Page 2
Every effort has been made to ensure the accuracy of this document. However, M86 Security makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. M86 Security shall not be liable for any error or for incidental or consequential damages in connec- tion with the furnishing, performance, or use of this manual or the examples herein.
Optional: Install the Traditional UP Racks ............... 16 Optional: Install the Open Racks ..................18 Install the Chassis into the Rack ..................21 Install the SL or HL Server Bezel ................... 22 Check the Power Supply....................23 Power Supply Precautions ..................... 23 General Safety Information.
Page 4
Step 1: Initial Setup Procedures.................. 27 Quick Start Setup Requirements .................... 27 LCD Panel Setup Requirements (for SL and HL Units) ............27 Step 1A: Quick Start Setup Procedures..............28 Link the Workstation to the Threat Analysis Reporter ............28 Monitor and Keyboard Setup ...................
Page 5
HL Unit........................... 76 Front LED Indicators and Buttons for Hardware Status Monitoring ........76 Rear LED Indicators for Hardware Status Monitoring ............77 HL and SL Units......................78 Front LED Indicators for Software and Hardware Status Monitoring ........78 .........79...
Page 6
ONTENTS ........83 PPENDIX PTIONAL THERNET NSTALLATION Preliminary Setup Procedures..................83 Unpack the Ethernet Tap Unit from the Box ................83 Other Required Installation Items ................... 83 Install the Ethernet Tap Unit..................84 ......................87 NDEX M86 S ECURITY NSTALLATION UIDE...
Web threats in real time. The TAR HL and SL server models include RAID technology for fault tolerance and high performance. Quick setup procedures—to implement the best usage practices for the Threat Analysis Reporter—are included in the Best Usage Practices section that follows...
• Introduction - This section is comprised of an overview of the Threat Analysis Reporter product and how to use this document • Service Information - This section provides M86 Security contact information • Preliminary Setup Procedures - This section includes instructions on how to physically set up the Threat Analysis Reporter in your network environment •...
The user should not attempt any maintenance or service on the unit beyond the procedures outlined in this document. Any initial hardware setup problem that cannot be resolved at your internal organi- zation should be referred to an M86 Security solutions engineer or technical support representative. M86 Security Corporate Headquarters (USA) Local 714.282.6111...
NOTES: Threat Analysis Reporter servers come with a NetOptics 10/100 BaseT Ethernet Tap kit to be installed at your option. For HL and SL servers, 1 bezel to be installed on the front of the chassis also is included, as well as 1 spare parts kit. For HL servers, this kit contains a hard drive and power supply.
RELIMINARY ETUP ROCEDURES ELECT A ITE FOR THE ERVER Select a Site for the Server The server operates reliably within normal office environmental limits. Select a site that meets the following criteria: • Clean and relatively free of excess dust. •...
RELIMINARY ETUP ROCEDURES OUNT THE ERVER Rack Mount the Server Rack Setup Precautions WARNING: Before rack mounting the server, the physical environment should be set up to safely accommodate the server. Be sure that: • The weight of all units in the rack is evenly distributed. Mounting of the equip- ment in the rack should be such that a hazardous condition is not achieved due to uneven mechanical loading.
Identify the Sections of the Rack Rails You should have received two rack rail assemblies with the M86 Security server unit. Each of these assemblies consists of two sections: An inner fixed chassis rail that secures to the unit (A), and an outer fixed rack rail that secures directly to the rack itself (B).
RELIMINARY ETUP ROCEDURES OUNT THE ERVER Install the Outer Rails Begin by measuring the distance from the front rail to the rear rail of the rack. Attach a short bracket to the front side of the right outer rail and a long bracket to the rear side of the right outer rail.
RELIMINARY ETUP ROCEDURES OUNT THE ERVER Install the Server into the Rack You should now have rails attached to both the chassis and the rack unit. The next step is to install the server chassis into the rack. Do this by lining up the rear of the chassis rails with the front of the rack rails.
ERVER Install the Server into a Telco Rack If you are installing the M86 Security server unit into a Telco type rack, use two L- shaped brackets on either side of the chassis (four total). First, determine how far follow the server will extend out the front of the rack. A larger chassis should be positioned to balance the weight between front and back.
RELIMINARY ETUP ROCEDURES OUNT THE ERVER Rack Mount Instructions for SL Servers Rack Setup Suggestions • Determine the placement of each component in the rack before you install the rails. • Install the heaviest server components on the bottom of the rack first, and then work up.
RELIMINARY ETUP ROCEDURES OUNT THE ERVER Install the Slide Assemblies to the Rack 1. After you have installed the short and long brackets to the outer slides, you are ready to install the whole slide assemblies (outer slides with short and long brackets attached) to the rack.
RELIMINARY ETUP ROCEDURES OUNT THE ERVER Install the Chassis into the Rack 1. Push the inner slides, which are attached to the chassis, into the grooves of the outer slide assemblies that are installed in the rack as shown below: 2.
RELIMINARY ETUP ROCEDURES OUNT THE ERVER Rack Mount Instructions for MSA Servers Optional: Install the Chassis Rails NOTE: If your chassis does not come with chassis rails, please follow the procedure listed on the last page of this sub-section to install the unit directly into the rack. CAUTION: Please make sure that the chassis covers and chassis rails are installed on the chassis before you install the chassis into the rack.
Page 21
RELIMINARY ETUP ROCEDURES OUNT THE ERVER 3. Locate the three holes on each side of the chassis and locate the three corre- sponding holes on each of the inner rail. 4. Attach an inner rail to each side of the chassis and secure the inner rail to the chassis by inserting three Type G screws through the holes on each side of the chassis and the inner rail.
RELIMINARY ETUP ROCEDURES OUNT THE ERVER Optional: Install the Traditional UP Racks After you have installed the inner rails on the chassis, you are ready to install the outer rails of rail assemblies to the rack. NOTE: The rails are designed to fit in the racks with the depth of 28” to 33”. •...
Page 23
RELIMINARY ETUP ROCEDURES OUNT THE ERVER 8. You will need to release the safety taps on both sides of the chassis in order to completely remove the chassis out of the rack. M86 S ECURITY NSTALLATION UIDE...
RELIMINARY ETUP ROCEDURES OUNT THE ERVER Optional: Install the Open Racks After you have installed the inner rails on the chassis, you are ready to install the outer rails of rail assemblies to the rack. NOTE: The rails are designed to fit in the racks with the depth of 28” to 33”. •...
Page 25
RELIMINARY ETUP ROCEDURES OUNT THE ERVER 3. Attach the front (short) bracket to the front end of the rack, and secure it to the rack with two Type H screws and Type I washers as shown below. (See the previous page for descriptions of Type H and Type I hardware components.) 4.
Page 26
RELIMINARY ETUP ROCEDURES OUNT THE ERVER 6. Slide the inner rails which are attached to the chassis into the outer rails on the rack. M86 S ECURITY NSTALLATION UIDE...
RELIMINARY ETUP ROCEDURES OUNT THE ERVER Install the Chassis into the Rack CAUTION: Before installing the chassis into the rack: • Make sure that the rack is securely anchored onto an unmovable surface or structure before installing the chassis into the rack. •...
ERVER Install the SL or HL Server Bezel After rack mounting an SL or HL server, the bezel should be installed on the front end of the chassis. NOTE: This portion of the installation process requires you to unpack the bezel. The bezel has been packaged separately from the unit to prevent damage during shipping.
• In geographic regions that are susceptible to electrical storms, M86 Security highly recommends plugging the AC power cord for the server into a surge suppressor.
Doing so may cause smoke, fire, electrical shock, serious physical injury, or death. WARNING: In HL servers, multiple sources of supply exist. Be sure to disconnect all sources before servicing. • Do not insert objects through openings in the chassis. Doing so could result in a short circuit that might cause a fire or an electrical shock.
RELIMINARY ETUP ROCEDURES ENERAL AFETY NFORMATION AC Power Cord and Cable Precautions WARNING: • The AC power cord for the server must be plugged into a grounded, power outlet. • Do not modify or use a supplied AC power cord if it is not the exact type required in the region where the server will be installed and used.
RELIMINARY ETUP ROCEDURES ENERAL AFETY NFORMATION Motherboard Battery Precautions CAUTION: The battery on the motherboard should not be replaced without following instruc- tions provided by the manufacturer. Only qualified service personnel should replace batteries. The battery contains energy and, as with all batteries, a malfunction can cause heat, smoke, or fire, release toxic materials, or cause burns.
This step requires you to link the workstation to the Threat Analysis Reporter. You have the option of using the text-based Quick Start setup procedures described in Step 1A, or, if you have an SL or HL unit, the LCD panel setup procedures described in Step 1B.
Monitor and Keyboard Setup A. Connect the PC monitor and keyboard cables to the rear of the chassis (see Fig. 1 for an SL or MSA unit, and Fig. 2 for an HL unit). B. Turn on the PC monitor.
Page 35
Fig. 4 - Diagram of MSA chassis front panel, power button at far right Fig. 5 - Diagram of HL chassis front panel, power button at far right Once the Threat Analysis Reporter is powered up, proceed to the instructions for HyperTerminal Setup Procedures.
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES HyperTerminal Setup Procedures If using a serial console, follow these procedures on a Windows XP machine to create a HyperTerminal session. NOTE: HyperTerminal is no longer included with Windows as of Microsoft’s Vista system. Please note on Microsoft’s Web page “What happened to HyperTerminal?”...
Page 37
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES B. In the Connection Description dialog box, enter any session Name, and then click OK to open the Connect To dialog box: C. At the Connect using field, select the COM port assigned to the serial port on the laptop (probably “COM1”), and then click OK to open the Properties dialog box, displaying the Port Settings tab: D.
Page 38
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES E. Click OK to connect to the HyperTerminal session: F. In the HyperTerminal session window, go to File > Properties to open the Prop- erties dialog box, displaying the Connect To and Settings tabs: G.
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Quick Start menu instructions For these Quick Start setup procedures, you will need your network administrator to provide you the LAN 1 and LAN 2 IP address and subnet mask, gateway IP address, DNS server IP address(es), host name of the server, and IP address for the Web interface (if using a NAT device).
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Configure Network Interface screen A. At the Enter interface lan1 IP address field, enter the IP address for the LAN 1 interface, and then press Enter to go to the next screen. B.
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES A. At the Enter default gateway IP field, enter the IP address for the default gateway. Press Enter to display the confirmation prompt. B. Press Y for “Yes” to confirm and save your entry for the gateway IP address, and to go to the Configure Domain Name Servers screen.
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES B. Press Y for “Yes” to confirm and save your entry for the host name, and to go to the Time zone regional configuration screen. Time zone regional configuration screen A. Use the up and down arrows in your keyboard to select your region. After selecting your locality, press Y for “Yes”...
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES C. At the Enter wizard password field, enter the password that will be used to access the setup wizard in the Threat Analysis Reporter interface. Press Y for “Yes” to confirm and save your entry and to go to the Quick Start Setup confir- mation screen.
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES System Status screen The System Status screen contains the following information: • lan1 interface for web access and Web Filter communications: LAN1 IP address and netmask specified in screen 3 (Configure Network Interface), and current status (“Active”...
On an SL or HL unit, the Threat Analysis Reporter can be configured using the LCD panel on front of the chassis bezel. When the bezel is placed on the front of the chassis, with the USB plug inserted into the USB port, the default LCD screen displays.
1B: LCD P NSTALL THE ERVER ANEL ETUP ROCEDURES IP / LAN1 and LAN2 When the IP / LAN 1 (LAN 2) option is selected, the IP / LAN 1 (LAN 2) screen displays with the following menu items: • Configure LAN 1 (2) IP •...
1B: LCD P NSTALL THE ERVER ANEL ETUP ROCEDURES Host Name When the Host Name option is selected, the Host Name screen displays with the Configure Hostname menu item. A. Choose Configure Hostname and press the checkmark key to go to the Configure Hostname screen.
1B: LCD P NSTALL THE ERVER ANEL ETUP ROCEDURES Non-Quick Start procedures or settings Current Patch Level When the Current Patch Level option is selected, “Threat Analysis Reporter” and the version number of the currently installed build displays. Reboot When the Reboot option is selected, the Reboot screen displays with two menu items.
1B: LCD P NSTALL THE ERVER ANEL ETUP ROCEDURES B. After making your selection, press the “X” key to return to the previous screen. Backlight When the Backlight option is selected, the Backlight screen displays. A. Press the checkmark or right arrow key three times to view each of the three available options: •...
LAN 1 port, the port on the left. Fig. 1 - Portion of SL and MSA chassis rear Fig. 2 - Portion of HL chassis rear B. Plug the other end of the CAT-5E cable into an open port on the network switch.
Enter.) • If pinging the IP address of the Threat Analysis Reporter is unsuccessful, try restarting the network service or rebooting the server. • If still unsuccessful, contact an M86 Security solutions engineer or technical support representative. M86 S...
3: R NSTALL THE ERVER EGISTER AND ITS PPLICATIONS Accept the Security Certificate in Firefox A. If using a Firefox browser, in the page “This Connection is Untrusted,” click the option I Understand the Risks: B. In the next set of instructions that display, click Add Exception...: Clicking Add Exception opens the Add Security Exception window: C.
3: R NSTALL THE ERVER EGISTER AND ITS PPLICATIONS Temporarily Accept the Security Certificate in IE If using an IE browser, in the page “There is a problem with this website's security certificate.”, click Continue to this website (not recommended): Selecting this option displays the Threat Analysis Reporter page’s address field and Certificate Error button to the right of the field shaded a reddish color: Proceed to Accept the End User License Agreement.
3: R NSTALL THE ERVER EGISTER AND ITS PPLICATIONS Accept the Security Certificate in Safari A. If using a Safari browser, the pop-up window "Safari can't verify the identity of the website..." opens: Click Show Certificate to open the certificate information box at the bottom of this window: B.
3: R NSTALL THE ERVER EGISTER AND ITS PPLICATIONS Accept the End User License Agreement A. Read the contents of the EULA Agreement dialog: B. Click Yes to accept the EULA, close the EULA Agreement dialog box, and display the Threat Analysis Reporter Wizard Login window. Proceed to Log in to the Threat Analysis Reporter Wizard.
3: R NSTALL THE ERVER EGISTER AND ITS PPLICATIONS Use the TAR Wizard to Specify Application Settings Enter Main Administrator Criteria A. Enter the Username the global administrator will use when logging into the Threat Analysis Reporter Administrator console. The global administrator has the highest level of permissions in the Threat Analysis Reporter.
3: R NSTALL THE ERVER EGISTER AND ITS PPLICATIONS Enter Web Filter Setup Criteria A. Enter the Server Name of the Web Filter to be used with the Threat Analysis Reporter, which is any name you wish to associate with that Web Filter. B.
4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE Step 4: Generate SSL Certificate Generate a Self-Signed Certificate for TAR This step requires you to generate a self-signed certificate for the Threat Analysis Reporter to ensure secure exchanges between the appliance and your browser. A.
Page 59
4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE D. Go to the bottom left corner of the Device Registry screen and click Generate SSL Certificate to open the Generate Self-Signed Certificate dialog box with the following message: "Generation of a self-signed certificate might take a long time.
4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE IE Security Certificate Installation Procedures Accept the Security Certificate in IE Go to the appropriate sub-section if using the following Windows operating system and IE browser: • Windows XP or Vista with IE 7 or 8 •...
Page 61
4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE B. Click Certificate Error to open the Certificate Invalid pop-up box: Figure B: Windows XP, IE 7 C. Click View certificates to open the Certificate window that includes the host name you assigned to TAR: Figure C: Windows XP, IE 7 D.
Page 62
4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE Figure E: Windows XP, IE 7 F. Choose the option “Place all certificates in the following store” and then click Browse... to open the Select Certificate Store pop-up box: Figure F: Windows XP, IE 7 G.
4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE Now that the security certificate is installed, you will need to map TAR’s IP address to its host name. Proceed to Map the TAR’s IP Address to the Server’s Host Name. Windows 7 with IE 8 A.
