Benutzeranleitung / Produktwartung Threat Analysis Reporter TAR 1.0 des Produzenten 8e6 Technologies
Zur Seite of 54
8e6 R QUICK ST ART GUIDE 8e6 R Model: T AR 1.0 T AR "S" (5K02-62) , TAR "H" (5K02-66) , TAR "MSA" (5K02-67) Release 1. 1 .
ii 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide © 2007 8e6 T echnologies. All rights reserved.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide iii C ontents t hrea t a nal ysis r eporter i ntroduCtion .................................................... 1 About this Document ............................................................
iv 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 1 t hrea t a nal ysis r eporter i ntroduCtion Thank you for choosing to evaluate the 8e6 T echnologies Threat Analysis Reporter .
2 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide About this Document This document is divided into the following sections: Introduction - This section is comprised of an overview of the Thr.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 3 s er viCe i nforma tion The user should not attempt any maintenance or service on the unit beyond the proce- dures outlined in this document.
4 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide p reliminar y s etup p roCedures Unpack the Unit from the Carton Inspect the packaging container for evidence of mishandling during transit. If the packag- ing container is damaged, photograph it for reference.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 5 Rack Mount the “S” or “MSA” Server Rack Mount Instructions Rack Setup Suggestions Determine the placement of each component in the rack before you install the rails. Install the heaviest server components on the bottom of the rack rst, and then work up.
6 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide Install the Rack Rails Determine where you want to place the server unit in the rack. Position the xed rack rail/sliding rail guide assemblies at the desired location in the rack, keeping the sliding rail guide facing the inside of the rack.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 7 Installing the Server into a T elco Rack If you are installing the 8e6 server unit into a T elco type rack, follow the directions given on the previous pages for rack installation.
8 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide Install the “H” Server Bezel Before rack mounting the “H” unit, the bezel should be installed on the front end of the chassis. This portion of the installation process requires you to unpack the unit and be- zel.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 9 A. Remove the plastic wrapping from the left and right ears. B. On one side of the chassis (left or right), un- screw the inner rail from the chassis.
10 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide F . Return the loosened inner rail to its upright po- sition and insert the bezel pin into the bottom hole of the ear . G. Slide the inner rail forward beneath the clips to lock it in place.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 1 1 Rack Mount the “H” Server Rack Mount Instructions Identify the Sections of the Rack Rails Y ou should have received two rack rail assemblies with the 8e6 server unit.
12 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide Install the Server into the Rack Y ou should now have rails attached to both the chassis and the rack unit. The next step is to install the server chassis into the rack. Do this by lining up the rear of the chassis rails with the front of the rack rails.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 13 Installing the Server into a T elco Rack If you are installing the 8e6 server unit into a T elco type rack, follow the directions given on the previous page for rack installation.
14 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide i nst all the s erver Step 1: Initial Setup Procedures This step requires you to link the workstation to the Threat Analysis Reporter .
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 15 Link the W orkstation to the Threat Analysis Reporter Monitor and Keyboard Setup A. Connect the PC monitor and keyboard cables to the rear of the chassis.
16 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide HyperT erminal Setup Procedures If using a serial console, follow these procedures to create a HyperT erminal session. A. Launch HyperT erminal by going to Start > Programs > Accessories > Communica- tions > HyperT erminal: B.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 17 C. At the Connect using eld, select the COM port assigned to the serial port on the laptop (probably “COM1”), and then click OK to open the Properties dialog box, dis- playing the Port Settings tab: D.
18 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide F . In the HyperT erminal session window , go to File > Properties to open the Properties dialog box, displaying the Connect T o and Settings tabs: G. Click the Settings tab, and at the Emulation menu select “VT100”.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 19 Step-by-Step Initial Setup Procedures For these step-by-step procedures, you will need your network administrator to provide you the LAN 1 .
20 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide E. At the Press the number of your selection prompt, press 2 to display the Adminis- trator Password Entry screen: F . At the Enter the administrator password prompt, re-enter your password: #s3tup#r3k G.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 21 Congure Network Interface screen A. At the Enter interface LAN1 (eth0) IP address eld, enter the IP address for the LAN 1 (Ethernet 0) interface, and then press Enter to go to the next screen.
22 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide C. Press Y for “Y es” to conrm and save your entries for the LAN1 (eth0) interface, and to go to the next screen. D. At the Enter interface LAN2 (eth1) IP address eld, enter the IP address for the LAN 2 (Ethernet 1) interface, and then press Enter to go to the next screen.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 23 Congure default gateway screen A. At the Enter default gateway IP eld, enter the IP address for the default gateway .
24 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide A. At the Enter rst DNS server IP eld, enter the IP address for the primary Domain Name Server .
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 25 A. At the Enter host name eld, enter the host name of the server . Press Enter to dis- play the conrmation prompt. B. Press Y for “Y es” to conrm and save your entry for the host name, and to go to the T ime zone regional conguration screen.
26 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide B. Use the up and down arrows in your keyboard to select your region. After selecting your locality , press Y for “Y es” to conrm and save your regional selection, and to go to the Congure Wizard user screen.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 27 C. At the Enter wizard password eld, enter the password that will be used to access the setup wizard in the Threat Analysis Reporter interface. Press Y for “Y es” to con- rm and save your entry and to go to the Setup Wizard Conrmation screen.
28 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide System Status Screen The System Status screen contains the following information: LAN1 (eth0) interface for web access and R3000 communicat.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 29 Step 2: Physically Connect the Unit to the Network After performing initial setup procedures for the Threat Analysis Reporter , the unit should be physically connected to the network. This step requires a standard CA T -5E cable to connect the unit to the network.
30 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide Step 3: Wizard Setup Procedures For this step, you will need your network administrator to provide you the following infor- mation: IP rang.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 31 D. After reading the End User License Agreement, you have the option to do either of the following: Click No to close both the EULA Agreement dialog box and the Threat Analysis Reporter interface.
32 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide Step 1: Register administrator Step 1 is performed in the left side of the rst screen of the wizard: A. Enter the username the global administrator will use when logging into the Threat Analysis Reporter Administrator console.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 33 D. Click the [+] Add tab beow to open the IP Range Information dialog box: E. Enter the IP address range for the bandwidth the Threat Analysis Reporter will moni- tor . F . Enter the Netmask for the IP range to be monitored, using the dotted decimals nota- tion format.
34 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide NOTE: Additional IP address ranges can be included by clicking the [+] Add tab again and making the entries described in steps E through G above.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 35 Step 2: Register R3000 & ER Step 2 is performed in the right side of the rst screen of the wizard. R3000: Specify information for the R3000 to be used with the Threat Analysis Reporter: A.
36 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide E. Click OK to close the dialog box and to display your entries in the list box: NOTE: Additional R3000 servers can be included by clicking the [+] Add tab again and making the entries described in steps A through E above.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 37 T o modify the IP address and Server Name for the R3000 server , click the [+] Add tab to re-open the R3000 Information dialog box, and edit information as necessary . Click OK to close the dialog box and to display the modied informa - tion in the list box.
38 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide NOTE: T o change your answer from “Y es” to “No,” click the < Back button to re-display the question “Do you have an Enterprise Reporter?” A. Enter the IP address of the ER server to be used with the Threat Analysis Re- porter .
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 39 Step 3: Register Gauges Step 3 requires you to specify settings for default gauges to be monitored by the Threat Analysis Reporter . These gauges will display in the Threat Analysis Reporter interface upon logging into the Administrator console.
iv 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide View , Edit Gauge Components T o view gauge components for a specied gauge, highlight and double-click the gauge name to populate the the elds to the right of the Gauge Groups list box.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 41 Step 4: Server Settings In Step 4, the following R3000 server information displays: Active Directory Settings, SMTP Server Settings, Patch .
iv 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide C onClusion Congratulations; you have completed the Threat Analysis Reporter quick start proce- dures. Now that the Threat Analysis Reporter is running on your network, the next step is to set up user groups or administrator groups.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 43 s peCifiCa tions Physical Specications Specication “S” V alue “H” V alue “MSA” V alue Height 1.7” (43mm) 1.7” (43mm) 1.7” (43mm) Width 16.8” (426mm) 17.2” (438mm) 16.
iv 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide Hardware Component Specications Specication “S” V alue “H” V alue “MSA” V alue Operating temperature range 10° C ~ 35° .
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 45 “S” and “MSA” Front Panel LED Indicators, Buttons Diagrams and Descriptions On “S” and “MSA” units, LED indicators and butt.
46 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 46 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide T ap i nsT alla Tion a ppendix : o ptional e thernet t ap i nst alla tion This appendix pertains to the optional installation of the Ethernet T ap unit for bandwidth monitoring.
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 47 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 47 T ap i nsT alla Tion Install the Ethernet T ap Unit Diagram showing T AR Ethernet T ap installation on the network This step is a continuation from Step 2: Physically Connect the Unit to the Network.
48 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 48 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide T ap i nsT alla Tion C. Using a crossover cable, connect one end to the Switch’ s port congured to be the destination port of the Port Mirror .
8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 49 8 e 6 T hrea T a nal ysis r eporTer Q uick s T arT G uide 49 T ap i nsT alla Tion.
8e6 Corporate Headquarters (USA): 828 West T aft Avenue Orange, CA 92865-4232 • T el: 714.282.61 1 1 or 888.786.7999 Fax: 714.282.61 16 (Sales/T echnical Support) • 714.282.61 17 (General Ofce) Satellite Ofce: 8e6 T aiwan: RM B2, 13F , No. 49, Sec.
Ein wichtiger Punkt beim Kauf des Geräts 8e6 Technologies Threat Analysis Reporter TAR 1.0 (oder sogar vor seinem Kauf) ist das durchlesen seiner Bedienungsanleitung. Dies sollten wir wegen ein paar einfacher Gründe machen:
Wenn Sie 8e6 Technologies Threat Analysis Reporter TAR 1.0 noch nicht gekauft haben, ist jetzt ein guter Moment, um sich mit den grundliegenden Daten des Produkts bekannt zu machen. Schauen Sie zuerst die ersten Seiten der Anleitung durch, die Sie oben finden. Dort finden Sie die wichtigsten technischen Daten für 8e6 Technologies Threat Analysis Reporter TAR 1.0 - auf diese Weise prüfen Sie, ob das Gerät Ihren Wünschen entspricht. Wenn Sie tiefer in die Benutzeranleitung von 8e6 Technologies Threat Analysis Reporter TAR 1.0 reinschauen, lernen Sie alle zugänglichen Produktfunktionen kennen, sowie erhalten Informationen über die Nutzung. Die Informationen, die Sie über 8e6 Technologies Threat Analysis Reporter TAR 1.0 erhalten, werden Ihnen bestimmt bei der Kaufentscheidung helfen.
Wenn Sie aber schon 8e6 Technologies Threat Analysis Reporter TAR 1.0 besitzen, und noch keine Gelegenheit dazu hatten, die Bedienungsanleitung zu lesen, sollten Sie es aufgrund der oben beschriebenen Gründe machen. Sie erfahren dann, ob Sie die zugänglichen Funktionen richtig genutzt haben, aber auch, ob Sie keine Fehler begangen haben, die den Nutzungszeitraum von 8e6 Technologies Threat Analysis Reporter TAR 1.0 verkürzen könnten.
Jedoch ist die eine der wichtigsten Rollen, die eine Bedienungsanleitung für den Nutzer spielt, die Hilfe bei der Lösung von Problemen mit 8e6 Technologies Threat Analysis Reporter TAR 1.0. Sie finden dort fast immer Troubleshooting, also die am häufigsten auftauchenden Störungen und Mängel bei 8e6 Technologies Threat Analysis Reporter TAR 1.0 gemeinsam mit Hinweisen bezüglich der Arten ihrer Lösung. Sogar wenn es Ihnen nicht gelingen sollte das Problem alleine zu bewältigen, die Anleitung zeigt Ihnen die weitere Vorgehensweise – den Kontakt zur Kundenberatung oder dem naheliegenden Service.