Symantec 10744983 Administration Guide - Page 50
Control Center certificate, Configuring, enabling and scheduling Scanner replication - internet security
UPC - 037648279321
View all Symantec 10744983 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 50 highlights
50 Configuring system settings Configuring Control Center settings About specifying host names for Control Center access When specifying host names for Control Center access, the Control Center allows clients to connect based on the Control Center's own DNS perspective. If the client's IP address resolves into a name that matches an allowed host name (a "reverse lookup"), then the the Control Center permits access to the client. The owner of a netblock controls the reverse lookup of an IP address, so users often have no control over what name their IP addresses resolve to. Also, two different DNS servers may each have mappings for the same netblock that are not the same. For example, the client's authoritative DNS server has a reverse lookup record of m1.example.com for the client's IP address. The DNS that is configured to be the Control Center's primary DNS server has a reverse mapping of dhcp23.example.com for the same IP address. In this case, the Control Center will see the dhcp23.example.com name whenever the client connects, so that is the name that should be entered into the host access control list in the Control Center. This situation happens more frequently on private networks than on the public Internet. Control Center certificate Through the Control Center, you can designate a user interface HTTPS certificate. This enhances the security for the Control Center and those logging into it. To designate a Control Center certificate 1 In the Control Center, click Settings > Control Center. 2 Under Control Center Certificate, select the desired certificate in the User interface HTTPS certificate dropdown list. You add certificates to this list using the Settings > Certificates page. See "Configuring certificate settings " on page 23.. 3 Click Save to store the current settings. Configuring, enabling and scheduling Scanner replication In the Control Center, replication refers to the process by which LDAP data stores are propagated from the Control Center to attached and enabled Scanners. Replication is controlled by global settings in the Control Center and by locally configurable settings on each Scanner. The following information will assist you in configuring and scheduling replication. However, no replication can occur until you have defined one or more LDAP servers to the Control Center and one full synchronization cycle has completed.