Symantec 10521146 Administration Guide - Page 75
Mapping the existing network, Locations, Managed Network Segments, Devices, Interfaces
UPC - 037648268134
View all Symantec 10521146 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 75 highlights
Populating the topology database 75 About the network topology Note: SuperUsers can view, add, edit, and delete all objects in the topology tree. Administrators can view, add, edit, and delete most objects in the topology tree except for software nodes and 7100 Series appliance nodes. StandardUsers and RestrictedUsers can view the topology tree. See "User groups reference" on page 319 for more about permissions. Mapping the existing network Before building the network topology database, we recommend that you create a map of your network topology. Include the devices and device interfaces that you want Symantec Network Security to monitor, or through which you want it to track attacks. The map becomes the model for your network topology: ■ Locations: Decide whether to divide the network into logical or physical groupings, depending on the network setup. A physical grouping might include all segments within a single building. A logical grouping might include all segments used by one department spread throughout multiple buildings. ■ Managed Network Segments: Within each location, identify the existing network segments. ■ Devices: Within each location or managed network segment, identify the routers that will send data to Symantec Network Security. ■ Interfaces: For each router, decide which interfaces you want Symantec Network Security to monitor, and those interfaces that you merely want Symantec Network Security to be aware of to track an attack through them. The following diagram shows an example of a simple topology map including locations, segments, devices, device interfaces and attachments between