Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1 Manual page 65

Configuring dsms
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1:
Table of Contents

Advertisement

25
E
XTREME
E
XTREME
A STRM ExtremeWare DSM accepts Extreme events using syslog. STRM records
all relevant events. Before you configure STRM to integrate with an ExtremeWare
device, you must configure syslog within your Extreme device.
You are now ready to configure the sensor device within the STRM interface. To
configure STRM to receive events from your ExtremeWare device, choose one of
the following options:
If you are using STRM 6.0, select ExtremeWare from the Sensor Device Type
drop-down list box.
If you are using STRM 6.0.1 and above, select Extreme Networks
ExtremeWare Operating System (OS) from the Sensor Device Type
drop-down list box.
For more information on configuring devices, see the Managing Sensor Devices
Guide. For more information on configuring Extreme, consult your vendor
documentation.
Configuring DSMs Guide
N
ETWORKS
W
ARE

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents