background image

530-025628-01

4

STRM Log Management Release Notes

Contacting 
Customer Support

To help you resolve any issues that you may encounter when installing or 
maintaining STRM Log Management, you can contact Customer Support as 
follows:

Open a support case using the Case Management link at 
http://www.juniper.net/support

Call 1-888-314-JTAC (from the United States, Canada, or Mexico) 
or1-408-745-9500 (from elsewhere)

Supported Devices 
and OS Versions

STRM Log Management 2008.2 supports platforms from multiple vendors. 

Table 1-1

 lists Juniper Networks device families and operating systems that 

support NSM. The table shows whether a device requires STRM to forward logs 
through NSM.

Note: For STRM to correctly process logs from SA and IC, the logs should be sent 
from the devices in WELF format. To enable WELF format on the device: Under 
System > Logs > Events > Settings, select the WELF filter for the syslog (STRM) 
server entry in this table.

Supported Java 
and Browser 
Software

STRM Log Management supports the following versions of Java and browsers:

Java version 1.5 and later

Internet Explorer version 7

Firefox version 2.0

Table 1-1   

Supported Juniper Networks Devices and OS Versions

Device Family

OS

Logs Sent Directly to 
STRM from Device

Logs Sent 
Through NSM to 
STRM

ISG with IDP

6.0, 6.1.0r1b

No

Yes

Firewall/VPN

6.0, 6.1.0r1

Yes

Yes

Standalone IDP

4.1

Yes

Yes

J-series

8.5, 9.0, 9.1

Yes

No

Secure Access (SA)  6.1

Yes

No

Infranet Controller 
(IC)

2.1

Yes

No

Summary of Contents for SECURITY THREAT RESPONSE MANAGER 2008.2 - CATEGORY OFFENSE INVESTIGATION GUIDE REV 1

Page 1: ...ager Log Management Only STRM LM provides a comprehensive log management solution for organizations that want to implement a distributed log management solution to collect archive and analyze network...

Page 2: ...ch system in your deployment New Device Extensions Functionality You can now modify how a DSM parses logs For example you can use a device extension to detect an event that has missing or incorrect fi...

Page 3: ...re information on Release 2008 2 refer to the on line documentation STRM Log Management Installation Guide STRM Log Management Administration Guide STRM Log Management Users Guide STRM Log Management...

Page 4: ...a device requires STRM to forward logs through NSM Note For STRM to correctly process logs from SA and IC the logs should be sent from the devices in WELF format To enable WELF format on the device Un...

Page 5: ...if your license key expired and you uploaded a new license key STRM Log Management did not provide the option to deploy the new license key Changing the Authentication to STRM Log Management Authentic...

Page 6: ...nagement 2008 2 the limit of CIDR ranges you can add is approximately 200 depending on the data on your system Now Able to Apply Any IP Filter When Searching for Events Previously when you attempted t...

Page 7: ...nt 2008 2 this directory structure is properly created Events Appear in Event Viewer and Flows in Flow Viewer After June 30 2008 The Event Correlation Engine license expires on 30 June 2008 This licen...

Page 8: ...e configuration file and restart services Step 1 Open the configuration file on the machine that uses the custom SSL key normally the Web Server console Step 1 Add the directory path to your custom SS...

Page 9: ...oller IC device may appear incorrectly as an Enterasys device Workaround Add the Infranet Controller device manually Infranet Controller Device Appears as Secure Access Device An auto discovered Infra...

Page 10: ...nfiguration change the event query service process restarts and may be temporarily unable to process event searches Workaround Wait between 2 and 3 minutes for the Event Viewer to finish restarting Th...

Page 11: ...per Networks Inc in the United States and other countries JUNOS and JUNOSe are trademarks of Juniper Networks Inc All other trademarks service marks registered trademarks or registered service marks a...

Reviews: