Download Print this page

Advertisement

Quick Links

STRM Overview
New and Updated
Functionality
STRM R
ELEASE
R
2008.2
ELEASE
J
2008
UNE
Juniper Networks is pleased to introduce STRM 2008.2. This release provides you
with several resolved issues and enhanced functionality.
This document includes:
STRM Overview
New and Updated Functionality
Related Documentation
Contacting Customer Support
Supported Devices and OS Versions
Supported Java and Browser Software
Resolved Issues
Known Issues and Limitations
Note: If your current deployment includes ISS SiteProtector, contact Juniper
Networks Customer Support before you install STRM.
Juniper Networks STRM is a network security management platform that provides
situational awareness and compliance support to organizations that need to
tighten security and improve policy monitoring with a modest investment in time
and resources. STRM goes beyond traditional security information/event
management (SIEM) products and network behavior analysis (NBA) products to
create a command-and-control center that delivers:
Threat Management: STRM detects threats that would otherwise be
missed by product or operational silos.
Log Management: STRM responds to the right threats at the right time
through effective analysis of log files.
Compliance: STRM implements a compliance and reporting safety net with
comprehensive event storage and reporting.
STRM 2008.2 provides you with the following new and updated functionality:
Activation and License Key Enhancement - STRM 2008.2 includes several
enhancements to activation and license keys including:
- Activation Keys - During installation of STRM, you must now enter an
activation key to complete the installation. This activation key is available on
N
OTES
STRM Overview
1
530-025618-01

Advertisement

loading

Summary of Contents for Juniper STRM 2008.2 - RELEASE NOTES

  • Page 1 STRM Overview STRM R ELEASE OTES 2008.2 ELEASE 2008 Juniper Networks is pleased to introduce STRM 2008.2. This release provides you with several resolved issues and enhanced functionality. This document includes: STRM Overview • • New and Updated Functionality Related Documentation •...
  • Page 2 STRM Release Notes the license CD. See the instructions that came with the license CD to install the activation key. - License Keys - The License key functionality is now enhanced in the STRM interface to include individual license keys for each system in your deployment.
  • Page 3 Related Documentation Adaptive Log Exporter Users Guide • Managing Sensor Devices Guide • Managing Vulnerability Assessment • • AQL Flow and Event Query CLI Guide SNMP Agent • Upgrading to STRM 2008.2 • 530-025618-01...
  • Page 4 OS Versions Networks device families and operating systems that support NSM. The table shows whether a device requires STRM to forward logs through NSM. Table 1-1 Supported Juniper Networks Devices and OS Versions Logs Sent Logs Sent Directly to...
  • Page 5 Resolved Issues During Installation Process, Error No Longer Occurs When Root Password is Not Changed During the installation process, a message appears indicating that you are able to use the default root password. However, if you attempted to use the default password, a message appeared indicating that you must enter a new password.
  • Page 6 STRM Release Notes Searching For Source or Destination IP Addresses Using CIDR Value No Longer Causes Error Previously, if you used a CIDR value when searching for source or destination IP addresses in the Flow Viewer, the search did not return valid data and an error message appeared in the log files.
  • Page 7 Resolved Issues Accessing Right-Click Menu In Offense Manager No Longer Results in Error Previously, when using the right mouse button (right-click) on an IP address in the Offense Manager, an error message may have appeared. This no longer occurs. Trusted SSL Key Now Enforced Through Deployment During Upgrade When upgrading from STRM 2008.1 to STRM 2008.1r2, the trusted SSL key may not have been properly enforced through your deployment.
  • Page 8 STRM Release Notes Known Issues and This section describes the known issues and limitations for the following areas: Limitations • General System Configuration • Deployment Editor • • Network Surveillance Offense Manager • Event Viewer • • Flow Viewer Reports •...
  • Page 9 Known Issues and Limitations Not all trusted certificates have an Intermediate key. Verisign certificates are one example that uses an Intermediate key. The overall impact of this problem depends on your particular deployment. The upgrade may fail because the configuration file is missing a line that provides the directory path to your custom certificate key on the server.
  • Page 10 STRM Release Notes System Restoring Configuration Information for Deployment with Encrypted Systems Fails Configuration If you attempt to restore configuration information in a deployment that includes encrypted systems and then deploy all changes, the restore process fails for the encrypted systems. Workaround: Follow the Restoring Your Configuration procedure outlined in the STRM Administration Guide, however, before you deploy all changes, wait for the STRM interface to become active.
  • Page 11 Known Issues and Limitations Network Surveillance Graph By Lines Option May Display Multiple Lines with Same Color When you are viewing a graph that includes multiple network view objects, the graph may display multiple view objects using the same color since the colors are based on the network.
  • Page 12 STRM Release Notes Offense Manager An IP Address Previously Identified as a Remote Attacker Can Not Be Created as an Offense When Creating a New Network Even if your network hierarchy is not defined, STRM can start generating offenses. However, STRM records all generated offenses as remote offenses since no local systems are defined in your network hierarchy.
  • Page 13 Known Issues and Limitations Unable to Remove Custom Event Mapping Once you create a custom event mapping using the event mapping tool in the Event Viewer, you are able to edit the mapping, however, you are unable to remove the event mapping or restore default settings. Workaround: None.
  • Page 14 1194 North Mathilda Avenue Sunnyvale, CA 94089 Copyright © 2008 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. JUNOS and JUNOSe are trademarks of Juniper Networks, Inc.

This manual is also suitable for:

Strm 2008.2