4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE Now that the security certificate is installed, you will need to map TAR’s IP address to its host name. Proceed to Map TAR’s IP Address to the Server’s Host Name. Map TAR’s IP Address to the Server’s Host Name A.
Page 65
4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE D. In the address field of your newly opened IE browser, from now on you will need to use TAR’s host name instead of its IP address—that is https://host- name:8443/8e6tar/ would be used instead of https://x.x.x.x:8443/8e6tar/. Click Go to open the TAR login window: M86 S ECURITY...
Obtain the latest Threat Analysis Reporter User Guide from our Web site at http:/ /www.m86security.com/support/Threat-Analysis-Reporter/documenta- tion.asp IMPORTANT: M86 Security recommends proceeding to the Best Usage Practices section for quick setup procedures described within that section. M86 S ECURITY...
SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS SAGE RACTICES Now that the Threat Analysis Reporter is installed on the network and you have successfully logged into the server, you are ready to begin using the Administrator console. To help you get started, this section provides an overview on some useful setup procedures and tools in the interface that you will use for identifying potential violators of your acceptable Internet usage policy so you can take effective and immediate action.
SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS Each URL gauge contains a number that represents its current score. This score is derived by activity within that gauge, based on the activities of end users who visited URLs listed in library categories that comprise the gauge. To view bandwidth gauge activity, click the Bandwidth tab above the URL gauges dashboard to display the bandwidth gauges dashboard.
• Device Registry - view information about devices connected to TAR, synchro- nize the server with user groups and libraries from the source Web Filter, edit M86 Security appliance criteria, add or delete a Web Filter or ER, reboot or shut down the server, or generate an SSL certificate for TAR •...
SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS II. Drill down into a gauge exercise This exercise will teach you how to drill down into a URL gauge to conduct an investigation on abnormally high Internet activity in a particular filtering category, in order to find out which individuals are driving that gauge’s score, and which URLs they are visiting.
Page 71
SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS Note the left side of this panel is populated with rows of records for Threats affected by the selected end user. Now that you’ve identified the user affecting the highest scoring gauge, next you will investigate the activity of that user who is driving the gauge’s score.
SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS Step B: Investigate a user’s activity in a specified gauge 1. To find out which URLs the top end user visited in the library category associ- ated with the high-scoring threat, select the Threat with the highest score and then click it to display a list of URLs the user visited in the right side of this panel: 2.
SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS Step C: Investigate the user’s Internet activity in other gauges 1. To find out which other gauges the same user is currently affecting, return to the Gauge Ranking table by going to the lower left corner of the Threat View User panel and clicking the Back button.
SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS 4. To find out which URLs the user is viewing in a particular library category, choose the category from the list, and then click the URL in the URLs list (see Step B1). In the Threat Analysis Reporter User Guide index, see: •...
SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS In the Threat Analysis Reporter User Guide index, see: • How to: access the Add/Edit Gauges panel Step B: Add a URL Gauge 1. Click New Gauge at the bottom left of the panel to open the URL Gauge panel: 2.
Page 76
SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS 5. From the Available User Groups list, select the user group to highlight it. 6. Click add > to move the user group to the Assigned User Groups list box. 7. After adding users, click Save at the bottom right of the panel to return to the Add/Edit Gauges panel that now includes the name of the gauge you just added: In the Threat Analysis Reporter User Guide index, see:...
SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS Now that you know the basics of creating a gauge, you will soon be able to create and use gauges to monitor various groups of users who frequent URLs in library categories you wish to restrict, and deal in real time with Internet usage issues that endanger your network and/or consume an excessive amount of bandwidth resources.
Page 78
SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS 3. Click New Alert to open a panel that displays the Alert Information frame to the left and the greyed-out target panel to the right containing the Email Addresses and Low Lockout Components accordions: 4.
SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS • Email - An email alert notifies a group administrator via email if an end user has reached the threshold limit set up in a gauge alert. • System Tray - A TAR Alert message notifies a group administrator via his/her workstation’s System Tray if an end user has reached the threshold limit set up in a gauge alert.
