Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 Administration Manual page 35

Strm log management administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1:
Table of Contents

Advertisement

Table 3-3 System Settings Parameters (continued)
Parameter
Reporting Execution Time
Limit
Command Line Execution
Time Limit
Event Log Hashing
Hashing Algorithm
SNMP Settings
Enable
Destination Host
STRM Log Management Administration Guide
Description
Specify the maximum amount of time, in seconds, you
wish a reporting query to process before a time out
occurs. The default is 57600 seconds.
Specify the maximum amount of time, in seconds, you
wish a query in the command line to process before a
time out occurs. The default is 0 seconds.
Enables or disables the ability for STRM Log
Management to store a hash file for every stored event
log file. The default is No.
You can use a hashing algorithm for database storage
and encryption. You can use one of the following hashing
algorithms:
Message-Digest Hash Algorithm - Transforms digital
signatures into shorter values called Message-Digests
(MD).
Secure Hash Algorithm (SHA) Hash Algorithm -
Standard algorithm that creates a larger (60 bit) MD.
Specify the log hashing algorithm you wish to use for your
deployment. The options are:
MD2 - Algorithm defined by RFC 1319.
MD5 - Algorithm defined by RFC 1321.
SHA-1 - Default. Algorithm defined by Secure Hash
Standard, NIST FIPS 180-1.
SHA-256 - Algorithm defined by the draft Federal
Information Processing Standard 180-2, Secure
Hashing Standard (SHS). SHA-256 is a 256 bit hash
algorithm intended for 128 bits of security against
security attacks.
SHA-384 - Algorithm defined by the draft Federal
Information Processing Standard 180-2, Secure
Hashing Standard (SHS). SHA-384 is a bit hash
algorithm is provided by truncating the SHA-512
output.
SHA-512 - Algorithm defined by the draft Federal
Information Processing Standard 180-2, Secure
Hashing Standard (SHS). SHA-512 is a bit hash
algorithm intended to provide 256 bits of security.
Enables or disables SNMP responses in the STRM Log
Management custom rules engine. The default is No,
which means you do not wish to accept events using
SNMP.
Specify the IP address to which you wish to send SNMP
notifications.
Configuring System Settings
29

Advertisement

Table of Contents
loading

Table of Contents