Additional Hardware Requirements; Additional Software Requirements; Browser Support - Juniper SECURITY THREAT RESPONSE MANAGER - LOG MANAGEMENT INSTALLATION REV 1 Installation Manual

Table of Contents

Advertisement

4
P
F
Y
REPARING
OR
Additional
Hardware
Requirements
Additional Software
Requirements

Browser Support

Preparing Your
Network Hierarchy
I
OUR
NSTALLATION
Event Collector - The Event Collector gathers events from local and remote
device sources. The Event Collector normalizes events and sends the
information to the Event Processor. Before being sent to the Event Processor,
the Event Collector bundles identical events to conserve system usage.
Event Processor - Processes events collected from one or more Event
Collector(s). Once received, the Event Processor correlates the information
from STRM-LM and distributes to the appropriate area, depending on the type
of event. Rules are applied to the events that allow the Event Processor to
process according to the configured rules.
Before installing your STRM-LM systems, make sure you have access to the
additional hardware components:
Monitor and keyboard or a serial console
To make sure that your STRM-LM data is preserved during a power failure, we
highly recommend that all STRM-LM appliances or systems running STRM-LM
software storing data (such as, Consoles or Event Processors) be equipped
with a Uninterrupted Power Supply (UPS).
Before installing STRM-LM, make sure you have Java Runtime Environment
installed on your system. You can download Java version 1.5.0_15 at the following
web site: http://java.com/
You must have a browser installed on your client system to access the STRM-LM
interface. STRM-LM supports the following web browsers:
- Microsoft Internet Explorer 6.0/7.0
- Firefox 2.0
STRM-LM uses the network hierarchy to understand your network traffic and
provide you with the ability to view network activity for your entire deployment.
STRM-LM supports any network hierarchy that can be defined by a range of IP
addresses. You can create your network based on many different variables,
including geographical or business units. For example, your network hierarchy
may include corporate IP address ranges (internal or external), physical
departments or areas, mails servers, and web servers.
Once you define the components you wish to add to your network hierarchy and
install STRM-LM, you can then configure the network hierarchy using the
STRM-LM interface. For each component you wish to add to your network
hierarchy, use the following table to indicate each component in your network map.
STRM-LM Installation Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Strm log management

Table of Contents