Войти:
Оценок - 1, средний балл: 3 ( )

Инструкция по эксплуатации ADC, модель Threat Analysis Reporter TAR

Производитель: ADC
Размер: 3.18 mb
Название файла: 685c6c7c-8352-4850-8fa4-2b2b822dfeab.pdf
Язык инструкции:en
Перейти к скачиванию



Фрагмент инструкции


After making your selection, press the “X” key to return to the previous screen. Backlight When the Backlight option is selected, the Backlight screen displays. A. Press the checkmark or right arrow key three times to view each of the three available options: backlight feature enabled (checkbox populated with “x” and backlight turns on) backlight feature disabled (checkbox empty and backlight turns off) display the backlight now (checkbox populated with checkmark, and backlight turns on) B. After making your selection, press the “X” key to return to the previous screen. LCD Controls When the LCD Controls option is selected, the LCD Controls screen displays with the following menu items: Contrast, On Brightness, Off Brightness. A. Choose one of the menu selections and press the checkmark key to go to that screen: Contrast - In the Contrast screen, use the left / right arrow keys to decrease / increase the text and screen contrast. On Brightness - In the On Brightness screen, use the left / right arrow keys to decrease / increase the brightness of a screen with a feature that is enabled. Off Brightness - In the Off Brightness screen, use the left / right arrow keys to decrease / increase the brightness of a screen with a feature that is disabled. B. After making your selection, press the “X” key to return to the previous screen. Bandwidth Management If you choose to install the Ethernet Tap for bandwidth monitoring, you will need to connect it to the Threat Analysis Reporter at this point. Refer to Appendix A at the end of this document for instructions on how to connect the Ethernet Tap unit. Step 2: Wizard Setup Procedures For this step, you will need your network administrator to provide you the following information: IP range and netmask of machines on the network the Threat Analysis Reporter server will be monitoring R3000 IP address, and port number to be used between the R3000 and Threat Analysis Reporter 8e6 Enterprise Reporter server IP address and server name, if an ER unit is connected to the R3000 Access the Threat Analysis Reporter Administrator Console A. Launch Internet Explorer. B. In the address field, type in (in which “x.x.x.x” represents the eth0 (LAN1) IP address entered in the Connect Network Interface screen of the Quick Start Setup Procedures). In our example, this entry would be: C. Click Go to open the Threat Analysis Reporter interface and the EULA Agreement dialog box: D. After reading the End User License Agreement, you have the option to do either of the following: Click No to close both the EULA Agreement dialog box and the Threat Analysis Reporter interface. You will not be able to enable the Threat Analysis Reporter for use in your environment. Click Yes to close the EULA Agreement dialog box and to open the Login dialog box: Proceed to the next sub-section: Log in to the Threat Analysis Reporter Wizard. Log in to the Threat Analysis Reporter Wizard A. In the Username field of the Login dialog box, type in the username specified in the Configure Wizard user screen of the Quick Start Setup Procedures. In our example, this entry would be: taruser. B. In the Password field, type in the password specified in the Configure Wizard user screen of the Quick Start Setup Procedures. C. Click LOGIN to close the login dialog box and to go to Step 1 of wizard setup procedures in the Threat Analysis Reporter Wizard (see Wizard Step 1: Register administrator). Wizard Step 1: Register administrator Step 1 is performed in the left side of the first screen of the wizard: A. Enter the username the global administrator will use when logging into the Threat Analysis Reporter Administrator console. The global administrator has the highest level of permissions in the Threat Analysis Reporter interface. B. Enter the password to be used with that username, and enter the same password again in the confirm password field. C. Enter the email address of the global administrator, who will be notified via email regarding system alerts. D. Click the [+] Add tab below to open the IP Range Information dialog box: E. Enter the Bandwidth IP address range for the bandwidth the Threat Analysis Reporter will monitor. F. Enter the Bandwidth Netmask for the bandwidth IP range to be monitored, using the dotted decimals notation format. G. Click OK to close the dialog box and to display your entries in the list box: NOTE: Additional Bandwidth IP address ranges can be included by clicking the [+] Add tab again and making the entries described in steps E through G above. To modify an IP address range, double-click the entry in the list box to highlight it and to display the [-] Remove tab to the left of the [+] Add tab: To modify the entries made for the IP address range, click the [+] Add tab to re- open the IP Range Information dialog box and edit information, as necessary. Click OK to close the dialog box and to display the modified i...

Эта инструкция также подходит к моделям:
Сетевое оборудование - Threat Analysis Reporter TAR (3.18 mb)
Сетевое оборудование - Threat Analysis Reporter TAR (3.18 mb)
Сетевое оборудование - Threat Analysis Reporter TAR (3.18 mb)

Напишите ваш отзыв об устройстве



Текст отзыва
Ваше имя:
Введите две цифры:
capcha





Категории