The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A
digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. The equipment generates, uses, and can radiate radio-frequency energy and, if not installed and
used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential
area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. The following
information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency energy. If it
is not installed in accordance with NetScreen’s installation instructions, i t may cause interference wi th radio and tele vision reception. This equip ment has
been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These
specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that
interference will not occur in a particular installation. If this equipmen t does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipme nt and receive r. Consult t he dealer o r an experienced ra dio/TV
technician for help. Connect the equipment to an outlet on a circuit different from that to which the receiver is connected.
Caution: Changes or modifications to this product could void the user's warrant y and authority to operate this device.
Disclaimer
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET
THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE
SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR JUNIPER NETWORKS REPRESENTATIVE FOR A COPY.
Setting Up Managed Hosts81
Using NAT with STRM87
Configuring a Managed Host91
Assigning a Component to a Host91
Configuring Host Context92
Configuring STRM Components95
Page 5
Configuring a Flow Collector95
Configuring a Flow Processor98
Configuring a Classification Engine104
Configuring an Update Daemon106
Configuring a Flow Writer108
Configuring an Event Collector109
Configuring an Event Processor110
Configuring the Magistrate112
Flow Shape Group336
Default Rules337
Default Building Blocks346
INDEX
Page 9
ABOUT THIS GUIDE
The STRM Administration Guide provides you with information for managing
STRM functionality requiring administrative access.
AudienceThis guide is intended for the system administrator responsible for setting up
STRM in your network. This guide assumes that you have STRM administrative
access and a knowledge of your corporate network and networking technologies.
ConventionsTable 1 lists conventions that are used throughout this guide.
Table 1 Icons
IconTypeDescription
Information noteInformation that describes important features or
instructions.
Technical
Documentation
Documentation
Feedback
CautionInformation that alerts you to potential loss of
data or potential damage to an application,
system, device, or network.
WarningInformation that alerts you to potential personal
injury.
You can access technical documentation, technical notes, and release notes
directly from the Juniper networks Support Web site at
www.juniper.net/support/.
http://
We encourage you to provide feedback, comments, and suggestions so that we
can improve the documentation. Send your comments to
techpubs-comments@juniper.net, orfill out the documentation feedback form at
http://www.juniper.net/techpubs/docbug/docbugreport.html. If you are using e-mail, be
sure to include the following information with your comments:
•Document name
•Document part number
STRM Administration Guide
Page 10
2ABOUT THIS GUIDE
•Page number
•Software release version
Requesting
Support
•Open a support case using the Case Management link at
http://www.juniper.net/support/ or call 1-888-314-JTAC (from the United States,
Canada, or Mexico) or 1-408-745-9500 (from elsewher e).
STRM Administration Guide
Page 11
OVERVIEW
1
This chapter provides an overview of the STRM Administration Console and
STRM administrative functionality including:
•About the Interface
•Accessing the Administration Console
•Using the Interface
•Deploying Changes
•Viewing STRM Audit Logs
About the InterfaceY ou must have administrative privileges to access the Administration Console. The
STRM Administration Console provides access to following administrative
functionality:
•Manage users. See Chapter 2Managing Users.
•Manage STRM. See Chapter 3Setting Up STRM.
•Backup and recover your data. See Chapter 4Managing Backup and
Recovery.
•Manage your deployment views. See Chapter 5Using the Deployment Editor.
•Managing flow sources. See Chapter 6Managing Flow Sources.
•Configure sentries. See Chapter 7Managing Sentries.
•Configure views. See Chapter 8Managing Views.
•Configure syslog forwarding. See Chapter 11Forwarding Syslog Data.
All configuration updates using the Administration Console are saved to a staging
area. Once all changes are complete, you can deploy the configuration changes or
all configuration settings to the remainder of your deployment.
STRM Administration Guide
Page 12
4OVERVIEW
Accessing the
Administration
Console
You can access the STRM Administration Console through the main STRM
interface. To access the Administration Console, click Config in the main STRM
interface. The Administration Console appears.
Using the InterfaceThe Administration Console provides several tab and menu options that allow you
to configure STRM including:
•System Configuration - Provides access to administrative functionality, such
as, user management, automatic updates, license key, network hierarchy,
sentries, STRM settings, system notifications, backup and recovery and
Console configuration.
•Views Configuration - Provides access to STRM views.
•SIM Configuration - Provides access to scanners, sensor device
management, syslog forwarding, and reset the SIM model.
•Flow Configuration - Provides access to flow source configuration, such as
NetFlow.
The Administration Console also includes several menu options including:
Table 1-1 Administrative Console Menu Options
Menu OptionSub-MenuDescription
FileCloseCloses the Administration Console.
ConfigurationsDeployment EditorOpens the deployment editor
interface.
Deploy configuration
changes
Deploy AllDeploys all configuration settings to
SystemSTRM StartStarts the STRM application.
STRM StopStops the STRM application.
Deploys any configuration changes
from the current session to your
deployment.
your deployment.
STRM Administration Guide
Page 13
Deploying Changes5
Table 1-1 Administrative Console Menu Options (continued)
Menu OptionSub-MenuDescription
STRM RestartRestarts the STRM application.
HelpHelp and SupportOpens user documentation.
About STRM
Administration Console
Displays version information.
The Administration Console provides several toolbar options including:
Table 1-2 Administration Console Toolbar Options
IconDescription
Opens the deployment editor interface.
Deploys all changes made through the Administration Console.
Deploying ChangesOnce you update your configuration settings using the Administration Console,
you must save those changes to the staging area. You must either manually
deploy all changes using the Deploy menu option or, upon exit, a window appears
prompting you to deploy changes before you exit. All deployed changes are then
enforced throughout your deployment.
Using the Administration Console menu, you can deploy changes as follows:
•Deploy All - Deploys all configuration settings to your deployment.
•Deploy configuration changes - Deploys any configuration changes from the
current session to your deployment.
Viewing STRM
Audit Logs
Changes made by STRM users are recorded in the audit logs. You can view the
audit logs to monitor changes to STRM and the users performing those changes.
All audit logs are stored in plain text and are archived and compressed once the
audit log file reaches a size of 200 MB. The current log file is named
Once the file reaches a size of 200 MB, the file is compressed and renamed as
follows:
audit.1.gz, audit.2.gz, etc with the file number incrementing each
time a log file is archived. STRM stores up to 50 archived log files.
This section provides information on using the audit logs including:
•Logged Actions
•Viewing the Log File
Logged ActionsSTRM logs the following categories of actions in the audit log file:
audit.log.
STRM Administration Guide
Page 14
6OVERVIEW
Table 1-3 Logged Actions
CategoryAction
User AuthenticationLog in to STRM
User AuthenticationLog out of STRM
Administrator AuthenticationLog in to the STRM Administration Consol e
Administrator AuthenticationLog out of the STRM Administration Console
Root LoginLog in to STRM, as root
Log out of STRM, as root
RulesAdding a rule
Deleting a rule
Editing a rule
Sentry Adding a sentry
Editing a sentry
Deleting a sentry
Editing a sentry package
Editing sentry logic
User AccountsAdding an account
Editing an account
Deleting an account
User RolesAdding a role
Editing a role
Deleting a role
Sensor DevicesAdding a sensor device
Editing a sensor device
Deleting a sensor device
Adding a sensor device group
Editing a sensor device group
Deleting a sensor device group
Sensor Device ExtensionAdding an sensor device extension
Editing the sensor device extension
Deleting a sensor device extension
Uploading a sensor device extension
Uploading a sensor device extension
successfully
Downloading a sensor device extension
Reporting a sensor device extension
Modifying a sensor devices association to a
device or device type.
STRM Administration Guide
Page 15
Viewing STRM Audit Logs7
Table 1-3 Logged Actions
CategoryAction
Protocol ConfigurationAdding a protocol configuration
Deleting a protocol configuration
Editing a protocol configuration
Flow SourcesAdding a flow source
Editing a flow source
Deleting a flow source
Offense ManagerHiding an offense
Closing an offense
Closing all offenses
TNC RecommendationsCreating a recommendation
Editing a recommendation
Deleting a recommendation
Syslog ForwardingAdding a syslog forwarding
Deleting a syslog forwarding
Editing a syslog forwarding
ReportsAdding a template
Deleting a template
Editing a template
Executing a template
Deleting a report
GroupsAdding a group
Deleting a group
Editing a group
Backup and RecoveryEditing the configuration
Initiating the backup
Completing the backup
Failing the backup
Deleting the backup
Synchronizing the backup
Cancelling the backup
Initiating the restore
Uploading a backup
Uploading an invalid backup
Deleting the backup
STRM Administration Guide
Page 16
8OVERVIEW
Table 1-3 Logged Actions
CategoryAction
ScannerAdding a scanner
Scanner ScheduleAdding a schedule
AssetDeleting all assets
LicenseAdding a license key.
Viewing the Log FileTo view the audit logs:
Step 1 Log in to STRM as root.
Step 2 Go to the following directory:
/var/log/audit
Deleting a scanner
Editing a scanner
Editing a schedule
Deleting a schedule
Editing a license key.
Step 3 Open the desired audit log file.
Each entry in the log file displays using the following format:
Note: The maximum size of any audit message (not including date, time, and host
name) is 1024 characters.
<date_time> is the date and time of the activity in the format: Month Date
HH:MM:SS.
<host name> is the host name of the Console where this activity was logged.
<user> is the name of the user that performed the action.
<IP address> is the IP address of the user that performed the action.
(thread ID) is the identifier of the Java thread that logged this activity.
<category> is the high-level category of this activity.
<sub-category> is the low-level category of this activity.
<action> is the activity that occurred.
<payload> is the complete record that has changed, if any. This may include a
user record or an event rule.
For example:
Nov 6 12:22:31 localhost.localdomain admin@10.100.100.15
(Session) [Authentication] [User] [Login]
This chapter provides information on managing STRM users including:
•Managing Roles
•Managing User Accounts
•Authenticating Users
You can add or remove user accounts for all users that you wish to access STRM.
Each user is associated with a role, which determines the privileges the user has
to functionality and information within STRM. You can also restrict or allow access
to areas of the network.
Managing RolesYou must create a role before you can create user accounts. By default, STRM
provides a default administrative role, which provides access to all areas of STRM.
A user that has been assigned administrative privileges (including the default
administrative role) cannot edit their own account. Another administrative user
must make any desired changes.
Using the Administration Console, you can:
•Create a role. See Creating a Role.
•Edit a role. See Editing a Role
Creating a RoleTo create a role:
Step 1 In the Administration Console, click the System Configuration tab.
The System Configuration panel appears.
Step 2 Click the User Roles icon.
The Manage User Roles window appears.
Step 3 Click Create Role.
STRM Administration Guide
Page 20
12MANAGING USERS
Step 4 Enter values for the parameters. You must select at least one permission to
proceed.
Table 2-1 Create Roles Parameters
ParameterDescription
Role NameSpecify the name of the role. The name can be up to 15
characters in length and must only contain integers and
letters.
AdministratorSelect the check box if you wish to grant this user
administrative access to the STRM interface. Within the
administrator role, you can grant additional access to the
following:
• System Administrator - Select this check box if you wish
to allow users access to all areas of STRM except Views.
Also users with this access are not able to edit other
administrator accounts.
• Administrator Manager - Select this check box if you
wish to allow users the ability to create and edit other
administrative user accounts. If you select this check box,
the System Administrator check box is automatically
selected.
• Views Administrator - Select this check box if you wish
to allow users the ability to create, edit, or delete Views.
For example, the Application View and the Ports View.
STRM Administration Guide
Page 21
Managing Roles13
Table 2-1 Create Roles Parameters (continued)
ParameterDescription
Offense ManagementSelect the check box if you wish to grant this user access to
Offense Manager functionality. Within the Offense Manager
functionality, you can grant additional access to the
following:
• Assign Offenses to Users - Select the check box if you
wish to allow users to assign offenses to other users.
• Customized Rule Creation - Select the check box if you
wish to allow users to create custom rules.
For more information on the Offense Manager, see the
STRM Users Guide.
Event ViewerSelect the check box if you wish this user to have access to
the Event Viewer. Within the Event Viewer, you can also
grant users additional access to the following:
• Event Search Restrictions Override - Select the check
box if you wish to allow users the ability to override event
search restrictions.
• Customized Rule Creation functionality - Select the
check box if you wish to allow users to create rules using
the Event Viewer.
For more information on the Event Viewer, see the STRM Users Guide.
Asset ManagementSelect the check box if you wish to grant this user access to
Asset Management functionality. Within the Asset
Management functionality, you can grant additional access
to the following:
• Server Discovery - Select the check box if you wish to
allow users the ability to discover servers.
• View VA Data - Select the check box if you wish to allow
users access to vulnerability assessment data.
• Perform VA Scans - Select the check box if you wish to
allows users to perform vulnerability assessment scans.
STRM Administration Guide
Page 22
14MANAGING USERS
Table 2-1 Create Roles Parameters (continued)
ParameterDescription
Network SurveillanceSelect the check box if you wish to grant this user access to
Network Surveillance functionality. Within the Network
Surveillance functionality, you can grant additional access to
the following:
• View Flows - Select the check box if you wish to allow
users access to content captured using the View Flows
function.
• View Flow Content - Select the check box if you wish to
allow users access to data accessed through the View
Flow box.
• View Flows Restrictions Override - Select the check
box if you wish to allow users the ability to override sentry
restrictions.
• Sentry Modification - Select the check box if you wish to
allows users to modify existing sentries.
For more information, see the STRM Users Guide.
ReportingSelect the check box if you wish to grant this user access to
Reporting functionality. Within the Reporting functionality,
you can grant users additional access to the following:
• Distribute Reports via Email - Select the check box if
you wish to allow users to distribute reports throug h
e-mail.
• Maintain Templates - Select the check box if you wish to
allow users to maintain reporting templates.
For more information, see the STRM Users Guide.
Step 5 Click Save.
Step 6 Click Return.
Step 7 Close the Manage Roles window.
The STRM Administration Console appears.
Step 8 From the menu, select Configurations > Deploy configuration changes.
Editing a RoleTo edit a role:
Step 1 In the Administration Console, click the System Configuration tab.
The System Configuration panel appears.
Step 2 Click the User Roles icon.
The Manage Role window appears.
Step 3 For the role you wish to edit, click the edit icon.
The Permissions for Role window appears.
Step 4 Update the permissions (see Table 2-1), as necessary.
STRM Administration Guide
Page 23
Managing User Accounts15
Step 5 Click Return.
Step 6 Click Save.
Step 7 Close the Manage User Roles window.
The STRM Administration Console appears.
Step 8 From the menu, select Configurations > Deploy configuration changes.
Managing User
Accounts
Creating a User
Account
You can create a STRM user account, which allows a user access to selected
network components using the STRM interface. You can also create multiple
accounts for your system that include administrative privileges. Only the main
administrative account can create accounts that have administrative privileges.
You can create and edit user accounts to access STRM including:
•Creating a User Account
•Editing a User Account
•Disabling a User Account
To create an account for a STRM user:
Step 1 In the Administration Console, click the System Configuration tab.
The System Configuration panel appears.
Step 2 Click the Users icon.
The Manage Users window appears.
Step 3 In the Manage Users area, click Add.
The User Details window appears.
Step 4 Enter values for the following parameters:
Table 2-2 User Details Parameters
ParameterDescription
UsernameSpecify a username for the new user. The username must not
include spaces or special characters.
STRM Administration Guide
Page 24
16MANAGING USERS
Step 5 Click Next.
Table 2-2 User Details Parameters (continued)
ParameterDescription
PasswordSpecify a password for the user to gain access. The password
must be at least 5 characters in length.
Confirm Password Re-enter the password for confirmation.
Email AddressSpecify the user’s e-mail address.
RoleUsing the drop-down list box, select the role you wish this user to
assume. For information on roles, see
Managing Roles. If you
select Admin, this process is complete.
The Selected Network Objects window appears.
Step 6 From the menu tree, select the network objects you wish this user to be able to
monitor.
The selected network objects appear in the Selected Network Object panel.
Step 7 Choose one of the following options:
a Click Deploy Now to deploy new user information immediately.
b Click Cancel to cancel all updates and return to the Manage Users window.
Step 8 Close the Manage Users window.
The STRM Administration Console appears.
STRM Administration Guide
Page 25
Managing User Accounts17
Editing a User
Account
Step 1 In the Administration Console, click the System Configuration tab.
Step 2 Click the Users icon.
Step 3 In the Manage Users area, click the user account you wish to edit.
Step 4 Update values (see Table 2-2), as necessary.
Step 5 Click Next.
Step 6 From the menu tree, select the network objects you wish this user to access.
Step 7 For all network objects you wish to remove access, select the object from the
Step 8 Choose one of the following options:
To edit a user account:
The System Configuration panel appears.
The Manage Users window appears.
The User Details window appears.
If you are editing a non-administrative user account, the Selected Network Objects
window appears. If you are editing an administrative user account, go to Step 9.
The selected network objects appear in the Selected Network Object panel.
Selected Network Objects panel and click Remove.
a Click Deploy Now to deploy new user information immediately.
Step 9 Close the Manage Users window.
Disabling a User
Account
Step 1 In the Administration Console, click the System Configuration tab.
Step 2 Click the Users icon.
Step 3 In the Manage Users area, click the user account you wish to disable.
Step 4 In the Role drop-down list box, select Disabled.
Step 5 Click Next.
Step 6 Close the Manage Users window.
b Click Cancel to return to cancel all updates and return to the Manage Users
window.
The STRM Administration Console appears.
To disable a user account:
The System Configuration panel appears.
The Manage Users window appears.
The User Details window appears.
The STRM Administration Console appears. This user no longer has access to the
STRM interface. If this user attempts to log in to STRM, the following message
appears: This account has been disabled.
STRM Administration Guide
Page 26
18MANAGING USERS
Authenticating
Users
You can configure authentication to validate STRM users and passwords. STRM
supports the following user authentication types:
•System Authentication - Users are authenticated lo cally by STRM. This is the
default authentication type.
•RADIUS Authentication - Users are authenticated by a Remote Authentication
Dial-in User Service (RADIUS) server. When a user attempts to login, STRM
encrypts the password only, and forwards the username and password to the
RADIUS server for authentication.
•TACACS Authentication - Users are authenticated by a Terminal Access
Controller Access Control System (TACACS) server. When a user attempts to
login, STRM encrypts the username and password, and forwards this
information to the TACACS server for authentication.
•LDAP/ Active Directory - Users are authenticated by a Lightweight Directory
Access Protocol (LDAP) server using Kerberos.
If you wish to configure RADIUS, TACACS, or LDAP/Active Directory as the
authentication type, you must :
•Configure the authentication server before you con figu re authentication in
STRM.
•Make sure the server has the appropriate user accounts and privilege levels to
communicate with STRM. See your server documentation for more information.
•Make sure the time of the authentication server is synchronized with the time of
the STRM server. For more information on setting STRM time, see Chapter 3
Setting Up STRM.
•Make sure all users have appropriate user accounts and roles in STRM to allow
authentication with the third party servers.
Once authentication is configured and a user enters an invalid username and
password combination, a message appears indicating the login was invalid. if the
user attempts to access the sy st em multiple times using invalid information, the
user must wait the configured amount of time before attempting to access the
system again. For more information on configuring system settings for
authentication, see Chapter 3Setting Up STRM - Configuring the Console
Settings. An administrative user can always access STRM through a third party
authentication module or by using the local STRM Admin password.
To configure authentication:
Step 1 In the Administration Console, click the System Configuration tab.
The System Configuration panel appears.
Step 2 Click the Authentication icon.
The Authentication window appears.
STRM Administration Guide
Page 27
Authenticating Users19
Step 3
From the Authentication Module drop-down list box, select the authentication type
you wish to configure.
Step 4 Configure the selected authentication type:
a If you selected System Authentication, go to Step 5
b If you selected RADIUS Authentication, enter values for the following
parameters:
Table 2-3 RADIUS Parameters
ParameterDescription
RADIUS ServerSpecify the hostname or IP address of the RADIUS server.
RADIUS PortSpecify the port of the RADIUS server.
Authentication
Type
Specify the type of authentication you wish to perf or m . Th e
options are:
• CHAP (Challenge Handshake Authentication Protocol) -
Establishes a Point-to-Point Protocol (PPP) connection
between the user and the server.
Protocol version 2)- Authenticates remote Windows
workstations using mutual authentication.
• EAPMD5 (Extensible Authentication Protocol using MD5
Protocol) - Uses MD5 to establish a PPP connection.
Shared SecretSpecify the shared secret that STRM uses to encrypt TACACS
passwords for transmission to the TACACS server.
d If you selected LDAP/ Active Directory, enter values for the following
parameters:
Table 2-5 LDAP/ Active Directory Parameters
ParameterDescription
Server URLSpecify the URL used to connect to the LDAP server. For
LDAP ContextSpecify the LDAP context you wish to use, for example,
LDAP DomainSpecify the domain you wish to use, for example q1labs.inc
Step 5 Click Save.
example, ldap://<host>:<port>
DC=Q1LABS,DC=INC.
STRM Administration Guide
Page 29
3
SETTING UP STRM
This chapter provides information on setting up STRM including:
•Managing Your License Keys
•Creating Your Network Hierarchy
•Scheduling Automatic Updates
•Configuring STRM Settings
•Configuring System Notifications
•Configuring the Console Settings
•Starting and Stopping STRM
•Resetting SIM
•Accessing the Embedded SNMP Agent
•Configuring Access Settings
Managing Your
License Keys
For your STRM Console, a default license key provides you access to the interface
for 5 weeks. You must manage your license key using the System Management
window in the STRM Administration Console. This interface prov ides the status of
the license key for each system (host) in your deployment including:
•Valid - The license key is valid.
•Expired - The license key has expired. To update your license key, see
Updating your License Key.
•Override Console License - This host is using the Console license key. You
can use the Console key or apply a license key for this system. If you wish to
use the Console license for any system in your deployment, click Default License in the Manage License window . The license for that system will default
to the Console license key.
This section provides information on managing your license keys including:
•Updating your License Key
•Exporting Your License Key Information
STRM Administration Guide
Page 30
22SETTING UP STRM
Updating your
License Key
Step 1 In the Administration Console, click the System Configuration tab.
Step 2 Click the System Management icon.
For your STRM Console, a default license key provides you access to the interface
for 5 weeks. Choose one of the following options for assistance with your license
key:
•For a new or updated license key, please contact your local sales
representative.
•For all other technical issues, please contact Juniper Networks Customer
Support.
If you log in to STRM and your Console license key has expired, you are
automatically directed to the System Management window. You must update the
license key before you can continue. However, if one of your non-Console systems
includes an expired license key, a message appears when you log in indicating a
system requires a new license key. You must navigate to the System Management
window to update that license key.
To update your license key:
The System Configuration panel appears.
The System Management window appears providing a list of all hosts in your
deployment.
Step 3 For the host that on which you wish to update the license key, click the value that
appears in the License column.
Note: If you update the license key for your Console, all systems in your
deployment default to the Console license key at that time.
The Current License Details window appears.
Step 4 Click Browse beside the New License Key File and locate the license key.
STRM Administration Guide
Page 31
Managing Your License Keys23
Step 5
Step 6 Click Save.
Step 7 Close the license key window.
Step 8 From the menu, select Configurations > Deploy All.
Exporting Your
License Key
Information
Step 1 In the Administration Console, click the System Configuration tab.
Step 2 Click the System Management icon.
Once you locate and select the license key, click Open.
The Current License Details window appears.
A message appears indicating the license key was successfully updated.
Note: If you wish to revert back to the previous license key, click Revert to
Deployed. If you revert to the license key used by the STRM Console system, click Revert to Console.
The Administration Console appears.
The license key information is updated in your deployment.
To export your license key information for all systems in your deployment:
The System Configuration panel appears.
The System Management window appears providing a list of all hosts in your
deployment.
STRM Administration Guide
Page 32
24SETTING UP STRM
Step 3 Click Export Licenses.
Step 4 Select one of the following options:
Step 5 Click OK.
The export window appears.
•Open - Opens the license key data in an Excel spreadsheet.
•Save - Allows you to save the file to your desktop.
Creating Your
Network Hierarchy
ConsiderationsConsider the following when defining your network hierarchy:
STRM uses the network hierarchy to understand your network traffic and provide
you with the ability to view network activity for your entire deployment.
When you develop your network hierarchy, you should consider the most effective
method for viewing network activity. Note that the network you configure in STRM
does not have to resemble the physical deployment of your network. STRM
supports any network hierarchy that can be defined by a range of IP addresses.
You can create your network based on many different variables, including
geographical or business units.
•Group together systems and user groups that have similar behavior. This
provides you with a clear view of your network.
•Create multiple top-level groups if your deployment is processing more than
600,000 flows.
•Organize your systems/network by role or similar traffic patterns. For example,
mail servers, departmental users, labs, development groups, or geographically
disperse locations. This allows you to differentiate network behavior and
enforce network management security policies.
•Do not group together servers that have unique behavior with other servers on
your network. For example, placing a unique server alone provides the server
greater visibility in STRM allowing you to enact specific policies.
•Within a group, place servers with high volumes of traffic, such as mail servers,
at the top of the group. This provides you a clear visual representation when a
discrepancy occurs.
•Combine multiple Classless Inter-Domain Routings (CIDRs) or subnets into a
single network/group to conserve disk space. For example:
We recommend that you extend this practice to all views.
Note: We recommend that you do not configure a network group with more than 15
objects. This may cause you difficulty in viewing detailed information for each
group.
You may also wish to define an all encompassing group so when you define new
networks, the appropriate policies and behavioral monitors are applied. For
example:
Step 1 In the Administration Console, click the System Configuration tab.
Step 2 Click the Network Hierarchy icon.
Step 3 From the menu tree, select the areas of the network you wish to add a network
Step 4 Click Add.
Step 5 Enter your network object values:
If you add a new network to the above example, such as 10.10.50.0/24, which is
an HR department, the traffic appears as Cleveland-based and any policies or
sentries applied to the Cleveland group is applied by default.
To define your netwo rk hierarchy:
The System Configuration panel appears.
The Network Views window appears.
component.
The Manage Group window appears for the selected network component.
The Add Network Object window appears.
Table 3-1 Add New Object Parameters
ParameterAction
GroupSpecify the group for the new network object. Click Add Group
to specify the group.
STRM Administration Guide
Page 34
26SETTING UP STRM
Step 6 Click Save.
Step 7 Repeat for all network objects.
Step 8 Click Re-Order.
Step 9 Order the network objects in the desired order.
Step 10 Click Save.
Table 3-1 Add New Object Parameters (continued)
ParameterAction
NameSpecify the name for the object.
WeightSpecify the weight of the object. The range is 1 to 100 and
indicates the importance of the object in the system.
IP/CIDR(s)Specify the CIDR range(s) for this object. For more information
on CIDR values, see
Accepted CIDR Values.
DescriptionSpecify a desc riptio n for this ne tw or k obje ct .
ColorSpecify a color for this object.
Database LengthSpecify the database length.
The Reorder Group window appears.
Note: We recommend that you consider adding key servers as individual objects
and grouping other major but related servers into multi-CIDR objects.
Accepted CIDR Values
Table 3-2 provides a list of the CIDR values that STRM accepts:
For example, a network is called a supernet when the prefix boundary contains
fewer bits than the network's natural (such as, classful) mask. A network is called a
subnet when the prefix boundary contains more bits than the network's natural
mask:
•209.60.128.0 is a class C network address with a natural mask of /24.
•209.60.128.0 /22 is a supernet which yields:
209.60.128.0 /24
209.60.129.0 /24
209.60.130.0 /24
209.60.131.0 /24
•192.0.0.0 /25
Subnet Host Range
0 192.0.0.1-192.0.0.126
1 192.0.0.129-192.0.0.254
STRM uses system configuration files to provide useful characterizations of
network data flows. You can now update your configuration files automatically or
manually using the STRM interface to make sure your configuration files contain
the latest network security information. The updates, located on the Qmmunity
web site, include threats, vulnerabilities, and geographic information from various
security related web sites. The managed host must be connected to the Internet to
receive the updates.
Note: We do not guarantee the accuracy of the third-party information contained
on the above mentioned web sites.
STRM allows you to either replace your existing configuration files or integrate the
updates with your existing files to maintain the integrity of your current
configuration and information.
You can also update the configuration files for all systems in your STRM
deployment. However, you must have the views created in your deployment editor.
For more information on using the deployment editor, see Chapter 5Using the
Deployment Editor.
Caution: Failing to build your deployment map before configuring automatic or
manual updates results in your remote systems not being updated.
STRM Administration Guide
Page 37
Scheduling Automatic Updates29
Scheduling
Automatic Updates
Step 1 In the Administration Console, click the System Configuration tab.
Step 2 Click the Auto Update icon.
To schedule automatic updates:
The System Configuration panel appears.
The Auto-Update Configuration window appears.
Step 3 In the Update Method list box, select the method you wish to use for updating your
files:
•Auto Integrate - Integrates the new configuration files with your existing files to
maintain the integrity of your information.
•Auto Update - Replaces your existing configuration files with the new
configuration files.
Step 4 By default, all views are updated. To prevent views from being updated, select the
check box(es) in the Protected Views section for the views you do not wish to
update with the new configuration files. The co nfiguration files for the selected
views are not updated.
Step 5 In the Schedule Autoupdates section, select the check box to enable automatic
updates.
Step 6 In the Frequency list box, select the frequency of the updates in the Frequency list
box:
STRM Administration Guide
Page 38
30SETTING UP STRM
Step 7 Click Save.
Step 8 From the menu, select Configurations > Deploy All.
•Daily - Updates are downloaded every day at 1 am.
•Weekly - Updates are downloaded every Sunday at 1 am.
•Monthly - Updates are downloaded on the first day of every month at 1 am.
The updates are enforced through your deployment.
Updating Your Files
On-Demand
Step 1 In the Administration Console, click the System Configuration tab.
Step 2 Click the Auto Update icon.
Step 3 In the Update Method list box, select the method you wish to use for updating your
Step 4 In the Protected views section, select the check box(s) for the views you do not
Step 5 Click Save and Update Now.
Step 6 From the menu, select Configurations > Deploy All.
You can update your files, whenever necessary, using the Auto-Update window.
To update your files:
The System Configuration panel appears.
The Auto-Update Configuration window appears.
files:
•Auto Integrate - Integrates the new configuration files with your existing files to
maintain the integrity of your information.
•Auto Update - Replaces your existing configuration files with the new
configuration files.
wish to update with the new configuration files. The configuration files for the
selected views are not updated.
Your views are updated.
The updates are enforced through your deployment.
STRM Administration Guide
Page 39
Configuring STRM Settings31
Configuring STRM
Settings
Step 1 In the Administration Console, click the System Configuration tab.
Step 2 Click the Secure Threat Reponse Manager icon.
Step 3 Enter values for the parameters:
Using the Administration Console, you can configure the STRM system, database,
and sentry settings.
To configure STRM system settings:
The System Configuration panel appears.
The STRM Settings window appears.
Table 3-3 STRM Settings Parameters
ParameterDescription
STRM Settings
Administrative Email
Address
Specify the e-mail address of the designated system
administrator. The default is root@localhost.
Alert Email From Address Specify the e-mail address from which you wish to receive
e-mail alerts.
Resolution Interval Length Specify the interval length, in minutes. The default is 1
minute.
Delete Root MailRoot mail is the default location for host context
messages. Specify one of the following:
• Yes - Delete the local administrator e-mail. This is the
default.
• No - Do not delete local administrator e-mail.
Temporary Files
Retention Period
Asset Profile Reporting
Interval
Specify the time period the system stores temporary files.
The default is 6 hours.
Specify the interval, in seconds, that the database stores
new asset profile information. The default is 900 seconds.
Asset Profile ViewsSpecify the views you wish the system to use when
accumulating asset profile data.
VIS passive Asset profile
interval
Specify the interval, in seconds, that the database stores
all passive asset profile information. The default is 86400
seconds.
Audit Log EnableEnables or disables the ability to collect audit logs. You
can view audit log information using the Event Viewer.
The default is Yes.
TNC Recommendation
Enable
TNC recommendations enable you to restrict or deny
access to the network based on user name or other
credentials. Specify one of the following:
• Yes - Enables the TNC recommendation functionality.
• No - Disables the TNC recommendation functionality.
STRM Administration Guide
Page 40
32SETTING UP STRM
Table 3-3 STRM Settings Parameters (continued)
ParameterDescription
Coalescing EventsEnables or disables the ability for a sensor device to
coalesce (bundle) events. This value applies to all sensor
devices. However, if you wish to alter this value for a
specific sensor device, edit the Coalescing Event
parameter in the sensor device configuration. For more
information, see the Managing Sensor Devices Guide.
The default is Yes.
Store Event PayloadEnables or disables the ability for a sensor device to store
event payload information. This value applies to all sensor
devices. However, if you wish to alter this value for a
specific sensor device, edit the Event Payload parameter
in the sensor device configuration. For more information,
see the Managing Sensor Devices Guide.
The default is Yes.
Global Iptables AccessSpec ify the IP address of a non-Console system that does
not have IP tables configuration to which you wish to
enable direct access. To enter multiple systems, enter a
comma separated list of IP addresses.
Dynamic Custom View
Deploy Interval
Specify the interval period, in seconds, you wish to deploy
changes for any dynamic custom view, such as, ASN or
ifIndex Views. When the Classification Engine collects
dynamic view information and reports this information to
configuration services, this is the interval that
configuration services component deploys the changes.
The default is 15 seconds.
Database Settings
User Data FilesSpecify the location of the user profiles. The default is
/store/users.
Database Storage
Location
Specify the location of the database files. The default
location is /store/db.
Sentry Database Location Specify the location of the sentry database. The default is
/store/sentry/db.
Network View Graph
Retention Period
Using the drop-down list box, select the period of time you
wish to store the network view graph information. The
default is 4 weeks.
All Views - Group
Database Retention
Period
All Views - Object
Database Retention
Period
Unused Database
Retention Period
Using the drop-down list box, select the period of time you
wish to store the group views information. The default is 1
week.
Using the drop-down list box, select the period of time you
wish to store the object views information. The default is 1
week.
Using the drop-down list box, select the period of time that
the system retains unused databases. The default is 4
weeks.
STRM Administration Guide
Page 41
Configuring STRM Settings33
Table 3-3 STRM Settings Parameters (continued)
ParameterDescription
Offense Retention PeriodUsing the drop-down list box, select the period of time you
wish to retain offense information. The default is 3 days.
Identity History Retention
Period
Using the drop-down list box, select the length of time you
wish to store asset profile history records. The default is
30 days
Attacker History Retention
Period
Specify the amount of time that you wish to store the
attacker history. The default is 6 months.
Ariel Database Settings
Flow Data Storage
Location
Flow Data Retention
Period
Asset Profile Storage
Location
Asset Profile Retention
Period
Device Log Storage
Location
Device Log Data
Retention Period
Custom View Retention
Period
Specify the location that you wish to store the flow log
information. The default location is /store/ariel/flows.
Specify the period of time you wish to store flow data. T he
default is 1 week.
Specify the location that you wish to store the asset profile
storage location. The default location is /store/ariel/hprof.
Specify the period of time, in days, that you wish to store
the asset profile information. The default is 30 days.
Specify the location that you wish to store the device log
information. The default location is /store/ariel/events.
Specify the amount of time that you wish to store the
device log data. The default is 30 days.
Specify the amount of time, in seconds, that you wish to
store custom view information. The default is 2592000
seconds.
Maximum Real Time
Results
Specify the maximum number of results you wish to view
in the Event Viewer and Flow Viewer. The default is
10000.
Reporting Max Matched
Results
Specify the maximum number of results you wish a report
to return. This value applies to the search results in the
Event Viewer and Flow Viewer. The default is 1000000.
Command Line Max
Matched Results
Specify the maximum number of results you wish the
command line to return. The default is 0.
Web Execution Time Limit Specify the maximum amount of time, in seconds, you
wish a query in the interface to process before a time out
occurs. This value applies to the search results in the
Event Viewer and Flow Viewer. The default is 600
seconds.
Reporting Execution Time
Limit
Specify the maximum amount of time, in seconds, you
wish a reporting query to process before a time out
occurs. The default is 57600 seconds.
Command Line Execution
Time Limit
Specify the maximum amount of time, in seconds, you
wish a query in the command line to process before a
time out occurs. The default is 0 seconds.
Flow Log HashingEnables or disables the ability for STRM to store a hash
file for every stored flow log file. The default is No.
STRM Administration Guide
Page 42
34SETTING UP STRM
Table 3-3 STRM Settings Parameters (continued)
ParameterDescription
Event Log HashingEnables or disables the ability for STRM to store a hash
file for every stored event log file. The default is No.
Hashing AlgorithmYou can use a hashing algorithm for database storage
and encryption. You can use one of the following hashing
algorithms:
• Message-Digest Hash Algorithm - Transforms digital
signatures into shorter values called Message-Digests
(MD).
• Secure Hash Algorithm (SHA) Hash Algorithm -
Standard algorithm that creates a larger (60 bit) MD.
Specify the log hashing algorithm you wish to use for your
deployment. The options are:
• MD2 - Algorithm defined by RFC 1319.
• MD5 - Algorithm defined by RFC 1321.
• SHA-1 - Default. Algorithm defined by Secure Hash
Standard, NIST FIPS 180-1.
• SHA-256 - Algorithm defined by the draft Federal
Information Processing Standard 180-2, Secure
Hashing Standard (SHS). SHA-256 is a 256 bit hash
algorithm intended for 128 bits of security against
security attacks.
• SHA-384 - Algorithm defined by the draft Federal
Information Processing Standard 180-2, Secure
Hashing Standard (SHS). SHA-384 is a bit hash
algorithm is provided by truncating the SHA-512
output.
• SHA-512 - Algorithm defined by the draft Federal
Information Processing Standard 180-2, Secure
Hashing Standard (SHS). SHA-512 is a bit hash
algorithm intended to provide 256 bits of security.
Sentry Settings
Alert DirectorySpecify the location you wish to store active alerts for
each user. The default is /store/sentry/alerts.
Default Sentry ScriptsSpecify the default sentry scripts you wish to execute. The
default is /opt/qradar/triggerbin/system.js
List of Sentry ScriptsSpecify the sentry scripts you wish to execute, in the
order of execution. Separate each entry with a comma.
The default is
system.js,activity_anomaly.js,learn_policy.js,threshold.js,
behavioral.js, system.js.
Sentry PropertiesSpecify the sentry properties location. The default is
/store/sentry/persistent_properties.xml
Sentry Response QueueSpecify the sentry response queue file. The default is
/store/sentry/response_queue.xml.
STRM Administration Guide
Page 43
Configuring STRM Settings35
Table 3-3 STRM Settings Parameters (continued)
ParameterDescription
Sentry Database Location Specify the location of the sentry database. The default is
/store/sentry/qc_persistentstorage.
SNMP Settings
EnableEnables or disables SNMP responses in the STRM
custom rules engine. The default is No, which means you
do not wish to accept events using SNMP.
Destination HostSpecify the IP address to which you wish to send SNMP
notifications.
Destination PortSpecify the port to which you wish to send SNMP
notifications. The default is 162.
Community (V2)Specify the SNMP community, such as public. This
parameter only applies if you are using SNMPv2.
User NameSpecify the name of the user you wish to access SNMP
related properties.
Security LevelSpecify the security level for SNMP. The options are:
• NOAUTH_NOPRIV - Indicates no authorization and no
privacy. This the default.
• AUTH_NOPRIV - Indicates authorization is permitted
but no privacy.
• AUTH_PRIV - Allows authorization and privacy.
Authentication ProtocolSpecify the algorithm you wish to use to authenticate
SNMP traps.
Authentication Password Specify the password you wish to use to authenticate
SNMP.
Privacy Protocol Specify the protocol you wish to use to decrypt SNMP
traps.
Privacy Password Specify the password used to decrypt SNMP traps.
Embedded SNMP Agent Settings
EnabledEnables or disables access to data from the SNMP Agent
using SNMP requests. The default is No.
Community StringSpecify the SNMP community, such as public. This
parameter only applies if you are using SNMPv2 and
SNMPv3.
IP Access List Specify the systems that can access data from the SNMP
agent using SNMP request. If the Enabled option is set to
Yes, this option is enforced.
Step 4
Click Save.
The STRM Administration Console appears.
Step 5 From the menu, select Configurations > Deploy All.
STRM Administration Guide
Page 44
36SETTING UP STRM
Configuring
System
Notifications
You can configure system performance alerts for thresholds using the STRM
Administration Console. This section provides information for configuring yo ur
system thresholds.
To config ure system thresholds:
Step 1 In the Administration Console, click the System Configuration tab.
The System Configuration panel appears.
Step 2 Click the Global System Notifications icon.
The Global System Notifications window appears.
Step 3 Enter values for the parameters. For each parameter , you must select the following
options:
•Enabled - Select the check box to enable the option.
•Respond if value is - Specify one of the following options:
-Greater Than - An alert occurs if the parameter value exceeds the
configured value.
-Less Than - An alert occurs if the parameter value is less than the
configured value.
•Resolution Message - Specify a description of the preferred resolution to the
alert.
Table 3-4 System Thresholds Parameters
ParameterDescription
User CPU usageSpecify the threshold percentage of user CPU usage.
Nice CPU usageSpecify the threshold percentage of user CPU usage at
the nice priority.
System CPU usageSpecify the threshold perc en ta ge of CPU us ag e wh ile
operating at the system level.
Idle CPU usageSpecify the threshold percentage of idle CPU time.
Percent idle timeSpecify the threshold percentage of idle time.
Run queue lengthSpecify the threshold number of processes waiting for
run time.
Number of processes in
the process list
System load over 1
minute
System load over 5
minute
System load over 15
minutes
Kilobytes of memory freeSpecify the threshold amount, in kilobytes, of free
Specify the threshold number of processes in the
process list.
Specify the threshold system load average over the last
minute.
Specify the threshold system load average over the last 5
minutes.
Specify the threshold system load average over the last
15 minutes.
memory.
STRM Administration Guide
Page 45
Configuring System Notifications37
Table 3-4 System Thresholds Parameters (continued)
ParameterDescription
Kilobytes of memory used Specify the threshold amount, in kilobytes, of used
memory. This does not consider memory used by the
kernel.
Percentage of memory
Specify the threshold percentage of used memory.
used
Kilobytes of cache swap
memory
Kilobytes of buffered
memory
Kilobytes of memory used
for disc cache
Kilobytes of swap memory
free
Kilobytes of swap memory
used
Specify the threshold amount of memory, in kilobytes,
shared by the system.
Specify the threshold amount of memory, in kilobytes,
used as a buffer by the kernel.
Specify the threshold amount of memory, in kilobytes,
used to cache data by the kernel.
Specify the threshold amount of free memory, in
kilobytes.
Specify the threshold amount, in kilobytes, of used swap
memory.
Percentage of swap usedSpecify the threshold percentage of used swap space.
Number of Interrupts per
second
Received Packets per
second
Transmitted Packets per
second
Received Bytes per
second
Transmitted Bytes per
second
Received Compressed
Packets
Transmitted Compressed
Packets
Received Multicast
Packets
Specify the threshold number of received interrupts per
second.
Specify the threshold number of packets received per
second.
Specify the threshold number of packets transmitted per
second.
Specify the threshold number of bytes received per
second.
Specify the threshold number of bytes transmitted per
second.
Specify the threshold number of compressed packets
received per second.
Specify the threshold number of compressed packets
transmitted per second.
Specify the threshold number of received Multicast
packets per second.
Receive ErrorsSpecify the threshold number of corrupt packets received
per second.
Transmit ErrorsSpecify the threshold number of corrupt packets
transmitted per second.
Packet CollisionsSpecify the threshold number of collisions that occur per
second while transmitting packets.
Dropped receive packetsSpecify the threshold number of received packets that
are dropped per second due to a lack of space in the
buffers.
STRM Administration Guide
Page 46
38SETTING UP STRM
Table 3-4 System Thresholds Parameters (continued)
ParameterDescription
Dropped Transmit
packets
Specify the threshold number of transmitted packets that
are dropped per second due to a lack of space in the
buffers.
Transmit carrier errorsSpecify the threshold number of carrier errors that occur
per second while transmitting packets.
Receive frame errorsSpecify the threshold number of frame alignment errors
that occur per second on received packets.
Receive fifo overrunsSpecify the threshold number of First In First Out (FIFO)
overrun errors that occur per second on received
packets.
Transmit fifo overrunsSpecify the threshold number of First In First Out (FIFO)
overrun errors that occur per second on transmitted
packets.
Transactions per secondSpecify the threshold number of transfers per second
sent to the system.
Sectors written per
second
Specify the threshold number of sectors transferred to or
from the system
Step 4
Click Save.
The STRM Administration Console appears.
Step 5 From the menu, select Configurations > Deploy configuration changes.
STRM Administration Guide
Page 47
Configuring the Console Settings39
Configuring the
Console Settings
The STRM Console provides the interface for STRM. The Console provides real
time views, reports, alerts, and in-depth investigation of flows for network traffic
and security threats. This Console is also used to manage distributed STRM
deployments.
The Console is accessed from a standard web browser. When you access the
system, a prompt appears for a user name and password, which must be
configured in advance by the STRM administrator. STRM supports the following
web browsers:
•Internet Explorer 6.0 or 7.0
•Mozilla Firefox 2.0
To configure STRM Console settings:
Step 1 In the Administration Console, click the System Configuration tab.
ARP - Safe InterfacesSpecify the interface you wish to be excluded from ARP
resolution activities. The default is eth0.
Enable 3D graphs in the
user interface
Using the drop-down list box, select one of the following:
• Yes - Displays Dashboard graphics in 3-dimensional
format.
• No - Displays Dashboard graphics in 2-dimensional
format.
Authentication Settings
Persistent Session
Timeout
Specify the length of time, in days, that a user system will
be persisted, in days. The default is 0, which disables this
features and the “remember me” option upon login.
Maximum Login FailuresSpecify the number of times a login attempt may fail. The
default is 5.
Login Failure Attempt
Window (in minutes)
Specify the length of time during which a maximum login
failures may occur before the system is locked. The
default is 10 minutes.
Login Failure Block Time
(in minutes)
Specify the length of time that the system is locked if the
the maximum login failures value is exceeded. The
default is 30 minutes.
Login Host WhitelistSpecify a list of hosts who are exempt from being locked
out of the system. Enter multiple entries using a comma
delimited list.
Inactivity Timeout (in
minutes)
Specify the amount of time that a user will be
automatically logged out of the system if no activity
occurs.
Login Message FileSpe cify the location and name of a file that includes
content you wish to appear on the STRM log in window.
This file may be in text or HTML format and the contents
of the file appear below the current log in window.
DNS Settings
Enable DNS Lookups for
Asset Profiles
Enable or disable the ability for STRM to search for DNS
information in asset profiles. When enabled, this
information is available using the right-mouse bu tto n
(right-click) on the IP address or host name located in the
Host Name (DNS Name) field in the asset profile. The
default is False.
Enable DNS Lookups for
Host Identity
Enable or disable the ability for STRM to search for host
identity information. When enabled, this information is
available using the right-mouse button (right-click) on any
IP address or asset name in the interface. The default is
True.
WINS Settings
WINS ServerSpecify the location of the Windows Internet Naming
Step 4 Click Save.
Step 5 From the Administration Console menu, select Configurations > Deploy
Specify whether you wish to include a header in a CSV
export file.
Specify the maximum number of exports you wish to
occur at one time.
configuration changes.
Starting and
To start, stop, or restart STRM:
Stopping STRM
Step 1 In the main STRM interface, click Config.
The STRM Administration Console appears.
Step 2 From the System menu, select one of the following options:
a STRM St art
b STRM Stop
c STRM Restart
Resetting SIMUsing the Administration Console, you can reset the SIM module, which allows you
to remove all offenses, attackers, and target information from the database and the
disk. This option is useful after tuning your deployment to avoid receiving any
additional false positive information.
To rese t the SEM module:
Step 1 In the Administration Console, click the SIM Configuration tab.
The SIM Configuration panel appears.
Step 2 Click the Clean SIM Model icon.
The Reset SIM Data Module window appears.
STRM Administration Guide
Page 50
42SETTING UP STRM
Step 3 Read the information in the window.
Step 4 Select one of the following options:
Step 5 If you wish to continue, select the Are you sure you want to reset the data
•Soft Clean - Closes all offenses in the database.
•Hard Clean - Closes all active SIM data including offenses, targets and
attackers.
model? check box.
Step 6 Click Proceed.
Step 7 Once the SIM reset process is complete, reset your browser.
Accessing the
Embedded SNMP
Agent
Step 1 In the Administration Console, click the System Configuration tab.
Step 2 Click the System Management icon.
A message appears indicating that the SIM reset process has started. This
process may take several minutes, depending on the amount of data in your
system.
Note: If you attempt to navigate to other areas of the user interface during the SIM
reset process, an error message appears.
To access the SNMP agent:
The System Configuration panel appears.
The System Management window appears.
Step 3 In the View Agent column, click View Agent for the SNMP agent you wish to
access.
STRM Administration Guide
Page 51
The SNMP Agent appears.
Configuring Access Settings43
Configuring
Access Settings
Configuring Firewall
Access
The System Configuration tab provides access to the web-based system
administration interface, which allows you to configure firewall rules, interface
roles, passwords, and system time. This section includes:
•Firewall access. See Configuring Firewall Access.
•Update your host set-up. See Updating Your Host Set-up.
•Configure the interface roles for a host. See Configuring Interface Roles.
•Change password to a host. See Changing Passwords.
•Update the system time. See Updating System Time.
You can configure local firewall access to enable communications between
devices and STRM. Also, you can define access to the web-base d system
administration interface.
To enable STRM managed hosts to access specific devices or interfaces:
Step 1 In the Administration Console, click the System Configuration tab.
The System Configuration panel appears.
Step 2 Click the System Management icon.
The System Management window appears.
Step 3 For the host you wish to configure firewall access, click Manage System.
Step 4 Log-in to the System Administration interface. The default is:
Username: root
Password: <your root password>
Note: The username and password are case sensitive.
Step 5 From the menu, select Managed Host Config > Local Firewall.
The Local Firewall window appears.
STRM Administration Guide
Page 52
44SETTING UP STRM
Step 6 In the Device Access box, you must include any STRM systems you wish to have
access to this managed host. Only managed hosts listed will have access. For
example, if you enter one IP address, only that one IP address will be granted
access to the managed host. All other managed hosts are blocked.
To configure access:
a In the IP Address field, enter the IP address of the managed host you wish to
have access.
b From the Protocol list box, select the protocol you wish to enable access for the
specified IP address and port:
-UDP - Allows UDP traffic.
-TCP - Allows TCP traffic.
-Any - Allows any traffic.
c In the Port field, enter the port on which you wish to enable communications.
Note: If you change your External Flow Source Monitoring Port parameter in the
QFlow Configuration, you must also update your firewall access configuration.
d Click Allow.
Step 7 In the System Administration Web Control box, enter the IP address of managed
hosts that you wish to allow access to the web-based system administration
interface in the IP Address field. Only IP addresses listed will have access to the
interface. If you leave the field blank, all IP addresses will have access. Click
Allow.
Note: Make sure you include the IP address of your client desktop you wish to
access the interface. Failing to do so may affect connectivity.
STRM Administration Guide
Page 53
Configuring Access Settings45
Step 8
Step 9 Wait for the interface to refresh before continuing.
Updating Your Host
Set-up
Step 1 In the Administration Console, click the System Configuration tab.
Step 2 Click the System Management icon.
Step 3 For the host you wish to update your host set-up, click Manage System.
Step 4 Log-in to the System Administration interface. The default is:
Step 5 From the menu, select Managed Host Config > STRM Setup.
Click Apply Access Controls.
You can use the web-based system administration interface to configure the mail
server you wish STRM to use, the global password for STRM configuration, and
the IP address for the STRM Console:
To configure yo ur host set-up:
The System Configuration panel appears.
The System Management window appears.
Username: root
Password: <your root password>
Note: The username and password are case sensitive.
The STRM Setup window appears.
Step 6 You must enable communications between the STRM Console and the current
host. In the Enter the IP address of the STRM console field, enter the IP address
of the managed host operating the STRM Console.
Step 7 In the Mail Server field, specify the address for the mail server you wish STRM to
use. STRM uses this mail server to distribute alerts and event messages. To use
the mail server provided with STRM, enter localhost.
STRM Administration Guide
Page 54
46SETTING UP STRM
Step 8
Step 9 In the Enter the web address of the console field, enter the IP address of the
Step 10 Click Apply Configuration.
Configuring Interface
Roles
Step 1 In the Administration Console, click the System Configuration tab.
Step 2 Click the System Management icon.
Step 3 For the host you wish to configure interface roles, click Manage System.
Step 4 Log-in to the System Administration interface. The default is:
In the Enter the global configuration password, enter the password you wish to
use to access the host. Confirm the entered password.
Note: The global configuration password must be the same throughout your
deployment. If you edit this password, you must also edit the global configuration
password on all systems in your deployment.
managed host operating the STRM Console.
You can assign specific roles to the network interfaces on each managed host.
To assign ro les:
The System Configuration panel appears.
The System Management window appears.
Username: root
Password: <your root password>
Note: The username and password are case sensitive.
Step 5 From the menu, select Managed Host Config > Network Interfaces.
The Network Interfaces window appears with a list of each interface on your
managed host.
Note: For assistance with determining the appropriate role for each interface,
please contact Juniper Networks Customer Support.
STRM Administration Guide
Page 55
Configuring Access Settings47
Step 6
For each interface listed, select the role you wish to assign to the interface using
the Role list box.
Step 7 Click Save Configuration.
Step 8 Wait for the interface to refresh before continuing.
Changing PasswordsTo change the passwords:
Step 1 In the Administration Console, click the System Configuration tab.
The System Configuration panel appears.
Step 2 Click the System Management icon.
The System Management window appears.
Step 3 For the host you wish to change passwords, click Manage System.
Step 4 Log-in to the System Administration interface. The default is:
Username: root
Password: <your root password>
Note: The username and password are case sensitive.
Step 5 From the menu, select Managed Host Config > Root Password.
The Root Passwords window appears.
Step 6 Update the passwords and confirm:
Note: Make sure you record the entered values.
•New Root Password - Specify the root password necessary to access the
web-based system administration interface.
•Confirm New Root Password - Re-enter the password for confirmation.
Step 7 Click Update Password.
STRM Administration Guide
Page 56
48SETTING UP STRM
Updating System
Time
Step 1 In the Administration Console, click the System Configuration tab.
Step 2 Click the System Management icon.
You are able to change the time for the following options:
•System time
•Hardware time
•Time Zone
•Time Server
Note: You must change the system time information on the host operating the
Console only. The change is then distributed to all managed hosts in your
deployment.
You can configure time for your system using one of the following methods:
•Configuring Your Time Server Using RDATE
•Configuring Time Settings For Your System
Configuring Your Time Server Using RDATE
To update the time settings using RDATE:
The System Configuration panel appears.
The System Management window appears.
Step 3 For the host on which you wish to configure time, click Manage System.
Step 4 Log-in to the System Administration interface. The default is:
Username: root
Password: <your root password>
Note: The username and password are case sensitive.
Step 5 From the menu, select Managed Host Config > System Time.
The System Time window appears.
Caution: The time settings window is divided into four sections. You must save
each setting before continuing. For example, when you configure System Time,
you must click Apply within the System Time section before continuing.
STRM Administration Guide
Page 57
Configuring Access Settings49
Step 6
In the Time Zone box, select the time zone in which this managed host is located
using the Change timezone to list box. Click Save.
Step 7 In the Time Server box, you must specify the following options:
•Timeserver hostnames or addresses - Specify the time server hostname or
IP address.
•Set hardware time too - Select the check box if you wish to set the hardware
time as well.
•Synchronize on schedule? - Specify one of the following options:
-No - Select the option if you do no t wis h to sync hro nize th e time s pec ifi ed i n
the Run at selected time below options. Go to Step 8.
-Yes - Select the option if you wish to synchronize the time. See options
below.
•Simple Schedule - Specify if you wish the time update to occur at a specific
time. If not, select the Run at times selected below option.
•Times and dates are selected below - Specify the time you wish the time
update to occur.
Step 8 Click Sync and Apply.
STRM Administration Guide
Page 58
50SETTING UP STRM
Step 1 In the Administration Console, click the System Configuration tab.
Step 2 Click the System Management icon.
Step 3 For the host on which you wish to configure time, click Manage System.
Step 4 Log-in to the System Administration interface. The default is:
Step 5 From the menu, select Managed Host Config > System Time.
Configuring Time Settings For Your System
To update the time settings for your system:
The System Configuration panel appears.
The System Management window appears.
Username: root
Password: <your root password>
Note: The username and password are case sensitive.
The System Time window appears.
Caution: The time settings window is divided into four sections. You must save
each setting before continuing. For example, when you configure System Time,
you must click Apply within the System Time section before continuing.
STRM Administration Guide
Page 59
Configuring Access Settings51
Step 6
In the Time Zone box, select the time zone in which this managed host is located
using the Change timezone to list box. Click Save.
Step 7 In the System Time box, you must specify the current date and time you wish to
assign to the managed host. Click Apply.
If you wish to set the System Time to the same as the Hardware time, click Set
system time to hardware time.
Step 8 In the Hardware Time box, you must specify the current date and time you wish to
assign to the managed host. Click Save.
If you wish to set the System Time to the same as the Hardware time, click Set
hardware time to system time.
STRM Administration Guide
Page 60
52SETTING UP STRM
STRM Administration Guide
Page 61
4
MANAGING BACKUPAND
R
ECOVERY
Using the Administration Console, you can backup and recover configuration
information and data for STRM. You can backup and recover the following
information for your system:
•License key information
•Sentry configuration
•Rules configuration
•Configuration database information
•User profile information
•Views configuration
This chapter provides information on managing backup and recover of including:
•Managing Backup Archives
Managing Backup
Archives
Viewing Back Up
Archives
Step 1 In the Administration Console, click the System Configuration tab.
Step 2 Click the Backup Recovery icon.
•Backing Up Your Information
•Restoring Your Configuration Information
Using the Administration Console, you can:
•View your successful backup archives. See Viewing Back Up Archives.
•Import an archive file. See Importing an Archive.
•Delete an archive file. See Deleting a Backup Archive.
To view all successful backups:
The System Configuration panel appears.
The Backup Archives window appears.
STRM Administration Guide
Page 62
54MANAGING BACKUPAND RECOVERY
The list of archives includes backup files that exist in the database. If a backup file
is deleted, it is removed from the disk and from the database. Also, the entry is
removed from this list and an audit event is generated to indicate the removal.
If a backup is in progress, a status window appears to indicate the duration of the
current backup, which user/process initiated the backup, and provides you with the
option to cancel the backup.
Each archive file includes the data from the previous day.
The Backup Archives window provides the following information for each backup
archive.
Table 4-1 Backup Archive Window Parameters
ParameterDescription
HostSpecifies the host that initiated the backup process.
NameSpecifies the name of the backup archive. To download the
backup file, click the name of the backup.
TypeSpecifies the type of backup. The options are:
• db (database)
• config (configuration data)
• data (events, flows, and asset profile information)
SizeSpecifies the size of the archive file.
Time InitiatedSpecifies the time that the backup file was created.
DurationSpecifies the time to complete the backup process.
Initialized BySpecifies whether the backup file was created by a user or
through a scheduled process.
Importing an ArchiveTo import a STRM backup archive file:
Step 1 In the Administration Console, click the System Configuration tab.
The System Configuration panel appears.
Step 2 Click the Backup Recovery icon.
The Backup Archives window appears.
STRM Administration Guide
Page 63
Managing Backup Archives55
Step 3 In the Upload Archive field, click Browse.
The File Upload window appears.
Step 4 Select the archive file you wish to upload. Click Open.
Step 5 Click Upload.
Deleting a Backup
Archive
Step 1 In the Administration Console, click the System Configuration tab.
Step 2 Click the Backup Recovery icon.
Step 3 Select the archive you wish to delete.
Step 4 Click Delete.
Step 5 A confirmation window appears.
To delete a backup arch ive:
Note: To delete a backup archive file, the backup archive file and the Host Context
component must reside on the same system. The system must also be in
communication with the Console.
The System Configuration panel appears.
The Backup Archives window appears.
Step 6 Click Ok.
STRM Administration Guide
Page 64
56MANAGING BACKUPAND RECOVERY
Backing Up Your
Information
Scheduling Your
Backup
You can backup your configuration information and data using the Backup
Recovery Configuration window. You can backup your configuration information
using a manual process. Also, you can also backup your configuration information
and data using a scheduled process. By default, STRM creates a backup archive
of your configuration information every night at midnight and the backup includes
configuration and/or data from the previous day. This section provides on both
methods of backing up your data including:
•Scheduling Your Backup
•Initiating a Backup
To schedule you r backup process:
To configure your backup settings:
Step 1 In the Administration Console, click the System Configuration tab.
Specifies the location you wish to store your backup file. This
path must exist before the backup process is initiated. If this path
does not exist, the backup process aborts. The default is
/store/backup.
Note: If you modify this pa th, make sure th e new p ath is valid on
every system in your deployment.
Backup Retention
Period
Specify the length of time, in days, that you wish to maintain
backup files. The default is 2 days.
Note: This per iod of time only affect s backup files generated as a
result of a scheduled process. Manually initiated backup
processes are not affected by this value.
Nightly Backup
Schedule
Select one of the following options:
• No Nightly Backups - Disables the creation of a backup
archive on a daily basis.
• Configuration Backup Only - Enables the creation of a daily
backup at midnight that includes configuration information
only.
• Configuration and Data Back up s - Enables the creation of a
daily backup at midnight that includes configuration
information and data. If you select the Configuration and Data
Backups option, you can select the hosts you wish to backup.
This option backs up all database table information including:
-Offenses (including targets and attacker information)
Step 5
-Asset data
-Categories
-Vulnerability data.
Once you select the host, you can select one of the following
options: Event Data, Flow Data, and Asset Profile Data.
Configuration Only Backup
Backup Time Limit Specify the length of time, in minutes, that you wish to allow the
backup to process.
Backup PrioritySpecify the level of importance (low, medium, high) you wish the
system to place on the configuration information backup process
compared to other processes.
Data Backup
Backup Time Limit
(min)
Specify the length of time, in minutes, that you wish to allow the
backup to process.
Backup PrioritySpecify the level of importance (low, medium, high) you wish the
system to place on the data backup process compared to other
processes.
Click Save.
STRM Administration Guide
Page 66
58MANAGING BACKUPAND RECOVERY
Step 6 From the Administration Console menu, select Configurations > Deploy All.
Initiating a BackupTo manually initiate a backup:
Step 1 In the Administration Console, click the System Configuration tab.
The System Configuration panel appears.
Step 2 Click the Backup Recovery icon.
The Backup Archives window appears.
Step 3 Click On Demand Backup.
The Create a Backup window appears.
Step 4 Enter values for the following parameters:
•Name - Spe cify a unique name you wish to assign to this backup file. Th e name
must be a maximum of 100 alphanumeric characters. Also, the name may
contain following characters: underscore (_), dash (-), or period (.).
•Description - Specify a description for this backup. The name can be up to 255
characters in length.
Step 5 Click Run Backup.
A confirmation window appears.
Step 6 Click OK.
STRM Administration Guide
Page 67
Restoring Your Configuration Information59
Restoring Your
Configuration
Information
You can restore configuration information from existing backup archives using the
Restore Backup window. Note the following requirements when you are restoring
configuration information:
•You can only restore a backup archive created within the same release of
software. For example, if you are running STRM 6.1.2, the backup archive must
of been created in STRM 6.1.2. You can not restore configuration information
archived in a previous release.
•Each backup archive includes IP address information of the system from which
the backup archive was created. The IP address of the system on which you
wish to restore the information must match the IP address of the backup
archive. If the IP addresses do not match, the restore process will fail.
To restore your configuration information using a backup archive:
Note: If the deployment you are restoring includes non-Console systems, make
sure you re-add the managed hosts to your deployment and deploy all changes
before you initiate the restore process.
Step 1 In the Administration Console, click the System Configuration tab.
The System Configuration panel appears.
Step 2 Click the Backup Recovery icon.
The Backup Archives window appears.
Step 3 Select the archive you wish to restore.
Step 4 Click Restore.
The Restore a Backup window appears.
Step 5 To restore specific items in the archive:
a Clear the All Items check box.
b The list of archived items appears.
c Select the check box for each item you wish to restore.
Step 6 Click Restore.
A confirmation window appears.
Step 7 Click Ok.
The restore process begins. This process may take an extended period of time.
STRM Administration Guide
Page 68
60MANAGING BACKUPAND RECOVERY
Step 8 From the Administration Console menu, select Configurations > Deploy All.
Note: The restore process only restores your configuration information. For
assistance in restoring your data, contact Q1 Labs Customer Support.
STRM Administration Guide
Page 69
5
USINGTHE DEPLOYMENT EDITOR
The deployment editor allows you to manage the individual components of your
STRM, and SIM deployment. Once you configure your Flow, Event, and System
Views, you can access and configure the individual components of each managed
host.
Note: The Deployment Editor requires Java Runtime Environment. Download
JRE5.0 at www.java.sun.com
configure your browser to accept Java Network Language Protocol (JNLP) files.
Caution: Many third-party web browsers that use the Internet Explorer engine,
such as Maxthon or MyIE, install components that may be incompatible with the
STRM Administration Console. You must disable any third-party web browsers
installed on your system. For further assistance, please contact customer support.
If you wish to access the STRM Administration Console from behind a proxy
server or firewall, you must configure the appropriate proxy settings on your
desktop. This allows the software to automatically detect the proxy settings from
your browser. To configure the proxy settings, open the Java configuration located
in your Control Panel and configure the IP address of your proxy server. For more
information on configuring proxy settings, see your Microsoft documentation.
. Also, If you are using the Firefox browser, you must
This chapter provides information on managing your views including:
•About the Deployment Editor
•Editing Deployment Editor Preferences
•Building Your Flow View
•Building Your Event View
•Managing Your System View
•Configuring STRM Components
STRM Administration Guide
Page 70
62USINGTHE DEPLOYMENT EDITOR
About the
Deployment Editor
You can access the deployment editor using the STRM Administration Console.
Y ou can use the deployment editor to create your deployment, assign connections,
and configure each component.
The deployment editor provides the following views of your deployment:
•Flow View - Allows you to create a view that outlines how flows are processed
in your deployment by allocating and connecting flow-based components, for
example, connecting a Flow Collector to a Flow Processor.
•System View - Allows you to assign software components, such as a Flow
Collector, to systems (managed hosts) in your deployment. The System View
includes all managed hosts in your deployment. A managed host is a system in
your deployment that has STRM software installed. By default, the System
View also includes the Host Context component, which monitors all STRM
components to ensure that each component is operating as expected.
•Event View - Allows you to create a view for your SIM components including
Event Processor, Event Collector, and Magistrate components.
Each view is divided into two panels.
In the Flow View, the left panel provides a list of components that you can add to
your view and the right panel provides the existing view of your deployment.
In the Event View, the left panel provides a list of SIM components you can add to
the view and the right panel provides an existing view of your SIM deployment.
STRM Administration Guide
Page 71
About the Deployment Editor63
In the System View , the lef t p anel provides a list of managed hosts, which you can
view and configure. The deployment editor polls your deployment for updates to
managed hosts. If the deployment editor detects a change to a managed host in
your deployment, a message appears notifying you of the change. For example, if
you remove a managed host, a message appears indicating that the assigned
components to that host must be re-assigned to another host. Also, if you add a
managed host to your deployment, the deployment editor displays a message
indicating that the managed host has been added.
Accessing the
Deployment Editor
In the Administration Console, click the deployment editor icon. The
deployment editor appears. Once you update your configuration settings using the
deployment editor, you must save those changes to the staging area. You must
either manually deploy all changes using the Administration Console Deploy menu
option or, upon exiting the Administration Console, a window appears prompting
you to deploy changes before you exit. All deployed changes are then enforced
throughout your deployment.
Using the EditorThe deployment editor provides you with several menu and toolbar options when
configuring your views including:
•Menu Options
•Toolbar Options
Menu Options
The menu options that appear depend on the selected component in your view.
Table 5-1 provides a list of the menu options and the component fo r which they
appear.
Table 5-1 Deployment Editor Menu Options
Menu OptionSub Menu OptionDescription
FileSave to stagingSaves deployment to the staging area.
Save and closeSave deployment to the staging area and
closes the deployment editor.
Open staged
deployment
Open production
deployment
Close current
deployment
RevertR everts current deployment to the
Edit PreferencesOpens the preferences window.
Close editorCloses the deployment editor.
EditDeleteDeletes a component, host, or connection.
ActionsAdd a managed host Opens the Add a Managed Host wizard.
Opens a deployment that was previously
saved to the staging area.
Opens a deployment that was previously
saved.
Closes the current deployment.
previously saved deployment.
STRM Administration Guide
Page 72
64USINGTHE DEPLOYMENT EDITOR
Table 5-1 Deployment Editor Menu Options (continued)
Menu OptionSub Menu OptionDescription
HelpHelp and SupportOpens user documentation.
Manage NATed
Networks
Opens the Manage NATed Networks
window, which allows you to manage the list
of NATed networks in your deployment.
Rename component Renames an existing co mponent.
This option is only available when a
component is selected.
ConfigureConfigure a STRM components.
This option is only available when a Flow
Collector, Flow Processor, Classification
Engine, Event Collector, Event Processor,
Magistrate, or Update Daemon is selected.
AssignAssigns a component to a managed host.
This option is only available when a Flow
Collector, Flow Processor, Classification
Engine, Event Collector, Event Processor,
Magistrate, or Update Daemon is selected.
UnassignUnassigns a component from a managed
host. This option is only available when the
selected component has a managed host
running a compatible version of STRM
software.
This option is only available when a Flow
Collector, Flow Processor, Classification
Engine, Event Collector, Event Processor,
or Update Daemon is selected.
Toolbar Options
The toolbar options include:
Table 5-2 Toolbar Options
IconDescription
Saves deployment to the staging area and closes the deployment editor.
Opens current production deployme nt .
Opens a deployment that was previously saved to the staging area.
Discards recent changes and reloads last saved model.
STRM Administration Guide
Page 73
Table 5-2 Toolbar Options (continued)
IconDescription
Deletes selected item from the deployment view.
This option is only available when the selected component has a managed
host running a compatible version of STRM software.
Opens the Add a Managed Host wizard, which allows you to add a
managed host to your deployment.
Opens the Manage NATed Networks window, which allows you to manage
the list of NATed networks in your deployment.
Resets the zoom to the default.
Zoom in.
Zoom out.
About the Deployment Editor65
Creating Your
To create your deployment, you must:
Deployment
Step 1 Build your Flow View. See Building Your Flow View.
Step 2 Build your System View. See Managing Your System View.
Step 3 Configure added components. See Configuring STRM Components.
Step 4 Build your Event View. See Building Your Event View.
Step 5 Configure SIM components. See Configuring STRM Components.
Step 6 Stage the deployment. From the deployment editor menu, select File > Save to
Staging.
Step 7 Deploy all configuration changes. From the Administration Console menu, select
Configurations > Deploy All.
For more information on the Administration Console, see Chapter 1Overview.
Before you BeginBefore you begin, you must:
•Install all necessary hardware and STRM software.
•Install Java Runtime Environment. You can download Java version 1.5.0_12 at
the following web site: http://java.com/en/download/index.jsp
•If you are using the Firefox browser, you must configure your browser to accept
Java Network Language Protocol (JNLP) files.
•Plan your STRM deployment including the IP addresses and login information
for all devices in your STRM deployment.
STRM Administration Guide
Page 74
66USINGTHE DEPLOYMENT EDITOR
Note: If you require assistance with the above, please contact Juniper Networks
Customer Support.
Editing Deployment
Editor Preferences
Step 1 From the deployment editor main menu, select File > Edit Preferences.
Step 2 Enter values for the following parameters:
Step 3 Close the window
To edit the deployment editor preferences:
The Deployment Editor Setting window appears.
•Presence Poll Frequency - Specify how often, in milliseconds, that the
managed host monitors your deployment for updates, for example, a new or
updated managed host.
•Zoom Increment - Specify the increment value when the zoom option is
selected. For example. 0.1 indicates 10%.
The Deployment Editor appears.
Building Your Flow
View
Step 1 Add STRM components to your view. See Adding STRM Components.
Step 2 Connect the added components. See Connecting Components.
Step 3 Connect the deployments, if necessary. See Connecting Deployments.
Step 4 Rename the components so each component has a unique name. See Renaming
The Flow View allows you to create and manage the flow-based software
components of your STRM deployment, for example, a Flow Collector or Flow
Processor. If you are using a STRM appliance, a default Flow View appears with
the appropriate components. You can edit or update the view, as necessary.
To build your Flow View, you must:
Components
Once you have completed building your Flow View, you can use the Event View to
manage your SIM components. See Building Your Event View.
STRM Administration Guide
Page 75
Building Your Flow View67
Adding STRM
Components
Step 1 In the deployment editor, click the Flow View tab.
You can add the following STRM components to your Flow View:
•Flow Collector - Collects data from devices and various live and recorded
feeds.
•Flow Processor - Collects and consolidates data from one or more Flow
Collector(s).
•Classification Engine - Receives input from one or more Flow Processor(s) as
well as classifies and accumulates statistical data on flows.
•Update Daemon - Stores TopN and database data once the Classification
Engine has processed the flows for an interval.
•Flow Writer - Stores the flow and asset profile data once the Classification
Engine has processed the flows for an interval.
Note: The procedures in the section provide information on adding STRM
components using the Flow View. You can also add components using the System
View. For information on the System View, see Managing Your System View.
To add STRM components to your Flow View:
The Flow View appears.
Step 2 In the Flow Components panel, select a component you wish to add to your
deployment.
The Adding a New Component Wizard appears.
STRM Administration Guide
Page 76
68USINGTHE DEPLOYMENT EDITOR
Step 3 Enter a unique name for the component you wish to add. The name can be up to
15 characters in length and may include underscores or hyphens. Make sure you
record the assigned name and Click Next.
Note: If the message “There are no hosts to which you can assign this
component.” appears, your deployment does not include hosts with the capabilities
to support the selected component or the host already has a full compliment of
components installed.
The Assign Component window appears.
Step 4 From the Select a host drop-down list box, select the managed host to which you
wish to assign the new component. Click Next.
The component ready to be added window appears.
Step 5 Click Finish.
STRM Administration Guide
Page 77
Building Your Flow View69
The component appears in your Flow View.
Step 6 Repeat for each component you wish to add to your view.
Step 7 From the menu, select File > Save to staging.
Connecting
Components
Step 1 In the Flow View, select the component for which you wish to establish a
Step 2 From the menu, select Actions > Add Connection.
Step 3 Drag the end of the arrow to the component on which you wish to establish a
Once you add all the necessary components in your Flow View, you must connect
them together. The Flow View only allows you to connect appropriate components
together. For example, you can connect a Flow Processor to a Flow Collector and
not an Update Daemon.
To connect components:
connection.
Note: You can also use the right mouse button (right-click) to access the Actions
menu item.
An arrow appears in your map.
connection. You can only connect appropriate components, for example, you can
connect a Classification Engine to an Update Daemon. Table 5-3 provides a list of
components you are able to connect.
Flow Writer - Multiple Classification Engines may be
connected to a single Flow Writer.
The arrow connects the two components.
Step 4 Repeat for all remaining components in your deployment that you wish to establish
a connection.
Step 5 From the menu, select File > Save to Staging.
STRM Administration Guide
Page 78
70USINGTHE DEPLOYMENT EDITOR
Connecting
Deployments
You can connect deployments in your network to allow deployments to share flow
data. To connect your deployments, you must configure an off-site Flow Processor
(target) in your current deployment and the associated off-site Flow Processor in
the receiving deployment (source). You can add the following components to your
Flow View:
•Off-site Source - Indicates an off-site Flow Processor from which you wish to
receive data. The source must be configured with appropriate permissions to
send flows to the off-site target.
•Off-site Target - Indicates an off-site Flow Processor to which you wish to send
data.
Note: The procedures in the section provide information on adding flow sources
using the Flow View. You can also add sources using the System View. For
information on the System View, see Managing Your System View.
Figure 5-1 shows an example of connecting two deployments, A and B. In this
example, deployment B wishes to receive flows from deployment A. To connect
these deployments, you must configure deployment A with an off-site target to
provide the IP address of the managed host that includes Flow Processor B. You
must then connect Flow Processor A to the off-site target. In deployment B, you
must configure an off-site source with the IP address of the managed host that
includes Flow Processor A and the port to which Flow Processor A is monitoring.
If you wish to disconnect the off-site source, you must remove the connections
from both deployments. From deployment A, you must remove the off-site target
and in deployment B, you must remove the off-site source.
If you wish to enable encryption between deployments, you must enable
encryption on both off-site source and target. Also, you must ensure both the
off-site source and target include the public keys to ensure appropriate access. For
example, in the example below, if you wish to enable encryption between the
off-site source and Flow Processor B, you must copy the public key (located at
/root/.ssh/id_rsa.pub) from the Flow Processor to the off-site source (copy the file
to /root/.ssh/authorized_keys).
Note: To enable encryption between two managed hosts, each managed host
must be running at least STRM 5.1.
STRM Administration Guide
Page 79
Figure 5-1 Example of Connecting Deployments
To connect your deployments:
Step 1 In the deployment editor, click the Flow View tab.
The Flow View appears.
Building Your Flow View71
Step 2 In the Flow Components panel, select either Add Off-site Source or Add Off-site
Target.
The Adding a New Component Wizard appears.
STRM Administration Guide
Page 80
72USINGTHE DEPLOYMENT EDITOR
Step 3 Specify a unique name for the source or target. The name can be up to 15
characters in length and may include underscores or hyphens. Click Next.
The flow source/target information window appears.
Step 4 Enter values for the parameters:
•Enter a name for the off-site host - Specify the name of the off-site host. The
name can be up to 15 characters in length and may include underscores or
hyphens.
•Enter the IP address of the server - Specify the IP address of the managed
host to which you wish to connect.
•Enter port of managed host - Specify the off-site managed host port number.
STRM Administration Guide
Page 81
•Encrypt traffic from off-site source - Select the check box if you wish to
encrypt traffic from an off-site source. To enable encryption, you must select
this check box on the associated off-site source and target. For more
information regarding encryption, see Managing Your System View.
Step 5 Click Next.
Step 6 Click Finish.
Step 7 Repeat for all remaining off-site sources and targets.
Step 8 From the main menu, select File > Save to staging.
Note: If you update your Flow Processor configuration or the monitoring ports, you
must manually update your source and target configurations to maintain the
connection between deployments.
Building Your Event View73
Renaming
Components
Building Your
Event View
You may wish to rename a component in your view to uniquely identify
components through your deployment.
To rename a component:
Step 1 Select the component you wish to rename.
Step 2 From the menu, select Actions > Rename component.
Note: You can also use the right mouse button (right-click) to access the Actions
menu items.
The Rename component window appears.
Step 3 Enter a new name for the component. The name must be alphanumeric with no
special characters.
Step 4 Click Ok.
The Event View allows you to create and manage the SIM components for your
deployment including:
•Event Collector - Collects security events from various types of security
devices in your network. The Event Collector gathers events from local, remote,
and device sources. The Event Collector then normalizes the events and sends
the information to the Event Processor. The Event Collector also bundles all
virtually identical events to conserve system usage.
•Event Processor - An Event Processor processes flows collected from one or
more Event Collector(s). The events are bundled once again to conserve
network usage. Once received, the Event Processor correlates the information
STRM Administration Guide
Page 82
74USINGTHE DEPLOYMENT EDITOR
from STRM and distributes to the appropriate area, depending on the type of
event. The Event Processor also includes information gathered by STRM to
indicate any behavioral changes or policy violations for that event. Rules are
then applied to the events that allow the Event Processor to process according
to the configured rules. Once complete, the Event Processor sends the events
to the Magistrate.
You must connect the Event Processor to a Classification Engine or another
Event Processor in your deployment. The Classification Engine is responsible
for sending the latest event information to the Event Processor. See Figure 5-2
for an example.
•Magistrate - The Magistrate component provides the core processing
components of SIM. You can add one Magistrate component for each
deployment. The Magistrate provides views, reports, alerts, and analysis of
network traffic and security events. The Magistrate processes the event against
the defined custom rules to create an offense. If no custom rules exist, the
Magistrate uses the default rules to process the event. An offense is an event
that has been processed through STRM using multiple inputs, individual
events, and events combined with analyzed behavior and vulnerabilities.
Magistrate prioritizes the offenses and assigns a magnitude value based on
several factors, including number of events, severity, relevance, and credibility.
Once processed, Magistrate also produces a list for each attacker, which
provides you with a list of attackers for each event. Once the Magistrate
establishes the magnitude for an event, the Magistrate provides multiple
options for resolution.
By default, the Event View includes a Magistrate component. Figure 5-2 shows an
example of STRM deployment that includes the SIM components. The example
shows that the Event Processor is connected to the Classification Engine, which
allows for the exchange of flow information.
STRM Administration Guide
Page 83
Building Your Event View75
Figure 5-2 Example of SIM Components in your STRM Deployment
To build your Event View, you must:
Step 1 Add SIM components to your view. See Adding Components.
Step 2 Connect the components. See Connecting Components.
Step 3 Forward normalized events. See Forwarding Normalized Events.
Step 4 Rename the components so each component has a unique name. See Renaming
Components.
Adding ComponentsTo add components to your Event View:
Step 1 In the deployment editor, click the Event View tab.
The Event View appears.
Step 2 In the Event Tools panel, select a component you wish to add to your deployment.
The Adding a New Component Wizard appears.
STRM Administration Guide
Page 84
76USINGTHE DEPLOYMENT EDITOR
Step 3 Enter a unique name for the component you wish to add. The name can be up to
15 characters in length and may include underscores or hyphens. Click Next.
The Assign Component window appears.
Step 4 From the Select a host to assign to list box, select a managed host to which you
wish to assign the new component. Click Next.
Step 5 Click Finish.
Step 6 Repeat for each component you wish to add to your view.
Step 7 From the main menu, select File > Save to staging.
STRM Administration Guide
Page 85
Building Your Event View77
Connecting
Components
Step 1 In the Event View, select the component for which you wish to establish a
Step 2 From the menu, select Actions > Add Connection.
Step 3 Drag the end of the arrow to the component on which you wish to establish a
Once you add all the necessary components in your Event View, you must connect
them together. The Event View only allows you to connect appropriate components
together. For example, you can connect an Event Collector to an Event Processor
and not a Magistrate component.
To connect components:
connection.
Note: You can also use the right mouse button (right-click) to access the Action
menu item.
An arrow appears in your map.
connection. You can only connect appropriate components, for example, you can
connect an Event Collector to an Event Processor. Table 5-4 provide s a list of
components you are able to connect.
Step 4 Repeat for all remaining components that you wish to establish a connection.
Forwarding
Normalized Events
The arrow connects the two components.
To forward normalized events, you must configure an off-site Event Collector
(target) in your current deployment and the associated off-site Event Collector in
the receiving deployment (source).
You can add the following components to your Event View:
•Off-site Source - Indicates an off-site Event Collector from which you wish to
receive data. The source must be configured with appropriate permissions to
send events to the off-site target.
•Off-site T arget - Indicates an off-site Event Collector to which you wish to send
data.
For example, if you wish to forward normalized events between two deployments
(A and B), where deployment B wishes to receive events from deployment A you
must configure deployment A with an off-site target to provide the IP address of the
managed host that includes Event Collector B. You must then connect Event
Collector A to the off-site target. In deployment B, you must configure an off-site
source with the IP address of the managed host that includes Event Collector A
and the port to which Event Collector A is monitoring.
STRM Administration Guide
Page 86
78USINGTHE DEPLOYMENT EDITOR
If you wish to disconnect the off-site source, you must remove the connections
from both deployments. From deployment A, you must remove the off-site target
and in deployment B, you must remove the off-site source.
If you wish to enable encryption between deployments, you must enable
encryption on both off-site source and target. Also, you must ensure both the
off-site source and target include the public keys to ensure appropriate access. For
example, in the example below, if you wish to enable encryption between the
off-site source and Event Collector B, you must copy the public key (located at
/root/.ssh/id_rsa.pub) from the Event Collector to the off-site source (copy the file
to /root/.ssh/authorized_keys).
Event Collector A
Event Processor
Magistrate
Figure 5-3 Example of Connecting Deployments
Off-site
Source
Off-site
Target
Event Collector B
Event Processor
Magistrate
To fo rward normalized events:
Step 1 In the deployment editor, click the Event View tab.
The Event View appears.
Step 2 In the Components panel, select either Add Off-site Source or Add Off-site
Target.
The Adding a New Component Wizard appears.
STRM Administration Guide
Page 87
Building Your Event View79
Step 3
Specify a unique name for the source or target. The name can be up to 15
characters in length and may include underscores or hyphens. Click Next.
The event source/target information window appears.
Step 4 Enter values for the parameters:
•Enter a name for the off-site host - Specify the name of the off-site host. The
name can be up to 15 characters in length and may include underscores or
hyphens.
•Enter the IP address of the server - Specify the IP address of the managed
host to which you wish to connect.
•Encrypt traffic from off-site source - Select the check box if you wish to
encrypt traffic from an off-site source. To enable encryption, you must select
this check box on the associated off-site source and target.
STRM Administration Guide
Page 88
80USINGTHE DEPLOYMENT EDITOR
Step 5 Click Next.
Step 6 Click Finish.
Step 7 Repeat for all remaining off-site sources and targets.
Step 8 From the main menu, select File > Save to staging.
Note: If you update your Event Collector configuration or the monitoring ports, you
must manually update your source and target configurations to maintain the
connection between deployments.
Renaming
Components
Managing Your
System View
You may wish to rename a component in your view to uniquely identify
components through your deployment.
To rename a compo nent:
Step 1 Select the component you wish to rename.
Step 2 From the menu, select Actions > Rename Component.
Note: You can also use the right mouse button (right-click) to access the Action
menu items.
The Rename component window appears.
Step 3 Enter a new name for the component. The name must be alphanumeric with no
special characters.
Step 4 Click Ok.
The System View allows you to manage all managed hosts in your network. A
managed host is a component in your network that includes STRM software. If you
are using a STRM appliance, the components for that appliance model appear. If
your STRM software is installed on your own hardware, the System View includes
a Host Context component. The System View allows you to select which
component(s) you wish to run on each managed host.
Using the System View, you can:
•Set up managed hosts in your deployment. See Setting Up Managed Hosts.
•Use STRM with NATed netw orks in your deployment. See Using NAT with
STRM.
•Update the managed host port configuration. See Configuring a Managed Host.
•Assign a component to a managed host. See Assigning a Component to a
Host.
STRM Administration Guide
Page 89
Managing Your System View81
•Configure Host Context. See Configuring Host Context.
Setting Up Managed
Hosts
Using the deployment editor you can manage all hosts in your deployment
including:
•Add a managed host to your deployment. See Adding a Managed Host.
•Edit an existing managed host. See Editing a Managed Host.
•Remove a managed host. See Removing a Managed Host.
When adding a managed host, you can also enable encryption between managed
hosts running at least STRM 5.1. The deployment editor determines the version of
STRM software running on a managed host. You can only add a managed host to
your deployment when the managed host is running a compatible version of STRM
software. For more information, contact Juniper Networks Customer Support.
Y ou also can not assign or configure components on a non-Console managed host
when the STRM software version is incompatible with the software version that the
Console is running. If a managed host has previously assigned components and is
running an incompatible software version, you can still view the components,
however, you are not able to update or delete the components.
Note: To enable encryption between two managed hosts, each managed host
must be running at least STRM 5.1.
Encryption provides greater security for all STRM traffic between managed hosts.
To provide enhanced security, STRM also provides integrated support for
®
OpenSSh and attachmateWRQ
Reflection SSH software. Reflection SSH
software provides a FIPS 140-2 certified encryption solution. When integrated with
STRM, Reflection SSH provides secure communication between STRM
components. For information on Reflection SSH, see the following web site:
www.wrq.com/products/reflection/ssh
Note: You must have Reflection SSH installed on each managed host you wish to
encrypt using Reflection SSH. Also, Reflection SSH is not compatible with other
SSH software, such as, Open SSH.
Since encryption occurs between managed hosts in your deployment, your
deployment must consist of more than one managed host before encryption is
possible. Encryption is enabled using SSH tu nnels (port forwarding) initiated from
the client. A client is the system that initiates a connection in a client/server
relationship. When encryption is enabled for a managed host, encryption tunnels
are created for all client applications on a managed host to provide protected
access to the respective servers. If you enable encryption on a non-Console
managed host, encryption tunnels are automatically created for databases and
other support service connections to the Console.
Figure 5-4 shows the flow of traffic withi n a STRM deployment including flows, flow
context, and event traffic. The figure also displays the client/server relationships
STRM Administration Guide
Page 90
82USINGTHE DEPLOYMENT EDITOR
within the deployment. When enabling encryption on a managed host, the
encryption SSH tunnel is created on the client’s host. For example, if you enable
encryption for the Event Collector in the below deployment, the connection
between the Event Processor and Classification Engine as well as the connection
between the Event Processor and Magistrate would be encrypted. The below
graphic also displays the client/server relationship between the Console and the
Ariel database. When you enable encryption on the Console, an encryption tunnel
is used when performing event searches through the Offense Manager.
Note: Enabling encryption reduces the performance of a managed host by at least
50%.
QFlow 1101
QFlow Collector
Server
Client
Flow Processor
Server
Client
Classification Engine
Client
Server
Client
Server
Update Daemon
QRadar 2100
FlowsFlow ContextEvent Traffic
Figure 5-4 Encryption Tunnels
Adding a Managed Host
To add a managed host:
Event Collector
Event Collector
Server
Event Processor
Client
Server
Client
Server
Client
Magistrate
Console
Ariel
Database
Server
Client
Note: Before you add a managed host, make sure the managed host includes
STRM software.
Step 1 From the menu, select Actions > Add a managed host.
The Add new host wizard appears.
STRM Administration Guide
Page 91
Step 2 Click Next.
The Enter the host’s IP window appears.
Managing Your System View83
Step 3 Enter values for the parameters:
•Enter the IP of the server or appliance to add - Specify the IP address of the
host you wish to add to your System View.
•Enter the root password of the host - Specify the root password for the host.
•Confirm the root password of the host - Specify the password again, for
confirmation.
•Host is NATed - Select the check box if you wish to use an existing Network
Address Translation (NA T) on this managed host. For more information on NA T,
see Using NAT with STRM.
STRM Administration Guide
Page 92
84USINGTHE DEPLOYMENT EDITOR
Note: If you wish to enable NAT for a managed host, the NATed network must be
using static NAT translation. For more information on using NAT, see Using NAT
with STRM.
•Enable Encryption - Select the check box if you wish to create an encryption
tunnel for the host. To enable encryption between two managed hosts, each
managed host must be running at least STRM 5.1.
If you selected the Host is NATed check box, the Configure NAT settings window
appears. Go to Step 4. Otherwise, go to Step 5.
Step 4 To select a NATed network, enter values for the following parameters:
•Enter public IP of the server or appliance to add - Specify the public IP
address of the managed host. The managed host uses this IP address to
communicate with another managed host that belongs to a different network
using NAT.
•Select NA Ted network - Using the drop-down list box, select network you wish
this managed host to use.
Note: For information on managing your NATed networks, see Using NAT with
STRM.
Step 5 Click Next.
Step 6 Click Finish.
Note: If your deployment included undeployed changes, a window appears
enabling you to deploy all changes.
The System View appears with the host in the Managed Hosts panel.
Editing a Managed Host
To edit an existing managed host:
Step 1 Click the System View tab.
Step 2 Use the right mouse button (right-click) on the managed host you wish to edit and
select Edit Managed Host.
The Edit a managed host wizard appears.
Note: This option is only available when the selected component has a managed
host running a compatible version of STRM software.
STRM Administration Guide
Page 93
Step 3 Click Next.
The attributes window appears.
Managing Your System View85
Step 4 Edit the following values, as necessary:
•Host is NATed - Select the check box if you wish to use existing Network
Address Translation (NA T) on this managed host. For more information on NA T,
see Using NAT with STRM.
Note: If you wish to enable NAT for a managed host, the NATed network must be
using static NAT translation. For more information on using NAT, see Using NAT
with STRM.
STRM Administration Guide
Page 94
86USINGTHE DEPLOYMENT EDITOR
•Enable Encryption - Select the check box if you wish to create an encryption
tunnel for the host. To enable encryption between two managed hosts, each
managed host must be running at least STRM 5.1.
If you selected the Host is NATed check box, the Configure NAT settings window
appears. Go to Step 5. Otherwise, go to Step 6.
Step 5 To select a NATed network, enter values for the following parameters:
•Enter public IP of the server or appliance to add - Specify the public IP
address of the managed host. The managed host uses this IP address to
communicate with another managed host that belongs to a different network
using NAT.
•Select NA Ted network - Using the drop-down list box, select network you wish
this managed host to use.
Note: For information on managing your NATed networks, see Using NAT with
STRM.
Step 6 Click Next.
Step 7 Click Finish.
The System View appears with the updated host in the Managed Hosts panel.
Removing a Managed Host
Y ou can only remove non-Console managed hosts from your deployment. You can
not remove a managed host that is hosting the STRM Console.
To remove a managed host:
Step 1 Click the System View tab.
Step 2 Use the right mouse button (right-click) on the managed host you wish to delete
and select Remove host.
Note: This option is only available when the selected component has a managed
host running a compatible version of STRM software.
A confirmation window appears.
Step 3 Click Ok.
Step 4 From the Administration Console menu, select Configurations > Deploy All.
STRM Administration Guide
Page 95
Managing Your System View87
10.100.100.1
Network 1
Classification Engine
Update Daemon
QFlow 1101
Magistrate
Network 2
Event Collector
Event Collector
NAT
Router
192.15.2.1
Using NAT with
STRM
Network Address Translation (NAT) translates an IP address in one network to a
different IP address in another network. NAT provides increased security for your
deployment since requests are managed through the translation process and
essentially hides internal IP address.
Before you enable NAT for a STRM managed host, you must set-up your NATed
networks using static NAT translation. This ensures communications between
managed hosts that exist within different NATed networks. For example, in
Figure 5-5 the QFlow 1101 in Network 1 has an internal IP address of
10.100.100.0. When the QFlow 1101 wishes to communicate with the Event
Collector in Network 2, the NAT router translates the IP address to 192.15.2.1.
Figure 5-5 Using NAT with STRM
Note: Your st atic NATed networks must be set-up and configured on your network
before you enable NAT using STRM. For more information, see your network
administrator.
You can add a non-NATed managed host using inbound NAT for the public IP
address and dynamic for outbound NAT but are located on the same switch as the
Console or managed host. However, you must configure the managed host to use
the same IP address for the public and private IP addresses.
When adding or editing a managed host, you can enable NAT for that managed
host. You can also use the deployment editor to manage your NATed networks
including:
•Adding a NA Ted Network to STRM
•Editing a NATed Network
•Deleting a NATed Network From STRM
•Changing the NAT Status for a Managed Host
STRM Administration Guide
Page 96
88USINGTHE DEPLOYMENT EDITOR
Adding a NATed Network to STRM
To add a NATed network to your STRM deployment:
Step 1 In the deployment editor, click the NATed networks icon.
Note: Y ou can also use the Actions > Managed NA T ed Networks menu o ption to
access the Managed NATed Networks window.
The Manage NATed Networks window appears.
Step 2 Click Add.
The Add New Nated Network window appears.
Step 3 Enter a name of a network you wish to use for NAT.
Step 4 Click Ok.
The Manage NATed Networks window appears.
Step 5 Click Ok.
A confirmation window appears.
Step 6 Click Yes.
Editing a NATed Network
To edit a NA Ted network:
Step 1 In the deployment editor, click the NATed networks icon.
Note: You can also use the Actions > Managed NATed Networks menu option
to access the Managed NATed Networks window.
The Manage NATed Networks window appears.
STRM Administration Guide
Page 97
Managing Your System View89
Step 2
Select the NATed network you wish to edit and click Edit.
The Edit NATed Network window appears.
Step 3 Update the name of the network you wish to use for NAT.
Step 4 Click Ok.
The Manage NATed Netwo rks window appears.
Step 5 Click Ok.
A confirmation window appears.
Step 6 Click Yes.
Deleting a NATed Network From STRM
To delete a NATed network from your deployment:
Step 1 In the deployment editor, click the NATed networks icon.
Note: Y ou can also use the Actions > Managed NATed Networks menu option to
access the Managed NATed Networks window.
The Manage NATed Netwo rks window appears.
Step 2 Select the NATed network you wish to delete.
Step 3 Click Delete.
A confirmation window appears.
Step 4 Click Ok.
Step 5 Click Yes.
STRM Administration Guide
Page 98
90USINGTHE DEPLOYMENT EDITOR
Changing the NAT Status for a Managed Host
To change your NAT status for a managed host, make sure you update the
managed host configuration within STRM before you update the device. This
prevents the host from becoming unreachable and allows you to deploy changes
to that host.
To change the status of NA T (enable or disable) for an existing managed host:
Step 1 In the deployment editor, click the System View tab.
Step 2 Use the right mouse button (right-click) on the managed host you wish to edit and
select Edit Managed Host.
The Edit a managed host wizard appears.
Step 3 Click Next.
The networking and tunneling attributes window appears.
Step 4 Choose one of the following:
a If you wish to enable NAT for the managed host, select the check box. Go to
Step 5
Note: If you wish to enable NAT for a managed host, the NATed network must be
using static NAT translation.
b If you wish to disable NAT for the managed host, clear the check box. Go to
Step 6
Step 5 To select a NATed network, enter values for the following parameters:
•Change public IP of the server or appliance to add - Specify the public IP
address of the managed host. The managed host uses this IP address to
communicate with another managed host that belongs to a different network
using NAT.
•Select NA Ted network - Using the drop-down list box, select network you wish
this managed host to use.
•Manage NATs List - Update the NATd network configuration. For more
information see, Using NAT with STRM.
Step 6 Click Next.
Step 7 Click Finish.
The System View appears with the updated host in the Managed Hosts panel.
Note: Once you change the NAT status for an existing managed host error
messages may appear. Ignore all error messages.
Step 8 Update the configuration for the device (firewall) to which the managed host is
communicating.
Step 9 From the STRM Administration Console menu, select Configurations > Deploy
All.
STRM Administration Guide
Page 99
Managing Your System View91
Configuring a
Managed Host
Step 1 From the System View, use the right mouse button (right-click) on the managed
Step 2 Enter values for the parameters:
To configure a ma naged host:
host you wish to configure and select Configure.
The Configure host window appears.
•Minimum port allowed- Specify the minimum port for which you wish to
establish communications.
•Maximum port allowed - Specify the maximum port for which you wish to
establish communications.
•Ports to exclude - Specify the port you wish to exclude from communications.
You can enter multiple ports you wish to exclude. Separate multiple ports using
a comma.
Step 3 Click Save.
Assigning a
Component to a Host
Step 1 Click the System View tab.
Step 2 From the Managed Host list, select the managed host to which you wish to assign
Step 3 Select the component you wish to assign to a managed host.
Step 4 From the menu, select Actions > Assign.
You can assign the STRM components added in the Flow or Event Views to the
managed hosts in your deployment. This section provides information on assigning
a component to a host using the System View, however, you can also assign
components to a host in the Flow or Event Views.
To assign a host:
a STRM component.
The System View of the host appears.
Note: You can also use the right mouse button (right-click) to access the Actions
menu items.
The Assign Component wizard appears.
STRM Administration Guide
Page 100
92USINGTHE DEPLOYMENT EDITOR
Step 5 From the Select a host drop-down list box, select the host that you wish to assign
to this component. Click Next.
Note: The drop-down list box only displays managed hosts that are running a
compatible version of STRM software.
Step 6 Click Finish.
Configuring Host
Context
Step 1 In the Deployment Editor, click the System View tab.
Step 2 Select the Managed Host that includes the Host Context you wish to configure.
Step 3 Select the Host Context component.
Step 4 From the menu, select Actions > Configure.
The Host Context component monitors all STRM components to make sure that
each component is operating as expected.
To configure Host Context:
The System View appears.
Note: You can also use the right mouse button (right-click) to access the Actions
menu item.
The Host Context Configuration window appears.
STRM Administration Guide
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.