Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 Administration Manual page 92

Strm log management administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1:
Table of Contents

Advertisement

86
I
NDEX
removing 68
set-up 38
maximum real-time results 28
MIB 83
N
NAT
editing 70
enabling 68
removing 70
using with STRM Log Management 68
Network Address Translation. See NAT
network hierarchy
creating 22
NTP 43
O
off-site source 62
off-site target 62
P
passwords
changing 40
Q
STRM Log Management components 76
STRM Log Management user 12
R
RADIUS authentication 15
RDATE 41
recovery 45
restarting STRM Log Management 35
role 9
administrator 10
creating 9
editing 11
managing 9
S
SNMP agent
accessing 35
SNMP Settings 29
source
,
off-site 61
62
starting STRM Log Management 35
stopping STRM Log Management 35
syslog
forwarding 79
adding 79
deleting 81
editing 80
system authentication 15
system settings 27
system thresholds 31
system time 41
system view
T
TACACS authentication 15
target
thresholds 31
time 41
time limit
U
user
users
STRM Log Management Administration Guide
,
configuring 27
33
about 54
assigning components 72
Host Context 73
managed host 72
managing 63
,
off-site 61
62
command like execution 29
reporting execution 29
web execution 28
creating account 12
,
editing account 13
14
managing 9
roles 9
authentication 15

Advertisement

Table of Contents
loading

Table of Contents