Juniper Secure Analytics 3800 Hardware Guide
Identifying Network Settings
Identifying Security Monitoring Devices and Flow Data Sources
40
Table 13: Network Hierarchy (continued)
Description
Name
Example for DMZ
Internal
For more information, see the Juniper Secure Analytics Administration Guide.
The following sections explain how to set your network before you install the JSA software:
Identifying Network Settings on page 40
Identifying Security Monitoring Devices and Flow Data Sources on page 40
Identifying Network Assets on page 41
Before you install Juniper Secure Analytics (JSA), you must have the following information
for each system you want to install:
Hostname
IP address
Network mask address
Subnet mask
Default gateway
Primary DNS server
Secondary DNS server (optional)
Public IP address for networks using Network Address Translation (NAT)
E-mail server
NTP server (console only) or Time server
Juniper Secure Analytics (JSA) can collect and correlate events received from external
sources such as security equipment (for example, firewalls, VPNs, or IDSs), and host or
application security logs, such as Windows logs. Device Support Modules (DSMs), and
Flow Collectors allow you to integrate JSA with this external data. JSA automatically
discovers sensor devices that are sending system log (syslog) messages to an Event
Collector. The sensor devices that are automatically discovered by JSA appear in the
Sensor Devices window within the JSA Administration console. Once autodiscovery is
completed, you should disable the Auto Detection Enabled option in the Event Collector
configuration. For more information, see the Juniper Secure Analytics Administration Guide
and Log Sources Users Guide.
IP/CIDR Value
Color
0.0.0.1/32
#000099
Copyright © 2015, Juniper Networks, Inc.
Weight
50