12.07.2015 Views

Symantec™ Security Gateways Reference Guide - Sawmill

Symantec™ Security Gateways Reference Guide - Sawmill

Symantec™ Security Gateways Reference Guide - Sawmill

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

8 ContentsChapter 9Chapter 10Appendix APreventing attacksAntivirus (appliance only) ......................................................................................................................................113Understanding antivirus ................................................................................................................................113Virus detection .................................................................................................................................................114Antivirus scanning ..........................................................................................................................................115Client comforting .............................................................................................................................................116Container policy ...............................................................................................................................................116Intrusion detection and prevention (appliance only) ........................................................................................116State machines .................................................................................................................................................117Signature engine ..............................................................................................................................................117Global gating ....................................................................................................................................................117Logical network interfaces .....................................................................................................................................118Allow multicast (UDP-based) traffic .............................................................................................................118SYN flood protection .......................................................................................................................................118Enable port scan detection .............................................................................................................................119Enable spoof protection ..................................................................................................................................120Provide recursion and expose private DNS information ...........................................................................120Suppress reset and ICMP error messages ....................................................................................................120Address transforms .................................................................................................................................................120Understanding address transforms ..............................................................................................................121Address transparency .....................................................................................................................................121Redirected services ..........................................................................................................................................124Network address translation .........................................................................................................................125Anti-spam measures ...............................................................................................................................................125Ensuring availabilityLimitations of non-clustered solutions ................................................................................................................127Single-machine drawbacks ............................................................................................................................127Multi-machine concerns .................................................................................................................................128Symantec’s clustered approach .............................................................................................................................128Cluster components ................................................................................................................................................128Synchawk daemon ...........................................................................................................................................128Bullfrog daemon ...............................................................................................................................................129Virtual IP addresses ........................................................................................................................................129Incident node ....................................................................................................................................................129Authoritative node ..........................................................................................................................................130Heartbeat network ...........................................................................................................................................130Stateful failover .......................................................................................................................................................130Load balancing .........................................................................................................................................................131Cluster administration ............................................................................................................................................131Creating a new cluster and adding nodes ....................................................................................................131Deleting nodes from a cluster ........................................................................................................................132Log messagesAbout log messages .................................................................................................................................................133Informational messages (100-199) .......................................................................................................................133Notice messages (200-299) .....................................................................................................................................158Warning messages (300-399) .................................................................................................................................176Error messages (400-499) .......................................................................................................................................229Alert messages (500-599) .......................................................................................................................................256Critical messages (600-699) ...................................................................................................................................260Emergency messages (700-799) ............................................................................................................................269

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!