Symantec 10744983 Administration Guide - Page 50

Control Center certificate, Configuring, enabling and scheduling Scanner replication - internet security

Page 50 highlights

50 Configuring system settings Configuring Control Center settings About specifying host names for Control Center access When specifying host names for Control Center access, the Control Center allows clients to connect based on the Control Center's own DNS perspective. If the client's IP address resolves into a name that matches an allowed host name (a "reverse lookup"), then the the Control Center permits access to the client. The owner of a netblock controls the reverse lookup of an IP address, so users often have no control over what name their IP addresses resolve to. Also, two different DNS servers may each have mappings for the same netblock that are not the same. For example, the client's authoritative DNS server has a reverse lookup record of m1.example.com for the client's IP address. The DNS that is configured to be the Control Center's primary DNS server has a reverse mapping of dhcp23.example.com for the same IP address. In this case, the Control Center will see the dhcp23.example.com name whenever the client connects, so that is the name that should be entered into the host access control list in the Control Center. This situation happens more frequently on private networks than on the public Internet. Control Center certificate Through the Control Center, you can designate a user interface HTTPS certificate. This enhances the security for the Control Center and those logging into it. To designate a Control Center certificate 1 In the Control Center, click Settings > Control Center. 2 Under Control Center Certificate, select the desired certificate in the User interface HTTPS certificate dropdown list. You add certificates to this list using the Settings > Certificates page. See "Configuring certificate settings " on page 23.. 3 Click Save to store the current settings. Configuring, enabling and scheduling Scanner replication In the Control Center, replication refers to the process by which LDAP data stores are propagated from the Control Center to attached and enabled Scanners. Replication is controlled by global settings in the Control Center and by locally configurable settings on each Scanner. The following information will assist you in configuring and scheduling replication. However, no replication can occur until you have defined one or more LDAP servers to the Control Center and one full synchronization cycle has completed.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249

About specifying host names for Control Center access
When specifying host names for Control Center access, the Control Center allows
clients to connect based on the Control Center's own DNS perspective. If the
client's IP address resolves into a name that matches an allowed host name (a
“reverse lookup”), then the the Control Center permits access to the client.
The owner of a netblock controls the reverse lookup of an IP address, so users
often have no control over what name their IP addresses resolve to. Also, two
different DNS servers may each have mappings for the same netblock that are
not the same. For example, the client's authoritative DNS server has a reverse
lookup record of m1.example.com for the client's IP address. The DNS that is
configured to be the Control Center's primary DNS server has a reverse mapping
of dhcp23.example.com for the same IP address. In this case, the Control Center
will see the dhcp23.example.com name whenever the client connects, so that is
the name that should be entered into the host access control list in the Control
Center. This situation happens more frequently on private networks than on the
public Internet.
Control Center certificate
Through the Control Center, you can designate a user interface HTTPS certificate.
This enhances the security for the Control Center and those logging into it.
To designate a Control Center certificate
1
In the Control Center, click
Settings > Control Center.
2
Under Control Center Certificate, select the desired certificate in the
User
interface HTTPS certificate
dropdown list.
You add certificates to this list using the Settings > Certificates page.
See
“Configuring certificate settings ”
on page 23..
3
Click
Save
to store the current settings.
Configuring, enabling and scheduling Scanner replication
In the Control Center, replication refers to the process by which LDAP data stores
are propagated from the Control Center to attached and enabled Scanners.
Replication is controlled by global settings in the Control Center and by locally
configurable settings on each Scanner. The following information will assist you
in configuring and scheduling replication. However, no replication can occur until
you have defined one or more LDAP servers to the Control Center and one full
synchronization cycle has completed.
Configuring system settings
Configuring Control Center settings
50