Summary of Contents for Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - INSTALLATION REV1
Page 1
Security Threat Response Manager STRM Installation Guide Release 2008.2 R2 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 408-745-2000 www.juniper.net Part Number: 530-027290-01, Revision 1...
Page 2
Juniper Networks or their respective owners. All specifications are subject to change without notice. Juniper Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update information in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
Qmmunity web site, locate the product and software release for which you require documentation. Your comments are important to us. Please send your e-mail comments about this guide or any of the Juniper Networks documentation to: documentation@Juniper.net. Include the following information with your comments: Document title •...
Page 6
BOUT UIDE • Access Qmmunity and Self-Service support using e-mail: support@juniper.net Telephone assistance: 1.866.377.7000. • STRM Installation Guide...
REPARING NSTALLATION This chapter provides information for when planning your STRM deployment including: Deploying STRM • Additional Hardware Requirements • Additional Software Requirements • Browser Support • Preparing Your Network Hierarchy • Identifying Network Settings • Identifying Security Monitoring Devices and Flow Data Sources •...
Page 8
REPARING NSTALLATION Deploying STRM You can deploy STRM using STRM appliances or STRM software installed on your own hardware. This section provides information on deploying STRM including: STRM Components • A STRM appliance includes STRM software and a CentOS-4 operating system. For further information on STRM appliances, see the Hardware Installation Guide.
Additional Hardware Requirements Event Processor - Processes events collected from one or more Event • Collector(s). Once received, the Event Processor correlates the information from STRM and distributes to the appropriate area, depending on the type of event. The Event Processor also includes information gathered by STRM to indicate any behavioral changes or policy violations for the event.
REPARING NSTALLATION You can create your network based on many different variables, including geographical or business units. For example, your network hierarchy may include corporate IP address ranges (internal or external), physical departments or areas, mails servers, and web servers. Once you define the components you wish to add to your network hierarchy and install STRM, you can then configure the network hierarchy using the STRM interface.
Identifying Security Monitoring Devices and Flow Data Sources E-mail Server • NTP Server (Console only) or Time server • Identifying Security STRM can collect and correlate events received from external sources such as Monitoring Devices security equipment (for example, firewalls, VPNs, or IDSs) and host or application and Flow Data security logs, such as, window logs.
REPARING NSTALLATION • Credibility indicates the integrity of an event or offense as determined by the credibility rating from source devices. Credibility increases as multiple sources report the same event. Identifying Network STRM can learn about your network and server infrastructure based on flow data. Assets The Server Discovery function uses STRM’s Asset Profile database to discover many types of servers.
STRM NSTALLING This chapter provides information on installing your STRM system using one of the following options: • Setting Up Appliances Installing Japanese Support • Installing STRM Using Red Hat Enterprise 4.6 • Accessing STRM • Setting Up A STRM appliance includes STRM software and a CentOS-4 operating system. Appliances This section provides information on setting up your appliance.
Page 16
STRM NSTALLING The End User License Agreement (EULA) appears. Read the information in the window. Press the Spacebar to advance each window Step 5 until you have reached the end of the document. Type yes to accept the agreement, then press Enter. The activation key window appears.
Page 17
Setting Up Appliances Using the up/down arrow keys, highlight the method you wish to use to set the date Step 8 and time, then use the spacebar to select that option: Manual - Allows you to manually input the time and date. Use the Tab key to •...
Page 18
STRM NSTALLING The Time Zone Region window appears. Note: The options that appear in this window are regions that are associated with the continent or area previously selected. Using the up/down arrow keys, or the page up/page down keys, select your time zone region.
Installing STRM Using Red Hat Enterprise 4.6 To configure the STRM root password: Step 13 Enter your password. Use the TAB key to move to the Next option. Press Enter. The Confirm New Root Password window appears. Re-enter your new password to confirm. Use the TAB key to move to the Finish option.
Page 20
STRM NSTALLING Place the STRM CD in the CD drive. Step 4 Login as root. Step 5 Mount the CD drive and change the CD content location: Step 6 mount /media/cdrom cd /media/cdrom Begin the installation: Step 7 ./setup The End User License Agreement (EULA) appears. Read the information in the window.
Page 21
Installing STRM Using Red Hat Enterprise 4.6 Using the up/down arrow keys, highlight one of the following options and use the Step 10 spacebar to select that option: Yes - Select this option only if this system is a Console. If you select this option, •...
Page 22
STRM NSTALLING • Server - Allows you to specify your time server. Use the Tab key to select the Next option. Press Enter. The Enter Time Server window appears. Go to Step To manually enter the time and date: Step 13 Enter the current date and time.
Page 23
Installing STRM Using Red Hat Enterprise 4.6 To select the time zone continent: Step 15 Using the up/down arrow keys, or the page up/page down keys, select your time zone continent or area. Using the left/right arrow keys, select Next, then press Enter. The Time Zone Region window appears.
STRM NSTALLING Use the TAB key to move to the Next option. Press Enter. The New Root Password window appears. To configure your STRM root password: Step 17 Enter your password. Use the TAB key to move to the Next option. Press Enter. The Confirm New Root Password window appears.
Accessing STRM web site, your Report templates will be replaced to ensure that the appropriate font and characters appear in the Reports interface. Note: To display reports in PDF format, Adobe Acrobat may require the installation of a Japanese plug-in to view your reports. For more information, see your Adobe documentation.
Page 26
STRM NSTALLING Where <root password> is the password assigned to STRM during the installation process. Click Login To STRM. Step 3 For your STRM Console, a default key provides you access to STRM for five weeks. For more information on the license key, see the STRM Administration Guide.
ETTING NTERPRISE STRM supports the 32-bit version of Red Hat Enterprise 4 Update 6. This appendix provides information on setting up Red Hat Enterprise including: Before You Begin • Configuring Network Parameters • Configuring Firewall Configuration • Configuring Disk Partitions •...
ETTING NTERPRISE CAUTION: If the hardware on which you wish to install STRM includes Red Hat Enterprise 4 Update 6, you must re-install Red Hat Enterprise from the CD using the minimal package option. The default Red Hat Enterprise 4 Update 6 installation does not have the appropriate options selected.
Installing Red Hat Enterprise 4 Update 6 For multi-disk deployments only, configure the following partitions for the Console: /store as RAID5 - Stores STRM data. Choose EXT3 as the file system type. • FLOWLOGS and DB are located in the Store partition. In a system with five •...
ETTING NTERPRISE grub The grub command line prompt appears. Enter the following command using the values recorded in Step Step 6 geometry (hd0) <x-value> heads, <y-value> sectors/track, <z-value> cylinders Enter the following command: Step 7 root (hd0,0) Enter the following command: Step 8 setup (hd0) Enter the following command:...
HANGING ETWORK ETTINGS This appendix provides information on changing network settings for the Console and non-Console systems when using Trustix or CentOS-4 operating systems in your deployment including: Changing Network Settings in an All-in-One Console • Changing the Network Settings of a Console in a Multi-System Deployment •...
Page 32
HANGING ETWORK ETTINGS Secondary DNS - Optional. Specify the secondary DNS server. • Public IP - Optional. Specify the Public IP address of the server. This is a • secondary IP address that is used to access the server, usually from a different network or the Internet, and is managed by your network administrator.
Page 33
Changing the Network Settings of a Console in a Multi-System Deployment Use the right mouse button (right-click) to access the menu, select Remove host. Step 6 Repeat for each non-Console managed host until all hosts are deleted. From the Administrative Console menu, select Configurations > Deploy Step 7 Configuration Changes.
Page 34
HANGING ETWORK ETTINGS Re-Adding Managed To re-add the managed host(s) and re-assign component(s), you must: Host(s) and Re-Assigning the Components Log in to STRM and access the System View in the Deployment Editor, as defined Step 1 Step Removing Non-Console Managed Hosts.
Page 35
Changing the Network Settings of a Non-Console in a Multi-System Deployment Changing the To change the network settings of a non-Console in a multi-system deployment, Network Settings of you must remove all non-Console managed host from the deployment, change the a Non-Console in a network settings, re-add the managed host, and then re-assign the component(s).
Page 36
HANGING ETWORK ETTINGS qchange_netsetup The Network Settings window appears. Using the up/down arrow keys to navigate the fields, make the necessary changes Step 3 to the following parameters: • Hostname — Specify a fully qualified domain name as the system hostname. Note: If you change the hostname and you are using Offense Resolution, we recommend you also update the Resolver Agent name, if a Resolver Agent is assigned to the host.
Page 37
Changing the Network Settings of a Non-Console in a Multi-System Deployment Enter the root password of the host — Specify the root password for the • host. Confirm the root password of the host — Specify the password again, for •...
Page 39
NDEX about this guide 1 Japanese support 21 appliances setting-up 11 Magistrate definition 5 browser support 6 network assets Classification Engine identifying 9 definition 4 network hierarchy configuring disk partitions 24 preparing 6 configuring firewall configuration 24 network settings configuring network parameters 24 identifying 7 Console definition 4...
Need help?
Do you have a question about the SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - INSTALLATION REV1 and is the answer not in the manual?
Questions and answers