Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1 Manual page 77

Configuring dsms
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1:
Table of Contents

Advertisement

71
destination_port_pattern=<destination port pattern>
protocol_pattern=<protocol pattern>
Where
<source ip pattern>, <source port pattern>, <destination
, and
ip pattern>, <destination port pattern>
<protocol pattern>
are the corresponding patterns identified in
Step
9.
Note: Patterns are case insensitive and you can add multiple patterns. For multiple
patterns, separate using a # symbol.
Save and exit the file.
Step 11
You are now ready to configure the sensor device within the STRM interface. To
configure STRM to receive events from a generic firewall, you must select the
Configurable Firewall Filter option from the Sensor Device Type drop-down list
box. For more information on configuring sensor devices, see the Managing
Sensor Devices Guide.
For more information regarding your firewall, see your vendor documentation.
Configuring DSMs Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents