11
Contents
Backup up cluster-wide data ....................................................................282
Integrating third-party events ........................................................................282
Integrating via Smart Agents ..................................................................283
Integrating with Symantec Decoy Server ..............................................285
Establishing high availability failover ...........................................................287
Monitoring node availability ...................................................................287
Configuring availability for single nodes ...............................................288
Configuring availability for multiple nodes ..........................................289
Configuring watchdog processes .............................................................293
Backing up and restoring ..................................................................................297
Backing up and restoring on the Network Security console ...............298
Backing up and restoring on compact flash ..........................................302
Configuring advanced parameters ..................................................................308
About parameters for clusters, nodes, and sensors .............................309
About basic setup and advanced tuning .................................................309
Configuring node parameters ..................................................................310
Configuring basic parameters ..................................................................310
Configuring Network Security console parameters .............................311
Configuring advanced parameters ..........................................................311
Section 4
Appendices
Appendix A
User groups reference
About user groups .............................................................................................319
About group permissions .........................................................................319
Permissions by group ................................................................................320
Permissions by task ...................................................................................321
Appendix B
SQL reference
About SQL export parameters .........................................................................325
Setting up SQL export ...............................................................................325
Using Oracle tables ............................................................................................326
Oracle incident table .................................................................................326
Oracle event table ......................................................................................328
Using MySQL tables ..........................................................................................332
MySQL incident table ................................................................................332
MySQL event table .....................................................................................334
Glossary
Acronyms
Summary of Contents for 10521146 - Network Security 7120
Page 1: ...Symantec Network Security Administration Guide...
Page 12: ...12 Contents Index...
Page 14: ...14...
Page 70: ...70...
Page 110: ...110 Populating the topology database Adding nodes and objects...
Page 158: ...158 Responding Managing flow alert rules...
Page 188: ...188...
Page 242: ...242 Reporting Playing recorded traffic...
Page 268: ...268 Managing log files Exporting data...
Page 316: ...316 Advanced configuration Configuring advanced parameters...
Page 318: ...318...
Page 338: ...338 SQL reference Using MySQL tables...
Page 366: ...366 Glossary...
Page 392: ...392 Index...