Symantec 10521146 - Network Security 7120 Administration Manual page 88

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

88 Populating the topology database
Adding nodes and objects
Use the same passphrase when you install Symantec Network Security
on the designated computer.
See
"Synchronization passphrases"
If editing a software node, proceed to the next step.
9
In Description, enter an optional description of up to 255 characters, and
click OK.
See
"Description"
Note: After adding a software node to the topology tree, you must install
Symantec Network Security on the designated computer. The installation
process populates the fields in the Advanced Network Options tab.
See
"Viewing advanced network options"
Caution: Click Topology > Save Changes before quitting the Network
Security console. You will lose any unsaved changes when you exit.
For the sensor to run, you must add interfaces and a protection policy to each
interface. To enable TrackBack to query flow data from this node, you must
apply the sensor parameter for flow statistics, and execute the TrackBack
response policy.
See
"About monitoring interfaces on software nodes"
See
"Defining new protection policies"
See
"Enable Flow Statistics Collection"
See
"Setting TrackBack response action"
See
"Deleting objects"
Viewing advanced network options
The Advanced Network Options tab contains information about the designated
computer that this node represents in the topology tree. The installation
process automatically provides this information. The Advanced Network
Options tab now provides a way to edit the node from the Network Security
console after installation. You can add a NAT device, for example, and assign a
private IP address after installation.
When you edit the node, the Network Security console determines whether the
IP address of the node has changed. If so, it prompts you to reboot. It modifies
the topology database on the single node and the master node, in that order, and
ensures that during synchronization, the data on the master node takes
precedence.
on page 77.
on page 120.
on page 163.
on page 81.
on page 78.
on page 88.
on page 89.
on page 147.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents