Symantec 10521148 Implementation Guide - Page 205

Domain Name Service., Smart Agent

Page 205 highlights

Index 3 in monitored networks 108 cloning protection policy 119 clusters 41 changing IP in 103, 156 failover group in 104 initial config using CF 146 monitoring group in 103 nodes in 102 restoring configuration to 141 with ManHunt 181 compact flash. See CF compliance 188 configuration 1U 18 2U 19 CF 83 hardware 17 initial 23, 67 initial serial 25 master node, LCD 69 master node, serial 77 monitoring 29 saving 170 slave node, LCD 72 slave node, serial 80 console.See Network Security console; serial console copper gigabit on bypass unit 36 ports 35 correlation 127 crossover cable 15, 176 with bypass unit 37, 52, 60 D database force synchronization 125 last synchronization time 132 log rotation 139 monitored networks 109, 112, 114 network topology 101 synchronization 104 default gateway 70 mode for interfaces 30 deleting custom policies 123 interfaces 105 IP address from logging criteria 123 predefined policies 116 response rule 126 sample monitored network 108 to change model number 105 unapply policies before 124 denial of service. See DoS deployment bypass unit 35 cluster 41 console 42 enterprise 10 fail-open 35 flexible bandwidth 30 in-line mode 31, 33 LiveUpdate 43 passive mode 30 SESA 42 Smart Agent 42 detection 10 architecture 10 in-line mode 31 passive mode 30 starting 115 DHCP 174, 175 dimensions of appliances 185 DNS server 105, 161 documentation about the set of 13 about this guide 11 on Web 14 Domain Name Service. See DNS DoS attacks 9, 10 duplex 38 E editing /etc/hosts file 161 advanced network fields 104, 106 custom policies 120 in-line pair 111 interface group 112, 113 interface name 107 master node sync password 104 model number 103 monitored networks 109

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214

3
Index
in monitored networks
108
cloning
protection policy
119
clusters 41
changing IP in
103, 156
failover group in
104
initial config using CF
146
monitoring group in
103
nodes in
102
restoring configuration to
141
with ManHunt
181
compact flash.
See
CF
compliance 188
configuration
1U 18
2U 19
CF 83
hardware 17
initial
23, 67
initial serial
25
master node, LCD
69
master node, serial
77
monitoring 29
saving 170
slave node, LCD
72
slave node, serial
80
console.
See
Network Security console; serial console
copper
gigabit on bypass unit
36
ports 35
correlation 127
crossover
cable
15, 176
with bypass unit
37, 52, 60
D
database
force synchronization
125
last synchronization time
132
log rotation
139
monitored networks
109, 112, 114
network topology
101
synchronization 104
default
gateway 70
mode for interfaces
30
deleting
custom policies
123
interfaces 105
IP address from logging criteria
123
predefined policies
116
response rule
126
sample monitored network
108
to change model number
105
unapply policies before
124
denial of service.
See
DoS
deployment
bypass unit
35
cluster 41
console 42
enterprise 10
fail-open 35
flexible bandwidth
30
in-line mode
31, 33
LiveUpdate 43
passive mode
30
SESA 42
Smart Agent
42
detection 10
architecture 10
in-line mode
31
passive mode
30
starting 115
DHCP
174, 175
dimensions
of appliances
185
DNS
server
105, 161
documentation
about the set of
13
about this guide
11
on Web
14
Domain Name Service.
See
DNS
DoS
attacks
9, 10
duplex 38
E
editing
/etc/hosts file
161
advanced network fields
104, 106
custom policies
120
in-line pair
111
interface group
112, 113
interface name
107
master node sync password
104
model number
103
monitored networks
109