Changing The Network Settings Of A Non-Console In A Multi-System Deployment - Juniper SECURITY THREAT RESPONSE MANAGER - LOG MANAGEMENT INSTALLATION REV 1 Installation Manual

Table of Contents

Advertisement

Changing the
Network Settings of
a Non-Console in a
Multi-System
Deployment
Removing the
Non-Console
Managed Host
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Step 8
Step 9

Changing the Network Settings of a Non-Console in a Multi-System Deployment

To change the network settings of a non-Console in a multi-system deployment,
you must remove all non-Console managed host from the deployment, change the
network settings, re-add the managed host, and then re-assign the component(s).
You must perform this procedure in the following order:
Removing the Non-Console Managed Host
Changing the Network Settings
Re-Adding the Managed Host and Re-Assigning the Components
Note: This procedure requires you to use the Deployment Editor. For more
information on using the Deployment Editor, see the STRM-LM Administration
Guide.
To remove non-Console managed host from your deployment, you must:
Log in to STRM-LM:
https://<
IP Address
Where <
IP Address
Username: admin
Password: <root password>
Where <root password> is the password assigned to STRM-LM during the
installation process.
In the main STRM-LM Interface, click Config.
In the main STRM-LM Interface, click Config.
Click the deployment editor icon.
Click the System View tab.
Select the managed host you wish to delete.
Use the right mouse button (right-click) to access the menu, select Remove host.
From the Administrative Console menu, select Configurations > Deploy
Configuration Changes.
Exit from the Administration Console.
Note: If the Administration Console is still active on your system tray, use the
right-mouse button (right-click) to access the menu and select Exit.
Changes are deployed.
STRM Installation Guide
>
> is the IP address of the STRM-LM system.
21

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SECURITY THREAT RESPONSE MANAGER - LOG MANAGEMENT INSTALLATION REV 1 and is the answer not in the manual?

This manual is also suitable for:

Strm log management

Table of Contents