Note: SuperUsers can view, add, edit, and delete all objects in the topology tree.
Administrators can view, add, edit, and delete most objects in the topology tree
except for software nodes and 7100 Series appliance nodes. StandardUsers and
RestrictedUsers can view the topology tree. See
page 319 for more about permissions.
Mapping the existing network
Before building the network topology database, we recommend that you create a
map of your network topology. Include the devices and device interfaces that
you want Symantec Network Security to monitor, or through which you want it
to track attacks.
The map becomes the model for your network topology:
Locations: Decide whether to divide the network into logical or physical
■
groupings, depending on the network setup. A physical grouping might
include all segments within a single building. A logical grouping might
include all segments used by one department spread throughout multiple
buildings.
Managed Network Segments: Within each location, identify the existing
■
network segments.
Devices: Within each location or managed network segment, identify the
■
routers that will send data to Symantec Network Security.
Interfaces: For each router, decide which interfaces you want Symantec
■
Network Security to monitor, and those interfaces that you merely want
Symantec Network Security to be aware of to track an attack through them.
The following diagram shows an example of a simple topology map including
locations, segments, devices, device interfaces and attachments between
Populating the topology database
About the network topology
"User groups reference"
75
on