Login:
Votes - 4, Average rating: 4 ( )

User manual 3Com, model Threat Analysis Reporter TAR

Manafacture: 3Com
File size: 3.18 mb
File name: 685c6c7c-8352-4850-8fa4-2b2b822dfeab.pdf
Language of manual:en
Free link for this manual available at the bottom of the page



manual abstract


In our example, this entry would be: C. Click Go to open the Threat Analysis Reporter interface and the EULA Agreement dialog box: D. After reading the End User License Agreement, you have the option to do either of the following: Click No to close both the EULA Agreement dialog box and the Threat Analysis Reporter interface. You will not be able to enable the Threat Analysis Reporter for use in your environment. Click Yes to close the EULA Agreement dialog box and to open the Login dialog box: Proceed to the next sub-section: Log in to the Threat Analysis Reporter Wizard. Log in to the Threat Analysis Reporter Wizard A. In the Username field of the Login dialog box, type in the username specified in the Configure Wizard user screen of the Quick Start Setup Procedures. In our example, this entry would be: taruser. B. In the Password field, type in the password specified in the Configure Wizard user screen of the Quick Start Setup Procedures. C. Click LOGIN to close the login dialog box and to go to Step 1 of wizard setup procedures in the Threat Analysis Reporter Wizard (see Wizard Step 1: Register administrator). Wizard Step 1: Register administrator Step 1 is performed in the left side of the first screen of the wizard: A. Enter the username the global administrator will use when logging into the Threat Analysis Reporter Administrator console. The global administrator has the highest level of permissions in the Threat Analysis Reporter interface. B. Enter the password to be used with that username, and enter the same password again in the confirm password field. C. Enter the email address of the global administrator, who will be notified via email regarding system alerts. D. Click the [+] Add tab below to open the IP Range Information dialog box: E. Enter the Bandwidth IP address range for the bandwidth the Threat Analysis Reporter will monitor. F. Enter the Bandwidth Netmask for the bandwidth IP range to be monitored, using the dotted decimals notation format. G. Click OK to close the dialog box and to display your entries in the list box: NOTE: Additional Bandwidth IP address ranges can be included by clicking the [+] Add tab again and making the entries described in steps E through G above. To modify an IP address range, double-click the entry in the list box to highlight it and to display the [-] Remove tab to the left of the [+] Add tab: To modify the entries made for the IP address range, click the [+] Add tab to re- open the IP Range Information dialog box and edit information, as necessary. Click OK to close the dialog box and to display the modified information in the list box. To remove the entry for the IP address range from the list box, click the [-] Remove tab. Click the [+] Add tab to open the IP Range Information dialog box and make new entries for the IP address range. Wizard Step 2: Register R3000 & ER Step 2 is performed in the right side of the first screen of the wizard. R3000: Specify information for the R3000 to be used with the Threat Analysis Reporter: A. Click the [+] Add tab above the R3000 list box to open the R3000 Information dialog box: B. Enter the IP address of the R3000 server to be used with the Threat Analysis Reporter. In our example, this is: 200.100.160.74, which is the LAN 2 IP address of the R3000 server. C. Enter the Server Name of the R3000 to be used with the Threat Analysis Reporter, which is any name you wish to associate with that R3000. In our example, this is: R3000LOGO. D. Respond to the question “Is this your Source R3000?” by clicking the “Yes” checkbox, if this R3000 will be designated the primary R3000 to be associated with the Threat Analysis Reporter. Otherwise, leave the checkbox blank. E. Click OK to close the dialog box and to display your entries in the list box: NOTE: Additional R3000 servers can be included by clicking the [+] Add tab again and making the entries described in steps A through E above. To modify an R3000 entry, double-click the R3000 entry in the list box to highlight it and to display the Set as Source tab and the [-] Remove tab to the left of the [+] Add tab: To modify the IP address and Server Name for the R3000 server, click the [+] Add tab to re-open the R3000 Information dialog box, and edit information as necessary. Click OK to close the dialog box and to display the modified information in the list box. To designate an R3000 as the Source R3000 server, click the entry for the R3000 server in the list box to highlight it, and then click the Set as Source tab to display “Source” in the Source column for that entry in the list box. To remove the entry for the R3000 server from the list box, click the [-] Remove tab. ER: Respond to the question “Do you have an Enterprise Reporter?” by clicking the radio button corresponding to either “Yes” or “No”. If “No” was selected, click SAVE > at the bottom right of the screen to go to Step 3. If “Yes” was selected, the IP address and Server...

Other models in this manual:
Network Equipment - Threat Analysis Reporter TAR (3.18 mb)
Network Equipment - Threat Analysis Reporter TAR (3.18 mb)
Network Equipment - Threat Analysis Reporter TAR (3.18 mb)

Reviews



Your review
Your name:
Please, enter two numbers from picture:
capcha





Category