Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 Administration Manual page 90

Strm administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2:
Table of Contents

Advertisement

82
U
D
SING THE
EPLOYMENT
Step 1
E
DITOR
within the deployment. When enabling encryption on a managed host, the
encryption SSH tunnel is created on the client's host. For example, if you enable
encryption for the Event Collector in the below deployment, the connection
between the Event Processor and Classification Engine as well as the connection
between the Event Processor and Magistrate would be encrypted. The below
graphic also displays the client/server relationship between the Console and the
Ariel database. When you enable encryption on the Console, an encryption tunnel
is used when performing event searches through the Offense Manager.
Note: Enabling encryption reduces the performance of a managed host by at least
50%.
QFlow 1101
QFlow Collector
Server
Client
Flow Processor
Server
Client
Classification Engine
Client
Server
Update Daemon
Flows
Figure 5-4 Encryption Tunnels
Adding a Managed Host
To add a managed host:
Note: Before you add a managed host, make sure the managed host includes
STRM software.
From the menu, select Actions > Add a managed host.
The Add new host wizard appears.
STRM Administration Guide
Event Collector
Event Collector
Event Processor
Client
Server
Magistrate
QRadar 2100
Flow Context
Client
Server
Ariel
Database
Server
Client
Console
Event Traffic

Advertisement

Table of Contents
loading

Table of Contents