Preparing For Your Installation; Deploying Strm - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - INSTALLATION REV1 Installation Manual

Table of Contents

Advertisement

1
P
I
NSTALLATION
This chapter provides information for when planning your STRM deployment
including:
Your STRM deployment may consist of STRM installed on one or multiple
systems. You can use the STRM three-tier architecture to install any or all
components on a single server for small enterprises or distributed across multiple
servers for maximum performance and scalability in large enterprise
environments.
To ensure a successful STRM deployment, adhere to the recommendations in this
document.
REPARING

Deploying STRM

Additional Hardware Requirements
Additional Software Requirements
Browser Support
Preparing Your Network Hierarchy
Identifying Network Settings
Identifying Security Monitoring Devices and Flow Data Sources
Identifying Network Assets
STRM Installation Guide
F
Y
OR
OUR

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents