299
Advanced configuration
Backing up and restoring
Reapplying policy assignments after failure
In a cluster, the master node stores the definitions of protection policies that
you apply to slave nodes. If the master node fails or is demoted, the link is
broken between applied policies and their definitions. Slave nodes sometimes
then appear to have viable policies applied that in reality are disabled. Prevent
losing policies through failure by backing up the master node. Prevent losing
policies when demoting by reapplying policy definitions to the new master node.
See
“Setting policies to interfaces”
on page 115.
Copying Symantec Network Security configurations
The Network Security console provides a way to copy a configuration of
Symantec Network Security
easily.
To copy a configuration
1
In the Network Security console, click
Admin >
Node
>
Manage Backups
.
2
In
Select Node
, choose a node from the pull-down list, and click
OK
.
3
In
Backups
, click an existing backup configuration.
4
In
Actions
, click
Secure Copy
.
5
Provide the following information:
■
Filename
: Enter the name of the backup file.
■
Host Name
: Enter the name of the host to copy to.
■
Directory
: Enter the directory.
■
User Name
: Enter the user name.
6
Click
OK
to copy the configuration to the desired location and exit.
Note:
SuperUsers and Administrators can copy a configuration; StandardUsers
and RestrictedUsers cannot. See
“User groups reference”
on page 319 for more
about permissions.
Deleting Symantec Network Security configurations
The Network Security console provides a way to delete an existing configuration
of Symantec Network Security
easily.
To delete a configuration
1
In the Network Security console, click
Admin >
Node
>
Manage Backups
.
2
In
Select Node
, choose a node from the pull-down list, and click
OK
.
Содержание 10521146 - Network Security 7120
Страница 1: ...Symantec Network Security Administration Guide...
Страница 12: ...12 Contents Index...
Страница 14: ...14...
Страница 70: ...70...
Страница 110: ...110 Populating the topology database Adding nodes and objects...
Страница 158: ...158 Responding Managing flow alert rules...
Страница 188: ...188...
Страница 242: ...242 Reporting Playing recorded traffic...
Страница 268: ...268 Managing log files Exporting data...
Страница 316: ...316 Advanced configuration Configuring advanced parameters...
Страница 317: ...Part IV Appendices The following appendices provide additional reference information User groups reference SQL reference...
Страница 318: ...318...
Страница 338: ...338 SQL reference Using MySQL tables...
Страница 366: ...366 Glossary...
Страница 392: ...392 Index...