Viewing Auto-Generated Objects; Viewing Node Details; Viewing Node Status - Symantec 10521146 - Network Security 7120 Administration Manual

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

Viewing auto-generated objects

Viewing node details

Viewing node status

The installation process automatically creates a number of objects in the
topology tree. These objects can be renamed and configured, and in some cases,
you can add more of them to the topology tree. For example, the installation
process creates an object for one location in the topology tree, called Enterprise
by default. You can add more location objects to represent other locations.
Symantec Network Security also automatically creates objects for managed
network segments in the topology tree.
See the following for related information:
See
"About location objects"
See
"About managed network segments"
When you click an object in the topology tree, the Network Security console
displays the description, if applicable, and other pertinent details about the
software or appliance node, such as its IP address or subnet mask.
To view node details
Click the corresponding device object.
The Network Security console displays the details and optional description
in the right pane.
The Network Security console displays an object in the topology tree
representing devices and interfaces in the network. When a software or
appliance node experiences a process failure of any kind, the Network Security
console displays the node with a red X, called the Node Status Indicator. This
signifies that Network Security processes or connectivity to the network has
failed.
To view node status
See the Node Status Indicator for the software or appliance node.
A red X or Node Status Indicator signifies that Network Security
processes or network connectivity failed on a software or
appliance node.
on page 83.
on page 108.
Populating the topology database
Managing the topology tree
79

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents