QUICK START GUIDE TAR "S" (5K02-62), TAR "H" (5K02-66), TAR "MSA" (5K02-67) Release 1.1.00 / Version No.: 06.18.07 Threat Analysis Reporter Model: TAR 1.0...
Page 2
8e6 Technologies. Every effort has been made to ensure the accuracy of this document. However, 8e6 Technologies makes no war- ranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose.
ontents hreat nalysis eporter About this Document ... 2 Conventions Used in this Document ... 2 ...3 erviCe nformation reliminary etup roCedures Unpack the Unit from the Carton ... 4 Rack Mount the “S” or “MSA” Server ... 5 Install the “H” Server Bezel ... 8 Rack Mount the “H”...
Thank you for choosing to evaluate the 8e6 Technologies Threat Analysis Reporter. This product addresses user-generated Web threats such as excessive use of bandwidth and inappropriate Internet usage, and provides network administrators tools to monitor such threats so management can enforce corporate Internet usage policies.
Introduction - This section is comprised of an overview of the Threat Analysis Re- porter product and how to use this document • Service Information - This section provides 8e6 Technologies contact information • Preliminary Setup Procedures - This section includes instructions on how to physi- cally set up the Threat Analysis Reporter unit in your network environment •...
The user should not attempt any maintenance or service on the unit beyond the proce- dures outlined in this document. Any initial hardware setup problem that cannot be resolved at your internal organiza- tion should be referred to an 8e6 Technologies solutions engineer or technical support representative. 8e6 Corporate Headquarters (USA) Local 714.282.6111...
reliminary Unpack the Unit from the Carton Inspect the packaging container for evidence of mishandling during transit. If the packag- ing container is damaged, photograph it for reference. Carefully unpack the unit from the carton and verify that all accessories are included. Save all packing materials in the event that the unit needs to be returned to 8e6 Tech- nologies.
Rack Mount the “S” or “MSA” Server Rack Mount Instructions Rack Setup Suggestions • Determine the placement of each component in the rack before you install the rails. • Install the heaviest server components on the bottom of the rack first, and then work Identify the Sections of the Rack Rails You should have received two rack rail assemblies with the 8e6 server unit.
Page 10
Install the Rack Rails Determine where you want to place the server unit in the rack. Position the fixed rack rail/sliding rail guide assemblies at the desired location in the rack, keeping the sliding rail guide facing the inside of the rack. Screw the assembly securely to the rack using the brackets provided.
Page 11
Installing the Server into a Telco Rack If you are installing the 8e6 server unit into a Telco type rack, follow the directions given on the previous pages for rack installation. The only difference in the installation pro- cedure will be the positioning of the rack brackets to the rack. They should be spaced apart just enough to accommodate the width of the Telco rack.
Install the “H” Server Bezel Before rack mounting the “H” unit, the bezel should be installed on the front end of the chassis. This portion of the installation process requires you to unpack the unit and be- zel. NOTE: The bezel has been packaged separately from the unit to prevent dam- age during shipping.
Page 13
A. Remove the plastic wrapping from the left and right ears. B. On one side of the chassis (left or right), un- screw the inner rail from the chassis. C. Slide the loosened inner rail slightly backwards to release it from the clips at the side of the chassis, and then lay it down beside the chas- sis, with the inside of the rail facing up.
Page 14
F. Return the loosened inner rail to its upright po- sition and insert the bezel pin into the bottom hole of the ear. G. Slide the inner rail forward beneath the clips to lock it in place. H. Screw the inner rail back on the chassis. After it is installed, the bezel should drop down when it is gently tugged forward and down- ward.
Rack Mount the “H” Server Rack Mount Instructions Identify the Sections of the Rack Rails You should have received two rack rail assemblies with the 8e6 server unit. Each of these assemblies consists of two sections: An inner fixed chassis rail that secures to the unit (A), and an outer fixed rack rail that secures directly to the rack itself (B).
Page 16
Install the Server into the Rack You should now have rails attached to both the chassis and the rack unit. The next step is to install the server chassis into the rack. Do this by lining up the rear of the chassis rails with the front of the rack rails.
Page 17
Installing the Server into a Telco Rack If you are installing the 8e6 server unit into a Telco type rack, follow the directions given on the previous page for rack installation. The only difference in the installation proce- dure will be the positioning of the rack brackets to the rack. They should be spaced apart just enough to accommodate the width of the Telco rack.
nstall the Step 1: Initial Setup Procedures This step requires you to link the workstation to the Threat Analysis Reporter. The follow- ing hardware can be used for the initial setup procedures: • Threat Analysis Reporter unit with AC power cord •...
Page 19
Link the Workstation to the Threat Analysis Reporter Monitor and Keyboard Setup A. Connect the PC monitor and keyboard cables to the rear of the chassis. B. Turn on the PC monitor. C. Power on the Threat Analysis Reporter unit by dropping down the face plate and pressing the large button at the right of the front panel (see image below).
