Juniper Networks IDP250 Network Card User Manual


 
IDP 75, 250, 800, and 8200 Installation Guide
26 Connecting to the Sensor
QuickStart Simple Configuration
Table 12 provides the information you need for a simple configuration.
ACM Advanced Configuration
The ACM controls advanced configuration options, such as RADIUS, DNS, and SSH
configurations.
The sections listed in Table 13 correspond to sections in the ACM wizard. To start
the wizard, open ACM, then select ACM from the initial page.
For detailed information about ACM, see the ACM online help.
Table 12: Information Needed for QuickStart Configuration
Field Configuration Information
Device
Deployment
mode
QuickStart offers the two most popular deployment modes. If you want to
use one of the other deployment modes, use the ACM instead.
Sniffer—You want the sensor to report on security events, but not take
action to prevent them.
Inline transparent—You want traffic to flow through the sensor. In this
mode, the sensor can block or drop traffic that violates security
parameters.
Management
Interface IP
Address
The IP address of the sensor management interface.
Management
Interface
Netmask
The netmask for the management interface IP address.
Default Route Your network’s default route.
Timezone/ Date/
Time
The time zone, date, and time where the sensor resides.
Other settings All other settings are the same as for “Simple Configuration” on page 21.
Table 13: Information Needed for ACM Configuration
Section Configuration Information
Setup IDP sensor root and admin passwords (default is abc123).
The new passwords you want to assign to the root and admin accounts.
The fully qualified domain name that you want to assign to the sensor.
(Example: Sensor1.example.com)
Mode
Deployment mode you have chosen: sniffer, router, bridge, transparent, or
proxy-ARP. If the mode you wish to use is already selected, select it again to
progress to the next screen. (The following modes are not available on the
IDP 8200 sensor: router, bridge, and proxy.)
For transparent mode, specify whether to enable Layer 2 bypass.
Your need for HA. See “Planning an Installation” on page 1. More
information on HA modes can be found in the NetScreen-Security Manager
Administrator’s Guide.