SAGE RACTICES HREAT NALYSIS EPORTER SAGE CENARIOS In the Threat Analysis Reporter User Guide index, see: • How to: set up email alert notifications in TAR Step D: Receiving an email alert When an end user’s activity in a gauge reaches the threshold limit established for an alert, it triggers an alert notification.
LED I MSA U NDICATORS AND UTTONS NITS LED I NDICATORS AND UTTONS SL and MSA Units Front LED Indicators and Buttons for Hardware Status Monitoring LED indicators and buttons for hardware status monitoring display on the front panel, located on the right side of the SL and MSA chassis (see diagrams below). LED Indicator Key PWR = Power HD = HDD Activity...
HL Unit Front LED Indicators and Buttons for Hardware Status Monitoring On an HL unit, the following control panel buttons, icons, and LED indicators for hardware status monitoring display on the right side of the front panel: LED Indicator Key...
UTTONS Rear LED Indicators for Hardware Status Monitoring UID (LED indicator) – On the rear of the HL chassis, to the left of the power supplies, a steady blue UID LED indicator displays when the UID button on the control panel is pressed. This LED remains lit until the UID button is pressed again.
HL and SL Units Front LED Indicators for Software and Hardware Status Monitoring On an HL or SL unit, the following LED indicators for software and hardware status monitoring display on the left side of the front panel: LED Indicator Key...
EGULATORY PECIFICATIONS AND ISCLAIMERS ECLARATION OF THE ANUFACTURER OR MPORTER EGULATORY PECIFICATIONS AND ISCLAIMERS Declaration of the Manufacturer or Importer Safety Compliance USA: UL 60950-1 2nd ed. 2007 Europe: Low Voltage Directive (LVD) 2006/95/EC to CB Scheme EN 60950: 2006 International: UL/CB to IEC 60950-1:2006 Electromagnetic Compatibility (EMC)
Operation of this equipment in a residential area is likely to cause harmful interfer- ence in which case the user will be required to correct the interference at his own expense. FCC Declaration of Conformity Models: HL-005-004, SL-004-004, MSA-004-004 M86 S ECURITY NSTALLATION...
EGULATORY PECIFICATIONS AND ISCLAIMERS ECLARATION OF THE ANUFACTURER OR MPORTER Electromagnetic Compatibility Class A Notice Industry Canada Equipment Standard for Digital Equipment (ICES-003) Bureau of Standards Metrology and Inspection (BSMI) - Taiwan M86 S ECURITY NSTALLATION UIDE...
EGULATORY PECIFICATIONS AND ISCLAIMERS ECLARATION OF THE ANUFACTURER OR MPORTER EC Declaration of Conformity European Community Directives Requirement (CE) M86 S ECURITY NSTALLATION UIDE...
PPENDIX PTIONAL THERNET NSTALLATION RELIMINARY ETUP ROCEDURES PPENDIX PTIONAL THERNET NSTALLATION This appendix pertains to the optional installation of the Ethernet Tap unit for band- width monitoring. Preliminary Setup Procedures Unpack the Ethernet Tap Unit from the Box Open the NetOptics Ethernet Tap box and verify that all accessories are included. Save all packing materials in the event that the unit needs to be returned to M86 Security.
PPENDIX PTIONAL THERNET NSTALLATION NSTALL THE THERNET Install the Ethernet Tap Unit Diagram showing TAR Ethernet Tap installation on the network This step is a continuation from Physically Connect the Unit to the Network in Step 1A or following setup in Step 1B. The procedures outlined in this step require the use of a CAT-5E cable.
Page 91
PPENDIX PTIONAL THERNET NSTALLATION NSTALL THE THERNET D. Connect the other end of the crossover cable to the Ethernet Tap’s Network A port. Ports in front panel of NetOptics 10/100BaseT Tap E. Using a straight through cable, connect one end to the Ethernet Tap’s Network B port.
Page 92
PPENDIX PTIONAL THERNET NSTALLATION NSTALL THE THERNET M86 S ECURITY NSTALLATION UIDE...
Need help?
Do you have a question about the HL and is the answer not in the manual?
Questions and answers