Login:
Votes - 2, Average rating: 4 ( )

User manual 8e6 Technologies, model Threat Analysis Reporter TAR 1.0

Manafacture: 8e6 Technologies
File size: 4.06 mb
File name: 0c416195-4785-48d5-9c5c-1a913eec7827.pdf
Language of manual:en
Free link for this manual available at the bottom of the page



manual abstract


This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine readable form without prior written consent from 8e6 Technologies. Every effort has been made to ensure the accuracy of this document. However, 8e6 Technologies makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. 8e6 Technologies shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice. Trademarks Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are the sole property of their respective manufacturers. Part# TAR-QSG-070618 8e6 Threat Analysis Reporter Quick Start Guide iii Contents Threat Analysis Reporter Introduction.....................................................1 About this Document.....................................................................................................................2 Conventions Used in this Document............................................................................................2 Service Information...................................................................................3 Preliminary Setup Procedures..................................................................4 Unpack the Unit from the Carton..................................................................................................4 Rack Mount the “S” or “MSA” Server..........................................................................................5 Install the “H” Server Bezel...........................................................................................................8 Rack Mount the “H” Server.........................................................................................................11 Install the Server...................................................................................14 Step 1: Initial Setup Procedures.................................................................................................14 Step 2: Physically Connect the Unit to the Network.................................................................29 Step 3: Wizard Setup Procedures...............................................................................................30 Conclusion..............................................................................................42 Specifications..........................................................................................43 Physical Specifications................................................................................................................43 Internal Product Specifications...................................................................................................43 Hardware Component Specifications.........................................................................................44 “S” and “MSA” Front Panel LED Indicators, Buttons...............................................................45 Appendix: Optional Ethernet Tap Installation.........................................46 Preliminary Setup Procedures....................................................................................................46 Install the Ethernet Tap Unit........................................................................................................47 iv 8e6 Threat Analysis Reporter Quick Start Guide Threat Analysis Reporter Introduction Thank you for choosing to evaluate the 8e6 Technologies Threat Analysis Reporter. This product addresses user-generated Web threats such as excessive use of bandwidth and inappropriate Internet usage, and provides network administrators tools to monitor such threats so management can enforce corporate Internet usage policies. Working in conjunction with 8e6’s R3000 Enterprise Filter, the Threat Analysis Reporter translates end user Internet activity from the R3000’s logs into dynamic graphical snapshots of network Internet traffic. Using remediation tools in the console, administrators and management can then manage and control user-generated Web threats in real time. About this Document This document is divided into the following sections: Introduction - This section is comprised of an overview of the Threat Analysis Reporter product and how to use this document Service Information - This section provides 8e6 Technologies contact information Preliminary Setup Procedures - This section includes instructions on how to physically set up the Threat Analysis Reporter unit in your network environment Install the Server - This section explains how to configure the Threat Analysis Reporter Conclusion - This section indicates that the quick start steps have been complet...

Other models in this manual:
Network Equipment - Threat Analysis Reporter TAR 1.0 (4.06 mb)
Network Equipment - Threat Analysis Reporter TAR 1.0 (4.06 mb)
Network Equipment - Threat Analysis Reporter TAR 1.0 (4.06 mb)

Reviews



Your review
Your name:
Please, enter two numbers from picture:
capcha





Category