and 120.
Customer ID: Displays an optional user-defined ID. Customer IDs for in-line
pairs and interface groups reflect the 7100 Series appliance nodes to which
they belong.
Model: Displays the model number of a 7100 Series appliance, either 7120,
7160, or 7161.
Monitoring Group: Identifies the monitoring group of the selected device, if
any.
Monitored Networks: Identifies the networks for which port usage patterns
are tracked and anomalies detected. Displayed only if you entered network
IP addresses on the Network tab when editing interfaces, adding in-line
pairs, or adding interface groups. Available only on 7100 Series interfaces.
TCP Reset Interface: Displays the interface that sends TCP resets; either
eth0, eth1, or eth2, corresponding to your choice of RST0, RST1, or RST2
when you added the interface group.
Bandwidth: Displays the expected throughput for the selected object.
Sensor Status: Displays the current status of the related sensor.
Description: Displays a brief optional description of the object.
Active Security Incidents: Displays the active incidents of the selected
topology object, with name, state, node number, and last date modified.
To configure Symantec Network Security, first populate the topology database.
This includes the following basic steps:
Mapping the existing network
Gathering information
Adding objects for the first time

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents