Introduction Outline Preparation Set BIOS Passwords First Boot Procedures... 2

Size: px
Start display at page:

Download "Introduction Outline Preparation Set BIOS Passwords First Boot Procedures... 2"

Transcription

1 CTP Series Security Deployment Guide Release 7.2R1 5 Feb 2016 TABLE OF CONTENTS Introduction... 2 Outline... 2 Preparation... 2 Set BIOS Passwords... 2 First Boot Procedures... 2 Configuration Actions While in Low Security Level Mode... 2 Periodic security actions... 3 Appendix B: Adding antivirus capability... 3 Appendix C: Installing Swatch... 4 Security Related Enhancements in CTPOS 7.1R Security Related Enhancements in CTPOS 7.2R UC APL Required Information... 9 Conditions Of Fielding... 9 Mitigation Strategies... 9 Juniper Networks, Inc. 1

2 Introduction This document outlines the procedure for configuring CTPOS 7.2R1 so that the system meets the JITC security specifications. The procedures outlined here assume that the system starts with a clean flash. Outline The procedures for configuring the CTP are as follows: Preparation Set BIOS password First boot procedure Configuration actions performed in low security mode Set the security level to high Configuration actions performed in high security mode Periodic actions during normal operation Preparation Gather the following information that will be needed for configuration: BIOS password Grub password Root password Network settings System administrator account name CTP administrator account name Auditor account name Set BIOS Passwords CTP2000 and CTP150 Series Systems 1. Connect a keyboard and monitor to the CTP150/CTP Reboot the CTP 3. Hit F2 on the CTP150/CTP2000 to access the BIOS 4. Hit Delete key on the CTP150/CTP2000 to access the BIOS 5. Go to the Security section 6. Set the Supervisor password 7. Set the User password 8. Save and Exit the BIOS First Boot Procedures When prompted, enter a password for root that meets JITC requirements (14 character with a minimum of 1 each upper case, lower case, numeral, and special character). Configure the network parameters. Configuration Actions While in Low Security Level Mode Log in as user ctp and, through menu >node operations > configure network settings. Then configure: Any additional IPv4 configurations. o A minimum of two Ethernet s are required, one for data traffic and one for management. Any required virtual IP addresses. Juniper Networks, Inc. 2

3 Any required VLAN s. Configure SNMP. Configure IP filtering to allow only the IP address of the CTPView web server(s). Enter the security profile menu [menu > node operations > Configure security profile]. Use root's password when prompted. Perform the following actions: 1. Set the password requirements. 14, 1, 1, 1, 1, 3 2. Add the system administrator, ctp administrator, and auditor accounts. Note, you will be prompted to setup a password for each user. 3. Configure remote logging if required. 4. Add the login banner as required. Example login banner: THIS IS A DEPARTMENT OF DEFENSE COMPUTER SYSTEM. THIS COMPUTER SYSTEM, INCLUDING ALL RELATED EQUIPMENT, NETWORKS, AND NETWORK DEVICES, SPECIFICALLY INCLUDING INTERNET ACCESS, ARE PROVIDED ONLY FOR AUTHORIZED US GOVERNMENT USE. DoD COMPUTER SYSTEMS MAY BE MONITORED FOR ALL LAWFUL PURPOSES, INCLUDING TO ENSURE THEIR USE IS AUTHORIZED, FOR MANAGEMENT OF THE SYSTEM, TO FACILITATE PROTECTION AGAINST UNAUTHORIZED ACCESS, AND TO VERIFY SECURITY PROCEDURES, SURVIVABILITY, AND OPERATIONAL SECURITY. MONITORING INCLUDES ACTIVE ATTACKS BY AUTHORIZED DoD ENTITIES TO TEST OR VERIFY THE SECURITY OF THIS SYSTEM. DURING MONITORING, INFORMATION MAY BE EXAMINED, RECORDED, COPIED, AND USED FOR AUTHORIZED PURPOSES. ALL INFORMATION, INCLUDING PERSONAL INFORMATION, PLACED ON OR SENT OVER THIS SYSTEM, MAY BE MONITORED. 5. Configure the management port to prohibit traffic forwarding between the management interface and all other interfaces. 6. Set the encrypted Grub password. As the user ctp, access the command line by typing ^C, then su to root. As user root: Add & configure the intrusion detection software (see appendix C). Add the antivirus software (see appendix B). Check /etc/sysconfig/iptables and make sure it s permissions are 644 if not then: o Changes the permissions: chmod 644 /etc/sysconfig/iptables o Verify it is changed o Backup the changes in Flash: Use backup command on CTP Box. As the system administrator, enter the security profile menu [menu > node operations > Configure security level] and perform the following actions: Set the security level to High Periodic security actions A system administrator must change the password for the ctp_cmd account at least once per year. Appendix B: Adding antivirus capability You can download the Vexira software at the following link: The procedure of installing the software on CTP is as following: Juniper Networks, Inc. 3

4 Prepare the CTP by making the /flash_local directory writable sudo mount LABEL=CTP_LOCAL -o remount -w sudo chmod 0777 /flash_local SCP package to the CTP scp vascan-for-ctp-ctpview-30aug2011.tgz Unpack the package into the directory "/" sudo tar -C / -xzvf /flash_local/vascan-for-ctp-ctpview-30aug2011.tgz Delete the package from the /flash_local directory [ctp_sa@n73]# sudo rm /flash_local/vascan-for-ctp-ctpview-30aug2011.tgz Restore the /flash_local directory to read-only again [ctp_sa@n73]# sudo chmod 0755 /flash_local [ctp_sa@n73]# sudo mount LABEL=CTP_LOCAL -o remount r Copying the package to flash [ctp_sa@n73]# backup Move to working directory [ctp_sa@n73]# cd /vascan linux-i386/ Execute scan [ctp_sa@n73]# sudo./vascan --quiet --thread=8 / Sample output vascan loader ( ) core ( ) vdb ( ) #sig: target was processed in 0:00:49 (hour:min:secs). Summary of completed scans files (total) 4926 in archives 213 mail parts 4 No virus has been found in the specified targets. Appendix C: Installing Swatch Obtain a copy of the Swatch software from Install Swatch on a LINUX Fedora Core 1 machine. To install, simply issue the following commands: perl Makefile.PL make make test make install make realclean Swatch installs just like a CPAN module. If you are not familiar with this process then you may want to read about it by issuing the command: man ExtUtils::MakeMaker Use the "perldoc" command if your "man" cannot find the document. Juniper Networks, Inc. 4

5 If you see messages like these: Warning: prerequisite Date::Calc 0 not found at (eval 1) line 219. Warning: prerequisite Date::Parse 0 not found at (eval 1) line 219. Warning: prerequisite File::Tail 0 not found at (eval 1) line 219. Warning: prerequisite Time::HiRes 1.12 not found at (eval 1) line 219. Then you need to install the CPAN module(s) that it doesn't find before you can use swatch. You can find these modules at search.cpan.org. Verify and/or set the permissions on the files listed below as shown: :46:42 etc/ :46:42 etc/rc.d/ :46:42 etc/rc.d/init.d/ -rwxr--r-- root/root :48:14 etc/rc.d/init.d/swatch :46:42 usr/ :46:42 usr/local/ :46:42 usr/local/etc/ -rw root/root :48:14 usr/local/etc/swatch.conf :46:42 usr/bin/ -rwx root/root :48:38 usr/bin/swatch :46:42 usr/lib/ :46:42 usr/lib/perl5/ :46:42 usr/lib/perl5/site_perl/ :46:42 usr/lib/perl5/site_perl/5.8.1/ :46:42 usr/lib/perl5/site_perl/5.8.1/auto/ :46:42 usr/lib/perl5/site_perl/5.8.1/auto/swatch/ :46:42 usr/lib/perl5/site_perl/5.8.1/auto/swatch/actions/ -r--r--r-- root/root :48:38 usr/lib/perl5/site_perl/5.8.1/auto/swatch/actions/autosplit.ix :46:42 usr/lib/perl5/site_perl/5.8.1/swatch/ -r--r--r-- root/root :53:22 usr/lib/perl5/site_perl/5.8.1/swatch/throttle.pm -r--r--r-- root/root :53:22 usr/lib/perl5/site_perl/5.8.1/swatch/threshold.pm -r--r--r-- root/root :53:22 usr/lib/perl5/site_perl/5.8.1/swatch/actions.pm README NOTE: Swatch is a third party application, and running swatch may adversely affect the operation of CTP functionality, including but not limited to circuits. This README only describes how to install & run Swatch, it does not imply that running Swatch has been fully tested by Juniper to ensure that Swatch does not impact CTP functionality, nor does it imply that the example Swatch configuration file is sufficient to detect an intrusion event. Because Swatch is a third party application, there is no support for configuring Swatch on a CTP. Support for Swatch is limited to this README. INTRODUCTION: The application Swatch is an intrusion detection system that watches log files for signature events. Which log messages trigger an event and what to do for each event are determined by the configuration file. See the Swatch man pages on-line for detailed information on the configuration file format. NOTE: CTPOS has no mail application. The example configuration file uses the command 'cmd L "swatch: $_"' to send the matched log entry to a remote syslog server (remote logging must be configured). Other commands that are useful include "echo" (echos the matched log entry to terminal- useful when debugging swatch.conf), "threshold" (useful for limiting the number of messages sent to syslog server), and "continue" (used to look for a second log entry before triggering an event). NOTE: Sending messages to a syslog server at a high rate may cause CTP circuit traffic interruptions. NOTE: There is no mechanism for Swatch to generate snmptraps. Juniper Networks, Inc. 5

6 The files listed must be included in the tar archive that they will copy to the CTP. The files must have the permissions & ownerships listed. Above are the files that must be included in the archive (archive named swatch tgz). Once installed on the FC1 machine you need to create a tar file from the files installed to install Swatch on the CTP. The archive can be named whatever you want. In this example the archive is swatch tgz: TYPE: tar czpvf swatch tgz <files listed above> PREPARE CTPOS for Swatch (see example below): copy the file swatch tgz to /tmp on the CTP. as root type: tar xzpvf /tmp/swatch tgz -C / backup EDIT CTP FILES: Edit the two CTP files below so they contain the information below. The two files specific to running on the CTP are etc/rc.d/init.d/swatch and usr/local/etc/swatch.conf. [builder@fc1 swatch]$ cat usr/local/etc/swatch.conf # Don't get into loop triggering on messages we generate... ignore /swatch:/ # Watch for users using su: watchfor /su\(pam_unix/ #echo exec /acorn/bin/cmd -L "swatch: $_" # watch for failed logins watchfor /PAM: Authentication failure/ #echo exec /acorn/bin/cmd -L "swatch: $_" # watch for attempted logins with unknown users watchfor /PAM: User not known/ #echo exec /acorn/bin/cmd -L "swatch: $_ [builder@fc1 swatch]$ cat etc/rc.d/init.d/swatch #!/bin/bash # # network Bring up/down swatch # # Source function library.. /etc/init.d/functions if [ $UID -ne 0 ]; then echo $" " echo $"You must be root to run this command" echo $" " exit 1 fi name="swatch" CONFIG_FILE="/usr/local/etc/swatch.conf" # Configuration file PROG="/usr/bin/swatch" # WATCH_FILES="/var/log/secure" # Which log files to watch PID_FILE="/var/run/swatch.pid" Juniper Networks, Inc. 6

7 SCRIPT_FILE="/root/.swatch" [ -f ${CONFIG_FILE} ] exit 0 [ -x ${PROG} ] exit 0 start() { if [ -f ${PID_FILE} ]; then echo "swatch is already running" exit 0 fi ${PROG} -c ${CONFIG_FILE} --daemon --use-cpan-file-tail -t ${WATCH_FILES} --pid-file ${PID_FILE} --dump-script ${SCRIPT_FILE} echo -n $"Starting $name: " /usr/bin/perl -- ${SCRIPT_FILE} & RETVAL=$? echo [ $RETVAL -eq 0 ] && touch /var/lock/subsys/$name return $RETVAL } stop() { echo -n $"Shutting down $name: " killproc ${PROG} RETVAL=$? echo [ -f /var/lock/subsys/$name ] && rm -f /var/lock/subsys/$name return $RETVAL } # See how we were called. case "$1" in start) start ;; stop) stop ;; restart) cd $CWD $0 stop $0 start ;; *) echo $"Usage: $0 {start stop restart}" exit 1 esac exit 0 MAKE INIT SCRIPTS: The last step is to make init script links (as root): cd /etc/rc.d/rc3.d && ln -s../init.d/swatch S98swatch cd /etc/rc.d/rc5.d && ln -s../init.d/swatch S98swatch cd /etc/rc.d/rc0.d && ln -s../init.d/swatch K04swatch cd /etc/rc.d/rc1.d && ln -s../init.d/swatch K04swatch cd /etc/rc.d/rc6.d && ln -s../init.d/swatch K04swatch backup OTHER: To start Swatch from the command line, as root: Juniper Networks, Inc. 7

8 /etc/init.d/swatch start To stop Swatch from the command line, as root: /etc/init.d/swatch stop To stop Swatch from running on startup: m cd /etc/rc.d/rc3.d && rm S98swatch cd /etc/rc.d/rc5.d && rm S98swatch backup Security Related Enhancements in CTPOS 7.1R1 CTPOS 7.1R1 installed on a CTP Box provides the facility to classify the CTP as an appliance in High Security level. CTP behavior is little bit different in CTPOS 7.1R1 compared to 7.0 or earlier releases. Some changes are made for all security levels while others are only for the High Security Level (JITC mode). Based on this, enhancements for CTPOS 7.1R1 are divided into the following two categories Enhancements for High Security Level (JITC mode) Enhancements for all Security Levels Enhancements for High Security Level (JITC mode): CTP is shell-less in High Security level or JITC mode. When CTP is in JITC mode or High level security mode, ctp_cmd user will not have access to CTP box. In JITC mode, System Administrators, System Auditors, CTP Administrator and Qry-only Users will directly enter in menu session upon login and ctp_cmd user will not be able to login to CTP box. ctp_cmd user will receive the error Connection Refused on login. While in Non JITC mode (for security level Low and Very Low) there is no change in behavior, System Administrators, System Auditors and ctp_cmd users will go to shell after login and CTP Administrators and Qry-only users will go to menu directly after login. In JITC mode, during password change new password should be different from the old password such that characters are changed in at least 15 of the positions within the password In JITC mode, system will not respond to ICMP echo request. System will be able to ping other boxes but will not respond to any ping request coming from any CTP box or server. In JITC mode, Admin user (System Admin and CTP Admin) can open at max 5 ssh session simultaneously. In JITC mode, the CTP user account gets permanently locked if the user does not login for 35 days. In JITC mode, user account will get lock after three unsuccessful login attempts. Locked user will automatically get unlocked after 15 minutes. Enhancements for all Security Levels: Upon successful login to CTP box, timestamp for last successful login will be displayed. Upon successful login, CTP box displays the number of unsuccessful login attempts since the last successful login for a user account. Juniper Networks, Inc. 8

9 The SSH daemon is now configured to not use Cipher-Block Chaining (CBC) ciphers. The SSH client is now configured to not use CBC-based ciphers. The SSH daemon is now configured to not allow TCP connection forwarding. NOTE: When burning 7.1R1 flash in CTP box it is recommended to change the password for all default accounts after the flash burn. Security Related Enhancements in CTPOS 7.2R1 CTP behavior is little bit different in CTPOS 7.2R1 compared to 7.1 or earlier releases. Following are the changes that are made for all security levels to meet the JITC requirements: NTP Authentication is supported on CTP devices from 7.2R1 release. Prior to 7.2R1 release, for radius user, there is no way of identifying which user actually logged in to the system as secure logs only dump the template account name and not the actual user. The actual radius user name will also be logged in to the secure logs from 7.2R1 release. Pam_faildelay rule is now added in /etc/pam.d/system-auth file. UC APL Required Information Conditions Of Fielding When the system is deployed into an operational environment, the following security measures (at a minimum) must be implemented to ensure an acceptable level of risk for the site s Designated Accrediting Authority (DAA): a. The system must be incorporated in the site s PKI. If PKI is not incorporated, the following findings will be included in the site s architecture: DSN18.10 for CTPView Application (Juniper CTPView Network Management) NET0445 for CTPView Application (Juniper CTPView Network Management) b. The site must use a SysLog device for auditing purposes. c. IP forwarding is enabled between devices with a restrictive Access Control List (ACL). If the system is not deployed in this manner then the following findings will be included in the site s architecture: GEN for all CTP 150 s and CTP 2000 s d. The site must only use the web interface (CTPView platform) for management. If the solution is managed in any other way then the following findings will be applicable to the solution: DSN and DSN18.10 NET0445 e. The configuration must be in compliance with the Juniper CTP military-unique features deployment guide. f. The site must register the system in the Systems Networks Approval Process Database < as directed by the Defense IA/Security Accreditation Work Group (DSAWG) and Program Management Office. Mitigation Strategies None required. Juniper Networks, Inc. 9

10 Corporate and Sales Headquarters Juniper Networks, Inc North Mathilda Avenue Sunnyvale, CA USA Phone: 888.JUNIPER ( ) or Fax: APAC Headquarters Juniper Networks (Hong Kong) 26/F, Cityplaza One 1111 King s Road Taikoo Shing, Hong Kong Phone: Fax: EMEA Headquarters Juniper Networks Ireland Airside Business Park Swords, County Dublin, Ireland Phone: EMEA Sales: Fax: Juniper Networks, Inc. 10 Copyright 2010 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their

11 respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Mon 2010 Juniper Networks, Inc. 11

Introduction Outline Preparation Set BIOS Passwords First Boot Procedures... 2

Introduction Outline Preparation Set BIOS Passwords First Boot Procedures... 2 CTP Series Security Deployment Guide Release 6.2 20 February 2012 TABLE OF CONTENTS Introduction... 2 Outline... 2 Preparation... 2 Set BIOS Passwords... 2 First Boot Procedures... 2 Configuration Actions

More information

Juniper Networks Certification Program

Juniper Networks Certification Program Juniper Networks Certification Program ecertificate Download and Print Instructions OVERVIEW Your JNCP ecertificates are now available in your user account on the Juniper Networks Learning Portal. Please

More information

QUICKSTART GUIDE FOR BRANCH SRX SERIES SERVICES GATEWAYS

QUICKSTART GUIDE FOR BRANCH SRX SERIES SERVICES GATEWAYS APPLICATION NOTE QUICKSTART GUIDE FOR BRANCH SRX SERIES SERVICES GATEWAYS Configuring Basic Security and Connectivity on Branch SRX Series Services Gateways Copyright 2009, Juniper Networks, Inc. Table

More information

Secure Remote Access with Comprehensive Client Certificate Management

Secure Remote Access with Comprehensive Client Certificate Management APPLICATION NOTE SA Series SSL VPN Appliances and MultiFactor SecureAuth Solution Secure Remote Access with Comprehensive Client Certificate Management Copyright 2009, Juniper Networks, Inc. 1 Table of

More information

JUNOS SCOPE SOFTWARE IP SERVICE MANAGER

JUNOS SCOPE SOFTWARE IP SERVICE MANAGER DATASHEET JUNOS SCOPE SOFTWARE IP SERVICE MANAGER Product Overview Product Description As service providers and enterprises evolve to meet the demands of their customer base, one key to success is the

More information

CONFIGURING THE CX111 FOR THE SSG SERIES

CONFIGURING THE CX111 FOR THE SSG SERIES APPLICATION NOTE CONFIGURING THE CX111 FOR THE SSG SERIES How to Configure the SSG Series for 3G Wireless WAN Termination Using the CX111 Cellular Broadband Data Bridge Copyright 2010, Juniper Networks,

More information

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES APPLICATION NOTE VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Configuring Secure SSL VPN Access in a VMware Virtual Desktop Environment Copyright 2010, Juniper Networks, Inc. 1 Table

More information

UPGRADING STRM TO R1 PATCH

UPGRADING STRM TO R1 PATCH UPGRADING STRM TO 2012.1.R1 PATCH RELEASE 2012.1 MARCH 2013 This Upgrade Guide provides information on the following: Before You Upgrade Clearing the Cache After You Upgrade Before You Upgrade Upgrade

More information

J-Care Agility Services Advanced Options

J-Care Agility Services Advanced Options J-Care Agility Services Advanced Options Focused Technical Support Services Description Table of Contents 1. Introduction...2 2. Eligibility and Purchasing...2 3. Service Features and Deliverable Description...2

More information

M120 Class-of-Service Behavior Analysis

M120 Class-of-Service Behavior Analysis Application Note M120 Class-of-Service Behavior Analysis An Overview of M120 Class-of-Service (CoS) Behavior with Notes on Best Practices and Design Considerations Juniper Networks, Inc. 1194 North Mathilda

More information

CTPView Management System

CTPView Management System CTPView Management System Security Deployment Guide Release 7.0R1 02 Dec 2014 TABLE OF CONTENTS Introduction... 5 Security Level... 6 Security Level Description for Web UI... 6 high... 6 Security Level

More information

Coordinated Threat Control

Coordinated Threat Control Application Note Coordinated Threat Control Juniper Networks Intrusion Detection and Protection (IDP) and Secure Access SSL VPN Interoperability Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,

More information

CONFIGURING WEBAPP SECURE TO PROTECT AGAINST CREDENTIAL ATTACKS

CONFIGURING WEBAPP SECURE TO PROTECT AGAINST CREDENTIAL ATTACKS APPLICATION NOTE CONFIGURING WEBAPP SECURE TO PROTECT AGAINST CREDENTIAL ATTACKS Protect your Web Applications from Brute Force Credential Attacks Using WebApp Secure and Intrusion Deception Technology

More information

JUNOS SPACE ROUTE INSIGHT

JUNOS SPACE ROUTE INSIGHT DATASHEET JUNOS SPACE ROUTE INSIGHT Product Overview Junos Space Route Insight is designed for network engineers and operators who manage today s complex, mission critical enterprise and service provider

More information

Forwarding Logs Using Tail2Syslog. Release Security Threat Response Manager. Juniper Networks, Inc.

Forwarding Logs Using Tail2Syslog. Release Security Threat Response Manager. Juniper Networks, Inc. Security Threat Response Manager Release 2013.2 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-07-19 Copyright Notice Copyright 2013

More information

Juniper Networks CTPOS Release 7.0R1 Software Release Notes

Juniper Networks CTPOS Release 7.0R1 Software Release Notes Juniper Networks CTPOS Release 7.0R1 Software Release Notes Release 7.0R1 September 2014 Revision 2 These release notes accompany Release 7.0R1 of the CTPOS software. They describe device documentation

More information

WX CENTRAL MANAGEMENT SYSTEM

WX CENTRAL MANAGEMENT SYSTEM DATASHEET WX CENTRAL MANAGEMENT SYSTEM Product Overview When it comes to WAN optimization, visibility into the distributed enterprise is absolutely critical to understand how applications are performing,

More information

Juniper Networks CTPOS Release 7.2R1 Software Release Notes

Juniper Networks CTPOS Release 7.2R1 Software Release Notes Juniper Networks CTPOS Release 7.2R1 Software Release Notes Release 7.2R1 5 February 2016 Revision 1 These release notes accompany Release 7.2R1 of the CTPOS software. They describe device documentation

More information

Intrusion Detection and Prevention Release Notes

Intrusion Detection and Prevention Release Notes Intrusion Detection and Prevention Release Notes Release 4.1r3 December 2008 Contents 1. Version Summary on page 2 2. New Features and Enhancements on page 2 3. Changes to Default Behavior on page 2 4.

More information

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection.

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection. TECHNICAL CONFIGURING iscsi AUGUST 2012 You can use a iscsi storage network in your STRM deployment. This document provides information on configuring and using iscsi devices with your deployment. Unless

More information

Intrusion Detection and Prevention IDP 4.1r4 Release Notes

Intrusion Detection and Prevention IDP 4.1r4 Release Notes Intrusion Detection and Prevention IDP 4.1r4 Release Notes Build 4.1.134028 September 22, 2009 Revision 02 Contents Overview...2 Supported Hardware...2 Changed Features...2 IDP OS Directory Structure...2

More information

IDP NetScreen-Security Manager Migration Guide

IDP NetScreen-Security Manager Migration Guide Intrusion Detection and Prevention IDP NetScreen-Security Manager Migration Guide Release 4.0r3 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Part

More information

Product Description. Product Overview DATASHEET

Product Description. Product Overview DATASHEET DATASHEET VGW Gateway Product Overview Juniper Networks vgw Gateway is a comprehensive virtualization security solution that includes integrated stateful inspection firewalling, intrusion detection, compliance

More information

Intrusion Detection and Prevention Release Notes

Intrusion Detection and Prevention Release Notes Intrusion Detection and Prevention Release Notes Release 4.0r4 5-21-2007 Contents 1 Version Summary on page 2 2 New Features on page 2 3 Changes to Default Behavior on page 2 4 System Requirements on page

More information

STRM Log Manager Administration Guide

STRM Log Manager Administration Guide Security Threat Response Manager STRM Log Manager Administration Guide Release 2010.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2011-10-10

More information

Cluster Upgrade. SRX Series Services Gateways for the Branch Upgrade Junos OS with Minimal Traffic Disruption and a Single Command APPLICATION NOTE

Cluster Upgrade. SRX Series Services Gateways for the Branch Upgrade Junos OS with Minimal Traffic Disruption and a Single Command APPLICATION NOTE APPLICATION NOTE Simple Chassis Cluster Upgrade SRX Series Services Gateways for the Branch Upgrade Junos OS with Minimal Traffic Disruption and a Single Command Copyright 2013, Juniper Networks, Inc.

More information

Installing JSA Using a Bootable USB Flash Drive

Installing JSA Using a Bootable USB Flash Drive Juniper Secure Analytics Installing JSA Using a Bootable USB Flash Drive Release 2014.2 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published:

More information

CTPView Security Implementation Guide

CTPView Security Implementation Guide Table of Contents Introduction... 3 Configuring a New CTPView Server... 4 Default Password... 4 Change the BIOS Menu Password... 4 Change the Server s Root Account Password... 4 Change the GRUB Boot Loader

More information

Juniper Networks QFX3500

Juniper Networks QFX3500 Implementation Guide Juniper Networks QFX3500 Switch and QLogic Converged Network Implementation Guide Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Introduction...3 Implementing Converged

More information

Exercise Sheet 2. (Classifications of Operating Systems)

Exercise Sheet 2. (Classifications of Operating Systems) Exercise Sheet 2 Exercise 1 (Classifications of Operating Systems) 1. At any given moment, only a single program can be executed. What is the technical term for this operation mode? 2. What are half multi-user

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Adding a New Routing Device to Your Network Modified: 2017-01-17 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Juniper Networks M Series and J Series Routers

Juniper Networks M Series and J Series Routers PRODUCT CATEGORY BROCHURE Juniper Networks M Series and J Series Routers Juniper Networks Enterprise Routers New Levels of Security, Availability, Predictable Performance, and Operations Agility for Today

More information

Platform Settings for Classic Devices

Platform Settings for Classic Devices The following topics explain Firepower platform settings and how to configure them on Classic devices: Introduction to Firepower Platform Settings, page 1 Configuring Firepower Platform Settings, page

More information

McAfee Network Security Platform Administration Course

McAfee Network Security Platform Administration Course McAfee Network Security Platform Administration Course Education Services administration course The McAfee Network Security Platform Administration course from McAfee Education Services is an essential

More information

Juniper Secure Analytics Patch Release Notes

Juniper Secure Analytics Patch Release Notes Juniper Secure Analytics Patch Release Notes 2014.8 October 2017 2014.8.r11.20171013131303 patch resolves several known issues in Juniper Secure Analytics (JSA). Contents Installing 2014.8.r11 Patch..............................................

More information

Restore Data. Release Juniper Secure Analytics. Juniper Networks, Inc.

Restore Data. Release Juniper Secure Analytics. Juniper Networks, Inc. Juniper Secure Analytics Release 2014.4 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2015-03-02 Copyright Notice Copyright 2015 Juniper

More information

IMPLEMENTING A LAYER 2 ENTERPRISE INFRASTRUCTURE WITH VIRTUAL CHASSIS TECHNOLOGY

IMPLEMENTING A LAYER 2 ENTERPRISE INFRASTRUCTURE WITH VIRTUAL CHASSIS TECHNOLOGY IMPLEMENTATION GUIDE IMPLEMENTING A LAYER 2 ENTERPRISE INFRASTRUCTURE WITH VIRTUAL CHASSIS TECHNOLOGY Although Juniper Networks has attempted to provide accurate information in this guide, Juniper Networks

More information

Juniper Secure Analytics Patch Release Notes

Juniper Secure Analytics Patch Release Notes Juniper Secure Analytics Patch Release Notes 2014.5 June 2015 2014.5.r1.20150605140117 patch resolves several known issues in Juniper Secure Analytics (JSA). Contents Installing 2014.5.r1 Patch..............................................

More information

JSA Common Ports Lists

JSA Common Ports Lists Juniper Secure Analytics Release 2014.6 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2016-04-21 Copyright Notice Copyright 2016 Juniper

More information

Table 1 List of Common Ports Used by STRM Components. Port Direction Reason. components. your SMTP gateway

Table 1 List of Common Ports Used by STRM Components. Port Direction Reason. components. your SMTP gateway TECHNICAL NOTE OPEN PORTS USED BY STRM November 2010 This document provides information about the ports used by and between STRM components. Table 1 lists the common ports used by STRM components, identifies

More information

Installation Guide. Contents. Overview. Dell SonicWALL Advanced Reporting Installation Guide. Secure Remote Access. SonicOS

Installation Guide. Contents. Overview. Dell SonicWALL Advanced Reporting Installation Guide. Secure Remote Access. SonicOS Secure Remote Access SonicOS Contents Overview...1 Server Requirements...2 Licensing and Activation...2 Installing and Upgrading...4 Collecting Dell SonicWALL Aventail Access Logs...8 Initial Setup of

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

WLM1200-RMTS User s Guide

WLM1200-RMTS User s Guide WLM1200-RMTS User s Guide Copyright 2011, Juniper Networks, Inc. 1 WLM1200-RMTS User Guide Contents WLM1200-RMTS Publication Suite........................................ 2 WLM1200-RMTS Hardware Description....................................

