M86 Security HL Installation Manual

Threat analysis reporter
Table of Contents

Advertisement

Quick Links

M86 Threat Analysis Reporter

INSTALLATION GUIDE

Models: HL, SL, MSA
Software Version: 2.1.10
Document Version: 06.01.10

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the HL and is the answer not in the manual?

Questions and answers

Summary of Contents for M86 Security HL

  • Page 1: Installation Guide

    M86 Threat Analysis Reporter INSTALLATION GUIDE Models: HL, SL, MSA Software Version: 2.1.10 Document Version: 06.01.10...
  • Page 2 Every effort has been made to ensure the accuracy of this document. However, M86 Security makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. M86 Security shall not be liable for any error or for incidental or consequential damages in connec- tion with the furnishing, performance, or use of this manual or the examples herein.
  • Page 3: Table Of Contents

    Optional: Install the Traditional UP Racks ............... 16 Optional: Install the Open Racks ..................18 Install the Chassis into the Rack ..................21 Install the SL or HL Server Bezel ................... 22 Check the Power Supply....................23 Power Supply Precautions ..................... 23 General Safety Information.
  • Page 4 Step 1: Initial Setup Procedures.................. 27 Quick Start Setup Requirements .................... 27 LCD Panel Setup Requirements (for SL and HL Units) ............27 Step 1A: Quick Start Setup Procedures..............28 Link the Workstation to the Threat Analysis Reporter ............28 Monitor and Keyboard Setup ...................
  • Page 5 HL Unit........................... 76 Front LED Indicators and Buttons for Hardware Status Monitoring ........76 Rear LED Indicators for Hardware Status Monitoring ............77 HL and SL Units......................78 Front LED Indicators for Software and Hardware Status Monitoring ........78 .........79...
  • Page 6 ONTENTS ........83 PPENDIX PTIONAL THERNET NSTALLATION Preliminary Setup Procedures..................83 Unpack the Ethernet Tap Unit from the Box ................83 Other Required Installation Items ................... 83 Install the Ethernet Tap Unit..................84 ......................87 NDEX M86 S ECURITY NSTALLATION UIDE...
  • Page 7: Threat Analysis Reporter Introduction

    Web threats in real time. The TAR HL and SL server models include RAID technology for fault tolerance and high performance. Quick setup procedures—to implement the best usage practices for the Threat Analysis Reporter—are included in the Best Usage Practices section that follows...
  • Page 8: About This Document

    • Introduction - This section is comprised of an overview of the Threat Analysis Reporter product and how to use this document • Service Information - This section provides M86 Security contact information • Preliminary Setup Procedures - This section includes instructions on how to physically set up the Threat Analysis Reporter in your network environment •...
  • Page 9: Service Information

    The user should not attempt any maintenance or service on the unit beyond the procedures outlined in this document. Any initial hardware setup problem that cannot be resolved at your internal organi- zation should be referred to an M86 Security solutions engineer or technical support representative. M86 Security Corporate Headquarters (USA) Local 714.282.6111...
  • Page 10: Preliminary Setup Procedures

    NOTES: Threat Analysis Reporter servers come with a NetOptics 10/100 BaseT Ethernet Tap kit to be installed at your option. For HL and SL servers, 1 bezel to be installed on the front of the chassis also is included, as well as 1 spare parts kit. For HL servers, this kit contains a hard drive and power supply.
  • Page 11: Select A Site For The Server

    RELIMINARY ETUP ROCEDURES ELECT A ITE FOR THE ERVER Select a Site for the Server The server operates reliably within normal office environmental limits. Select a site that meets the following criteria: • Clean and relatively free of excess dust. •...
  • Page 12: Rack Mount The Server

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Rack Mount the Server Rack Setup Precautions WARNING: Before rack mounting the server, the physical environment should be set up to safely accommodate the server. Be sure that: • The weight of all units in the rack is evenly distributed. Mounting of the equip- ment in the rack should be such that a hazardous condition is not achieved due to uneven mechanical loading.
  • Page 13: Rack Mount Instructions For Hl Servers

    Identify the Sections of the Rack Rails You should have received two rack rail assemblies with the M86 Security server unit. Each of these assemblies consists of two sections: An inner fixed chassis rail that secures to the unit (A), and an outer fixed rack rail that secures directly to the rack itself (B).
  • Page 14: Install The Outer Rails

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Install the Outer Rails Begin by measuring the distance from the front rail to the rear rail of the rack. Attach a short bracket to the front side of the right outer rail and a long bracket to the rear side of the right outer rail.
  • Page 15: Install The Server Into The Rack

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Install the Server into the Rack You should now have rails attached to both the chassis and the rack unit. The next step is to install the server chassis into the rack. Do this by lining up the rear of the chassis rails with the front of the rack rails.
  • Page 16: Install The Server Into A Telco Rack

    ERVER Install the Server into a Telco Rack If you are installing the M86 Security server unit into a Telco type rack, use two L- shaped brackets on either side of the chassis (four total). First, determine how far follow the server will extend out the front of the rack. A larger chassis should be positioned to balance the weight between front and back.
  • Page 17: Rack Mount Instructions For Sl Servers

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Rack Mount Instructions for SL Servers Rack Setup Suggestions • Determine the placement of each component in the rack before you install the rails. • Install the heaviest server components on the bottom of the rack first, and then work up.
  • Page 18: Install The Slide Assemblies To The Rack

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Install the Slide Assemblies to the Rack 1. After you have installed the short and long brackets to the outer slides, you are ready to install the whole slide assemblies (outer slides with short and long brackets attached) to the rack.
  • Page 19: Install The Chassis Into The Rack

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Install the Chassis into the Rack 1. Push the inner slides, which are attached to the chassis, into the grooves of the outer slide assemblies that are installed in the rack as shown below: 2.
  • Page 20: Rack Mount Instructions For Msa Servers

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Rack Mount Instructions for MSA Servers Optional: Install the Chassis Rails NOTE: If your chassis does not come with chassis rails, please follow the procedure listed on the last page of this sub-section to install the unit directly into the rack. CAUTION: Please make sure that the chassis covers and chassis rails are installed on the chassis before you install the chassis into the rack.
  • Page 21 RELIMINARY ETUP ROCEDURES OUNT THE ERVER 3. Locate the three holes on each side of the chassis and locate the three corre- sponding holes on each of the inner rail. 4. Attach an inner rail to each side of the chassis and secure the inner rail to the chassis by inserting three Type G screws through the holes on each side of the chassis and the inner rail.
  • Page 22: Optional: Install The Traditional Up Racks

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Optional: Install the Traditional UP Racks After you have installed the inner rails on the chassis, you are ready to install the outer rails of rail assemblies to the rack. NOTE: The rails are designed to fit in the racks with the depth of 28” to 33”. •...
  • Page 23 RELIMINARY ETUP ROCEDURES OUNT THE ERVER 8. You will need to release the safety taps on both sides of the chassis in order to completely remove the chassis out of the rack. M86 S ECURITY NSTALLATION UIDE...
  • Page 24: Optional: Install The Open Racks

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Optional: Install the Open Racks After you have installed the inner rails on the chassis, you are ready to install the outer rails of rail assemblies to the rack. NOTE: The rails are designed to fit in the racks with the depth of 28” to 33”. •...
  • Page 25 RELIMINARY ETUP ROCEDURES OUNT THE ERVER 3. Attach the front (short) bracket to the front end of the rack, and secure it to the rack with two Type H screws and Type I washers as shown below. (See the previous page for descriptions of Type H and Type I hardware components.) 4.
  • Page 26 RELIMINARY ETUP ROCEDURES OUNT THE ERVER 6. Slide the inner rails which are attached to the chassis into the outer rails on the rack. M86 S ECURITY NSTALLATION UIDE...
  • Page 27: Install The Chassis Into The Rack

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Install the Chassis into the Rack CAUTION: Before installing the chassis into the rack: • Make sure that the rack is securely anchored onto an unmovable surface or structure before installing the chassis into the rack. •...
  • Page 28: Install The Sl Or Hl Server Bezel

    ERVER Install the SL or HL Server Bezel After rack mounting an SL or HL server, the bezel should be installed on the front end of the chassis. NOTE: This portion of the installation process requires you to unpack the bezel. The bezel has been packaged separately from the unit to prevent damage during shipping.
  • Page 29: Check The Power Supply

    • In geographic regions that are susceptible to electrical storms, M86 Security highly recommends plugging the AC power cord for the server into a surge suppressor.
  • Page 30: General Safety Information

    Doing so may cause smoke, fire, electrical shock, serious physical injury, or death. WARNING: In HL servers, multiple sources of supply exist. Be sure to disconnect all sources before servicing. • Do not insert objects through openings in the chassis. Doing so could result in a short circuit that might cause a fire or an electrical shock.
  • Page 31: Ac Power Cord And Cable Precautions

    RELIMINARY ETUP ROCEDURES ENERAL AFETY NFORMATION AC Power Cord and Cable Precautions WARNING: • The AC power cord for the server must be plugged into a grounded, power outlet. • Do not modify or use a supplied AC power cord if it is not the exact type required in the region where the server will be installed and used.
  • Page 32: Motherboard Battery Precautions

    RELIMINARY ETUP ROCEDURES ENERAL AFETY NFORMATION Motherboard Battery Precautions CAUTION: The battery on the motherboard should not be replaced without following instruc- tions provided by the manufacturer. Only qualified service personnel should replace batteries. The battery contains energy and, as with all batteries, a malfunction can cause heat, smoke, or fire, release toxic materials, or cause burns.
  • Page 33: Install The Server

    This step requires you to link the workstation to the Threat Analysis Reporter. You have the option of using the text-based Quick Start setup procedures described in Step 1A, or, if you have an SL or HL unit, the LCD panel setup procedures described in Step 1B.
  • Page 34: Step 1A: Quick Start Setup Procedures

    Monitor and Keyboard Setup A. Connect the PC monitor and keyboard cables to the rear of the chassis (see Fig. 1 for an SL or MSA unit, and Fig. 2 for an HL unit). B. Turn on the PC monitor.
  • Page 35 Fig. 4 - Diagram of MSA chassis front panel, power button at far right Fig. 5 - Diagram of HL chassis front panel, power button at far right Once the Threat Analysis Reporter is powered up, proceed to the instructions for HyperTerminal Setup Procedures.
  • Page 36: Hyperterminal Setup Procedures

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES HyperTerminal Setup Procedures If using a serial console, follow these procedures on a Windows XP machine to create a HyperTerminal session. NOTE: HyperTerminal is no longer included with Windows as of Microsoft’s Vista system. Please note on Microsoft’s Web page “What happened to HyperTerminal?”...
  • Page 37 1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES B. In the Connection Description dialog box, enter any session Name, and then click OK to open the Connect To dialog box: C. At the Connect using field, select the COM port assigned to the serial port on the laptop (probably “COM1”), and then click OK to open the Properties dialog box, displaying the Port Settings tab: D.
  • Page 38 1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES E. Click OK to connect to the HyperTerminal session: F. In the HyperTerminal session window, go to File > Properties to open the Prop- erties dialog box, displaying the Connect To and Settings tabs: G.
  • Page 39: Quick Start Menu Instructions

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Quick Start menu instructions For these Quick Start setup procedures, you will need your network administrator to provide you the LAN 1 and LAN 2 IP address and subnet mask, gateway IP address, DNS server IP address(es), host name of the server, and IP address for the Web interface (if using a NAT device).
  • Page 40: Configure Network Interface Screen

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Configure Network Interface screen A. At the Enter interface lan1 IP address field, enter the IP address for the LAN 1 interface, and then press Enter to go to the next screen. B.
  • Page 41: Configure Domain Name Servers Screen

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES A. At the Enter default gateway IP field, enter the IP address for the default gateway. Press Enter to display the confirmation prompt. B. Press Y for “Yes” to confirm and save your entry for the gateway IP address, and to go to the Configure Domain Name Servers screen.
  • Page 42: Time Zone Regional Configuration Screen

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES B. Press Y for “Yes” to confirm and save your entry for the host name, and to go to the Time zone regional configuration screen. Time zone regional configuration screen A. Use the up and down arrows in your keyboard to select your region. After selecting your locality, press Y for “Yes”...
  • Page 43: Quick Start Setup Confirmation Screen

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES C. At the Enter wizard password field, enter the password that will be used to access the setup wizard in the Threat Analysis Reporter interface. Press Y for “Yes” to confirm and save your entry and to go to the Quick Start Setup confir- mation screen.
  • Page 44: System Status Screen

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES System Status screen The System Status screen contains the following information: • lan1 interface for web access and Web Filter communications: LAN1 IP address and netmask specified in screen 3 (Configure Network Interface), and current status (“Active”...
  • Page 45: Step 1B: Lcd Panel Setup Procedures

    On an SL or HL unit, the Threat Analysis Reporter can be configured using the LCD panel on front of the chassis bezel. When the bezel is placed on the front of the chassis, with the USB plug inserted into the USB port, the default LCD screen displays.
  • Page 46: Ip / Lan1 And Lan2

    1B: LCD P NSTALL THE ERVER ANEL ETUP ROCEDURES IP / LAN1 and LAN2 When the IP / LAN 1 (LAN 2) option is selected, the IP / LAN 1 (LAN 2) screen displays with the following menu items: • Configure LAN 1 (2) IP •...
  • Page 47: Host Name

    1B: LCD P NSTALL THE ERVER ANEL ETUP ROCEDURES Host Name When the Host Name option is selected, the Host Name screen displays with the Configure Hostname menu item. A. Choose Configure Hostname and press the checkmark key to go to the Configure Hostname screen.
  • Page 48: Non-Quick Start Procedures Or Settings

    1B: LCD P NSTALL THE ERVER ANEL ETUP ROCEDURES Non-Quick Start procedures or settings Current Patch Level When the Current Patch Level option is selected, “Threat Analysis Reporter” and the version number of the currently installed build displays. Reboot When the Reboot option is selected, the Reboot screen displays with two menu items.
  • Page 49: Backlight

    1B: LCD P NSTALL THE ERVER ANEL ETUP ROCEDURES B. After making your selection, press the “X” key to return to the previous screen. Backlight When the Backlight option is selected, the Backlight screen displays. A. Press the checkmark or right arrow key three times to view each of the three available options: •...
  • Page 50: Step 2: Physically Connect The Unit To The Network

    LAN 1 port, the port on the left. Fig. 1 - Portion of SL and MSA chassis rear Fig. 2 - Portion of HL chassis rear B. Plug the other end of the CAT-5E cable into an open port on the network switch.
  • Page 51: Step 3: Register Tar And Its Applications

    Enter.) • If pinging the IP address of the Threat Analysis Reporter is unsuccessful, try restarting the network service or rebooting the server. • If still unsuccessful, contact an M86 Security solutions engineer or technical support representative. M86 S...
  • Page 52: Accept The Security Certificate In Firefox

    3: R NSTALL THE ERVER EGISTER AND ITS PPLICATIONS Accept the Security Certificate in Firefox A. If using a Firefox browser, in the page “This Connection is Untrusted,” click the option I Understand the Risks: B. In the next set of instructions that display, click Add Exception...: Clicking Add Exception opens the Add Security Exception window: C.
  • Page 53: Temporarily Accept The Security Certificate In Ie

    3: R NSTALL THE ERVER EGISTER AND ITS PPLICATIONS Temporarily Accept the Security Certificate in IE If using an IE browser, in the page “There is a problem with this website's security certificate.”, click Continue to this website (not recommended): Selecting this option displays the Threat Analysis Reporter page’s address field and Certificate Error button to the right of the field shaded a reddish color: Proceed to Accept the End User License Agreement.
  • Page 54: Accept The Security Certificate In Safari

    3: R NSTALL THE ERVER EGISTER AND ITS PPLICATIONS Accept the Security Certificate in Safari A. If using a Safari browser, the pop-up window "Safari can't verify the identity of the website..." opens: Click Show Certificate to open the certificate information box at the bottom of this window: B.
  • Page 55: Accept The End User License Agreement

    3: R NSTALL THE ERVER EGISTER AND ITS PPLICATIONS Accept the End User License Agreement A. Read the contents of the EULA Agreement dialog: B. Click Yes to accept the EULA, close the EULA Agreement dialog box, and display the Threat Analysis Reporter Wizard Login window. Proceed to Log in to the Threat Analysis Reporter Wizard.
  • Page 56: Use The Tar Wizard To Specify Application Settings

    3: R NSTALL THE ERVER EGISTER AND ITS PPLICATIONS Use the TAR Wizard to Specify Application Settings Enter Main Administrator Criteria A. Enter the Username the global administrator will use when logging into the Threat Analysis Reporter Administrator console. The global administrator has the highest level of permissions in the Threat Analysis Reporter.
  • Page 57: Enter Web Filter Setup Criteria

    3: R NSTALL THE ERVER EGISTER AND ITS PPLICATIONS Enter Web Filter Setup Criteria A. Enter the Server Name of the Web Filter to be used with the Threat Analysis Reporter, which is any name you wish to associate with that Web Filter. B.
  • Page 58: Step 4: Generate Ssl Certificate

    4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE Step 4: Generate SSL Certificate Generate a Self-Signed Certificate for TAR This step requires you to generate a self-signed certificate for the Threat Analysis Reporter to ensure secure exchanges between the appliance and your browser. A.
  • Page 59 4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE D. Go to the bottom left corner of the Device Registry screen and click Generate SSL Certificate to open the Generate Self-Signed Certificate dialog box with the following message: "Generation of a self-signed certificate might take a long time.
  • Page 60: Ie Security Certificate Installation Procedures

    4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE IE Security Certificate Installation Procedures Accept the Security Certificate in IE Go to the appropriate sub-section if using the following Windows operating system and IE browser: • Windows XP or Vista with IE 7 or 8 •...
  • Page 61 4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE B. Click Certificate Error to open the Certificate Invalid pop-up box: Figure B: Windows XP, IE 7 C. Click View certificates to open the Certificate window that includes the host name you assigned to TAR: Figure C: Windows XP, IE 7 D.
  • Page 62 4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE Figure E: Windows XP, IE 7 F. Choose the option “Place all certificates in the following store” and then click Browse... to open the Select Certificate Store pop-up box: Figure F: Windows XP, IE 7 G.
  • Page 63: Windows 7 With Ie 8

    4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE Now that the security certificate is installed, you will need to map TAR’s IP address to its host name. Proceed to Map the TAR’s IP Address to the Server’s Host Name. Windows 7 with IE 8 A.
  • Page 64: Map Tar's Ip Address To The Server's Host Name

    4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE Now that the security certificate is installed, you will need to map TAR’s IP address to its host name. Proceed to Map TAR’s IP Address to the Server’s Host Name. Map TAR’s IP Address to the Server’s Host Name A.
  • Page 65 4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE D. In the address field of your newly opened IE browser, from now on you will need to use TAR’s host name instead of its IP address—that is https://host- name:8443/8e6tar/ would be used instead of https://x.x.x.x:8443/8e6tar/. Click Go to open the TAR login window: M86 S ECURITY...
  • Page 66: Conclusion

    Obtain the latest Threat Analysis Reporter User Guide from our Web site at http:/ /www.m86security.com/support/Threat-Analysis-Reporter/documenta- tion.asp IMPORTANT: M86 Security recommends proceeding to the Best Usage Practices section for quick setup procedures described within that section. M86 S ECURITY...
  • Page 67: Best Usage Practices

    SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS SAGE RACTICES Now that the Threat Analysis Reporter is installed on the network and you have successfully logged into the server, you are ready to begin using the Administrator console. To help you get started, this section provides an overview on some useful setup procedures and tools in the interface that you will use for identifying potential violators of your acceptable Internet usage policy so you can take effective and immediate action.
  • Page 68: Step B: Navigate Panels In The Policy Section

    SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS Each URL gauge contains a number that represents its current score. This score is derived by activity within that gauge, based on the activities of end users who visited URLs listed in library categories that comprise the gauge. To view bandwidth gauge activity, click the Bandwidth tab above the URL gauges dashboard to display the bandwidth gauges dashboard.
  • Page 69: Step C: Navigate Panels In The Report/Analysis Section

    • Device Registry - view information about devices connected to TAR, synchro- nize the server with user groups and libraries from the source Web Filter, edit M86 Security appliance criteria, add or delete a Web Filter or ER, reboot or shut down the server, or generate an SSL certificate for TAR •...
  • Page 70: Ii. Drill Down Into A Gauge Exercise

    SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS II. Drill down into a gauge exercise This exercise will teach you how to drill down into a URL gauge to conduct an investigation on abnormally high Internet activity in a particular filtering category, in order to find out which individuals are driving that gauge’s score, and which URLs they are visiting.
  • Page 71 SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS Note the left side of this panel is populated with rows of records for Threats affected by the selected end user. Now that you’ve identified the user affecting the highest scoring gauge, next you will investigate the activity of that user who is driving the gauge’s score.
  • Page 72: Step B: Investigate A User's Activity In A Specified Gauge

    SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS Step B: Investigate a user’s activity in a specified gauge 1. To find out which URLs the top end user visited in the library category associ- ated with the high-scoring threat, select the Threat with the highest score and then click it to display a list of URLs the user visited in the right side of this panel: 2.
  • Page 73: Step C: Investigate The User's Internet Activity In Other Gauges

    SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS Step C: Investigate the user’s Internet activity in other gauges 1. To find out which other gauges the same user is currently affecting, return to the Gauge Ranking table by going to the lower left corner of the Threat View User panel and clicking the Back button.
  • Page 74: Iii. Create A Gauge Exercise

    SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS 4. To find out which URLs the user is viewing in a particular library category, choose the category from the list, and then click the URL in the URLs list (see Step B1). In the Threat Analysis Reporter User Guide index, see: •...
  • Page 75: Step B: Add A Url Gauge

    SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS In the Threat Analysis Reporter User Guide index, see: • How to: access the Add/Edit Gauges panel Step B: Add a URL Gauge 1. Click New Gauge at the bottom left of the panel to open the URL Gauge panel: 2.
  • Page 76 SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS 5. From the Available User Groups list, select the user group to highlight it. 6. Click add > to move the user group to the Assigned User Groups list box. 7. After adding users, click Save at the bottom right of the panel to return to the Add/Edit Gauges panel that now includes the name of the gauge you just added: In the Threat Analysis Reporter User Guide index, see:...
  • Page 77: Iv. Create An Email Alert Exercise

    SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS Now that you know the basics of creating a gauge, you will soon be able to create and use gauges to monitor various groups of users who frequent URLs in library categories you wish to restrict, and deal in real time with Internet usage issues that endanger your network and/or consume an excessive amount of bandwidth resources.
  • Page 78 SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS 3. Click New Alert to open a panel that displays the Alert Information frame to the left and the greyed-out target panel to the right containing the Email Addresses and Low Lockout Components accordions: 4.
  • Page 79: Step C: Select Email Alert Action

    SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS • Email - An email alert notifies a group administrator via email if an end user has reached the threshold limit set up in a gauge alert. • System Tray - A TAR Alert message notifies a group administrator via his/her workstation’s System Tray if an end user has reached the threshold limit set up in a gauge alert.
  • Page 80: Step D: Receiving An Email Alert

    SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS In the Threat Analysis Reporter User Guide index, see: • How to: set up email alert notifications in TAR Step D: Receiving an email alert When an end user’s activity in a gauge reaches the threshold limit established for an alert, it triggers an alert notification.
  • Page 81: Led Indicators And Buttons

    LED I MSA U NDICATORS AND UTTONS NITS LED I NDICATORS AND UTTONS SL and MSA Units Front LED Indicators and Buttons for Hardware Status Monitoring LED indicators and buttons for hardware status monitoring display on the front panel, located on the right side of the SL and MSA chassis (see diagrams below). LED Indicator Key PWR = Power HD = HDD Activity...
  • Page 82: Hl Unit

    HL Unit Front LED Indicators and Buttons for Hardware Status Monitoring On an HL unit, the following control panel buttons, icons, and LED indicators for hardware status monitoring display on the right side of the front panel: LED Indicator Key...
  • Page 83: Rear Led Indicators For Hardware Status Monitoring

    UTTONS Rear LED Indicators for Hardware Status Monitoring UID (LED indicator) – On the rear of the HL chassis, to the left of the power supplies, a steady blue UID LED indicator displays when the UID button on the control panel is pressed. This LED remains lit until the UID button is pressed again.
  • Page 84: Hl And Sl Units

