8e6 Technologies Network Card TAR 10 User Manual

Threat Analysis Reporter  
R
8e6  
QUICK START  
GUIDE  
Model: TAR 1.0  
TAR "S" (5K02-62), TAR "H" (5K02-66), TAR "MSA" (5K02-67)  
Release 1.1.00 / Version No.: 06.18.07  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
iii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
iv  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
threat analysis reporter introduCtion  
Thank you for choosing to evaluate the 8e6 Technologies Threat Analysis Reporter. This  
product addresses user-generated Web threats such as excessive use of bandwidth  
and inappropriate Internet usage, and provides network administrators tools to monitor  
such threats so management can enforce corporate Internet usage policies.  
Working in conjunction with 8e6’s R3000 Enterprise Filter, the Threat Analysis Reporter  
translates end user Internet activity from the R3000’s logs into dynamic graphical snap-  
shots of network Internet traffic. Using remediation tools in the console, administrators  
and management can then manage and control user-generated Web threats in real  
time.  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
About this Document  
This document is divided into the following sections:  
Introduction - This section is comprised of an overview of the Threat Analysis Re-  
porter product and how to use this document  
Service Information - This section provides 8e6 Technologies contact information  
Preliminary Setup Procedures - This section includes instructions on how to physi-  
cally set up the Threat Analysis Reporter unit in your network environment  
Install the Server - This section explains how to configure the Threat Analysis Re-  
porter  
Conclusion - This section indicates that the quick start steps have been completed  
Specifications - This section features hardware specifications and descriptions of  
front panel LED indicators  
Appendix: Optional Ethernet Tap Installation - This appendix explains how to  
install the optional Ethernet Tap device on your network for bandwidth monitoring if  
you have a TAR “S” or TAR “H” server  
Conventions Used in this Document  
The following icons are used throughout this document to call attention to important  
information pertaining to handling, operation, and maintenance of the server; safety and  
preservation of the equipment, and personal safety:  
NOTE: The “note” icon is followed by additional information to be consid-  
ered.  
WARNING: The “warning” icon is followed by information alerting you to a  
potential situation that may cause damage to property or equipment.  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
serviCe information  
The user should not attempt any maintenance or service on the unit beyond the proce-  
dures outlined in this document.  
Any initial hardware setup problem that cannot be resolved at your internal organiza-  
tion should be referred to an 8e6 Technologies solutions engineer or technical support  
representative.  
8e6 Corporate Headquarters (USA)  
Local  
Domestic US  
International  
:
:
:
714.282.6111  
1.888.786.7999  
+1.714.282.6111  
8e6 Taiwan  
Taipei Local  
:
2501-5285  
Domestic Taiwan : 02-2501-5285  
International  
:
886-2-2501-5285  
Procedures  
When calling 8e6 Technologies regarding a problem, please provide the representative  
the following information:  
Your contact information.  
Serial number or original order number.  
Description of the problem.  
Network environment in which the unit is used.  
State of the unit before the problem occurred.  
Frequency and repeatability of the problem.  
Can the product continue to operate with this problem?  
Can you identify anything that may have caused the problem?  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
preliminary setup proCedures  
Unpack the Unit from the Carton  
Inspect the packaging container for evidence of mishandling during transit. If the packag-  
ing container is damaged, photograph it for reference.  
Carefully unpack the unit from the carton and verify that all accessories are included.  
Save all packing materials in the event that the unit needs to be returned to 8e6 Tech-  
nologies.  
The carton should contain the following items:  
1 Threat Analysis Reporter unit  
1 AC Power Cord  
1 Serial Port Cable  
1 CAT-5E Crossover Cable  
1 CAT-5E Coupler  
Rack Mount Brackets (2)  
1 End User License Agreement (EULA)  
1 envelope containing a CD-ROM with a PDF of the Threat Analysis Reporter User  
Guide. The latest version of the user guide can be obtained from our Web site at  
NOTE: TAR “S” and “H” units come with a NetOptics 10/100BaseT Ethernet  
Tap kit to be installed at your option. TAR “H” units also come with a separate bezel  
to be installed on the front of the chassis, and an additional AC power cord.  
Inspect the server and accessories for damage. If the contents appear damaged, file a  
damage claim with the carrier immediately.  
For “S” and “MSA” units, proceed to the instructions for Rack Mount the “S” or “MSA”  
Server.  
For “H” units, proceed to the instructions for Install the “H” Server Bezel, followed by  
Rack Mount the “H” Server.  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Rack Mount the “S” or “MSA” Server  
Rack Mount Instructions  
Rack Setup Suggestions  
Determine the placement of each component in the rack before you install the rails.  
Install the heaviest server components on the bottom of the rack first, and then work  
up.  
Identify the Sections of the Rack Rails  
You should have received two rack rail assemblies with the 8e6 server unit. Each of  
these assemblies consists of two sections: An inner fixed chassis rail that secures to the  
unit (A), and an outer fixed rack rail that secures directly to the rack itself (B). A sliding  
rail guide sandwiched between the two should remain attached to the fixed rack rail. The  
A and B rails must be detached from each other in order to install.  
To remove the fixed chassis rail (A), pull it out as far as possible. You should hear a  
“click” sound as a locking tab emerges from inside the rail assembly and locks the inner  
rail. Then depress the locking tab to pull the inner rail completely out. Do this for both the  
left and right side rack rail.  
Install the Chassis Rails  
Position the fixed chassis rail sections you just removed along the side of the server  
chassis making sure the five screw holes line up. Note that these two rails are left/right  
specific. Screw the rail securely to the side of the chassis. Repeat this procedure for the  
other rail on the other side of the chassis. You will also need to attach the rail brackets  
when installing into a Telco rack.  
Locking Tabs: As you have seen, both chassis rails have a locking tab, which serves  
two functions. The first is to lock the server into place when installed and pushed fully  
into the rack, which is its normal position. Secondly, these tabs also lock the server in  
place when fully extended from the rack. This prevents the server from coming com-  
pletely out of the rack when you pull it out for servicing.  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Install the Rack Rails  
Determine where you want to place the server unit in the rack. Position the fixed rack  
rail/sliding rail guide assemblies at the desired location in the rack, keeping the sliding  
rail guide facing the inside of the rack. Screw the assembly securely to the rack using  
the brackets provided. Attach the other assembly to the other side of the rack, making  
sure that both are at the exact same height and with the rail guides facing inward.  
Install the Server into the Rack  
You should now have rails attached to both the chassis and the rack unit. The next step  
is to install the server chassis into the rack. Do this by lining up the rear of the chassis  
rails with the front of the rack rails. Slide the chassis rails into the rack rails, keeping the  
pressure even on both sides (you may have to depress the locking tabs when inserting).  
6
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Installing the Server into a Telco Rack  
If you are installing the 8e6 server unit into a Telco type rack, follow the directions given  
on the previous pages for rack installation. The only difference in the installation pro-  
cedure will be the positioning of the rack brackets to the rack. They should be spaced  
apart just enough to accommodate the width of the Telco rack.  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Install the “H” Server Bezel  
Before rack mounting the “H” unit, the bezel should be installed on the front end of the  
chassis. This portion of the installation process requires you to unpack the unit and be-  
zel.  
NOTE: The bezel has been packaged separately from the unit to prevent dam-  
age during shipping.  
Front of bezel  
Outside of left inner rail  
Inside front end of left inner  
rail  
Inner left rail attached to chassis  
Pin on right side of bezel  
8
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
A. Remove the plastic wrapping from the left and  
right ears.  
B. On one side of the chassis (left or right), un-  
screw the inner rail from the chassis.  
C. Slide the loosened inner rail slightly backwards  
to release it from the clips at the side of the  
chassis, and then lay it down beside the chas-  
sis, with the inside of the rail facing up.  
D. On the inner rail that is still attached to the  
chassis, insert the bezel pin into the bottom  
hole of the ear. Be sure the pin is pushed all  
the way in so that it is flush against the ear.  
E. Take up the free end of the bezel and also the  
loosened inner rail.  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
F. Return the loosened inner rail to its upright po-  
sition and insert the bezel pin into the bottom  
hole of the ear.  
G. Slide the inner rail forward beneath the clips to  
lock it in place.  
H. Screw the inner rail back on the chassis.  
I. After it is installed, the bezel should drop down  
when it is gently tugged forward and down-  
ward. The bezel should remain upright when  
raised up and closed.  
ꢀ0  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Rack Mount the “H” Server  
Rack Mount Instructions  
Identify the Sections of the Rack Rails  
You should have received two rack rail assemblies with the 8e6 server unit. Each of  
these assemblies consists of two sections: An inner fixed chassis rail that secures to the  
unit (A), and an outer fixed rack rail that secures directly to the rack itself (B). Two pairs  
of short brackets to be used on the front side of the outer rails are also included.  
Install the Inner Rails  
Both the left and right side inner rails have been pre-attached to the chassis. Proceed to  
the next step.  
Install the Outer Rails  
Begin by measuring the distance from the front rail to the rear rail of the rack. Attach a  
short bracket to the front side of the right outer rail and a long bracket to the rear side of  
the right outer rail. Adjust both the short and long brackets to the proper distance so that  
the rail can fit snugly into the rack. Secure the short bracket to the front side of the outer  
rail with two M4 screws and the long bracket to the rear side of the outer rail with three  
M4 screws. Repeat these steps for the left outer rail.  
Locking Tabs: Both chassis rails have a locking tab, which serves two functions. The  
first is to lock the server into place when installed and pushed fully into the rack, which is  
its normal position. Secondly, these tabs also lock the server in place when fully extend-  
ed from the rack. This prevents the server from coming completely out of the rack when  
you pull it out for servicing.  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
ꢀꢀ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Install the Server into the Rack  
You should now have rails attached to both the chassis and the rack unit. The next step  
is to install the server chassis into the rack. Do this by lining up the rear of the chassis  
rails with the front of the rack rails. Slide the chassis rails into the rack rails, keeping the  
pressure even on both sides (you may have to depress the locking tabs when inserting).  
When the server has been pushed completely into the rack, you should hear the locking  
tabs “click.” Finish by inserting and tightening the thumbscrews that hold the front of the  
server to the rack.  
ꢀꢁ  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Installing the Server into a Telco Rack  
If you are installing the 8e6 server unit into a Telco type rack, follow the directions given  
on the previous page for rack installation. The only difference in the installation proce-  
dure will be the positioning of the rack brackets to the rack. They should be spaced apart  
just enough to accommodate the width of the Telco rack.  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
ꢀꢂ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
install the server  
Step 1: Initial Setup Procedures  
This step requires you to link the workstation to the Threat Analysis Reporter. The follow-  
ing hardware can be used for the initial setup procedures:  
Threat Analysis Reporter unit with AC power cord  
either one of two options:  
PC monitor with AC power cord and keyboard, or  
PC laptop computer with HyperTerminal and serial port cable (and USB DB9 se-  
rial adapter, if there is no serial port on your laptop)  
NOTE: Before installing the Threat Analysis Reporter server, the R3000 server  
to be used with this server must already be installed and running software version  
1.10.15 or higher.  
ꢀꢃ  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Link the Workstation to the Threat Analysis Reporter  
Monitor and Keyboard Setup  
A. Connect the PC monitor and keyboard cables to the rear of the chassis.  
B. Turn on the PC monitor.  
C. Power on the Threat Analysis Reporter unit by dropping down the face plate and  
pressing the large button at the right of the front panel (see image below).  
Front of the chassis  
Once the Threat Analysis Reporter is powered up, proceed to the Step-by-Step Initial  
Setup Procedures.  
Serial Console Setup  
A. Using the serial port cable (and USB DB9 serial adapter, if necessary), connect the  
laptop to the rear of the chassis (see images below).  
Rear of the “S” or “MSA” chassis  
Rear of the “H” chassis  
B. Power on the laptop.  
C. Power on the Threat Analysis Reporter by dropping down the face plate and pressing  
the large button at the right of the front panel (see top image on this page).  
Once the Threat Analysis Reporter is powered up, proceed to the instructions for Hyper-  
Terminal Setup Procedures.  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
ꢀꢄ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
HyperTerminal Setup Procedures  
If using a serial console, follow these procedures to create a HyperTerminal session.  
A. Launch HyperTerminal by going to Start > Programs > Accessories > Communica-  
tions > HyperTerminal:  
B. In the Connection Description dialog box, enter any session Name, and then click  
OK to open the Connect To dialog box:  
ꢀ6  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C. At the Connect using field, select the COM port assigned to the serial port on the  
laptop (probably “COM1”), and then click OK to open the Properties dialog box, dis-  
playing the Port Settings tab:  
D. Specify the following session settings:  
Bits per second: 9600  
Data bits: 8  
Parity: None  
Stop bits: 1  
Flow control: Hardware  
E. Click OK to connect to the HyperTerminal session:  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
ꢀꢅ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
F. In the HyperTerminal session window, go to File > Properties to open the Properties  
dialog box, displaying the Connect To and Settings tabs:  
G. Click the Settings tab, and at the Emulation menu select “VT100”.  
H. Click OK to close the dialog box, and to go to the login screen.  
NOTE: If using a HyperTerminal session, the login screen will display with black  
text on a white background.  
ꢀ8  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Step-by-Step Initial Setup Procedures  
For these step-by-step procedures, you will need your network administrator to provide  
you the LAN 1 (Ethernet 0) and LAN 2 (Ethernet 1) IP address and subnet mask, gate-  
way IP address, DNS server IP address(es), host name of the server, and IP address for  
the Web interface (if using a NAT device).  
Login screen, password prompts  
The login screen displays after powering on the Threat Analysis Reporter unit using a  
monitor and keyboard, or after creating a HyperTerminal session.  
NOTE: If the screensaver currently displays on your screen, press the Enter  
key to display the login screen.  
A. At the login prompt, type in menu.  
B. Press the Enter key to display the Password prompt.  
C. At the Password prompt, type in the following: #s3tup#r3k  
D. Press Enter to display the System Configuration screen:  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
ꢀꢆ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
E. At the Press the number of your selection prompt, press 2 to display the Adminis-  
trator Password Entry screen:  
F. At the Enter the administrator password prompt, re-enter your password:  
#s3tup#r3k  
G. Press Enter to display the Administration menu where you can begin the step-by-  
step initial setup process using the configuration screens:  
H. At the Press the number of your selection prompt, press 2 to select the “Initial  
Setup step-by-step” process. This process takes you to the Configure Network Inter-  
face screen.  
ꢁ0  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configure Network Interface screen  
A. At the Enter interface LAN1 (eth0) IP address field, enter the IP address for the  
LAN 1 (Ethernet 0) interface, and then press Enter to go to the next screen.  
B. At the Enter interface LAN1 (eth0) netmask field, enter the subnet mask for the  
LAN 1 (Ethernet 0) interface using the dotted decimals notation format. Press Enter  
to display the confirmation prompt.  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
ꢁꢀ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C. Press Y for “Yes” to confirm and save your entries for the LAN1 (eth0) interface, and  
to go to the next screen.  
D. At the Enter interface LAN2 (eth1) IP address field, enter the IP address for the  
LAN 2 (Ethernet 1) interface, and then press Enter to go to the next screen.  
E. At the Enter interface LAN2 (eth1) netmask field, using the dotted decimals nota-  
tion format, enter the subnet mask for the LAN 2 (Ethernet 1) interface. Press Enter  
to display the confirmation prompt.  
F. Press Y for “Yes” to confirm and save your entries for the eth1 interface, and to go to  
the Configure default gateway screen.  
ꢁꢁ  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configure default gateway screen  
A. At the Enter default gateway IP field, enter the IP address for the default gateway.  
Press Enter to display the confirmation prompt.  
B. Press Y for “Yes” to confirm and save your entry for the gateway IP address, and to  
go to the Configure Domain Name Servers screen.  
Configure Domain Name Servers screen  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
ꢁꢂ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
A. At the Enter first DNS server IP field, enter the IP address for the primary Domain  
Name Server. Press Enter to go to the next screen.  
B. At the Enter (optional) second DNS server IP field, if you have a secondary Do-  
main Name Server you wish to use, enter the IP address for that server. Press Enter  
to display the confirmation prompt.  
C. Press Y for “Yes” to confirm and save your entries for the domain name servers, and  
to go to the Configure Host Name screen.  
Configure Host Name screen  
ꢁꢃ  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
A. At the Enter host name field, enter the host name of the server. Press Enter to dis-  
play the confirmation prompt.  
B. Press Y for “Yes” to confirm and save your entry for the host name, and to go to the  
Time zone regional configuration screen.  
Time zone regional configuration screen  
A. Use the up and down arrows in your keyboard to select your region. After selecting  
your locality, press Y for “Yes” to confirm and save your regional selection, and to go  
to the next screen:  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
ꢁꢄ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
B. Use the up and down arrows in your keyboard to select your region. After selecting  
your locality, press Y for “Yes” to confirm and save your regional selection, and to go  
to the Configure Wizard user screen.  
Configure Wizard user screen  
A. At the Enter wizard user name field, enter the username that will be used to access  
the setup wizard in the Threat Analysis Reporter interface. Press Enter to display the  
confirmation prompt.  
B. Press Y for “Yes” to confirm and save your entry and to go to the next screen.  
ꢁ6  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C. At the Enter wizard password field, enter the password that will be used to access  
the setup wizard in the Threat Analysis Reporter interface. Press Y for “Yes” to con-  
firm and save your entry and to go to the Setup Wizard Confirmation screen.  
Setup Wizard Confirmation screen  
Press Y for “Yes” to save all your wizard entries and to return to the Administration  
menu.  
NOTE: When saving your entries, there may be a 4-10 second delay before  
the Administration menu displays.  
Administration menu  
After making all entries using the step-by-step initial setup process, you will return to the  
Administration menu. Press X to return to the System Configuration screen. Or, to verify  
the status of the Threat Analysis Reporter and review the entries you made using the  
wizard, press 1 to view the System Status screen.  
NOTE: Changing your password using option C, “Change administration pass-  
word”, will change the password for the console menu but not the Threat Analysis  
Reporter console login screen.  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
ꢁꢅ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
System Status Screen  
The System Status screen contains the following information:  
LAN1 (eth0) interface for web access and R3000 communications: LAN1 (eth0)  
IP address and netmask specified in screen 3 (Configure Network Interface), and  
current status (“Active” or “Inactive”)  
LAN2 (eth1) interface for bandwidth monitoring: LAN2 (eth1) IP address and  
netmask specified in screen 4 (Configure Network Interface), and current status  
(“Active” or “Inactive”)  
Default gateway IP address specified in screen 5 (Configure default gateway)  
Configure host name specified in screen 7 (Configure Host Name)  
DNS server IP address(es) specified in screen 6 (Configure Domain Name Servers)  
Current status of the Threat Analysis Reporter  
Current Version of the Threat Analysis Reporter software  
NOTE: Modifications can be made at any time by returning to the specific  
screen of the wizard.  
Log Off, Disconnect the Peripherals  
A. After completing the wizard setup procedures, return to the System Configuration  
screen and press 9 to log out.  
B. Disconnect the peripherals from the Threat Analysis Reporter.  
ꢁ8  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Step 2: Physically Connect the Unit to the Network  
After performing initial setup procedures for the Threat Analysis Reporter, the unit should  
be physically connected to the network. This step requires a standard CAT-5E cable to  
connect the unit to the network. An additional CAT-5E cable is required if the Ethernet  
Tap unit will be installed for bandwidth monitoring.  
A. Plug one end of a standard CAT-5E cable into the Threat Analysis Reporter’s LAN 1  
port, the port on the left.  
