![Juniper SECURITY THREAT RESPONSE MANAGER - LOG MANAGEMENT INSTALLATION REV 1 Installation Manual Download Page 13](http://html1.mh-extra.com/html/juniper/security-threat-response-manager-log-management-installation-rev-1/security-threat-response-manager-log-management-installation-rev-1_installation-manual_2032894013.webp)
STRM-LM Installation Guide
2
I
NSTALLING
STRM-LM
This chapter provides information on installing your STRM-LM system using one of
the following options:
•
Setting Up Appliances
•
Installing Japanese Support
•
Accessing STRM-LM
Setting Up
Appliances
A STRM-LM appliance includes STRM-LM software and a CentOS-4 operating
system. This section provides information on setting up your appliance. For more
information on appliances see the
Hardware Installation Guide
.
To set-up your appliance:
Step 1
Install all necessary hardware.
For information on rack mounting your STRM-LM appliance, see the
Hardware
Installation Guide
.
Step 2
Choose one of the following options:
a
Connect a laptop to the serial port on the rear of the appliance.
Note:
When using a laptop to connect to the system you must use a terminal
program, such as HyperTerminal, to connect to the system. Be sure to set
Connect Using
to the appropriate COM port of the serial connector and
Bits per
second
to 9600. You must also set
Stop Bits
(1),
Data bits
(8), and
Parity
(None).
b
Connect a keyboard and monitor to their respective ports.
For more information on appliance ports, see the
Hardware Installation Guide
.
Step 3
Power on the system and log in to STRM-LM:
Username:
root
Password:
password
Note:
The username and password are case sensitive.
Step 4
Press
Enter
.
The End User License Agreement (EULA) appears.
Summary of Contents for SECURITY THREAT RESPONSE MANAGER - LOG MANAGEMENT INSTALLATION REV 1
Page 4: ......
Page 11: ...STRM LM Installation Guide Identifying Security Monitoring Devices 7 ...
Page 12: ......
Page 20: ...STRM LM Installation Guide 16 INSTALLING STRM LM ...
Page 28: ......
Page 30: ......