The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A
digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. The equipment generates, uses, and can radiate radio-frequency energy and, if not installed and
used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential
area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. The following
information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency energy. If it
is not installed in accordance with NetScreen’s installation instructions, i t may cause interference wi th radio and tele vision reception. This equip ment has
been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These
specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that
interference will not occur in a particular installation. If this equipmen t does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipme nt and receive r. Consult t he dealer o r an experienced ra dio/TV
technician for help. Connect the equipment to an outlet on a circuit different from that to which the receiver is connected.
Caution: Changes or modifications to this product could void the user's warrant y and authority to operate this device.
Disclaimer
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET
THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE
SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR JUNIPER NETWORKS REPRESENTATIVE FOR A COPY.
Setting Up Managed Hosts81
Using NAT with STRM87
Configuring a Managed Host91
Assigning a Component to a Host91
Configuring Host Context92
Configuring STRM Components95
Configuring a Flow Collector95
Configuring a Flow Processor98
Configuring a Classification Engine104
Configuring an Update Daemon106
Configuring a Flow Writer108
Configuring an Event Collector109
Configuring an Event Processor110
Configuring the Magistrate112
Flow Shape Group336
Default Rules337
Default Building Blocks346
INDEX
ABOUT THIS GUIDE
The STRM Administration Guide provides you with information for managing
STRM functionality requiring administrative access.
AudienceThis guide is intended for the system administrator responsible for setting up
STRM in your network. This guide assumes that you have STRM administrative
access and a knowledge of your corporate network and networking technologies.
ConventionsTable 1 lists conventions that are used throughout this guide.
Table 1 Icons
IconTypeDescription
Information noteInformation that describes important features or
instructions.
Technical
Documentation
Documentation
Feedback
CautionInformation that alerts you to potential loss of
data or potential damage to an application,
system, device, or network.
WarningInformation that alerts you to potential personal
injury.
You can access technical documentation, technical notes, and release notes
directly from the Juniper networks Support Web site at
www.juniper.net/support/.
http://
We encourage you to provide feedback, comments, and suggestions so that we
can improve the documentation. Send your comments to
techpubs-comments@juniper.net, orfill out the documentation feedback form at
http://www.juniper.net/techpubs/docbug/docbugreport.html. If you are using e-mail, be
sure to include the following information with your comments:
•Document name
•Document part number
STRM Administration Guide
2ABOUT THIS GUIDE
•Page number
•Software release version
Requesting
Support
•Open a support case using the Case Management link at
http://www.juniper.net/support/ or call 1-888-314-JTAC (from the United States,
Canada, or Mexico) or 1-408-745-9500 (from elsewher e).
STRM Administration Guide
OVERVIEW
1
This chapter provides an overview of the STRM Administration Console and
STRM administrative functionality including:
•About the Interface
•Accessing the Administration Console
•Using the Interface
•Deploying Changes
•Viewing STRM Audit Logs
About the InterfaceY ou must have administrative privileges to access the Administration Console. The
STRM Administration Console provides access to following administrative
functionality:
•Manage users. See Chapter 2Managing Users.
•Manage STRM. See Chapter 3Setting Up STRM.
•Backup and recover your data. See Chapter 4Managing Backup and
Recovery.
•Manage your deployment views. See Chapter 5Using the Deployment Editor.
•Managing flow sources. See Chapter 6Managing Flow Sources.
•Configure sentries. See Chapter 7Managing Sentries.
•Configure views. See Chapter 8Managing Views.
•Configure syslog forwarding. See Chapter 11Forwarding Syslog Data.
All configuration updates using the Administration Console are saved to a staging
area. Once all changes are complete, you can deploy the configuration changes or
all configuration settings to the remainder of your deployment.
STRM Administration Guide
4OVERVIEW
Accessing the
Administration
Console
You can access the STRM Administration Console through the main STRM
interface. To access the Administration Console, click Config in the main STRM
interface. The Administration Console appears.
Using the InterfaceThe Administration Console provides several tab and menu options that allow you
to configure STRM including:
•System Configuration - Provides access to administrative functionality, such
as, user management, automatic updates, license key, network hierarchy,
sentries, STRM settings, system notifications, backup and recovery and
Console configuration.
•Views Configuration - Provides access to STRM views.
•SIM Configuration - Provides access to scanners, sensor device
management, syslog forwarding, and reset the SIM model.
•Flow Configuration - Provides access to flow source configuration, such as
NetFlow.
The Administration Console also includes several menu options including:
Table 1-1 Administrative Console Menu Options
Menu OptionSub-MenuDescription
FileCloseCloses the Administration Console.
ConfigurationsDeployment EditorOpens the deployment editor
interface.
Deploy configuration
changes
Deploy AllDeploys all configuration settings to
SystemSTRM StartStarts the STRM application.
STRM StopStops the STRM application.
Deploys any configuration changes
from the current session to your
deployment.
your deployment.
STRM Administration Guide
Deploying Changes5
Table 1-1 Administrative Console Menu Options (continued)
Menu OptionSub-MenuDescription
STRM RestartRestarts the STRM application.
HelpHelp and SupportOpens user documentation.
About STRM
Administration Console
Displays version information.
The Administration Console provides several toolbar options including:
Table 1-2 Administration Console Toolbar Options
IconDescription
Opens the deployment editor interface.
Deploys all changes made through the Administration Console.
Deploying ChangesOnce you update your configuration settings using the Administration Console,
you must save those changes to the staging area. You must either manually
deploy all changes using the Deploy menu option or, upon exit, a window appears
prompting you to deploy changes before you exit. All deployed changes are then
enforced throughout your deployment.
Using the Administration Console menu, you can deploy changes as follows:
•Deploy All - Deploys all configuration settings to your deployment.
•Deploy configuration changes - Deploys any configuration changes from the
current session to your deployment.
Viewing STRM
Audit Logs
Changes made by STRM users are recorded in the audit logs. You can view the
audit logs to monitor changes to STRM and the users performing those changes.
All audit logs are stored in plain text and are archived and compressed once the
audit log file reaches a size of 200 MB. The current log file is named
Once the file reaches a size of 200 MB, the file is compressed and renamed as
follows:
audit.1.gz, audit.2.gz, etc with the file number incrementing each
time a log file is archived. STRM stores up to 50 archived log files.
This section provides information on using the audit logs including:
•Logged Actions
•Viewing the Log File
Logged ActionsSTRM logs the following categories of actions in the audit log file:
audit.log.
STRM Administration Guide
6OVERVIEW
Table 1-3 Logged Actions
CategoryAction
User AuthenticationLog in to STRM
User AuthenticationLog out of STRM
Administrator AuthenticationLog in to the STRM Administration Consol e
Administrator AuthenticationLog out of the STRM Administration Console
Root LoginLog in to STRM, as root
Log out of STRM, as root
RulesAdding a rule
Deleting a rule
Editing a rule
Sentry Adding a sentry
Editing a sentry
Deleting a sentry
Editing a sentry package
Editing sentry logic
User AccountsAdding an account
Editing an account
Deleting an account
User RolesAdding a role
Editing a role
Deleting a role
Sensor DevicesAdding a sensor device
Editing a sensor device
Deleting a sensor device
Adding a sensor device group
Editing a sensor device group
Deleting a sensor device group
Sensor Device ExtensionAdding an sensor device extension
Editing the sensor device extension
Deleting a sensor device extension
Uploading a sensor device extension
Uploading a sensor device extension
successfully
Downloading a sensor device extension
Reporting a sensor device extension
Modifying a sensor devices association to a
device or device type.
STRM Administration Guide
Viewing STRM Audit Logs7
Table 1-3 Logged Actions
CategoryAction
Protocol ConfigurationAdding a protocol configuration
Deleting a protocol configuration
Editing a protocol configuration
Flow SourcesAdding a flow source
Editing a flow source
Deleting a flow source
Offense ManagerHiding an offense
Closing an offense
Closing all offenses
TNC RecommendationsCreating a recommendation
Editing a recommendation
Deleting a recommendation
Syslog ForwardingAdding a syslog forwarding
Deleting a syslog forwarding
Editing a syslog forwarding
ReportsAdding a template
Deleting a template
Editing a template
Executing a template
Deleting a report
GroupsAdding a group
Deleting a group
Editing a group
Backup and RecoveryEditing the configuration
Initiating the backup
Completing the backup
Failing the backup
Deleting the backup
Synchronizing the backup
Cancelling the backup
Initiating the restore
Uploading a backup
Uploading an invalid backup
Deleting the backup
STRM Administration Guide
8OVERVIEW
Table 1-3 Logged Actions
CategoryAction
ScannerAdding a scanner
Scanner ScheduleAdding a schedule
AssetDeleting all assets
LicenseAdding a license key.
Viewing the Log FileTo view the audit logs:
Step 1 Log in to STRM as root.
Step 2 Go to the following directory:
/var/log/audit
Deleting a scanner
Editing a scanner
Editing a schedule
Deleting a schedule
Editing a license key.
Step 3 Open the desired audit log file.
Each entry in the log file displays using the following format:
Note: The maximum size of any audit message (not including date, time, and host
name) is 1024 characters.
<date_time> is the date and time of the activity in the format: Month Date
HH:MM:SS.
<host name> is the host name of the Console where this activity was logged.
<user> is the name of the user that performed the action.
<IP address> is the IP address of the user that performed the action.
(thread ID) is the identifier of the Java thread that logged this activity.
<category> is the high-level category of this activity.
<sub-category> is the low-level category of this activity.
<action> is the activity that occurred.
<payload> is the complete record that has changed, if any. This may include a
user record or an event rule.
For example:
Nov 6 12:22:31 localhost.localdomain admin@10.100.100.15
(Session) [Authentication] [User] [Login]
This chapter provides information on managing STRM users including:
•Managing Roles
•Managing User Accounts
•Authenticating Users
You can add or remove user accounts for all users that you wish to access STRM.
Each user is associated with a role, which determines the privileges the user has
to functionality and information within STRM. You can also restrict or allow access
to areas of the network.
Managing RolesYou must create a role before you can create user accounts. By default, STRM
provides a default administrative role, which provides access to all areas of STRM.
A user that has been assigned administrative privileges (including the default
administrative role) cannot edit their own account. Another administrative user
must make any desired changes.
Using the Administration Console, you can:
•Create a role. See Creating a Role.
•Edit a role. See Editing a Role
Creating a RoleTo create a role:
Step 1 In the Administration Console, click the System Configuration tab.
The System Configuration panel appears.
Step 2 Click the User Roles icon.
The Manage User Roles window appears.
Step 3 Click Create Role.
STRM Administration Guide
12MANAGING USERS
Step 4 Enter values for the parameters. You must select at least one permission to
proceed.
Table 2-1 Create Roles Parameters
ParameterDescription
Role NameSpecify the name of the role. The name can be up to 15
characters in length and must only contain integers and
letters.
AdministratorSelect the check box if you wish to grant this user
administrative access to the STRM interface. Within the
administrator role, you can grant additional access to the
following:
• System Administrator - Select this check box if you wish
to allow users access to all areas of STRM except Views.
Also users with this access are not able to edit other
administrator accounts.
• Administrator Manager - Select this check box if you
wish to allow users the ability to create and edit other
administrative user accounts. If you select this check box,
the System Administrator check box is automatically
selected.
• Views Administrator - Select this check box if you wish
to allow users the ability to create, edit, or delete Views.
For example, the Application View and the Ports View.
STRM Administration Guide
Managing Roles13
Table 2-1 Create Roles Parameters (continued)
ParameterDescription
Offense ManagementSelect the check box if you wish to grant this user access to
Offense Manager functionality. Within the Offense Manager
functionality, you can grant additional access to the
following:
• Assign Offenses to Users - Select the check box if you
wish to allow users to assign offenses to other users.
• Customized Rule Creation - Select the check box if you
wish to allow users to create custom rules.
For more information on the Offense Manager, see the
STRM Users Guide.
Event ViewerSelect the check box if you wish this user to have access to
the Event Viewer. Within the Event Viewer, you can also
grant users additional access to the following:
• Event Search Restrictions Override - Select the check
box if you wish to allow users the ability to override event
search restrictions.
• Customized Rule Creation functionality - Select the
check box if you wish to allow users to create rules using
the Event Viewer.
For more information on the Event Viewer, see the STRM Users Guide.
Asset ManagementSelect the check box if you wish to grant this user access to
Asset Management functionality. Within the Asset
Management functionality, you can grant additional access
to the following:
• Server Discovery - Select the check box if you wish to
allow users the ability to discover servers.
• View VA Data - Select the check box if you wish to allow
users access to vulnerability assessment data.
• Perform VA Scans - Select the check box if you wish to
allows users to perform vulnerability assessment scans.
STRM Administration Guide
14MANAGING USERS
Table 2-1 Create Roles Parameters (continued)
ParameterDescription
Network SurveillanceSelect the check box if you wish to grant this user access to
Network Surveillance functionality. Within the Network
Surveillance functionality, you can grant additional access to
the following:
• View Flows - Select the check box if you wish to allow
users access to content captured using the View Flows
function.
• View Flow Content - Select the check box if you wish to
allow users access to data accessed through the View
Flow box.
• View Flows Restrictions Override - Select the check
box if you wish to allow users the ability to override sentry
restrictions.
• Sentry Modification - Select the check box if you wish to
allows users to modify existing sentries.
For more information, see the STRM Users Guide.
ReportingSelect the check box if you wish to grant this user access to
Reporting functionality. Within the Reporting functionality,
you can grant users additional access to the following:
• Distribute Reports via Email - Select the check box if
you wish to allow users to distribute reports throug h
e-mail.
• Maintain Templates - Select the check box if you wish to
allow users to maintain reporting templates.
For more information, see the STRM Users Guide.
Step 5 Click Save.
Step 6 Click Return.
Step 7 Close the Manage Roles window.
The STRM Administration Console appears.
Step 8 From the menu, select Configurations > Deploy configuration changes.
Editing a RoleTo edit a role:
Step 1 In the Administration Console, click the System Configuration tab.
The System Configuration panel appears.
Step 2 Click the User Roles icon.
The Manage Role window appears.
Step 3 For the role you wish to edit, click the edit icon.
The Permissions for Role window appears.
Step 4 Update the permissions (see Table 2-1), as necessary.
STRM Administration Guide
Managing User Accounts15
Step 5 Click Return.
Step 6 Click Save.
Step 7 Close the Manage User Roles window.
The STRM Administration Console appears.
Step 8 From the menu, select Configurations > Deploy configuration changes.
Managing User
Accounts
Creating a User
Account
You can create a STRM user account, which allows a user access to selected
network components using the STRM interface. You can also create multiple
accounts for your system that include administrative privileges. Only the main
administrative account can create accounts that have administrative privileges.
You can create and edit user accounts to access STRM including:
•Creating a User Account
•Editing a User Account
•Disabling a User Account
To create an account for a STRM user:
Step 1 In the Administration Console, click the System Configuration tab.
The System Configuration panel appears.
Step 2 Click the Users icon.
The Manage Users window appears.
Step 3 In the Manage Users area, click Add.
The User Details window appears.
Step 4 Enter values for the following parameters:
Table 2-2 User Details Parameters
ParameterDescription
UsernameSpecify a username for the new user. The username must not
include spaces or special characters.
STRM Administration Guide
16MANAGING USERS
Step 5 Click Next.
Table 2-2 User Details Parameters (continued)
ParameterDescription
PasswordSpecify a password for the user to gain access. The password
must be at least 5 characters in length.
Confirm Password Re-enter the password for confirmation.
Email AddressSpecify the user’s e-mail address.
RoleUsing the drop-down list box, select the role you wish this user to
assume. For information on roles, see
Managing Roles. If you
select Admin, this process is complete.
The Selected Network Objects window appears.
Step 6 From the menu tree, select the network objects you wish this user to be able to
monitor.
The selected network objects appear in the Selected Network Object panel.
Step 7 Choose one of the following options:
a Click Deploy Now to deploy new user information immediately.
b Click Cancel to cancel all updates and return to the Manage Users window.
Step 8 Close the Manage Users window.
The STRM Administration Console appears.
STRM Administration Guide
Managing User Accounts17
Editing a User
Account
Step 1 In the Administration Console, click the System Configuration tab.
Step 2 Click the Users icon.
Step 3 In the Manage Users area, click the user account you wish to edit.
Step 4 Update values (see Table 2-2), as necessary.
Step 5 Click Next.
Step 6 From the menu tree, select the network objects you wish this user to access.
Step 7 For all network objects you wish to remove access, select the object from the
Step 8 Choose one of the following options:
To edit a user account:
The System Configuration panel appears.
The Manage Users window appears.
The User Details window appears.
If you are editing a non-administrative user account, the Selected Network Objects
window appears. If you are editing an administrative user account, go to Step 9.
The selected network objects appear in the Selected Network Object panel.
Selected Network Objects panel and click Remove.
a Click Deploy Now to deploy new user information immediately.
Step 9 Close the Manage Users window.
Disabling a User
Account
Step 1 In the Administration Console, click the System Configuration tab.
Step 2 Click the Users icon.
Step 3 In the Manage Users area, click the user account you wish to disable.
Step 4 In the Role drop-down list box, select Disabled.
Step 5 Click Next.
Step 6 Close the Manage Users window.
b Click Cancel to return to cancel all updates and return to the Manage Users
window.
The STRM Administration Console appears.
To disable a user account:
The System Configuration panel appears.
The Manage Users window appears.
The User Details window appears.
The STRM Administration Console appears. This user no longer has access to the
STRM interface. If this user attempts to log in to STRM, the following message
appears: This account has been disabled.
STRM Administration Guide
18MANAGING USERS
Authenticating
Users
You can configure authentication to validate STRM users and passwords. STRM
supports the following user authentication types:
•System Authentication - Users are authenticated lo cally by STRM. This is the
default authentication type.
•RADIUS Authentication - Users are authenticated by a Remote Authentication
Dial-in User Service (RADIUS) server. When a user attempts to login, STRM
encrypts the password only, and forwards the username and password to the
RADIUS server for authentication.
•TACACS Authentication - Users are authenticated by a Terminal Access
Controller Access Control System (TACACS) server. When a user attempts to
login, STRM encrypts the username and password, and forwards this
information to the TACACS server for authentication.
•LDAP/ Active Directory - Users are authenticated by a Lightweight Directory
Access Protocol (LDAP) server using Kerberos.
If you wish to configure RADIUS, TACACS, or LDAP/Active Directory as the
authentication type, you must :
•Configure the authentication server before you con figu re authentication in
STRM.
•Make sure the server has the appropriate user accounts and privilege levels to
communicate with STRM. See your server documentation for more information.
•Make sure the time of the authentication server is synchronized with the time of
the STRM server. For more information on setting STRM time, see Chapter 3
Setting Up STRM.
•Make sure all users have appropriate user accounts and roles in STRM to allow
authentication with the third party servers.
Once authentication is configured and a user enters an invalid username and
password combination, a message appears indicating the login was invalid. if the
user attempts to access the sy st em multiple times using invalid information, the
user must wait the configured amount of time before attempting to access the
system again. For more information on configuring system settings for
authentication, see Chapter 3Setting Up STRM - Configuring the Console
Settings. An administrative user can always access STRM through a third party
authentication module or by using the local STRM Admin password.
To configure authentication:
Step 1 In the Administration Console, click the System Configuration tab.
The System Configuration panel appears.
Step 2 Click the Authentication icon.
The Authentication window appears.
STRM Administration Guide
Authenticating Users19
Step 3
From the Authentication Module drop-down list box, select the authentication type
you wish to configure.
Step 4 Configure the selected authentication type:
a If you selected System Authentication, go to Step 5
b If you selected RADIUS Authentication, enter values for the following
parameters:
Table 2-3 RADIUS Parameters
ParameterDescription
RADIUS ServerSpecify the hostname or IP address of the RADIUS server.
RADIUS PortSpecify the port of the RADIUS server.
Authentication
Type
Specify the type of authentication you wish to perf or m . Th e
options are:
• CHAP (Challenge Handshake Authentication Protocol) -
Establishes a Point-to-Point Protocol (PPP) connection
between the user and the server.
Protocol version 2)- Authenticates remote Windows
workstations using mutual authentication.
• EAPMD5 (Extensible Authentication Protocol using MD5
Protocol) - Uses MD5 to establish a PPP connection.
Shared SecretSpecify the shared secret that STRM uses to encrypt TACACS
passwords for transmission to the TACACS server.
d If you selected LDAP/ Active Directory, enter values for the following
parameters:
Table 2-5 LDAP/ Active Directory Parameters
ParameterDescription
Server URLSpecify the URL used to connect to the LDAP server. For
LDAP ContextSpecify the LDAP context you wish to use, for example,
LDAP DomainSpecify the domain you wish to use, for example q1labs.inc
Step 5 Click Save.
example, ldap://<host>:<port>
DC=Q1LABS,DC=INC.
STRM Administration Guide
3
SETTING UP STRM
This chapter provides information on setting up STRM including:
•Managing Your License Keys
•Creating Your Network Hierarchy
•Scheduling Automatic Updates
•Configuring STRM Settings
•Configuring System Notifications
•Configuring the Console Settings
•Starting and Stopping STRM
•Resetting SIM
•Accessing the Embedded SNMP Agent
•Configuring Access Settings
Managing Your
License Keys
For your STRM Console, a default license key provides you access to the interface
for 5 weeks. You must manage your license key using the System Management
window in the STRM Administration Console. This interface prov ides the status of
the license key for each system (host) in your deployment including:
•Valid - The license key is valid.
•Expired - The license key has expired. To update your license key, see
Updating your License Key.
•Override Console License - This host is using the Console license key. You
can use the Console key or apply a license key for this system. If you wish to
use the Console license for any system in your deployment, click Default License in the Manage License window . The license for that system will default
to the Console license key.
This section provides information on managing your license keys including:
•Updating your License Key
•Exporting Your License Key Information
STRM Administration Guide
22SETTING UP STRM
Updating your
License Key
Step 1 In the Administration Console, click the System Configuration tab.
Step 2 Click the System Management icon.
For your STRM Console, a default license key provides you access to the interface
for 5 weeks. Choose one of the following options for assistance with your license
key:
•For a new or updated license key, please contact your local sales
representative.
•For all other technical issues, please contact Juniper Networks Customer
Support.
If you log in to STRM and your Console license key has expired, you are
automatically directed to the System Management window. You must update the
license key before you can continue. However, if one of your non-Console systems
includes an expired license key, a message appears when you log in indicating a
system requires a new license key. You must navigate to the System Management
window to update that license key.
To update your license key:
The System Configuration panel appears.
The System Management window appears providing a list of all hosts in your
deployment.
Step 3 For the host that on which you wish to update the license key, click the value that
appears in the License column.
Note: If you update the license key for your Console, all systems in your
deployment default to the Console license key at that time.
The Current License Details window appears.
Step 4 Click Browse beside the New License Key File and locate the license key.
STRM Administration Guide
Loading...
+ 340 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.