Symantec 10268947 User Guide - Page 36

About the Network Security console

Page 36 highlights

36 Getting Started About the management interfaces About the Network Security console The Network Security console serves as the main management interface for both Network Security software nodes and 7100 Series appliance nodes. The Network Security console uses QSP 256-bit AES encryption. This section describes how to launch the Network Security console and adjust the view: ■ Launching the Network Security console ■ Viewing the Network Security console ■ Adjusting the Devices view ■ Adjusting the Incidents view ■ Viewing node status Caution: The first time you launch the Network Security console after installation, expect a wait time of a few minutes while the database files load. Symantec Network Security caches the files after that first load, and makes subsequent launches faster. Launching the Network Security console All users can launch the Network Security console on Windows, Solaris, and Linux, and view the main tabs and menus. To launch the Network Security console 1 Depending on the operating system, do one of the following: ■ For Windows, double-click the Symantec Network Security icon on the desktop. ■ For Solaris or Linux, run the following command: /bin/java -Xmx256M -jar snsadmin.jar For example: /usr/SNS/java/jre/bin/java -jar snsadmin.jar Note: The Network Security console must have Java 1.4 installed to run. 2 In Hostname, enter the hostname or IP address of the software or appliance node you want to monitor. 3 In Port, enter the port number. If in a cluster, all nodes must use the same port number.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134

36
Getting Started
About the management interfaces
About the Network Security console
The Network Security console serves as the main management interface for
both Network Security software nodes and 7100 Series appliance nodes. The
Network Security console uses QSP 256-bit AES encryption.
This section describes how to launch the Network Security console and adjust
the view:
Launching the Network Security console
Viewing the Network Security console
Adjusting the Devices view
Adjusting the Incidents view
Viewing node status
Caution:
The first time you launch the Network Security console after
installation, expect a wait time of a few minutes while the database files load.
Symantec Network Security caches the files after that first load, and makes
subsequent launches faster.
Launching the Network Security console
All users can launch the Network Security console on Windows, Solaris, and
Linux, and view the main tabs and menus.
To launch the Network Security console
1
Depending on the operating system, do one of the following:
For Windows, double-click the
Symantec Network Security
icon on the
desktop.
For Solaris or Linux, run the following command:
<path to java>/bin/java -Xmx256M -jar snsadmin.jar
For example:
/usr/SNS/java/jre/bin/java -jar snsadmin.jar
Note:
The Network Security console must have Java 1.4 installed to run.
2
In
Hostname
, enter the hostname or IP address of the software or appliance
node you want to monitor.
3
In
Port
, enter the port number.
If in a cluster, all nodes must use the same port number.