SMC Manager configuration allows you to customize how the SMC components work.
This online help was created for Forcepoint Network Security Platform, version 7.3.0.
Before setting up Forcepoint Network Security Platform, it is useful to know what the different components do and what engine roles are available.
Before you can set up the system and start configuring elements, you must consider how the different SMC components should be positioned and deployed.
After deploying the SMC components, you are ready to start using the SMC Client and carrying out some of the first configuration tasks.
You can use the SMC to monitor system components and third-party devices. You can also view and filter logs, and create Reports from them.
You can command and set options for engines through the SMC Client or on the engine command line. You can also stop traffic manually.
Administrator accounts define administrator rights and permissions in the SMC.
The SMC can escalate the alerts generated so that notifications are sent to the administrators through multiple channels.
Domain elements allow you to restrict which elements are displayed to the administrators in the SMC Client and in the optional Web Portal. They also allow you to define in which administrative Domains an administrator has permissions. Configuring Domains requires a special license.
Using the Web Portal, customers of managed service providers can access information about their systems.
To avoid installing the full Java-based SMC Client on each workstation that an administrator uses, you can run the SMC Client in a web browser.
When the Management Server provides the SMC Client for download, administrators can download and install the SMC Client from the SMC Downloads page.
You can modify a Log Server element, configure settings for Log Servers, and recertify Log Servers.
You can install several Management Servers and Log Servers to provide high availability for the SMC.
You can modify settings for Management Servers, change hardware platforms or the IP addresses used in system communications, change the type of certificate authority, and change the role of Security Engines.
You can create and modify Engines, IPS engines, Layer 2 Engines, Master Engines and Virtual Security Engines. You can configure the Security Engine properties, activate optional features, and configure advanced Security Engine settings.
Use the SMC Client to configure static or dynamic routing, and use a Multi-Link configuration to manage and distribute inbound and outbound connections.
Policies are key elements that contain rules for allowing or blocking network traffic and inspecting the content of traffic.
User accounts are stored in internal databases or external directory servers. You can use Forcepoint Network Security Platform in the Engine/VPN role or external authentication servers to authenticate users.
Forcepoint Network Security Platform supports both policy-based and Route-based Tunnels between VPN gateways. For full remote access, Forcepoint Network Security Platform supports both IPsec and SSL VPN tunnels for VPN clients.
Maintenance includes procedures that you do not typically need to do frequently.
Troubleshooting helps you resolve common problems in the Forcepoint Network Security Platform and SMC.