Network Settings
Information on configuring network interfaces and information on your Network Security appliance.
- Configuring protection interfaces
Use the Protection Interfaces page to configure the Protection Mode and the Speed and Duplex mode for each interface. - High availability overview
Two IBM QRadar Network Security appliances can mirror traffic in an existing high availability network environment by using high availability (HA) mode. - Configuring management interfaces
Use the Management Interfaces page to view and configure the network management interfaces for the appliance. - Configuring management access policy rules
You can create an ordered list of rules to control administrative access to the appliance management interfaces from hosts that are connected to the management network. - Configuring static routes
Configure static routes to the paired protection interfaces on your appliance to enable network routers to redirect users to block pages or authentication pages. - Flow data overview
You can use flow data to investigate traffic mix and bandwidth usage. - Managing outbound SSL inspection certificates
Before you use the Outbound SSL Inspection policy to inspect traffic, you must determine which signing certificate the Network Security appliance uses for the SSL key negotiation. - Managing inbound SSL inspection certificates
Before you can inspect traffic that is based on rules that you configure in the Inbound SSL Inspection policy, you must provide the certificate and the private key that are used on the destination server. - Configuring server certificate verification settings for outbound SSL inspection
The Network Security appliance must verify the server certificate for the destination servers it is trying to establish a connection with before it can perform outbound SSL inspection. If the appliance does not recognize the certificate authority (CA) that signed the server certificate, then it does not trust the server certificate and does not perform outbound SSL inspection. - Configuring an advanced threat protection agent
Configure the Network Security appliance to accept alert information from advanced threat protection agents. The appliance uses this alert information to quarantine traffic. - Configuring trusted authentication certificates
Use the Management Certificate Authorities page to view a list of trusted certificate authority (CA) root certificates that are included with the appliance or to upload your own certificate authority (CA) certificates to the appliance. The appliance uses the root certificates to manage server certificate verification for SSL connections to the SiteProtector™ System and to the Update Server.
Parent topic: Manage: System Settings