HyperTerminal Setup Procedures If using a serial console, follow these procedures to create a HyperTerminal session. A. Launch HyperTerminal by going to Start > Programs > Accessories > Communica- tions > HyperTerminal: B. In the Connection Description dialog box, enter any session Name, and then click OK to open the Connect To dialog box: hreaT nalysis...
Page 21
C. At the Connect using field, select the COM port assigned to the serial port on the laptop (probably “COM1”), and then click OK to open the Properties dialog box, dis- playing the Port Settings tab: D. Specify the following session settings: •...
Page 22
F. In the HyperTerminal session window, go to File > Properties to open the Properties dialog box, displaying the Connect To and Settings tabs: G. Click the Settings tab, and at the Emulation menu select “VT100”. H. Click OK to close the dialog box, and to go to the login screen. NOTE: If using a HyperTerminal session, the login screen will display with black text on a white background.
Page 23
Step-by-Step Initial Setup Procedures For these step-by-step procedures, you will need your network administrator to provide you the LAN 1 (Ethernet 0) and LAN 2 (Ethernet 1) IP address and subnet mask, gate- way IP address, DNS server IP address(es), host name of the server, and IP address for the Web interface (if using a NAT device).
Page 24
E. At the Press the number of your selection prompt, press 2 to display the Adminis- trator Password Entry screen: F. At the Enter the administrator password prompt, re-enter your password: #s3tup#r3k G. Press Enter to display the Administration menu where you can begin the step-by- step initial setup process using the configuration screens: H.
Page 25
Configure Network Interface screen A. At the Enter interface LAN1 (eth0) IP address field, enter the IP address for the LAN 1 (Ethernet 0) interface, and then press Enter to go to the next screen. B. At the Enter interface LAN1 (eth0) netmask field, enter the subnet mask for the LAN 1 (Ethernet 0) interface using the dotted decimals notation format.
Page 26
C. Press Y for “Yes” to confirm and save your entries for the LAN1 (eth0) interface, and to go to the next screen. D. At the Enter interface LAN2 (eth1) IP address field, enter the IP address for the LAN 2 (Ethernet 1) interface, and then press Enter to go to the next screen. E.
Page 27
Configure default gateway screen A. At the Enter default gateway IP field, enter the IP address for the default gateway. Press Enter to display the confirmation prompt. B. Press Y for “Yes” to confirm and save your entry for the gateway IP address, and to go to the Configure Domain Name Servers screen.
Page 28
A. At the Enter first DNS server IP field, enter the IP address for the primary Domain Name Server. Press Enter to go to the next screen. B. At the Enter (optional) second DNS server IP field, if you have a secondary Do- main Name Server you wish to use, enter the IP address for that server.
Page 29
A. At the Enter host name field, enter the host name of the server. Press Enter to dis- play the confirmation prompt. B. Press Y for “Yes” to confirm and save your entry for the host name, and to go to the Time zone regional configuration screen.
Page 30
B. Use the up and down arrows in your keyboard to select your region. After selecting your locality, press Y for “Yes” to confirm and save your regional selection, and to go to the Configure Wizard user screen. Configure Wizard user screen A.
C. At the Enter wizard password field, enter the password that will be used to access the setup wizard in the Threat Analysis Reporter interface. Press Y for “Yes” to con- firm and save your entry and to go to the Setup Wizard Confirmation screen. Setup Wizard Confirmation screen Press Y for “Yes”...
System Status Screen The System Status screen contains the following information: • LAN1 (eth0) interface for web access and R3000 communications: LAN1 (eth0) IP address and netmask specified in screen 3 (Configure Network Interface), and current status (“Active” or “Inactive”) •...
Step 2: Physically Connect the Unit to the Network After performing initial setup procedures for the Threat Analysis Reporter, the unit should be physically connected to the network. This step requires a standard CAT-5E cable to connect the unit to the network. An additional CAT-5E cable is required if the Ethernet Tap unit will be installed for bandwidth monitoring.
Step 3: Wizard Setup Procedures For this step, you will need your network administrator to provide you the following infor- mation: • IP range and netmask of machines on the network the Threat Analysis Reporter server will be monitoring • R3000 IP address, port number to be used between the R3000 and Threat Analysis Reporter, and type of authentication method to be used (IP group or LDAP) •...
Page 35
D. After reading the End User License Agreement, you have the option to do either of the following: • Click No to close both the EULA Agreement dialog box and the Threat Analysis Reporter interface. You will not be able to enable the Threat Analysis Reporter for use in your environment.
Page 36
Step 1: Register administrator Step 1 is performed in the left side of the first screen of the wizard: A. Enter the username the global administrator will use when logging into the Threat Analysis Reporter Administrator console. The global administrator has the highest level of permissions in the Threat Analysis Reporter interface.
