Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 Administration Manual page 43

Strm log management administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1:
Table of Contents

Advertisement

In the Device Access box, you must include any STRM Log Management systems
Step 6
you wish to have access to this managed host. Only managed hosts listed will
have access. For example, if you enter one IP address, only that one IP address
will be granted access to the managed host. All other managed hosts are blocked.
To configure access:
In the IP Address field, enter the IP address of the managed host you wish to
a
have access.
From the Protocol list box, select the protocol you wish to enable access for the
b
specified IP address and port:
- UDP - Allows UDP traffic.
- TCP - Allows TCP traffic.
- Any - Allows any traffic.
In the Port field, enter the port on which you wish to enable communications.
c
Note: If you change your External Flow Source Monitoring Port parameter in the
QFlow Configuration, you must also update your firewall access configuration.
Click Allow.
d
In the System Administration Web Control box, enter the IP address of managed
Step 7
hosts that you wish to allow access to the web-based system administration
interface in the IP Address field. Only IP addresses listed will have access to the
interface. If you leave the field blank, all IP addresses will have access. Click
Allow.
Note: Make sure you include the IP address of your client desktop you wish to
access the interface. Failing to do so may affect connectivity.
STRM Log Management Administration Guide
Configuring Access Settings
37

Advertisement

Table of Contents
loading

Table of Contents