SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
First/Final Draft for Review - FireEye Confidential - August 17, 2013

TM

Inside this Card
• Before You Begin
• Installing the FireEye Appliance
• Quick Set-Up Using the
Front Panel LCD

FireEye™ Appliance
Quick Start
Use this quick start card to install the FireEye appliance in minutes. FireEye appliances can
accurately identify malicious attacks, including targeted attacks specific to a particular
enterprise network. After definitively confirming a targeted malware attack, the FireEye
appliance can block the attack, quarantine the infected machine, and alert administrators
about the incident.

Before You Begin

• Quick Set-Up Using the
Serial Console

• Inspect the package contents and verify that you have received all components listed in
the packing list.

• Where to Go Next

• Ensure that sufficient power is available. FireEye appliances consume approximately
2 amps (220 watts at 110 volts) continuously, with peaks slightly higher.
• Ensure a minimum of 6 inches clearance in the front and back of the chassis.
• Have a serial console cable and laptop or terminal server to serve as the console.
• Have two Ethernet cables.

Installing the FireEye Appliance
1. Install the FireEye appliance in the network rack using one of the following
methods:
• Use a rail kit (purchased from FireEye) to attach the rack and rails to the box. Follow
the instructions in the rail kit box.
• Install a rack tray (purchased from FireEye) and place the appliance on the tray.
Follow the instructions in the tray kit.
NOTE: Mounting the FireEye appliance on the rack using only the front brackets is
not recommended.
FireEye™ Appliance Quick Start

2. Attach Ethernet cables.
• Attach an Ethernet cable to the Management
interface (port 1) and the other end to your
LAN to enable remote access to the FireEye
command-line interface (CLI) and graphical
user interface (GUI).

Serial port

Management
port

Monitoring
interfaces

• Attach an additional Ethernet cable to one of
the monitoring interfaces (ports 3-6 on the
FireEye appliance) and connect the other
end of the cable to the SPAN/mirror port of
the switch that you want to monitor.
3. (Optional) Attach a serial console
cable to the serial port on the
appliance and to a terminal.
• Configure the following settings on the terminal: 115200 bps, 8 data bits, one stop bit, no parity.
NOTE: You can use a serial console to configure the FireEye appliance without first configuring an IP address
and to view all console log messages.
4. Connect power cables and turn the
power on.
• Connect the power cable to the
back of the appliance. Make sure
that the power switch is in the OFF
position when connecting the
power cable.

5. Power on the appliance.
• Turn on the power supply switch
on the back of the appliance.
• Press and hold the green checkmark button on the front panel
LCD for 5 seconds to power on
the appliance.
• Configure the appliance using
one of the following methods:
- Quick Set-Up Using the Front Panel LCD
- Quick Set-Up Using the Serial Console

Power supply switch

Front panel LCD
FireEye™ Appliance Quick Start

Quick Set-Up Using the Front Panel LCD
Perform either the LCD panel set-up steps or the serial console set-up steps. FireEye
recommends using the serial console method, if possible, as described on the next page.
NOTE: You may need to wait after powering on for the FireEye logo to disappear
and the alternating status display to appear.
6. Configure the primary DNS server (optional).

1. Access the LCD menu interface.

View the Primary DNS menu.

Access the menu system.

Enter modify mode.

Access the Network menu.
2. Configure DHCP.

and
and

View DHCP status.

Save when the correct address is displayed.

Enter modify mode.
and

Set DHCP status to yes or no.

7. Configure the appliance domain name (optional).

View the Domain Name menu.

Accept the displayed value.
NOTE: If DHCP is yes, go to step 8. If DHCP is no, go to step 3.

Enter modify mode.
and

3. Configure a static IP address.

and
View the Static IP Addr menu.

and

Change values.
Move between digits in the name.

Save when the correct name is displayed.

Enter modify mode.
and

Change values.
Move between digits in the address.

8. Configure the appliance hostname (optional).

Change values.

View the hostname menu.

Move between digits in the address.

Save when the correct address is displayed.
4. Configure the network mask.

Enter modify mode.
and
and

View the Netmask menu.

Change values.
Move between characters in the hostname.

Save the correct hostname.

Enter modify mode.

9. Save settings.

Repeatedly to increment the netmask and
to decrement it. Example: to set netmask of 255.255.255.0 (/24)

Return to status display mode.

when displayed value is 0.0.0.0, press

Access the menu system.

24 times.

Save when the correct netmask is displayed.
5. Configure the gateway.

View the Gateway menu.
Enter modify mode.
and
and

Change values.
Move between digits in the address.

Save when the correct address is displayed.

Access save settings menu.
Enter modify mode.
Select Yes.
Save settings.

NOTE: Changes do not take effect until you perform
step 9, even though the LCD may appear to reflect the
desired configuration settings.
FireEye™ Appliance Quick Start

Quick Set-Up Using the Serial Console
Perform either the LCD panel set-up steps or the serial console set-up steps. FireEye
recommends using the serial console method, if possible, as described on this page.
1. Make sure that the appliance is installed and powered on and that the console
terminal is properly configured and active (page 1).
2. Log in to the console with user name admin and no password.
3. Enter yes to use the configuration wizard, and then respond as shown below.
1. Hostname?

Enter the hostname for the appliance.

2. Use DHCP on ether1 interface?

Enter yes to use DHCP or no to manually configure your IP address and network settings.
If DHCP is selected, you will be immediately sent to step 8.

3. Primary IP address?

Enter the IP address for the management interface.

4. Netmask?

Enter the network mask in A.B.C.D format.

5. Default gateway?

Enter the gateway IP address for the management interface.

6. Primary DNS server?

Enter the DNS server IP address.

7. Domain name?

Enter the domain for the management interface.

8. Enable NTP?

Enter yes to use default public Network Time Protocol (NTP) servers (pool.ntp.org or time.nist.gov) to set the
system time or no to configure the time manually at a later time.

9. Admin password?

Enter a new administrator password. Press <Enter> to keep the default admin.

10. Product license key?

Enter the license key or press <Enter> to use an evaluation license.

11. Enable MAX
security-contents updates?

Enter yes to enable download of new security content from the FireEye Malware Analysis and Exchange Network (MAX) network.

12. Enable MAX
security-contents uploads?

Enter yes to enable uploading of security statistics and content to the MAX network.

13. MAX user name?

Enter a user name for access to the MAX network.

14. MAX password?

Enter and then confirm a password for access to the MAX network. Press <Enter> to leave unchanged.

4. After all the questions are answered, the wizard summarizes the answers. To change an answer, enter the step
number. To save changes and exit, press <enter>.

Where to Go Next
You can now access the FireEye appliance management GUI using any of the following methods:
• Web browser using HTTPS. Open a web browser (Firefox or Internet Explorer), and enter https://[appliance IP address
or hostname]. Log in with the user name admin and the password that was entered during set-up (default admin).
• Serial console or Management port CLI using SSH.
For more information, see the following documents:
• FireEye Appliance Operator’s Guide—Contains information on configuring and monitoring FireEye appliances.
• FireEye CMS Operator’s Guide—Contains a product overview and information about how to use the FireEye Central
Management System (CMS) to configure and administer the FireEye appliance.
• FireEye Appliance CLI Command Reference Guide—Contains a description of the commands that make up the CLI of the
FireEye appliance.

TM

FireEye, Inc.
1390 McCarthy Boulevard
Milpitas, CA 95035
www.fireeye.com

Part Number 230-QS4000-A6
© 2008-2009 FireEye, Inc. All rights reserved.
FireEye and the FireEye logo are either trademarks or trade names of
FireEye, Inc. All other trademarks are the property of their respective owners.

Weitere ähnliche Inhalte

Was ist angesagt?

Free radius for wpa2 enterprise with active directory integration
Free radius for wpa2 enterprise with active directory integrationFree radius for wpa2 enterprise with active directory integration
Free radius for wpa2 enterprise with active directory integration
Chanaka Lasantha
 

Was ist angesagt? (20)

Free radius for wpa2 enterprise with active directory integration
Free radius for wpa2 enterprise with active directory integrationFree radius for wpa2 enterprise with active directory integration
Free radius for wpa2 enterprise with active directory integration
 
Introduction to docker
Introduction to dockerIntroduction to docker
Introduction to docker
 
Dockers and containers basics
Dockers and containers basicsDockers and containers basics
Dockers and containers basics
 
Dell EMC OpenManage idrac9 server power capping
Dell EMC OpenManage idrac9 server power capping Dell EMC OpenManage idrac9 server power capping
Dell EMC OpenManage idrac9 server power capping
 
Containers Anywhere with OpenShift by Red Hat
Containers Anywhere with OpenShift by Red HatContainers Anywhere with OpenShift by Red Hat
Containers Anywhere with OpenShift by Red Hat
 
Cisco CCNP Data Center
Cisco CCNP Data CenterCisco CCNP Data Center
Cisco CCNP Data Center
 
Containers: The What, Why, and How
Containers: The What, Why, and HowContainers: The What, Why, and How
Containers: The What, Why, and How
 
Installing Aix
Installing AixInstalling Aix
Installing Aix
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 
OpenStack Architecture
OpenStack ArchitectureOpenStack Architecture
OpenStack Architecture
 
Packet tracer
Packet tracerPacket tracer
Packet tracer
 
iSCSI (Internet Small Computer System Interface)
iSCSI (Internet Small Computer System Interface)iSCSI (Internet Small Computer System Interface)
iSCSI (Internet Small Computer System Interface)
 
Software Defined Networking (SDN)
Software Defined Networking (SDN)Software Defined Networking (SDN)
Software Defined Networking (SDN)
 
Cloud stack for_beginners
Cloud stack for_beginnersCloud stack for_beginners
Cloud stack for_beginners
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Hp next gen msr series routers technical training 21 jan15
Hp next gen msr series routers technical training 21 jan15Hp next gen msr series routers technical training 21 jan15
Hp next gen msr series routers technical training 21 jan15
 
Red Hat Essentials
Red Hat EssentialsRed Hat Essentials
Red Hat Essentials
 
VMware vSphere Storage Enhancements
VMware vSphere Storage EnhancementsVMware vSphere Storage Enhancements
VMware vSphere Storage Enhancements
 
OpenNebula Networking - Rubén S. Montero
OpenNebula Networking - Rubén S. MonteroOpenNebula Networking - Rubén S. Montero
OpenNebula Networking - Rubén S. Montero
 
Red Hat OpenStack - Open Cloud Infrastructure
Red Hat OpenStack - Open Cloud InfrastructureRed Hat OpenStack - Open Cloud Infrastructure
Red Hat OpenStack - Open Cloud Infrastructure
 

Andere mochten auch

Fireeye definitive-guide-next-gen-threat-protection-2
Fireeye definitive-guide-next-gen-threat-protection-2Fireeye definitive-guide-next-gen-threat-protection-2
Fireeye definitive-guide-next-gen-threat-protection-2
drewz lin
 
FireEye System Engineer (FSE) Certification
FireEye System Engineer (FSE) CertificationFireEye System Engineer (FSE) Certification
FireEye System Engineer (FSE) Certification
Yasser Amir
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Edge Pereira
 
StackOverflow
StackOverflowStackOverflow
StackOverflow
Susam Pal
 

Andere mochten auch (20)

FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
FireEye
FireEyeFireEye
FireEye
 
FireEye Systems Engineer
FireEye Systems EngineerFireEye Systems Engineer
FireEye Systems Engineer
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted Attacks
 
Fireeye definitive-guide-next-gen-threat-protection-2
Fireeye definitive-guide-next-gen-threat-protection-2Fireeye definitive-guide-next-gen-threat-protection-2
Fireeye definitive-guide-next-gen-threat-protection-2
 
FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not
 
FireEye System Engineer (FSE) Certification
FireEye System Engineer (FSE) CertificationFireEye System Engineer (FSE) Certification
FireEye System Engineer (FSE) Certification
 
FireEye Junior System Engineer
FireEye Junior System Engineer FireEye Junior System Engineer
FireEye Junior System Engineer
 
FireEye Engineering
FireEye Engineering FireEye Engineering
FireEye Engineering
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
 
[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers
 
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatchDetecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
 
StackOverflow
StackOverflowStackOverflow
StackOverflow
 
The Seven Deadly Sins of Incident Response
The Seven Deadly Sins of Incident ResponseThe Seven Deadly Sins of Incident Response
The Seven Deadly Sins of Incident Response
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
 
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
 
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointExtending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
 
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
 
Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best Practices
 
Top 10 Security Vulnerabilities (2006)
Top 10 Security Vulnerabilities (2006)Top 10 Security Vulnerabilities (2006)
Top 10 Security Vulnerabilities (2006)
 

Ähnlich wie Fire Eye Appliance Quick Start

Digium ip pbx admin-manual
Digium  ip pbx admin-manualDigium  ip pbx admin-manual
Digium ip pbx admin-manual
janamejay1978
 
Smart homes using android
Smart homes using androidSmart homes using android
Smart homes using android
Droidcon Berlin
 
Wireless lab4902
Wireless lab4902Wireless lab4902
Wireless lab4902
mark scott
 
Voice Primer Lab.pdf
Voice Primer Lab.pdfVoice Primer Lab.pdf
Voice Primer Lab.pdf
acaldere
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_Lab
Taishaun Owens
 

Ähnlich wie Fire Eye Appliance Quick Start (20)

SunEyes T Series User Manual
SunEyes T Series User ManualSunEyes T Series User Manual
SunEyes T Series User Manual
 
ArubaOS 6.3.x Quick Start Guide
ArubaOS 6.3.x Quick Start GuideArubaOS 6.3.x Quick Start Guide
ArubaOS 6.3.x Quick Start Guide
 
Aruba os 6.3.x quick start guide
Aruba os 6.3.x quick start guideAruba os 6.3.x quick start guide
Aruba os 6.3.x quick start guide
 
7106506104 tl wa701-nd(eu)_2.0_qig
7106506104 tl wa701-nd(eu)_2.0_qig7106506104 tl wa701-nd(eu)_2.0_qig
7106506104 tl wa701-nd(eu)_2.0_qig
 
manual vvtk camera_st7501
manual vvtk camera_st7501manual vvtk camera_st7501
manual vvtk camera_st7501
 
Ccna icnd1-labs - exercices
Ccna icnd1-labs - exercicesCcna icnd1-labs - exercices
Ccna icnd1-labs - exercices
 
Interconnecting cisco networking devices part-1
Interconnecting cisco networking devices part-1Interconnecting cisco networking devices part-1
Interconnecting cisco networking devices part-1
 
Wi fi ruckus config
Wi fi ruckus configWi fi ruckus config
Wi fi ruckus config
 
Digium ip pbx admin-manual
Digium  ip pbx admin-manualDigium  ip pbx admin-manual
Digium ip pbx admin-manual
 
Aruba cppm 6_1_user_guide
Aruba cppm 6_1_user_guideAruba cppm 6_1_user_guide
Aruba cppm 6_1_user_guide
 
Smart homes using android
Smart homes using androidSmart homes using android
Smart homes using android
 
Wireless lab4902
Wireless lab4902Wireless lab4902
Wireless lab4902
 
Project Pt1
Project Pt1Project Pt1
Project Pt1
 
Voice Primer Lab.pdf
Voice Primer Lab.pdfVoice Primer Lab.pdf
Voice Primer Lab.pdf
 
System installation in CCTV
System installation in CCTVSystem installation in CCTV
System installation in CCTV
 
Digital video recorder
Digital video recorderDigital video recorder
Digital video recorder
 
Configuring a cisco 2901 router
Configuring a cisco 2901 routerConfiguring a cisco 2901 router
Configuring a cisco 2901 router
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_Lab
 
NVR3000 Wizard & Basic Configuration
NVR3000 Wizard & Basic ConfigurationNVR3000 Wizard & Basic Configuration
NVR3000 Wizard & Basic Configuration
 
Quick Installation Guide EWS7952FP
Quick Installation Guide EWS7952FPQuick Installation Guide EWS7952FP
Quick Installation Guide EWS7952FP
 

Mehr von Content Rules, Inc.

Mehr von Content Rules, Inc. (20)

Taxonomy and Terminology: The Crossroad of Controlled Vocabulary
Taxonomy and Terminology: The Crossroad of Controlled VocabularyTaxonomy and Terminology: The Crossroad of Controlled Vocabulary
Taxonomy and Terminology: The Crossroad of Controlled Vocabulary
 
Taking Your Content to Global Proportinos - Global Website Best Practices
Taking Your Content to Global Proportinos - Global Website Best PracticesTaking Your Content to Global Proportinos - Global Website Best Practices
Taking Your Content to Global Proportinos - Global Website Best Practices
 
Do Personas Work in a Global Marketplace?
Do Personas Work in a Global Marketplace?Do Personas Work in a Global Marketplace?
Do Personas Work in a Global Marketplace?
 
Processing Source Terminology - Localization World 2014
Processing Source Terminology - Localization World 2014Processing Source Terminology - Localization World 2014
Processing Source Terminology - Localization World 2014
 
Global content strategy meetup 10_16_14
Global content strategy meetup 10_16_14Global content strategy meetup 10_16_14
Global content strategy meetup 10_16_14
 
Your Brain on XML: Structured Content and Operational Efficiency
Your Brain on XML: Structured Content and Operational EfficiencyYour Brain on XML: Structured Content and Operational Efficiency
Your Brain on XML: Structured Content and Operational Efficiency
 
WikiProject Medicine: Breaking Down Barriers to Save Lives
WikiProject Medicine: Breaking Down Barriers to Save LivesWikiProject Medicine: Breaking Down Barriers to Save Lives
WikiProject Medicine: Breaking Down Barriers to Save Lives
 
Content rules overview and global readiness
Content rules overview and global readinessContent rules overview and global readiness
Content rules overview and global readiness
 
Security Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleSecurity Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training Sample
 
Preparing the Sentriant CE150 for Operation Module 7
 - - Training Sample
Preparing the Sentriant CE150 for Operation Module 7
 -  - Training SamplePreparing the Sentriant CE150 for Operation Module 7
 -  - Training Sample
Preparing the Sentriant CE150 for Operation Module 7
 - - Training Sample
 
NetApp Word Cloud - Marketing Sample
NetApp Word Cloud - Marketing SampleNetApp Word Cloud - Marketing Sample
NetApp Word Cloud - Marketing Sample
 
How to Write Using International English - Excerpt
How to Write Using International English - ExcerptHow to Write Using International English - Excerpt
How to Write Using International English - Excerpt
 
P03 swisher val_developing a global content strategy_swisher
P03 swisher val_developing a global content strategy_swisherP03 swisher val_developing a global content strategy_swisher
P03 swisher val_developing a global content strategy_swisher
 
Planning Your Global Content Strategy
Planning Your Global Content StrategyPlanning Your Global Content Strategy
Planning Your Global Content Strategy
 
The Seven Components of a Global Content Strategy
The Seven Components of a Global Content StrategyThe Seven Components of a Global Content Strategy
The Seven Components of a Global Content Strategy
 
Using Language to Change the World - Translators Without Borders
Using Language to Change the World - Translators Without BordersUsing Language to Change the World - Translators Without Borders
Using Language to Change the World - Translators Without Borders
 
Google Course Lecture
Google Course LectureGoogle Course Lecture
Google Course Lecture
 
Thinking Strategically About Content Destined for Machine Translation
Thinking Strategically About Content Destined for Machine TranslationThinking Strategically About Content Destined for Machine Translation
Thinking Strategically About Content Destined for Machine Translation
 
