11
Contents
Backup up cluster-wide data ....................................................................282
Integrating third-party events ........................................................................282
Integrating via Smart Agents ..................................................................283
Integrating with Symantec Decoy Server ..............................................285
Establishing high availability failover ...........................................................287
Monitoring node availability ...................................................................287
Configuring availability for single nodes ...............................................288
Configuring availability for multiple nodes ..........................................289
Configuring watchdog processes .............................................................293
Backing up and restoring ..................................................................................297
Backing up and restoring on the Network Security console ...............298
Backing up and restoring on compact flash ..........................................302
Configuring advanced parameters ..................................................................308
About parameters for clusters, nodes, and sensors .............................309
About basic setup and advanced tuning .................................................309
Configuring node parameters ..................................................................310
Configuring basic parameters ..................................................................310
Configuring Network Security console parameters .............................311
Configuring advanced parameters ..........................................................311
Section 4
Appendices
Appendix A
User groups reference
About user groups .............................................................................................319
About group permissions .........................................................................319
Permissions by group ................................................................................320
Permissions by task ...................................................................................321
Appendix B
SQL reference
About SQL export parameters .........................................................................325
Setting up SQL export ...............................................................................325
Using Oracle tables ............................................................................................326
Oracle incident table .................................................................................326
Oracle event table ......................................................................................328
Using MySQL tables ..........................................................................................332
MySQL incident table ................................................................................332
MySQL event table .....................................................................................334
Glossary
Acronyms
Содержание 10521146 - Network Security 7120
Страница 1: ...Symantec Network Security Administration Guide...
Страница 12: ...12 Contents Index...
Страница 14: ...14...
Страница 70: ...70...
Страница 110: ...110 Populating the topology database Adding nodes and objects...
Страница 158: ...158 Responding Managing flow alert rules...
Страница 188: ...188...
Страница 242: ...242 Reporting Playing recorded traffic...
Страница 268: ...268 Managing log files Exporting data...
Страница 316: ...316 Advanced configuration Configuring advanced parameters...
Страница 317: ...Part IV Appendices The following appendices provide additional reference information User groups reference SQL reference...
Страница 318: ...318...
Страница 338: ...338 SQL reference Using MySQL tables...
Страница 366: ...366 Glossary...
Страница 392: ...392 Index...