Identifying Network Settings; Identifying Security Monitoring Devices And Flow Data Sources - Juniper 3800 Hardware Manual

Secure analytics
Table of Contents

Advertisement

Juniper Secure Analytics 3800 Hardware Guide

Identifying Network Settings

Identifying Security Monitoring Devices and Flow Data Sources

40
Table 13: Network Hierarchy (continued)
Description
Name
Example for DMZ
Internal
For more information, see the Juniper Secure Analytics Administration Guide.
The following sections explain how to set your network before you install the JSA software:
Identifying Network Settings on page 40
Identifying Security Monitoring Devices and Flow Data Sources on page 40
Identifying Network Assets on page 41
Before you install Juniper Secure Analytics (JSA), you must have the following information
for each system you want to install:
Hostname
IP address
Network mask address
Subnet mask
Default gateway
Primary DNS server
Secondary DNS server (optional)
Public IP address for networks using Network Address Translation (NAT)
E-mail server
NTP server (console only) or Time server
Juniper Secure Analytics (JSA) can collect and correlate events received from external
sources such as security equipment (for example, firewalls, VPNs, or IDSs), and host or
application security logs, such as Windows logs. Device Support Modules (DSMs), and
Flow Collectors allow you to integrate JSA with this external data. JSA automatically
discovers sensor devices that are sending system log (syslog) messages to an Event
Collector. The sensor devices that are automatically discovered by JSA appear in the
Sensor Devices window within the JSA Administration console. Once autodiscovery is
completed, you should disable the Auto Detection Enabled option in the Event Collector
configuration. For more information, see the Juniper Secure Analytics Administration Guide
and Log Sources Users Guide.
IP/CIDR Value
Color
0.0.0.1/32
#000099
Copyright © 2015, Juniper Networks, Inc.
Weight
50

Advertisement

Table of Contents
loading

Table of Contents