More information

Security Profiles for AMX Products

Security Profiles for AMX Products Security Profiles for AMX Products Configuring AMX devices for Installation Into a Secure Enviroment Version 1.2 AMX, LLC Document History Version Author(s) Description Date 1.0 Rick Gelling Initial distribution

More information

JUNIPER CARE SERVICES

JUNIPER CARE SERVICES DATASHEET SERVICES Product Overview Juniper Care Services provide rapid response from Juniper Networks technical service engineers and hardware replacement options that let you choose the right timing

More information

The TRELLIS Real-Time Infrastructure Optimization Platform

The TRELLIS Real-Time Infrastructure Optimization Platform The TRELLIS Real-Time Infrastructure Optimization Platform Disaster Recovery Technical Bulletin Technical Support Site If you encounter any installation or operational issues with your product, check the

More information

SOLUTION BROCHURE. Mobility Changes Everything

SOLUTION BROCHURE. Mobility Changes Everything SOLUTION BROCHURE Simply Connected The New Campus Network Mobility Changes Everything Simply Connected Vision The challenge of the new business network is expectations: Expectations of solving long-standing

More information

Steel-Belted Radius Installation Instructions for EAP-FAST Security Patch

Steel-Belted Radius Installation Instructions for EAP-FAST Security Patch Security Patch Steel-Belted Radius Installation Instructions for EAP-FAST Security Patch Revision 0.5 22 September 2009 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA

More information

Course 55187B Linux System Administration

Course 55187B Linux System Administration Course Outline Module 1: System Startup and Shutdown This module explains how to manage startup and shutdown processes in Linux. Understanding the Boot Sequence The Grand Unified Boot Loader GRUB Configuration

More information

VERTIV. Avocent ACS8xxx Advanced Console System Release Notes VERSION 2.4.2, AUGUST 24, Release Notes Section Outline. 1 Update Instructions

VERTIV. Avocent ACS8xxx Advanced Console System Release Notes VERSION 2.4.2, AUGUST 24, Release Notes Section Outline. 1 Update Instructions VERTIV Avocent ACS8xxx Advanced Console System Release Notes VERSION 2.4.2, AUGUST 24, 2018 Release Notes Section Outline 1 Update Instructions 2 Appliance Firmware Version Information 3 Local Client Requirements

More information

CTPOS 6.6 Circuit Emulation Software Release Notes

CTPOS 6.6 Circuit Emulation Software Release Notes CTPOS 6.6 Circuit Emulation Software Release Notes Release 6.6R2 20 th June 2014 New Hardware: This release notes accompany Release 6.6R2 of the CTPOS Circuit Emulation software. This describe the enhancements,

More information

802.1X: Port-Based Authentication Standard for Network Access

802.1X: Port-Based Authentication Standard for Network Access WHITE PAPER 802.1X: Port-Based Authentication Standard for Network Access Control (NAC) A Secure, Strong and Flexible Framework for Network Access Control (NAC) Copyright 2010, Juniper Networks, Inc. Table

More information

Juniper Secure Analytics Patch Release Notes

Juniper Secure Analytics Patch Release Notes Juniper Secure Analytics Patch Release Notes 2014.8 January 2018 2014.8.r12.20171213225424 patch resolves several known issues in Juniper Secure Analytics (JSA). Contents Installing 2014.8.r12 Patch.............................................

More information

Reconfigure Offboard Storage During a JSA Upgrade

Reconfigure Offboard Storage During a JSA Upgrade Juniper Secure Analytics Reconfigure Offboard Storage During a JSA Upgrade Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published:

More information

Upgrading and Deploying your Polycom HDX System

Upgrading and Deploying your Polycom HDX System Polycom HDX Systems, Version 2.7.0_J This software meets the latest U.S. Department of Defense network requirements for listing on the Defense Switched Network (DSN) Approved Products List (APL), as tested

More information

EX2500 ETHERNET SWITCHES

EX2500 ETHERNET SWITCHES DATASHEET ETHERNET SWITCHES Product Overview The Juniper Networks line of Ethernet switches delivers a compact, powerful solution for high-density data center top-of-rack access switch deployments where

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide h-series 800-782-3762 www.edgewave.com 2001 2011 EdgeWave Inc. (formerly St. Bernard Software). All rights reserved. The EdgeWave logo, iprism and iguard are trademarks

More information

Product Description. Product Overview. Architecture and Key Components of the MAG Series Junos Pulse Gateways

Product Description. Product Overview. Architecture and Key Components of the MAG Series Junos Pulse Gateways DATASHEET MAG Series Junos Pulse Gateways Product Overview The challenge for today s technology leader is to build an infrastructure that provides easy, secure access to the corporate network for all workers

More information

Installation and Configuration Guide

Installation and Configuration Guide CYBERSECURITY, EVOLVED EdgeWave iprism Web Security Installation and Configuration Guide V8.0 15333 Avenue of Science, Suite 100 San Diego, CA 92128 Give us a call 1-855-881-2004 Send us an email: info@edgewave.com

More information

CONFIGURING THE CX111 FOR THE SSG SERIES

CONFIGURING THE CX111 FOR THE SSG SERIES APPLICATION NOTE CONFIGURING THE CX111 FOR THE SSG SERIES How to Configure the SSG Series for 3G Wireless WAN Termination Using the CX111 Cellular Broadband Data Bridge Copyright 2013, Juniper Networks,

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Validated Reference - Business Edge Solution - Device R-10 Release 1.0 Published: 2014-03-31 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089

More information

Clearswift SECURE Gateway Installation & Getting Started Guide. Version Document Revision 1.0