Rear of the “S” and “MSA” chassis  
Rear of the “H” chassis  
B. Plug the other end of the CAT-5E cable into an open port on the network switch.  
Bandwidth Management  
If you choose to install the Ethernet Tap for bandwidth monitoring, you will need to con-  
nect it to the Threat Analysis Reporter at this point. Refer to Appendix A at the end of this  
document for instructions on how to connect the Ethernet Tap unit.  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
ꢁꢆ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Step 3: Wizard Setup Procedures  
For this step, you will need your network administrator to provide you the following infor-  
mation:  
IP range and netmask of machines on the network the Threat Analysis Reporter  
server will be monitoring  
R3000 IP address, port number to be used between the R3000 and Threat Analysis  
Reporter, and type of authentication method to be used (IP group or LDAP)  
8e6 Enterprise Reporter server IP address and server name, if an ER unit is con-  
nected to the R3000  
Access the Threat Analysis Reporter Administrator Console  
A. Launch Internet Explorer.  
B. In the address field, type in http://x.x.x.x:8080/8e6tar/wizard.html (in which “x.x.x.x”  
represents the eth0 IP address entered in the Connect Network Interface screen  
of the Step-by-Step Initial Setup Procedures). In our example, this entry would be:  
C. Click Go to open the Threat Analysis Reporter interface and the EULA Agreement  
dialog box:  
ꢂ0  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
D. After reading the End User License Agreement, you have the option to do either of  
the following:  
Click No to close both the EULA Agreement dialog box and the Threat Analysis  
Reporter interface. You will not be able to enable the Threat Analysis Reporter for  
use in your environment.  
Click Yes to close the EULA Agreement dialog box and to open the Login dialog  
box:  
Proceed to the next sub-section: Log in to the Threat Analysis Reporter Adminis-  
trator Console.  
Log in to the Threat Analysis Reporter Administrator Console  
A. In the Username field of the Login dialog box, type in the username specified in the  
Configure Wizard user screen of the Step-by-Step Initial Setup Procedures. In our  
example, this entry would be: taruser.  
B. In the Password field, type in the password specified in the Configure Wizard user  
screen of the Step-by-Step Initial Setup Procedures.  
C. Click LOGIN to close the login dialog box and to go to Step 1 of wizard setup pro-  
cedures in the Threat Analysis Reporter Administrator console (see Step 1: Register  
administrator).  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
ꢂꢀ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Step 1: Register administrator  
Step 1 is performed in the left side of the first screen of the wizard:  
A. Enter the username the global administrator will use when logging into the Threat  
Analysis Reporter Administrator console. The global administrator has the highest  
level of permissions in the Threat Analysis Reporter interface.  
B. Enter the password to be used with that username, and enter the same password  
again in the confirm password field.  
C. Enter the email address of the global administrator, who will be notified via email  
when gauges reach their specified upper threshold limits.  
ꢂꢁ  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.  
D. Click the [+] Add tab beow to open the IP Range Information dialog box:  
E. Enter the IP address range for the bandwidth the Threat Analysis Reporter will moni-  
tor.  
F. Enter the Netmask for the IP range to be monitored, using the dotted decimals nota-  
tion format.  
G. Click OK to close the dialog box and to display your entries in the list box:  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
ꢂꢂ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
NOTE: Additional IP address ranges can be included by clicking the [+] Add  
tab again and making the entries described in steps E through G above.  
To modify an IP address range, double-click the entry in the list box to highlight it and  
to display the [-] Remove tab to the left of the [+] Add tab:  
To modify the entries made for the IP address range, click the [+] Add tab to re-  
open the IP Range Information dialog box and edit information, as necessary.  
Click OK to close the dialog box and to display the modified information in the list  
box.  
To remove the entry for the IP address range from the list box, click the [-] Re-  
move tab. Click the [+] Add tab to open the IP Range Information dialog box and  
make new entries for the IP address range.  
ꢂꢃ  
8e6 ThreaT analysis reporTer Quick sTarT Guide  
Download from Www.Somanuals.com. All Manuals Search And Download.