Shepherding Your Content for Operational Efficiency
Shepherding Your Content for Operational EfficiencyShepherding Your Content for Operational Efficiency
Shepherding Your Content for Operational Efficiency
 
It Starts With The Source - Source English Terminology in a Multi-Channel, Gl...
It Starts With The Source - Source English Terminology in a Multi-Channel, Gl...It Starts With The Source - Source English Terminology in a Multi-Channel, Gl...
It Starts With The Source - Source English Terminology in a Multi-Channel, Gl...
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Fire Eye Appliance Quick Start

  • 1. First/Final Draft for Review - FireEye Confidential - August 17, 2013 TM Inside this Card • Before You Begin • Installing the FireEye Appliance • Quick Set-Up Using the Front Panel LCD FireEye™ Appliance Quick Start Use this quick start card to install the FireEye appliance in minutes. FireEye appliances can accurately identify malicious attacks, including targeted attacks specific to a particular enterprise network. After definitively confirming a targeted malware attack, the FireEye appliance can block the attack, quarantine the infected machine, and alert administrators about the incident. Before You Begin • Quick Set-Up Using the Serial Console • Inspect the package contents and verify that you have received all components listed in the packing list. • Where to Go Next • Ensure that sufficient power is available. FireEye appliances consume approximately 2 amps (220 watts at 110 volts) continuously, with peaks slightly higher. • Ensure a minimum of 6 inches clearance in the front and back of the chassis. • Have a serial console cable and laptop or terminal server to serve as the console. • Have two Ethernet cables. Installing the FireEye Appliance 1. Install the FireEye appliance in the network rack using one of the following methods: • Use a rail kit (purchased from FireEye) to attach the rack and rails to the box. Follow the instructions in the rail kit box. • Install a rack tray (purchased from FireEye) and place the appliance on the tray. Follow the instructions in the tray kit. NOTE: Mounting the FireEye appliance on the rack using only the front brackets is not recommended.
  • 2. FireEye™ Appliance Quick Start 2. Attach Ethernet cables. • Attach an Ethernet cable to the Management interface (port 1) and the other end to your LAN to enable remote access to the FireEye command-line interface (CLI) and graphical user interface (GUI). Serial port Management port Monitoring interfaces • Attach an additional Ethernet cable to one of the monitoring interfaces (ports 3-6 on the FireEye appliance) and connect the other end of the cable to the SPAN/mirror port of the switch that you want to monitor. 3. (Optional) Attach a serial console cable to the serial port on the appliance and to a terminal. • Configure the following settings on the terminal: 115200 bps, 8 data bits, one stop bit, no parity. NOTE: You can use a serial console to configure the FireEye appliance without first configuring an IP address and to view all console log messages. 4. Connect power cables and turn the power on. • Connect the power cable to the back of the appliance. Make sure that the power switch is in the OFF position when connecting the power cable. 5. Power on the appliance. • Turn on the power supply switch on the back of the appliance. • Press and hold the green checkmark button on the front panel LCD for 5 seconds to power on the appliance. • Configure the appliance using one of the following methods: - Quick Set-Up Using the Front Panel LCD - Quick Set-Up Using the Serial Console Power supply switch Front panel LCD
  • 3. FireEye™ Appliance Quick Start Quick Set-Up Using the Front Panel LCD Perform either the LCD panel set-up steps or the serial console set-up steps. FireEye recommends using the serial console method, if possible, as described on the next page. NOTE: You may need to wait after powering on for the FireEye logo to disappear and the alternating status display to appear. 6. Configure the primary DNS server (optional). 1. Access the LCD menu interface. View the Primary DNS menu. Access the menu system. Enter modify mode. Access the Network menu. 2. Configure DHCP. and and View DHCP status. Save when the correct address is displayed. Enter modify mode. and Set DHCP status to yes or no. 7. Configure the appliance domain name (optional). View the Domain Name menu. Accept the displayed value. NOTE: If DHCP is yes, go to step 8. If DHCP is no, go to step 3. Enter modify mode. and 3. Configure a static IP address. and View the Static IP Addr menu. and Change values. Move between digits in the name. Save when the correct name is displayed. Enter modify mode. and Change values. Move between digits in the address. 