Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - GETTING STARTED WITH STRM LOG MANAGEMENT APPLIANCES REV 1 Getting Started
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - GETTING STARTED WITH STRM LOG MANAGEMENT APPLIANCES REV 1 Getting Started

Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - GETTING STARTED WITH STRM LOG MANAGEMENT APPLIANCES REV 1 Getting Started

Getting started with strm log management appliances
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 - GETTING STARTED WITH STRM LOG MANAGEMENT APPLIANCES REV 1:

Advertisement

Security Threat Response Manager
Getting Started with STRM Log Manage-
ment Appliances
Release 2008.2
Juniper Networks, Inc.
1194 North Mathilda Avenue
Sunnyvale, CA 94089
USA
408-745-2000
www.juniper.net
Part Number: 530-025623-01, Revision 1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SECURITY THREAT RESPONSE MANAGER 2008.2 - GETTING STARTED WITH STRM LOG MANAGEMENT APPLIANCES REV 1 and is the answer not in the manual?

Questions and answers

Summary of Contents for Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - GETTING STARTED WITH STRM LOG MANAGEMENT APPLIANCES REV 1

  • Page 1 Security Threat Response Manager Getting Started with STRM Log Manage- ment Appliances Release 2008.2 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 408-745-2000 www.juniper.net Part Number: 530-025623-01, Revision 1...
  • Page 2 Juniper Networks or their respective owners. All specifications are subject to change without notice. Juniper Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update information in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
  • Page 3 ONTENTS Before You Begin 1 STRM Log Management Appliance Installation and Configuration 3 Before You Begin Before performing these procedures, you must have access to the following: Hardware Requirements — You must have access to a hard drive, monitor, • keyboard, and mouse to log in to the application.
  • Page 5: Connect To External Devices

    STRM Log Management Appliance Installation and Configuration Unpack Your Appliance Save all shipping materials in case you need them later. (Your appliance may not include all accessories shown.) Install the Appliance in a Rack See the Hardware Installation Guide for instructions on installing your appliance in a rack.
  • Page 6 Enter Your Activation Key The activation key is a 24-digit four-part (separated by hyphens) alphanumeric string that you receive from Juniper Networks. Press Next. The Tuning Template window appears. Select a Tuning Template Using the left/right arrow keys, select Next.
  • Page 7: Configure Time Zone

    Enter the Date and Time Enter the current date and time. Using the left/right arrow keys, select Next. Press Enter. The Time Zone window appears. Go to Step 14. Enter Time Server Name In the text field, enter the time server name or IP address.
  • Page 8: Configure Passwords

    Configure STRM Log Management Settings Using the up/down arrow keys to navigate the fields, update the following parameters: Hostname - Domain name as hostname. • IP Address - IP address of the appliance. • Netmask - Network mask address. • Gateway - Default gateway.
  • Page 9 Access STRM Log Management Open your web browser. Log in to STRM Log Management: https://<IP Address> Where <IP Address> is the IP address of the STRM Log Management Console. The default values are: Username: admin Password: <your root password> For your STRM Log Management Console, a default key provides you access to STRM Log Management for five weeks.

This manual is also suitable for:

Security threat response manager

Table of Contents