Symantec 10521146 Administration Guide - Page 372

Bad Service Saturation Alert Threshold, Auto Update tab

Page 372 highlights

372 Index clustering with software nodes 65 deleting nodes 277 deployment checklist 43 documentation 20 enabling blocking rules 123 fail-open 39 management via consoles 39 monitoring interfaces 96 node status indicator 79 parameters 309 powering off 54 queries from TrackBack 94 shutting down from the serial console 51 single-node deployment 62 applying flow data collection 219 incident view during failover 292 LiveUpdates 271 parameters to nodes 309, 310 parameters to sensors 309 policies after failure 299 policies to interfaces 115 response rules to Decoy Server events 285 sensor parameters to objects 161 signature variables 185 applying user-defined signatures 181 architecture about the core 25 about the management and detection 32 about the node 34 FlowChaser 37 archive clearing automatically 250 archiving configuring automatic 248 log files 249 logs 246 assigning monitoring groups 67 attack responses. See responses attacks categories 136 flood-based 142 fragmentation 230 syn floods 149 target IP address 202, 204 traffic 249 Auto Update tab about 113 automated response architecture 131 availability for single nodes 288 monitoring node 287 B backing up cluster-wide data 282 configurations 298 LiveUpdate configurations 274 on the Network Security console 298 protection policies 128 refreshing the configuration list 300 response rules database 135 Symantec Network Security 297 using compact flash 302 via compact flash 40 watchdog process 289 Bad Service Saturation Alert Threshold setting sensor parameters 166 basic parameters configuring 310 basic setup advanced tuning 309 blocking about 38 automatically 124, 126 disabling 123 enabling 123 in LiveUpdate 124, 126 overriding globally 115 bypass unit. See in-line C cancelling changes to topology tree 82 LiveUpdate schedules 274 policy applications 117 reverting signature variables 186 checklist appliance-specific deployment 43 general deployment 42 cleartext preventing passwords in 149 cloning protection policies 121

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

372
Index
clustering with software nodes
65
deleting nodes
277
deployment checklist
43
documentation 20
enabling blocking rules
123
fail-open 39
management via consoles
39
monitoring interfaces
96
node status indicator
79
parameters 309
powering off
54
queries from TrackBack
94
shutting down from the serial console
51
single-node deployment
62
applying
flow data collection
219
incident view during failover
292
LiveUpdates 271
parameters to nodes
309, 310
parameters to sensors
309
policies after failure
299
policies to interfaces
115
response rules to Decoy Server events
285
sensor parameters to objects
161
signature variables
185
applying user-defined signatures
181
architecture
about the core
25
about the management and detection
32
about the node
34
FlowChaser 37
archive
clearing automatically
250
archiving
configuring automatic
248
log files
249
logs 246
assigning
monitoring groups
67
attack responses.
See
responses
attacks
categories 136
flood-based 142
fragmentation 230
syn floods
149
target IP address
202, 204
traffic 249
Auto Update tab
about 113
automated
response architecture
131
availability
for single nodes
288
monitoring node
287
B
backing up
cluster-wide data
282
configurations 298
LiveUpdate configurations
274
on the Network Security console
298
protection policies
128
refreshing the configuration list
300
response rules database
135
Symantec Network Security
297
using compact flash
302
via compact flash
40
watchdog process
289
Bad Service Saturation Alert Threshold
setting sensor parameters
166
basic parameters
configuring 310
basic setup
advanced tuning
309
blocking
about 38
automatically
124, 126
disabling 123
enabling 123
in LiveUpdate
124, 126
overriding globally
115
bypass unit.
See
in-line
C
cancelling
changes to topology tree
82
LiveUpdate schedules
274
policy applications
117
reverting signature variables
186
checklist
appliance-specific deployment
43
general deployment
42
cleartext
preventing passwords in
149
cloning
protection policies
121