78 Populating the topology database
Managing the topology tree
Managing the topology tree
To configure Symantec Network Security, first populate the topology database
to provide key information about your network. Collect this key information
described in the
Gathering information
section. After you add this information
to the database, you can edit it at any time by modifying the tree, and adjust to
new information, network reorganization, or other changes to the network.
This section describes how to edit and delete object information, reverse or save
your changes, refresh your view, and back up your topology database, as follows:
■
Viewing auto-generated objects
■
Viewing node details
■
Viewing node status
■
Adding objects for the first time
■
Editing objects
■
Deleting objects
■
Reverting changes
■
Saving changes
■
Forcing nodes to synchronize
■
Backing up
Interface name
For each interface in the topology tree, follow the naming
convention of the manufacturer for that interface, such as
qfe0
or
fa/0
.
Synchronization
passphrases
For some objects in the topology tree, provide a unique
synchronization passphrase between 6 and 64 characters,
inclusive. This enables nodes to communicate securely during
database synchronization and cross-node event correlation. Make
a note of the synchronization passphrase so you can supply it
when you physically install the slave node.
Note:
You cannot edit this passphrase. If you fail to provide, or
provide an erroneous passphrase when you add the slave node,
you must delete the node, create a new one, and assign a new
synchronization passphrase to it.
Table 4-1
Information to gather
Field
Description
Summary of Contents for 10521146 - Network Security 7120
Page 1: ...Symantec Network Security Administration Guide...
Page 12: ...12 Contents Index...
Page 14: ...14...
Page 70: ...70...
Page 110: ...110 Populating the topology database Adding nodes and objects...
Page 158: ...158 Responding Managing flow alert rules...
Page 188: ...188...
Page 242: ...242 Reporting Playing recorded traffic...
Page 268: ...268 Managing log files Exporting data...
Page 316: ...316 Advanced configuration Configuring advanced parameters...
Page 318: ...318...
Page 338: ...338 SQL reference Using MySQL tables...
Page 366: ...366 Glossary...
Page 392: ...392 Index...