Juniper Networks IDP75 ユーザーズマニュアル

ページ / 68
IDP 75, 250, 800, and 8200 Installation Guide
26
 
„  Connecting to the Sensor
QuickStart Simple Configuration
Table 12 provides the information you need for a simple configuration.
ACM Advanced Configuration
The ACM controls advanced configuration options, such as RADIUS, DNS, and SSH 
configurations.
The sections listed in Table 13 correspond to sections in the ACM wizard. To start 
the wizard, open ACM, then select ACM from the initial page.
For detailed information about ACM, see the ACM online help.
Table 12:  Information Needed for QuickStart Configuration  
Field
Configuration Information
Device 
Deployment 
mode
QuickStart offers the two most popular deployment modes. If you want to 
use one of the other deployment modes, use the ACM instead.
„
Sniffer—You want the sensor to report on security events, but not take 
action to prevent them.
„
Inline transparent—You want traffic to flow through the sensor. In this 
mode, the sensor can block or drop traffic that violates security 
parameters.
Management 
Interface IP 
Address
The IP address of the sensor management interface.
Management 
Interface 
Netmask
The netmask for the management interface IP address.
Default Route
Your network’s default route.
Timezone/ Date/ 
Time
The time zone, date, and time where the sensor resides.
Other settings
All other settings are the same as for “Simple Configuration” on page 21.
Table 13:  Information Needed for ACM Configuration  
Section
Configuration Information
Setup
„
IDP sensor root and admin passwords (default is abc123).
„
The new passwords you want to assign to the root and admin accounts.
„
The fully qualified domain name that you want to assign to the sensor. 
(Example: Sensor1.example.com)
Mode
„
Deployment mode you have chosen: sniffer, router, bridge, transparent, or 
proxy-ARP. If the mode you wish to use is already selected, select it again to 
progress to the next screen. (The following modes are not available on the 
IDP 8200 sensor: router, bridge, and proxy.)
For transparent mode, specify whether to enable Layer 2 bypass. 
„
Your need for HA. See “Planning an Installation” on page 1. Mor
information on HA modes can be found in the NetScreen-Security Manager 
Administrator’s Guide
.