Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 Administration Manual page 86

Strm administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2:
Table of Contents

Advertisement

78
U
D
SING THE
EPLOYMENT
Step 1
Step 2
E
DITOR
If you wish to disconnect the off-site source, you must remove the connections
from both deployments. From deployment A, you must remove the off-site target
and in deployment B, you must remove the off-site source.
If you wish to enable encryption between deployments, you must enable
encryption on both off-site source and target. Also, you must ensure both the
off-site source and target include the public keys to ensure appropriate access. For
example, in the example below, if you wish to enable encryption between the
off-site source and Event Collector B, you must copy the public key (located at
/root/.ssh/id_rsa.pub) from the Event Collector to the off-site source (copy the file
to /root/.ssh/authorized_keys).
Event Collector A
Event Processor
Magistrate
Figure 5-3 Example of Connecting Deployments
To forward normalized events:
In the deployment editor, click the Event View tab.
The Event View appears.
In the Components panel, select either Add Off-site Source or Add Off-site
Target.
The Adding a New Component Wizard appears.
STRM Administration Guide
Off-site
Source
Off-site
Target
Event Collector B
Event Processor
Magistrate

Advertisement

Table of Contents
loading

Table of Contents