Clearswift SECURE  Gateway Installation & Getting Started Guide. Version Document Revision 1.0 Clearswift SECURE Email Gateway Installation & Getting Started Guide Version 4.6.0 Document Revision 1.0 Copyright Revision 1.0, April, 2017 Published by Clearswift Ltd. 1995 2017 Clearswift Ltd. All rights

More information

Performing Administrative Tasks

Performing Administrative Tasks This chapter describes how to perform administrative tasks using Cisco CMX. Users who are assigned administration privileges can perform administrative tasks. Cisco CMX User Accounts, page 1 Backing Up

More information

OCTVQE Zaptel Echo Canceller (PRELIMINARY)

OCTVQE Zaptel Echo Canceller (PRELIMINARY) OCTVQE - Zaptel Echo Canceller User s Guide (Preliminary) OCTVQE Zaptel Echo Canceller (PRELIMINARY) User s Guide Revision 1.9 OctWare Inc. www.octware.net 4101, Molson St., Suite 300 Montreal Quebec H1Y

More information

7.3 Install on Linux and Initial Configurations

7.3 Install on Linux and Initial Configurations 7.3 Install on Linux and Initial Configurations This section describes how to install SoftEther VPN Server to a Linux operating system. This assumes that in the Linux operating system, no extra application

More information

System Architecture Overview for THE Juniper Networks SSG500 Line

System Architecture Overview for THE Juniper Networks SSG500 Line WHITE PAPER System Architecture Overview for THE Juniper Networks SSG500 Line Copyright 2009, Juniper Networks, Inc. Table of Contents Executive Summary...1 Introduction...1 The SSG500 Line...1 A Purpose-Built

More information

Linux Essentials Objectives Topics:

Linux Essentials Objectives Topics: Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives

More information

Clearswift SECURE Gateway Installation & Getting Started Guide. Version 4.3 Document Revision 1.0

Clearswift SECURE  Gateway Installation & Getting Started Guide. Version 4.3 Document Revision 1.0 Clearswift SECURE Email Gateway Installation & Getting Started Guide Version 4.3 Document Revision 1.0 Copyright Revision 1.1, March, 2016 Published by Clearswift Ltd. 1995 2016 Clearswift Ltd. All rights

More information

Web Device Manager Guide

Web Device Manager Guide Juniper Networks EX2500 Ethernet Switch Web Device Manager Guide Release 3.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Part Number: 530-029704-01,

More information

Cisco CIMC Firmware Update Utility User Guide

Cisco CIMC Firmware Update Utility User Guide Cisco CIMC Firmware Update Utility User Guide For Cisco UCS C-Series Servers September 17, 2010 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Lab 7 Configuring Basic Router Settings with IOS CLI

Lab 7 Configuring Basic Router Settings with IOS CLI Lab 7 Configuring Basic Router Settings with IOS CLI Objectives Part 1: Set Up the Topology and Initialize Devices Cable equipment to match the network topology. Initialize and restart the router and switch.

More information

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B::

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B:: Module Title Duration : 55187B: Linux System Administration : 4 days Overview This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional

More information

JUNIPER NETWORKS PRODUCT BULLETIN

JUNIPER NETWORKS PRODUCT BULLETIN PRODUCT BULLETIN JUNIPER NETWORKS PRODUCT BULLETIN Junos Pulse Mobile Security Suite 4.2 What s New for Enterprises and Service Providers Bulletin Date January 24, 2013 Bulletin Number 8000022 Applicable

More information

"Charting the Course... MOC B: Linux System Administration. Course Summary

Charting the Course... MOC B: Linux System Administration. Course Summary Description Course Summary This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional Linux system administrator. The course covers

More information

McAfee Firewall Enterprise 8.3.2

McAfee Firewall Enterprise 8.3.2 Common Criteria Evaluated Configuration Guide Revision A McAfee Firewall Enterprise 8.3.2 The McAfee Firewall Enterprise Common Criteria Configuration Guide, version 8.3.2, describes requirements and guidelines

More information

Juniper Secure Analytics Patch Release Notes

Juniper Secure Analytics Patch Release Notes Juniper Secure Analytics Patch Release Notes 7.3.0 January 2018 7.3.0.20171205025101 patch resolves several known issues in Juniper Secure Analytics (JSA). Contents Administrator Notes..................................................

More information

RSA Ready Implementation Guide for. VMware vsphere Management Assistant 6.0

RSA Ready Implementation Guide for. VMware vsphere Management Assistant 6.0 RSA Ready Implementation Guide for vsphere Management Assistant 6.0 Daniel Pintal, RSA Partner Engineering Last Modified: July 20 th, 2016 Solution Summary vsphere Management

More information

SOURCEFIRE 3D SYSTEM RELEASE NOTES

SOURCEFIRE 3D SYSTEM RELEASE NOTES SOURCEFIRE 3D SYSTEM RELEASE NOTES Version 5.3.0.2 Original Publication: April 21, 2014 Last Updated: April 25, 2016 These release notes are valid for Version 5.3.0.2 of the Sourcefire 3D System. Even

More information

Bitnami MySQL for Huawei Enterprise Cloud

Bitnami MySQL for Huawei Enterprise Cloud Bitnami MySQL for Huawei Enterprise Cloud Description MySQL is a fast, reliable, scalable, and easy to use open-source relational database system. MySQL Server is intended for mission-critical, heavy-load

More information

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Review of the Linux File System and Linux Commands 1. Introduction Becoming adept at using the Linux OS requires gaining familiarity

More information

ForeScout CounterACT. Configuration Guide. Version 1.2

ForeScout CounterACT. Configuration Guide. Version 1.2 ForeScout CounterACT Endpoint Module: Linux Plugin Version 1.2 Table of Contents About This Plugin... 4 Accessing and Managing Endpoints... 4 Remote Inspection... 4 SecureConnector... 5 What to Do... 5

More information

Partition Splitting. Release Juniper Secure Analytics. Juniper Networks, Inc.

Partition Splitting. Release Juniper Secure Analytics. Juniper Networks, Inc. Juniper Secure Analytics Release 2014.8 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2016-11-29 Copyright Notice Copyright 2016 Juniper

More information

Once the VM is started, the VirtualBox OS Manager window can be closed. But our Ubuntu VM is still running.

Once the VM is started, the VirtualBox OS Manager window can be closed. But our Ubuntu VM is still running. How to use iptables on Ubuntu Revised: 16-August-2016 by David Walling This "How To" document describes using the iptables program to define firewall rules for our Ubuntu server. We will also explore using

More information

Bitnami MariaDB for Huawei Enterprise Cloud

Bitnami MariaDB for Huawei Enterprise Cloud Bitnami MariaDB for Huawei Enterprise Cloud First steps with the Bitnami MariaDB Stack Welcome to your new Bitnami application running on Huawei Enterprise Cloud! Here are a few questions (and answers!)

More information

Product Description. Architecture and Key Components of the MAG Series Junos Pulse Gateways. Product Overview DATASHEET

Product Description. Architecture and Key Components of the MAG Series Junos Pulse Gateways. Product Overview DATASHEET DATASHEET MAG Series Junos Pulse Gateways Product Overview The challenge for today s technology leader is to build an infrastructure that provides accelerated, rolebased secure access to the corporate

More information

. Fill in the Blank: A directory named mydir has just been... Points:10. Add Question Success: 64 questions added as a copy.

. Fill in the Blank: A directory named mydir has just been... Points:10. Add Question Success: 64 questions added as a copy. . Fill in the Blank: A directory named mydir has just been... Success: 64 questions added as a copy. A directory named mydir has just been created with the touch command. Nochmod commands have been issued

More information

Performing Maintenance Operations

Performing Maintenance Operations This chapter describes how to back up and restore Cisco Mobility Services Engine (MSE) data and how to update the MSE software. It also describes other maintenance operations. Guidelines and Limitations,

More information

WhatsConfigured v3.1 User Guide

WhatsConfigured v3.1 User Guide WhatsConfigured v3.1 User Guide Contents Table of Contents Welcome to WhatsConfigured v3.1 Finding more information and updates... 1 Sending feedback... 2 Deploying WhatsConfigured STEP 1: Prepare the

More information

Installing and Upgrading Cisco Network Registrar Virtual Appliance

Installing and Upgrading Cisco Network Registrar Virtual Appliance CHAPTER 3 Installing and Upgrading Cisco Network Registrar Virtual Appliance The Cisco Network Registrar virtual appliance includes all the functionality available in a version of Cisco Network Registrar

More information

WX Client. Product Description. Product Overview DATASHEET

WX Client. Product Description. Product Overview DATASHEET DATASHEET Client Product Overview The Client is a leading-edge, Windows-based WAN optimization software for mobile end users and small office/home office end users. The Client improves application response

More information

Deploying JSA in an IPV6 Environment

Deploying JSA in an IPV6 Environment Juniper Secure Analytics Deploying JSA in an IPV6 Environment Release 7.3.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2017-09-14

More information

CounterACT 7.0 Single CounterACT Appliance

CounterACT 7.0 Single CounterACT Appliance CounterACT 7.0 Single CounterACT Appliance Quick Installation Guide Table of Contents Welcome to CounterACT Version 7.0....3 Included in your CounterACT Package....3 Overview...4 1. Create a Deployment

More information

Industry Tested, Government-Certified

Industry Tested, Government-Certified DATASHEET Product Overview As the demand to enable users to work from anywhere, at anytime increases, so does the need for secure network accessibility and robust authentication. Mobility drives the need

More information

Lab 3a Using the vi editor

Lab 3a Using the vi editor Lab 3a Using the vi editor Objectives: Become familiar with the vi Editor Review the three vi Modes Review keystrokes to move between vi modes Create a new file with vi Editor Invoke vi with show mode

More information

Please choose the best answer. More than one answer might be true, but choose the one that is best.

Please choose the best answer. More than one answer might be true, but choose the one that is best. Introduction to Linux and Unix - endterm Please choose the best answer. More than one answer might be true, but choose the one that is best. SYSTEM STARTUP 1. A hard disk master boot record is located:

More information

SOURCEFIRE 3D SYSTEM RELEASE NOTES

SOURCEFIRE 3D SYSTEM RELEASE NOTES SOURCEFIRE 3D SYSTEM RELEASE NOTES Version 5.2.0.2 Original Publication: October 18, 2013 Last Updated: October 18, 2013 These release notes are valid for Version 5.2.0.2 of the Sourcefire 3D System. Even

More information

ECDS MDE 100XVB Installation Guide on ISR G2 UCS-E and VMWare vsphere Hypervisor (ESXi)

ECDS MDE 100XVB Installation Guide on ISR G2 UCS-E and VMWare vsphere Hypervisor (ESXi) ECDS MDE 100XVB Installation Guide on ISR G2 UCS-E and VMWare vsphere Hypervisor (ESXi) Revised: November, 2013 Contents Overview, page 1 Guidelines and Limitations, page 1 Prerequisites, page 2 Installation

More information

Polycom DMA 7000 System Deployment Guide for Maximum Security Environments

Polycom DMA 7000 System Deployment Guide for Maximum Security Environments Polycom DMA 7000 System Deployment Guide for Maximum Security Environments v. 2.1.0J August 2011 3725-76304-001A2 Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated

More information

ForeScout CounterACT. Single CounterACT Appliance. Quick Installation Guide. Version 8.0

ForeScout CounterACT. Single CounterACT Appliance. Quick Installation Guide. Version 8.0 ForeScout CounterACT Single CounterACT Appliance Version 8.0 Table of Contents Welcome to CounterACT Version 8.0... 4 CounterACT Package Contents... 4 Overview... 5 1. Create a Deployment Plan... 6 Decide

More information

NN Nortel Communication Server 1000 Linux Platform Base and Applications Installation and Commissioning

NN Nortel Communication Server 1000 Linux Platform Base and Applications Installation and Commissioning Linux Platform Base and Applications Installation and Commissioning Release: Release 5.5 Document Revision: 02.09 www.nortel.com NN43001-315. Release: Release 5.5 Publication: NN43001-315 Document release

More information