46 Getting started
About the management interfaces
If in a cluster, all nodes must use the same port number.
4
In
Username
, enter the user name. Access and permissions depend on the
user group of your login account.
5
In
Passphrase
, enter the passphrase established for your user login account,
and click
OK
.
Caution:
If a non-SuperUser uses the wrong passphrase, an
Incorrect
Username or Passphrase
message appears. If this occurs multiple times (as
specified by the Maximum Login Failures parameter), the Network Security
console locks the non-SuperUser out. Even if the correct passphrase is used
at that point, access is denied. Contact the SuperUser to create a new
passphrase.
Viewing the Network Security console
The Network Security console contains three main tabs that provide a view of
the network topology, the network traffic, and the detection and response
functionality:
■
The
Devices
tab provides a hierarchical tree view of the network topology
with a detailed summary of each device.
■
The
Incidents
tab provides detailed descriptions of security incidents and
their correlated events taking place in the network, including sub-levels of
packet detail.
■
The
Policies
tab provides the area for managing protection policies and
automated responses at the point of entry.
Adjusting the Devices view
You can adjust the display of the network topology tree in the Devices tab as
follows:
To display the entire topology tree
■
In the
Devices
tab, click
Topology
>
Expand All Objects
.
To display all device objects and hide all interface objects
■
In the
Devices
tab, click
Topology
>
Expand Categories
.
To display the first level of objects in the topology tree
■
In the
Devices
tab, click
Topology
>
Collapse All Objects
.
Summary of Contents for 10521146 - Network Security 7120
Page 1: ...Symantec Network Security Administration Guide...
Page 12: ...12 Contents Index...
Page 14: ...14...
Page 70: ...70...
Page 110: ...110 Populating the topology database Adding nodes and objects...
Page 158: ...158 Responding Managing flow alert rules...
Page 188: ...188...
Page 242: ...242 Reporting Playing recorded traffic...
Page 268: ...268 Managing log files Exporting data...
Page 316: ...316 Advanced configuration Configuring advanced parameters...
Page 318: ...318...
Page 338: ...338 SQL reference Using MySQL tables...
Page 366: ...366 Glossary...
Page 392: ...392 Index...