Symantec 10521146 - Network Security 7120 Administration Manual page 76

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

76 Populating the topology database
About the network topology
interfaces. This example might help you when taking inventory of your own
network topology:
Figure 4-1
Sample Network Topology Map
Segment A
Location 1
Segment B
Segment C
Location 2
Segment D
Gathering information
After you have taken an inventory of your existing network, you can provide
this information to the Symantec Network Security database by populating the
topology tree. To prepare for this, we recommend that you gather information
specific to each element of your topology.
This section describes the information and conventions common to most
devices and network elements that you might need to provide. Each individual
procedure includes device-specific information.
Device
Device
Device
Device
Device
Device
Device
Device
Interface
Interface
Interface
Interface
Interface
Interface
Interface
Interface
Interface
Interface
Interface
Interface
Interface
Interface
Interface
Interface
Interface
Interface
Interface
Interface
Interface
Interface
Interface
Interface

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents