Do you have a question about the SECURITY THREAT RESPONSE MANAGER 2008.2 - GETTING STARTED WITH STRM LOG MANAGEMENT APPLIANCES REV 1 and is the answer not in the manual?
Questions and answers
Related Manuals for Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - GETTING STARTED WITH STRM LOG MANAGEMENT APPLIANCES REV 1
Summary of Contents for Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - GETTING STARTED WITH STRM LOG MANAGEMENT APPLIANCES REV 1
Page 1
Security Threat Response Manager Getting Started with STRM Log Manage- ment Appliances Release 2008.2 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 408-745-2000 www.juniper.net Part Number: 530-025623-01, Revision 1...
Page 2
Juniper Networks or their respective owners. All specifications are subject to change without notice. Juniper Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update information in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
Page 3
ONTENTS Before You Begin 1 STRM Log Management Appliance Installation and Configuration 3 Before You Begin Before performing these procedures, you must have access to the following: Hardware Requirements — You must have access to a hard drive, monitor, • keyboard, and mouse to log in to the application.
STRM Log Management Appliance Installation and Configuration Unpack Your Appliance Save all shipping materials in case you need them later. (Your appliance may not include all accessories shown.) Install the Appliance in a Rack See the Hardware Installation Guide for instructions on installing your appliance in a rack.
Page 6
Enter Your Activation Key The activation key is a 24-digit four-part (separated by hyphens) alphanumeric string that you receive from Juniper Networks. Press Next. The Tuning Template window appears. Select a Tuning Template Using the left/right arrow keys, select Next.
Enter the Date and Time Enter the current date and time. Using the left/right arrow keys, select Next. Press Enter. The Time Zone window appears. Go to Step 14. Enter Time Server Name In the text field, enter the time server name or IP address.
Configure STRM Log Management Settings Using the up/down arrow keys to navigate the fields, update the following parameters: Hostname - Domain name as hostname. • IP Address - IP address of the appliance. • Netmask - Network mask address. • Gateway - Default gateway.
Page 9
Access STRM Log Management Open your web browser. Log in to STRM Log Management: https://<IP Address> Where <IP Address> is the IP address of the STRM Log Management Console. The default values are: Username: admin Password: <your root password> For your STRM Log Management Console, a default key provides you access to STRM Log Management for five weeks.
Need help?
Do you have a question about the SECURITY THREAT RESPONSE MANAGER 2008.2 - GETTING STARTED WITH STRM LOG MANAGEMENT APPLIANCES REV 1 and is the answer not in the manual?
Questions and answers