Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1 Manual page 145

Configuring dsms
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1:
Table of Contents

Advertisement

Integrating Nortel
Switched Firewall
Using OPSEC
Step 1
Step 2
Step 3
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Step 8
Step 9
Step 10
This method ensures the STRM Nortel Switched Firewall 5100 DSM accepts
CheckPoint FireWall-1 events using OPSEC. To enable Nortel Switched Firewall
and STRM integration, you must:
Reconfigure Check Point SmartCenter Server. See
SmartCenter
Server.
Configure the OPSEC LEA protocol in the STRM interface.
To configure STRM to receive event from a Check Point SmartCenter Server using
OPSEC LEA, you must select the LEA option from the Protocol drop-down list box
when configuring your protocol configuration. For more information, see
Configuring Protocols in the Managing Sensor Devices Guide.
Configure the sensor device within the STRM interface.
To configure STRM to receive events from a Nortel Switched Firewall 5100 device
using OPSEC, you must select the Nortel Switched Firewall 5100 option from the
Sensor Device Type drop-down list box. For more information on configuring
sensor devices, see the Managing Sensor Devices Guide.
For more information, see your vendor documentation.
Reconfiguring Check Point SmartCenter Server
This section describes how to reconfigure the Check Point SmartCenter Server. In
the Check Point SmartCenter Server, create a host object representing the STRM
system. The leapipe is the connection between the Check Point SmartCenter
Server and STRM.
To reconfigure the Check Point SmartCenter Server:
To create a host object, open the Check Point SmartDashboard GUI and select
Manage > Network Objects > New > Node > Host.
Enter in the Name, IP Address, and optional Comment for your host.
Click OK.
Select Close.
To create the OPSEC connection, select Manage > Servers and OPSEC
applications > New > OPSEC Application Properties.
Enter the Name and optional Comment.
Note: The name you enter must be different than the name entered in
From the Host drop-down menu, select the host object you have created in
1.
From Application Properties, select User Defined as the vendor.
From Client Entries, select LEA.
Click Communication to generate a Secure Internal Communication (SIC)
certificate and enter an activation key.
Configuring DSMs Guide
Integrating Nortel Switched Firewall Using OPSEC
Reconfiguring Check Point
139
Step
2.
Step

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1 and is the answer not in the manual?

This manual is also suitable for:

Security threat response manager

Table of Contents