352 Glossary
near real-time
The timely action in response to an event, incident, or alert.
network
A group of computers and associated devices that are connected by communications
facilities (both hardware and software) to share information and peripheral devices such
as printers and modems.
network tap
See
interface, monitoring
.
network worm
A program or command file that uses a computer network as a means for adversely
affecting a system's integrity, reliability, or availability. A network worm can attack from
one system to another by establishing a network connection. It is usually a self-contained
program that does not need to attach itself to a host file to infiltrate network after
network.
NIC
See
Ethernet interface
and
gigabit Ethernet interface
.
NIDS (network-based
intrusion detection
system)
A type of intrusion detection system that works at the network level by monitoring
packets on the network and gauging whether a hacker is attempting to sending a large
number of connection requests to a computer on the network, indicating an attempt
either to break into a system or cause a denial of service attack. Unlike other intrusion
detection systems, a NIDS is able to monitor numerous computers at once.
NNTP (Network News
Transfer Protocol)
The predominant protocol used by computers (servers and clients) for managing the notes
posted on newsgroups. NNTP replaced the original Usenet protocol, UNIX-to-UNIX.
node, active
The primary node in a watchdog process or failover group, from which all activity
predominates. See also
node, standby
.
node, master
A primary Symantec Network Security installation that ranks above all other Network
Security nodes in a group or cluster. By default, the first Network Security installation is
designated as a master node, and all other Network Security nodes within the cluster are
designated as slave nodes. Changes to a master node are propagated to the slave nodes in a
cluster.
node, network
See
object
.
node, Network Security
The main component of Symantec Network Security that includes comprehensive
detection, analysis, and response functionality. Network Security
nodes can be
administered via the Network Security console, and can be deployed singly or grouped for
cross-node correlation.
node, standby
The standby node or nodes in a watchdog process or failover group serve as a backup if
your active master node fails or is shut down for servicing.
node, slave
A Symantec Network Security installation that ranks below a master Network Security
node in a group or cluster. By default, the first Symantec Network Security installation is
designated as a master node, and all other Network Security nodes within the cluster are
designated as slave nodes. The slave nodes receive updates to their topology, response
policy, and configuration databases from a master Network Security software node in the
cluster.
Summary of Contents for 10521146 - Network Security 7120
Page 1: ...Symantec Network Security Administration Guide...
Page 12: ...12 Contents Index...
Page 14: ...14...
Page 70: ...70...
Page 110: ...110 Populating the topology database Adding nodes and objects...
Page 158: ...158 Responding Managing flow alert rules...
Page 188: ...188...
Page 242: ...242 Reporting Playing recorded traffic...
Page 268: ...268 Managing log files Exporting data...
Page 316: ...316 Advanced configuration Configuring advanced parameters...
Page 318: ...318...
Page 338: ...338 SQL reference Using MySQL tables...
Page 366: ...366 Glossary...
Page 392: ...392 Index...