12.07.2015 Views

Quick Start for Network Agent 5-Step Quick Start See - Websense ...

Quick Start for Network Agent 5-Step Quick Start See - Websense ...

Quick Start for Network Agent 5-Step Quick Start See - Websense ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Quick</strong> <strong>Start</strong> <strong>for</strong> <strong>Network</strong> <strong>Agent</strong><strong>Network</strong> Interface Card (NIC) Settings(Planning worksheet 4) The NIC used <strong>for</strong> monitoring can be set <strong>for</strong> stealth mode (no IP address), butit must be associated with a second NIC that is assigned an IP address and is used <strong>for</strong> blocking.Identification: The selected NIC.Monitoring: Use this NIC to monitor traffic? (If the <strong>Network</strong> <strong>Agent</strong> machine has multiple NICs,you can configure more than one NIC to monitor traffic. Each monitoring NIC must capture allpackets it is assigned, not just packets that are addressed directly to it.)NOTEIf <strong>Network</strong> <strong>Agent</strong> runs on a Linux or Solaris machine with multipleNICs, the operating system determines real-time which NIC to use <strong>for</strong>monitoring. <strong>Network</strong> <strong>Agent</strong> may sometimes use a NIC other than theone specified here.If you select Yes, click Monitoring to continue configuration of this NIC.• Monitor List: How much of the internal network should be monitored <strong>for</strong> internet andprotocol requests?• All: <strong>Network</strong> <strong>Agent</strong> monitors requests from all machines it sees using the selected NIC.• None: <strong>Network</strong> <strong>Agent</strong> monitors no machines in the selected NIC’s network segment.• Specific: <strong>Network</strong> <strong>Agent</strong> monitors only a portion of the selected NIC’s network segment.If you selected Specific, click Add to identify the IP addresses of the machines to monitor.• Monitor List Exceptions: Identify internal machines to exclude from monitoring.<strong>Quick</strong> <strong>Start</strong> 13 <strong>Network</strong> <strong>Agent</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!