About Nodes And Interfaces - Symantec 10521146 - Network Security 7120 Administration Manual

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

About nodes and interfaces

4
Click Color, and select a color to associate with this location. At a glance, you
can see which incidents and events were detected in this location. You can
select any color except white. Click OK or Reset.
5
In Description, enter an optional description of up to 255 characters, and
click OK.
See
"Description"
Caution: Click Topology > Save Changes before quitting the Network
Security console. You will lose any unsaved changes when you exit.
Under any location object, SuperUsers can add the following nodes and objects:
See "About router objects"
See "About nodes and interfaces"
See "About Smart Agents"
See
"Deleting objects"
Under Enterprise, the location object created automatically during the
installation process, SuperUsers can add objects to represent each software
node and 7100 Series appliance node, as follows:
Network Security software nodes: The objects that represent Symantec
Network Security software installed on designated computers.
See
"Adding or editing software nodes"
7100 Series appliance nodes: The objects that represent Symantec Network
Security software installed on the new Symantec Network Security 7100
Series appliance.
See "Adding or editing 7100 Series nodes"
Node interfaces: Interface objects represent the point of contact between
Symantec Network Security and the devices in the network. Some interface
objects are mandatory, others are optional.
See
"About monitoring interfaces on software nodes"
See
"About 7100 Series interfaces"
See
"About router interfaces"
See
"About Smart Agent interfaces"
on page 77.
on page 101.
on page 85.
on page 104.
on page 81.
on page 95.
on page 103.
on page 106.
Populating the topology database
Adding nodes and objects
on page 86.
on page 92.
on page 89.
85

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents