Preparing For Your Installation; Deploying Strm-Lm - Juniper SECURITY THREAT RESPONSE MANAGER - LOG MANAGEMENT INSTALLATION REV 1 Installation Manual

Table of Contents

Advertisement

1
Deploying
STRM-LM
P
REPARING
I
NSTALLATION
This chapter provides information for when planning your STRM-LM deployment
including:

Deploying STRM-LM

Additional Hardware Requirements
Additional Software Requirements
Browser Support
Preparing Your Network Hierarchy
Identifying Network Settings
Identifying Security Monitoring Devices
Your STRM-LM deployment may consist of STRM-LM installed on one or multiple
systems. You can also connect one or multiple STRM 1601system to your
STRM-LM system. For more information on appliances, see the Hardware
Installation Guide.
To ensure a successful STRM-LM deployment, adhere to the recommendations in
this document.
You can deploy STRM-LM using appliances or STRM-LM software installed on
your own hardware. A STRM-LM appliance includes STRM-LM software and a
CentOS-4 operating system. For further information on STRM appliances, see the
Hardware Installation Guide.
STRM-LM components that may exist in your deployment include:
Note: For more information on each STRM-LM component, see the STRM-LM
Administration Guide.
Console - Provides the interface for STRM-LM. The Console is accessed from
a standard web browser. When you access the system, a prompt appears for a
user name and password, which is configured during the installation process.
You must also have Java installed. For information on software requirements,
see
Additional Software
STRM-LM Installation Guide
F
Y
OR
OUR
Requirements.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Strm log management

Table of Contents