Symantec 10521146 - Network Security 7120 Administration Manual page 87

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

To add or edit a software node
1
On the Devices tab, do one of the following:
Right-click Symantec Network Security Nodes, and select Add Node >
Software Node > OK.
Right-click an existing node, and click Edit from the pop-up menu.
2
In Add Software Node or Edit Software Node, enter a descriptive name of
up to 40 characters for the device. This name appears in the topology tree.
See
"Name"
on page 77.
3
Enter an optional customer ID of up to 40 characters long.
See
"Customer IDs"
4
Enter the IP address for the node.
You can position Symantec Network Security in front of and/or behind a
NAT device. If behind, provide a local IP address and an administration IP
address. Use the administration IP address when adding the node to the
topology tree.
Note: If you change the IP address of a physical node, you must edit the
Advanced Network Options tab. Verify that the values in the Netmask and
Default Router fields are valid for the new IP address.
See
"Viewing advanced network options"
5
Enter a unique node number between 2 and 120, inclusive, not assigned to
any other node in the cluster.
Note: Use this same number when you install Symantec Network Security
on the designated computer.
See
"Node number"
6
Click Monitoring Group and select a group from the pull-down list.
7
In Failover Group Information, do one of the following:
If you do not want to provide failover, proceed to the next step.
If you want to provide failover, click Failover Group Member, and
provide a Failover Group Number between 1 and 99, inclusive.
All nodes within the failover group must use the same group number.
See
"Establishing high availability failover"
8
Do one of the following:
If adding a software node in a cluster, in Master Node Sync
Information, enter the synchronization password.
on page 77.
on page 77.
Populating the topology database
Adding nodes and objects
on page 88.
on page 287.
87

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents