Symantec 11281411 Administration Guide - Page 50

Choosing which computers to protect, Creating the access list

Page 50 highlights

50 Managing Symantec AntiVirus Enhancing server group security Choosing which computers to protect The IP address of the computer running the Symantec System Center console should be included in the access list of every server in a server group. If you are only changing client group settings, you only need to include the address for the primary server. You do not need to include the access list on every client. You can effectively lock down a server group and prevent IP spoofing by creating the access list on each server and leaving it empty. Add IP and IPX addresses to the access list only when you need to allow the Symantec System Center to access the server. Delete the value for an address when you no longer require access. Creating the access list To create an access list, you create a registry subkey and specify the authorized IP and IPX addresses. To create the access list 1 Start a registry editor, such as Regedt32. 2 Open the HKEY_LOCAL_MACHINE\SOFTWARE\INTEL\LANDesk\ VirusProtect6\CurrentVersion key. 3 Type AccessList as a new subkey. 4 In the AccessList subkey, add string values for IP and IPX addresses and subnet addresses of the computers that you want included in the access list. Use the following formats: . IP IP subnet IPX IPX subnet Type (IP)- where is the numeric address for the computer. Type (IP)-/ where is the numeric address for the computer and is the subnet notation (for example, 16 or 24). Type (IPX)- where is the numeric address for the computer. Type (IPX)-: where is the numeric address for the computer and is the subnet notation. 5 Close the registry editor.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

50
Managing Symantec AntiVirus
Enhancing server group security
Choosing which computers to protect
The IP address of the computer running the Symantec System Center console
should be included in the access list of every server in a server group. If you are
only changing client group settings, you only need to include the address for the
primary server.
You do not need to include the access list on every client. You can effectively
lock down a server group and prevent IP spoofing by creating the access list on
each server and leaving it empty. Add IP and IPX addresses to the access list
only when you need to allow the Symantec System Center to access the server.
Delete the value for an address when you no longer require access.
Creating the access list
To create an access list, you create a registry subkey and specify the authorized
IP and IPX addresses.
To create the access list
1
Start a registry editor, such as Regedt32.
2
Open the HKEY_LOCAL_MACHINE\SOFTWARE\INTEL\LANDesk\
VirusProtect6\CurrentVersion key.
3
Type
AccessList
as a new subkey.
4
In the AccessList subkey, add string values for IP and IPX addresses and
subnet addresses of the computers that you want included in the access list.
Use the following formats:
.
5
Close the registry editor.
IP
Type
(IP)-<0.0.0.0>
where <0.0.0.0> is the numeric address for
the computer.
IP subnet
Type
(IP)-<0.0.0.0>/<n>
where <0.0.0.0> is the numeric address
for the computer and <n> is the subnet notation (for example,
16 or 24).
IPX
Type
(IPX)-<0000000:0000000000000>
where
<0000000:0000000000000> is the numeric address for the
computer.
IPX subnet
Type
(IPX)-<0000000>:<FFFFFFFFFFFFFFF>
where
<0000000> is the numeric address for the computer and
<FFFFFFFFFFFFFFF> is the subnet notation.