background image

STRM Installation Guide

Additional Hardware Requirements

7

from STRM and distributes to the appropriate area, depending on the type of 
event. The Event Processor also includes information gathered by STRM to 
indicate any behavioral changes or policy violations for the event. Rules are 
applied to the events that allow the Event Processor to process according to the 
configured rules. Once complete, the Event Processor sends the events to the 
Magistrate. 

Magistrate 

- Provides the core processing components. You can add one 

Magistrate component for each deployment. The Magistrate provides views, 
reports, alerts, and analysis of network traffic and security events. The 
Magistrate processes the event against the defined custom rules to create an 
offense. If no custom rules exist, the Magistrate uses the default rules to 
process the event. An offense is an event that has been processed through 
STRM using multiple inputs, individual events, and events combined with 
analyzed behavior and vulnerabilities. Magistrate prioritizes the offenses and 
assigns a magnitude value based on several factors, including number of 
events, severity, relevance, and credibility.

Additional 
Hardware 
Requirements

Before installing your STRM systems, make sure you have access to the additional 
hardware components:

Monitor and keyboard or a serial console

To make sure that your STRM data is preserved during a power failure, we 
highly recommend that all STRM appliances or systems running STRM 
software storing data (such as, Consoles, Event Processors, or Flow 
Processors) be equipped with a Uninterrupted Power Supply (UPS).

Additional Software 
Requirements

Before installing STRM, make sure you have Java Runtime Environment installed 
on your system. You can download Java version 1.5.0_12 at the following web 
site: http://java.com/.

Browser Support

You must have a browser installed on your client system to access the STRM 
interface. STRM supports the following web browsers:

-

Microsoft Internet Explorer 6.0/7.0

-

Firefox 2.0 

Preparing Your 
Network Hierarchy

STRM uses the network hierarchy to understand your network traffic and provide 
you with the ability to view network activity for your entire deployment. STRM 
supports any network hierarchy that can be defined by a range of IP addresses. 
You can create your network based on many different variables, including 
geographical or business units. For example, your network hierarchy may include 
corporate IP address ranges (internal or external), physical departments or areas, 
mails servers, and web servers.

Summary of Contents for SECURITY THREAT RESPONSE MANAGER - SOFTWARE INSTALLATION REV 1

Page 1: ...etworks Inc 1194 North Mathilda Avenue Sunnyvale CA 94089 USA 408 745 2000 www juniper net Part Number 530 025619 01 Revision 1 Security Threat Response Manager STRM Software Installation Guide Releas...

Page 2: ...ay radiate radio frequency energy If it is not installed in accordance with NetScreen s installation instructions it may cause interference with radio and television reception This equipment has been...

Page 3: ...ing Network Settings 8 Identifying Security Monitoring Devices and Flow Data Sources 9 Identifying Network Assets 10 2 INSTALLING STRM Setting Up Appliances 13 Installing STRM Using Red Hat Enterprise...

Page 4: ......

Page 5: ...feedback comments and suggestions so that we can improve the documentation Send your comments to techpubs comments juniper net or fill out the documentation feedback form at http www juniper net tech...

Page 6: ...ide 4 ABOUT THIS GUIDE Requesting Support Open a support case using the Case Management link at http www juniper net support or call 1 888 314 JTAC from the United States Canada or Mexico or 1 408 745...

Page 7: ...ettings Identifying Security Monitoring Devices and Flow Data Sources Identifying Network Assets Your STRM deployment may consist of STRM installed on one or multiple systems You can use the STRM thre...

Page 8: ...objects Console Provides the interface for STRM The Console provides real time views reports alerts and in depth flow views of network traffic and security threats This Console is also used to manage...

Page 9: ...nal Hardware Requirements Before installing your STRM systems make sure you have access to the additional hardware components Monitor and keyboard or a serial console To make sure that your STRM data...

Page 10: ...P address space for example 0 0 0 0 8 Proxy servers Network Address Translation NAT IP address range Server Network subnets Voice over IP VoIP subnets For more information see the STRM Administration...

Page 11: ...anually For more information see the Managing Sensor Devices Guide For each device you wish to add to your deployment record the device in Table 1 2 Where Link Speed Type indicates the maximum network...

Page 12: ...tuning results Table 1 3 provides a list of possible servers When identified see the STRM Users Guide for information on defining severs within STRM If your network includes a large number of servers...

Page 13: ...STRM Installation Guide Identifying Network Assets 11...

Page 14: ......

Page 15: ...n rack mounting your STRM appliance see the Hardware Installation Guide Step 2 Choose one of the following options a Connect a laptop to the serial port on the rear of the appliance Note When using a...

Page 16: ...with the packing slip all appliances are listed along with their associated keys Step 6 Enter your activation key If you are setting up a STRM appliance such as a STRM 2100 the Tuning Template window...

Page 17: ...he Next option Press Enter The Enter Time Server window appears Go to Step 10 Step 9 To manually enter the time and date a Enter the current date and time b Using the left right arrow keys select Next...

Page 18: ...elds enter values for the following parameters Hostname Specify a fully qualified domain name as the system hostname IP Address Specify the IP address of the system Network Mask Specify the network ma...

Page 19: ...w appears Step 13 To configure the STRM root password a Enter your password b Use the TAB key to move to the Next option Press Enter The Confirm New Root Password window appears c Re enter your new pa...

Page 20: ...urity Threat Response Manager Link to download the software Step 4 Place the STRM CD in the CD drive Step 5 Login as root Step 6 Mount the CD drive and change the CD content location mount media cdrom...

Page 21: ...ning Template window appears Go to Step 11 No Select this option only if this system is not a Console If you select this option the Time Zone Continent window appears Go to Step 16 Note To select the...

Page 22: ...Next option Press Enter The Current Date and Time window appears Go to Step 14 Server Allows you to specify your time server Use the Tab key to select the Next option Press Enter The Enter Time Server...

Page 23: ...selected c Using the up down arrow keys or the page up page down keys select your time zone region d Using the left right arrow keys select Next Press Enter The Configure STRM window appears Step 16 T...

Page 24: ...ss in one network to a different IP address in another network Email Server Specify the email server If you do not have an email server specify localhost in this field b Use the TAB key to move to the...

Page 25: ...n provides information on installing the plug in for your STRM system including Installing Plug In on an Appliance Installing Plug In on a System Running Red Hat Enterprise Installing Plug In on an Ap...

Page 26: ...ress is the IP address of the STRM system The default values are Username admin Password root password Where root password is the password assigned to STRM during the installation process Step 3 Click...

Page 27: ...ng You must use the 32 bit version of Red Hat Enterprise 4 Update 6 Using another version causes the installation process to fail When installing Red Hat Enterprise you must use the Minimal install op...

Page 28: ...ing partitions Note Make sure all EXT3 file systems are mounted as noatime boot System boot files should typically be 100 MB Select a file system type of EXT3 and the forced to be primary option swap...

Page 29: ...liance with a disk larger than 2 TB see Installing Red Hat Enterprise 4 Update 6 You are now ready to install STRM Installing Red Hat Enterprise 4 Update 6 Red Hat Enterprise 4 Update 6 is not compati...

Page 30: ...Hat Upgrades STRM installs both a customized version of boost and modules to support the Endace cards that are tied to a particular version of the kernel If you upgrade Red Hat Enterprise the wrong v...

Page 31: ...ources identifying 9 Flow Processor definition 6 Flow Writer definition 6 I installing Japanese support 23 preparing 5 Red Hat Enterprise 4 update 6 27 J Japanese support 23 M Magistrate definition 7...

Page 32: ...customizing 28 Update Daemon definition 6...

Reviews: