6
Contents
Managing user passphrases
.......................................................................
57
Controlling user access
...............................................................................
59
Planning the deployment
...................................................................................
60
Deploying single nodes
.......................................................................................
61
Deploying a single Network Security software node
.............................
61
Deploying a single 7100 Series appliance node
......................................
62
Configuring single-node parameters
........................................................
63
Deploying node clusters
.....................................................................................
64
Deploying software and appliance nodes in a cluster
............................
65
Monitoring groups within a cluster
..........................................................
66
Section
2
Initial Configuration
Chapter
4
Populating the topology database
About the network topology
..............................................................................
71
About the Devices tab
.................................................................................
72
About topology mapping
............................................................................
74
Managing the topology tree
...............................................................................
78
Viewing auto-generated objects
................................................................
79
Viewing node details
...................................................................................
79
Viewing node status
....................................................................................
79
Adding objects for the first time
...............................................................
80
Editing objects
..............................................................................................
81
Deleting objects
............................................................................................
81
Reverting changes
.......................................................................................
82
Saving changes
.............................................................................................
82
Forcing nodes to synchronize
....................................................................
83
Backing up
.....................................................................................................
83
Adding nodes and objects
...................................................................................
83
About location objects
.................................................................................
83
About nodes and interfaces
........................................................................
85
About Network Security software nodes
.................................................
86
About 7100 Series appliance nodes
..........................................................
92
About router objects
..................................................................................
101
About Smart Agents
..................................................................................
104
About managed network segments
.........................................................
108
Chapter
5
Protection policies
About protection policies
.................................................................................
111
Responding to malicious or suspicious events
.....................................
112
Understanding the protection policy work area
...........................................
112
Using protection policies
.................................................................................
113