C
ONTENTS
A
BOUT
T
HIS
G
UIDE
Conventions
3
Technical Documentation
3
Documentation Feedback
3
Requesting Support
4
1
P
REPARING
F
OR
Y
OUR
I
NSTALLATION
Deploying STRM
6
Additional Hardware Requirements
7
Additional Software Requirements
7
Browser Support
7
Preparing Your Network Hierarchy
7
Identifying Network Settings
8
Identifying Security Monitoring Devices and Flow Data Sources
9
Identifying Network Assets
10
2
I
NSTALLING
STRM
Setting Up Appliances
13
Installing STRM Using Red Hat Enterprise 4.6
18
Installing Japanese Support
23
Accessing STRM
24
A
S
ETTING
U
P
R
ED
H
AT
E
NTERPRISE
Before You Begin
25
Configuring Network Parameters
26
Configuring Firewall Configuration
26
Configuring Disk Partitions
26
Installing Red Hat Enterprise 4
Update 6
27
Customizing Red Hat Upgrades
28
I
NDEX
Содержание SECURITY THREAT RESPONSE MANAGER - SOFTWARE INSTALLATION REV 1
Страница 4: ......
Страница 13: ...STRM Installation Guide Identifying Network Assets 11...
Страница 14: ......
Страница 32: ...customizing 28 Update Daemon definition 6...