Symantec 10521146 Administration Guide - Page 88

Viewing advanced network options, Description, Topology, Save Changes

Page 88 highlights

88 Populating the topology database Adding nodes and objects Use the same passphrase when you install Symantec Network Security on the designated computer. See "Synchronization passphrases" on page 78. ■ If editing a software node, proceed to the next step. 9 In Description, enter an optional description of up to 255 characters, and click OK. See "Description" on page 77. Note: After adding a software node to the topology tree, you must install Symantec Network Security on the designated computer. The installation process populates the fields in the Advanced Network Options tab. See "Viewing advanced network options" on page 88. Caution: Click Topology > Save Changes before quitting the Network Security console. You will lose any unsaved changes when you exit. For the sensor to run, you must add interfaces and a protection policy to each interface. To enable TrackBack to query flow data from this node, you must apply the sensor parameter for flow statistics, and execute the TrackBack response policy. ■ See "About monitoring interfaces on software nodes" on page 89. ■ See "Defining new protection policies" on page 120. ■ See "Enable Flow Statistics Collection" on page 163. ■ See "Setting TrackBack response action" on page 147. ■ See "Deleting objects" on page 81. Viewing advanced network options The Advanced Network Options tab contains information about the designated computer that this node represents in the topology tree. The installation process automatically provides this information. The Advanced Network Options tab now provides a way to edit the node from the Network Security console after installation. You can add a NAT device, for example, and assign a private IP address after installation. When you edit the node, the Network Security console determines whether the IP address of the node has changed. If so, it prompts you to reboot. It modifies the topology database on the single node and the master node, in that order, and ensures that during synchronization, the data on the master node takes precedence.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

88
Populating the topology database
Adding nodes and objects
Use the same passphrase when you install Symantec Network Security
on the designated computer.
See
²Synchronization passphrases³
on page 78.
If editing a software node, proceed to the next step.
9
In
Description
, enter an optional description of up to 255 characters, and
click
OK
.
See
²Description³
on page 77.
Note:
After adding a software node to the topology tree, you must install
Symantec Network Security on the designated computer. The installation
process populates the fields in the Advanced Network Options tab.
See
²Viewing advanced network options³
on page 88.
Caution:
Click
Topology
>
Save Changes
before quitting the Network
Security console. You will lose any unsaved changes when you exit.
For the sensor to run, you must add interfaces and a protection policy to each
interface. To enable TrackBack to query flow data from this node, you must
apply the sensor parameter for flow statistics, and execute the TrackBack
response policy.
See
²About monitoring interfaces on software nodes³
on page 89.
See
²Defining new protection policies³
on page 120.
See
²Enable Flow Statistics Collection³
on page 163.
See
²Setting TrackBack response action³
on page 147.
See
²Deleting objects³
on page 81.
Viewing advanced network options
The Advanced Network Options tab contains information about the designated
computer that this node represents in the topology tree. The installation
process automatically provides this information. The Advanced Network
Options tab now provides a way to edit the node from the Network Security
console after installation. You can add a NAT device, for example, and assign a
private IP address after installation.
When you edit the node, the Network Security console determines whether the
IP address of the node has changed. If so, it prompts you to reboot. It modifies
the topology database on the single node and the master node, in that order, and
ensures that during synchronization, the data on the master node takes
precedence.