Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 Administration Manual page 52

Strm administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2:
Table of Contents

Advertisement

44
S
U
STRM
ETTING
P
Step 6
Step 7
In the Device Access box, you must include any STRM systems you wish to have
access to this managed host. Only managed hosts listed will have access. For
example, if you enter one IP address, only that one IP address will be granted
access to the managed host. All other managed hosts are blocked.
To configure access:
In the IP Address field, enter the IP address of the managed host you wish to
a
have access.
From the Protocol list box, select the protocol you wish to enable access for the
b
specified IP address and port:
- UDP - Allows UDP traffic.
- TCP - Allows TCP traffic.
- Any - Allows any traffic.
In the Port field, enter the port on which you wish to enable communications.
c
Note: If you change your External Flow Source Monitoring Port parameter in the
QFlow Configuration, you must also update your firewall access configuration.
Click Allow.
d
In the System Administration Web Control box, enter the IP address of managed
hosts that you wish to allow access to the web-based system administration
interface in the IP Address field. Only IP addresses listed will have access to the
interface. If you leave the field blank, all IP addresses will have access. Click
Allow.
Note: Make sure you include the IP address of your client desktop you wish to
access the interface. Failing to do so may affect connectivity.
STRM Administration Guide

Advertisement

Table of Contents
loading

Table of Contents