Installing and Initially Configuring the Threat Mitigation Application
Because the Threat Mitigation Application relies on other components in the SRC network, you must complete several tasks before you install the Threat Mitigation Application software. After you install the software, you must also complete several configuration tasks before the application can function correctly.
For information about the location of the Threat Mitigation Application software, see Installing SRC Application Packages.
Before you install and configure the Threat Mitigation Application, you must:
- Deploy a working SRC network.
To support the Threat Mitigation Application, you must install SAEs to manage the routers or other devices through which subscribers connect to the network. You must also install and configure the directory in which you will store the SRC data.
- Install a J2EE application server on the host that supports the Threat Mitigation Application.
- On the host that supports the Threat Mitigation Application, install a transactional database to store the data for the Threat Mitigation Application.
To install the Threat Mitigation Application:
- Install the Solaris package for the Threat Mitigation Application on a host that supports JBoss.
- Run the configuration script to configure the Threat Mitigation Application.
- Run the load script to complete the configuration tasks for deploying the Threat Mitigation Application.
- On each host, restart JBoss.
You must restart JBoss when you have configured the SRC-TMP for the first time or you have changed the database type.