8. Configure the appliance hostname (optional). Change values. View the hostname menu. Move between digits in the address. Save when the correct address is displayed. 4. Configure the network mask. Enter modify mode. and and View the Netmask menu. Change values. Move between characters in the hostname. Save the correct hostname. Enter modify mode. 9. Save settings. Repeatedly to increment the netmask and to decrement it. Example: to set netmask of 255.255.255.0 (/24) Return to status display mode. when displayed value is 0.0.0.0, press Access the menu system. 24 times. Save when the correct netmask is displayed. 5. Configure the gateway. View the Gateway menu. Enter modify mode. and and Change values. Move between digits in the address. Save when the correct address is displayed. Access save settings menu. Enter modify mode. Select Yes. Save settings. NOTE: Changes do not take effect until you perform step 9, even though the LCD may appear to reflect the desired configuration settings.
  • 4. FireEye™ Appliance Quick Start Quick Set-Up Using the Serial Console Perform either the LCD panel set-up steps or the serial console set-up steps. FireEye recommends using the serial console method, if possible, as described on this page. 1. Make sure that the appliance is installed and powered on and that the console terminal is properly configured and active (page 1). 2. Log in to the console with user name admin and no password. 3. Enter yes to use the configuration wizard, and then respond as shown below. 1. Hostname? Enter the hostname for the appliance. 2. Use DHCP on ether1 interface? Enter yes to use DHCP or no to manually configure your IP address and network settings. If DHCP is selected, you will be immediately sent to step 8. 3. Primary IP address? Enter the IP address for the management interface. 4. Netmask? Enter the network mask in A.B.C.D format. 5. Default gateway? Enter the gateway IP address for the management interface. 6. Primary DNS server? Enter the DNS server IP address. 7. Domain name? Enter the domain for the management interface. 8. Enable NTP? Enter yes to use default public Network Time Protocol (NTP) servers (pool.ntp.org or time.nist.gov) to set the system time or no to configure the time manually at a later time. 9. Admin password? Enter a new administrator password. Press <Enter> to keep the default admin. 10. Product license key? Enter the license key or press <Enter> to use an evaluation license. 11. Enable MAX security-contents updates? Enter yes to enable download of new security content from the FireEye Malware Analysis and Exchange Network (MAX) network. 12. Enable MAX security-contents uploads? Enter yes to enable uploading of security statistics and content to the MAX network. 13. MAX user name? Enter a user name for access to the MAX network. 14. MAX password? Enter and then confirm a password for access to the MAX network. Press <Enter> to leave unchanged. 4. After all the questions are answered, the wizard summarizes the answers. To change an answer, enter the step number. To save changes and exit, press <enter>. Where to Go Next You can now access the FireEye appliance management GUI using any of the following methods: • Web browser using HTTPS. Open a web browser (Firefox or Internet Explorer), and enter https://[appliance IP address or hostname]. Log in with the user name admin and the password that was entered during set-up (default admin). • Serial console or Management port CLI using SSH. For more information, see the following documents: • FireEye Appliance Operator’s Guide—Contains information on configuring and monitoring FireEye appliances. • FireEye CMS Operator’s Guide—Contains a product overview and information about how to use the FireEye Central Management System (CMS) to configure and administer the FireEye appliance. • FireEye Appliance CLI Command Reference Guide—Contains a description of the commands that make up the CLI of the FireEye appliance. TM FireEye, Inc. 1390 McCarthy Boulevard Milpitas, CA 95035 www.fireeye.com Part Number 230-QS4000-A6 © 2008-2009 FireEye, Inc. All rights reserved. FireEye and the FireEye logo are either trademarks or trade names of FireEye, Inc. All other trademarks are the property of their respective owners.