372 Index
clustering with software nodes 65
deleting nodes 277
deployment checklist 43
documentation 20
enabling blocking rules 123
fail-open 39
management via consoles 39
monitoring interfaces 96
node status indicator 79
parameters 309
powering off 54
queries from TrackBack 94
shutting down from the serial console 51
single-node deployment 62
applying
flow data collection 219
incident view during failover 292
LiveUpdates 271
parameters to nodes 309, 310
parameters to sensors 309
policies after failure 299
policies to interfaces 115
response rules to Decoy Server events 285
sensor parameters to objects 161
signature variables 185
applying user-defined signatures 181
architecture
about the core 25
about the management and detection 32
about the node 34
FlowChaser 37
archive
clearing automatically 250
archiving
configuring automatic 248
log files 249
logs 246
assigning
monitoring groups 67
attack responses.
See
responses
attacks
categories 136
flood-based 142
fragmentation 230
syn floods 149
target IP address 202, 204
traffic 249
Auto Update tab
about 113
automated
response architecture 131
availability
for single nodes 288
monitoring node 287
B
backing up
cluster-wide data 282
configurations 298
LiveUpdate configurations 274
on the Network Security console 298
protection policies 128
refreshing the configuration list 300
response rules database 135
Symantec Network Security 297
using compact flash 302
via compact flash 40
watchdog process 289
Bad Service Saturation Alert Threshold
setting sensor parameters 166
basic parameters
configuring 310
basic setup
advanced tuning 309
blocking
about 38
automatically 124, 126
disabling 123
enabling 123
in LiveUpdate 124, 126
overriding globally 115
bypass unit.
See
in-line
C
cancelling
changes to topology tree 82
LiveUpdate schedules 274
policy applications 117
reverting signature variables 186
checklist
appliance-specific deployment 43
general deployment 42
cleartext
preventing passwords in 149
cloning
protection policies 121
Summary of Contents for 10521146 - Network Security 7120
Page 1: ...Symantec Network Security Administration Guide...
Page 12: ...12 Contents Index...
Page 14: ...14...
Page 70: ...70...
Page 110: ...110 Populating the topology database Adding nodes and objects...
Page 158: ...158 Responding Managing flow alert rules...
Page 188: ...188...
Page 242: ...242 Reporting Playing recorded traffic...
Page 268: ...268 Managing log files Exporting data...
Page 316: ...316 Advanced configuration Configuring advanced parameters...
Page 318: ...318...
Page 338: ...338 SQL reference Using MySQL tables...
Page 366: ...366 Glossary...
Page 392: ...392 Index...