42 Getting started
General checklist
General checklist
This section provides a broad outline of the basic steps to set up a core Symantec
Network Security intrusion detection system for the first time. It also describes
additional deployment options that are unique to the 7100 Series appliance.
This section describes the following topics:
■
General software and appliance checklist
■
Additional appliance-specific checklist
General software and appliance checklist
To set up a new Symantec Network Security intrusion detection system for the
first time, consider the following:
Preparing to set up Symantec Network Security
■
Deployment Plan
: Decide how to deploy a Symantec Network Security
intrusion detection system. Some things to consider might include:
■
What kinds of traffic flow do you expect on your network?
■
Which devices or elements of your network will you monitor?
■
Will you deploy Symantec Network Security as single peer software or
appliance nodes, or as a cluster of interacting nodes?
■
Will you establish failover redundancy with standby nodes?
■
Licensing
: Obtain a Symantec license for each software and appliance node.
■
Installation
: Install Symantec Network Security.
■
User accounts
: One SuperUser default account is created at installation. You
can add more accounts at any time after installation.
Setting up Symantec Network Security
After installation, use the following tools to get your Symantec Network
Security intrusion detection system started:
■
Create network topology database
: Provide detailed information about your
Symantec Network Security intrusion detection system by populating the
topology tree on the Devices tab.
■
Establish protection policy
: Establish blocking and/or alerting triggers so
that Symantec Network Security automatically responds to intrusions at the
point of entry.
Summary of Contents for 10521146 - Network Security 7120
Page 1: ...Symantec Network Security Administration Guide...
Page 12: ...12 Contents Index...
Page 14: ...14...
Page 70: ...70...
Page 110: ...110 Populating the topology database Adding nodes and objects...
Page 158: ...158 Responding Managing flow alert rules...
Page 188: ...188...
Page 242: ...242 Reporting Playing recorded traffic...
Page 268: ...268 Managing log files Exporting data...
Page 316: ...316 Advanced configuration Configuring advanced parameters...
Page 318: ...318...
Page 338: ...338 SQL reference Using MySQL tables...
Page 366: ...366 Glossary...
Page 392: ...392 Index...