Page 37
D. Click the [+] Add tab beow to open the IP Range Information dialog box: E. Enter the IP address range for the bandwidth the Threat Analysis Reporter will moni- tor. F. Enter the Netmask for the IP range to be monitored, using the dotted decimals nota- tion format.
Page 38
NOTE: Additional IP address ranges can be included by clicking the [+] Add tab again and making the entries described in steps E through G above. To modify an IP address range, double-click the entry in the list box to highlight it and to display the [-] Remove tab to the left of the [+] Add tab: •...
Page 39
Step 2: Register R3000 & ER Step 2 is performed in the right side of the first screen of the wizard. R3000: Specify information for the R3000 to be used with the Threat Analysis Reporter: A. Click the [+] Add tab above the R3000 list box to open the R3000 Information dialog box: B.
Page 40
E. Click OK to close the dialog box and to display your entries in the list box: NOTE: Additional R3000 servers can be included by clicking the [+] Add tab again and making the entries described in steps A through E above. To modify an R3000 entry, double-click the R3000 entry in the list box to highlight it and to display the Set as Master tab and the [-] Remove tab to the left of the [+] Add tab:...
Page 41
• To modify the IP address and Server Name for the R3000 server, click the [+] Add tab to re-open the R3000 Information dialog box, and edit information as necessary. Click OK to close the dialog box and to display the modified informa- tion in the list box.
Page 42
NOTE: To change your answer from “Yes” to “No,” click the < Back button to re-display the question “Do you have an Enterprise Reporter?” A. Enter the IP address of the ER server to be used with the Threat Analysis Re- porter.
Page 43
Step 3: Register Gauges Step 3 requires you to specify settings for default gauges to be monitored by the Threat Analysis Reporter. These gauges will display in the Threat Analysis Reporter interface upon logging into the Administrator console. NOTE: Return to Step 1 or Step 2 by clicking the < BACK button in the lower left corner of this wizard screen.
Page 44
View, Edit Gauge Components To view gauge components for a specified gauge, highlight and double-click the gauge name to populate the the fields to the right of the Gauge Groups list box. The following gauge criteria can be edited: • Name: The displayed gauge name to be used in the interface can be modified by making an entry in this field.
Step 4: Server Settings In Step 4, the following R3000 server information displays: Active Directory Settings, SMTP Server Settings, Patch Server Settings, PROXY Server Settings, NTP Server Set- tings: NOTE: Return to Step 3 by clicking the < BACK button in the lower left corner of this wizard screen.
onClusion Congratulations; you have completed the Threat Analysis Reporter quick start proce- dures. Now that the Threat Analysis Reporter is running on your network, the next step is to set up user groups or administrator groups. You will set up and configure gauges thereafter.
Hardware Component Specifications Specification Operating temperature range Storage temperature range Operating humidity range Storage humidity range Power supply Rated AC input voltage Rated input frequency Rated input current Rated output power Maximum rated BTU Nominal DC output: +3.3V Nominal DC output: +5V Nominal DC output: +12V Nominal DC output: -12V Nominal DC output: +5V...
“S” and “MSA” Front Panel LED Indicators, Buttons Diagrams and Descriptions On “S” and “MSA” units, LED indicators and buttons display on the front panel to the right: LED indicators alert you to the status of a feature on the unit while buttons let you per- form a function on the unit.
Unpack the Ethernet Tap Unit from the Box Open the NetOptics Ethernet Tap box and verify that all accessories are included. Save all packing materials in the event that the unit needs to be returned to 8e6 Technologies. The NetOptics box should contain the following items: •...
Install the Ethernet Tap Unit Diagram showing TAR Ethernet Tap installation on the network This step is a continuation from Step 2: Physically Connect the Unit to the Network. The procedures outlined in this step require the use of a CAT-5E cable. A.
Page 52
nsTallaTion C. Using a crossover cable, connect one end to the Switch’s port configured to be the destination port of the Port Mirror. If adding a Threat Analysis Reporter to an existing installation, this port would be the port that was originally occupied by the listening interface of the R3000. D.
Page 53
hreaT hreaT nalysis nalysis eporTer eporTer uick uick TarT TarT uide uide nsTallaTion...
Page 54
8e6 Corporate Headquarters (USA): 828 West Taft Avenue Orange, CA 92865-4232 • Tel: 714.282.6111 or 888.786.7999 Fax: 714.282.6116 (Sales/Technical Support) • 714.282.6117 (General Office) Satellite Office: 8e6 Taiwan: RM B2, 13F, No. 49, Sec. 3, Minsheng E. Rd., Taipei 104, Taiwan, R.O.C. Tel: 886-2-2501-5285 •...
Need help?
Do you have a question about the Threat Analysis Reporter TAR 1.0 and is the answer not in the manual?
Questions and answers