132 Index
signatures
about 22
about detection 86
about user-defined 22
detection by 87
Symantec 22, 88
user-defined 88
variables 89
viewing 89
slave nodes
synchronizing 52
viewing appliance 55
Smart Agents
about 31
about interfaces 61
sniffer.
See
sensor processes
SNMP
alert failure 103
configuring notification 80
request failure 103
truncated message 103
software
about nodes 52
about the node architecture 28
accessing Knowledge Base 16
documentation 15
viewing Hardware Compatibility Reference 16
source
destination reports 114
StandardUser
pre-defined login account 103
standby nodes
about failover 43
stateful signatures.
See
signatures
statistics
devices with flow 115
stopping
end time 105
incident response 80
Symantec Decoy Server
enable via Symantec Network Security 63
external sensors 63
Symantec Network Security
about analysis 24
about database architecture 29
about detection 20
about response 25
about software features 11
about the 7100 Series 9
about the core architecture 19
about the node architecture 28
accessing patch site 16
accessing the Network Security console 36
detection architecture 26
enabling Symantec Decoy Server 63
management architecture 26
software documentation 15
Symantec signatures.
See
signatures
synchronizing
slave nodes 52
synflood
top event type 111
T
tabs
about Advanced Network Options tab 52, 55
about Auto Update tab 67, 70
about Devices tab 27
about Full Event List tab 67
about Incidents tab 27
about Notes tab 68, 71
about Policies tab 27
about Protection Policies tab 66, 67
about Search Events tab 67, 68
TCP reset 81
third-party integration
Smart Agents 31
tool tips
annotating policies 71
topology
about network 51
modifying the view 37
viewing 37
viewing device objects 49, 50
TrackBack
about 12, 13
configuring 80
traffic
about rate monitoring 23
playback tool 83
record response 81
replaying recorded 84
viewing current flows 117
viewing exported flows 119
U
updating
Summary of Contents for 10268947 - Network Security 7160
Page 1: ...Symantec Network Security User Guide...
Page 18: ...18 Introduction Finding information...
Page 34: ...34 Architecture About management and detection architecture...
Page 46: ...46 Getting Started About deploying node clusters...
Page 64: ...64 Topology Database Viewing objects in the topology tree...
Page 124: ...124 Log Files About log files...
Page 134: ...134 Index...