    HL and SL Units Front LED Indicators for Software and Hardware Status Monitoring On an HL or SL unit, the following LED indicators for software and hardware status monitoring display on the left side of the front panel: LED Indicator Key...
  • Page 85: Egulatory Pecifications And Isclaimers

    EGULATORY PECIFICATIONS AND ISCLAIMERS ECLARATION OF THE ANUFACTURER OR MPORTER EGULATORY PECIFICATIONS AND ISCLAIMERS Declaration of the Manufacturer or Importer Safety Compliance USA: UL 60950-1 2nd ed. 2007 Europe: Low Voltage Directive (LVD) 2006/95/EC to CB Scheme EN 60950: 2006 International: UL/CB to IEC 60950-1:2006 Electromagnetic Compatibility (EMC)
  • Page 86: Federal Communications Commission (Fcc) Class A Notice (Usa)

    Operation of this equipment in a residential area is likely to cause harmful interfer- ence in which case the user will be required to correct the interference at his own expense. FCC Declaration of Conformity Models: HL-005-004, SL-004-004, MSA-004-004 M86 S ECURITY NSTALLATION...
  • Page 87: Electromagnetic Compatibility Class A Notice

    EGULATORY PECIFICATIONS AND ISCLAIMERS ECLARATION OF THE ANUFACTURER OR MPORTER Electromagnetic Compatibility Class A Notice Industry Canada Equipment Standard for Digital Equipment (ICES-003) Bureau of Standards Metrology and Inspection (BSMI) - Taiwan M86 S ECURITY NSTALLATION UIDE...
  • Page 88: Ec Declaration Of Conformity

    EGULATORY PECIFICATIONS AND ISCLAIMERS ECLARATION OF THE ANUFACTURER OR MPORTER EC Declaration of Conformity European Community Directives Requirement (CE) M86 S ECURITY NSTALLATION UIDE...
  • Page 89: Appendix : Optional Ethernet Tap Installation

    PPENDIX PTIONAL THERNET NSTALLATION RELIMINARY ETUP ROCEDURES PPENDIX PTIONAL THERNET NSTALLATION This appendix pertains to the optional installation of the Ethernet Tap unit for band- width monitoring. Preliminary Setup Procedures Unpack the Ethernet Tap Unit from the Box Open the NetOptics Ethernet Tap box and verify that all accessories are included. Save all packing materials in the event that the unit needs to be returned to M86 Security.
  • Page 90: Install The Ethernet Tap Unit

    PPENDIX PTIONAL THERNET NSTALLATION NSTALL THE THERNET Install the Ethernet Tap Unit Diagram showing TAR Ethernet Tap installation on the network This step is a continuation from Physically Connect the Unit to the Network in Step 1A or following setup in Step 1B. The procedures outlined in this step require the use of a CAT-5E cable.
  • Page 91 PPENDIX PTIONAL THERNET NSTALLATION NSTALL THE THERNET D. Connect the other end of the crossover cable to the Ethernet Tap’s Network A port. Ports in front panel of NetOptics 10/100BaseT Tap E. Using a straight through cable, connect one end to the Ethernet Tap’s Network B port.
  • Page 92 PPENDIX PTIONAL THERNET NSTALLATION NSTALL THE THERNET M86 S ECURITY NSTALLATION UIDE...
  • Page 93: Index

    NDEX Admin Console Wizard User 41 BSMI 79 Change Quick Start password 37 crossover cable 4 EMC 79 FCC 79 HL 4 HyperTerminal Setup 30 ICES-003 79 Install Bezel 22 Install Tap 83 LCD Panel 27 Login screen 33 LVD 79...
  • Page 94 NDEX Rack Setup Precautions 6 RAID 78 reboot 42 RoHS compliant 82 serial port cable 27 shut down 63 SL 11 spare parts kit 4 UID 76 UL 79 Web Filter 1 M86 S ECURITY NSTALLATION UIDE...
  • Page 96 M86 Security Corporate Headquarters (USA): 828 West Taft Avenue Orange, CA 92865-4232 • Tel: 714.282.6111 or 888.786.7999 Fax: 714.282.6116 (Sales/Technical Support) • 714.282.6117 (General Office)

This manual is also suitable for:

MsaSl

Table of Contents