Defining Your Network Hierarchy - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 Administration Manual

Strm log management administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1:
Table of Contents

Advertisement

Defining Your
Network Hierarchy
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Note:
We recommend
objects. This may cause you difficulty in viewing detailed information for each
group.
You may also wish to define an all encompassing group so when you define new
networks, the appropriate policies and behavioral monitors are applied. For
example:
Group
Cleveland
Cleveland
Cleveland
To define your network hierarchy:
In the Administration Console, click the System Configuration tab.
The System Configuration panel appears.
Click the Network Hierarchy icon.
The Network Views window appears.
From the menu tree, select the areas of the network you wish to add a network
component.
The Manage Group window appears for the selected network component.
Click Add.
The Add Network Object window appears.
Enter your network object values:
Table 3-1 Add New Object Parameters
Parameter
Action
Group
Specify the group for the new network object. Click Add Group
to specify the group.
Name
Specify the name for the object.
Weight
Specify the weight of the object. The range is 1 to 100 and
indicates the importance of the object in the system.
IP/CIDR(s)
Specify the CIDR range(s) for this object. For more information
on CIDR values, see
Description
Specify a description for this network object.
Color
Specify a color for this object.
Database Length
Specify the database length.
Click Save.
Repeat for all network objects.
STRM Log Management Administration Guide
that you do not configure a network group with more than 15
Subgroup
Cleveland misc
Cleveland Sales
Cleveland Marketing
Accepted CIDR Values
Creating Your Network Hierarchy
IP Address
10.10.0.0/16
10.10.8.0/21
10.10.1.0/24
.
23

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents