Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 Administration Manual page 87

Strm administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2:
Table of Contents

Advertisement

Specify a unique name for the source or target. The name can be up to 15
Step 3
characters in length and may include underscores or hyphens. Click Next.
The event source/target information window appears.
Enter values for the parameters:
Step 4
Enter a name for the off-site host - Specify the name of the off-site host. The
name can be up to 15 characters in length and may include underscores or
hyphens.
Enter the IP address of the server - Specify the IP address of the managed
host to which you wish to connect.
Encrypt traffic from off-site source - Select the check box if you wish to
encrypt traffic from an off-site source. To enable encryption, you must select
this check box on the associated off-site source and target.
STRM Administration Guide
Building Your Event View
79

Advertisement

Table of Contents
loading

Table of Contents