Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Adding Devices That are Managed by a Sourcefire Defense Center

Use Configuration Source Management to add all devices from a Sourcefire Defense Center to JSA Risk Manager.

Review the supported software versions, credentials, and required commands for your network devices. For more information, see Supported Adapters.

  1. On the navigation menu, click Admin to open the admin tab.

  2. On the Admin navigation menu, click Plug-ins or Apps.

    • In JSA 7.3.0 or earlier, click Plug-ins.

    • In JSA 7.3.1, click Apps.

  3. On the Risk Manager pane, click Configuration Source Management.

  4. On the navigation menu, click Credentials.

  5. On the Network Groups pane, click Add a new network group.

    1. Type a name for the network group, and then click OK.

    2. Type the IP address of your device, and click Add.

      You can type an IP address, a range of IP addresses, a CIDR subnet, or a wildcard.

    3. Ensure that the address that you add are is displayed in the Network address box beside the Add address box.

    4. Repeat the step 5 (a) and step 5 (b) for each IP address that you want to add.

  6. On the Credentials pane, click Add a new credential set.

    1. Type a name for the credential set, and then click OK.

    2. Select the name of the credential set that you created and enter values for the parameters.

    The following table describes the parameters:

    Table 1: Parameter Options for Sourcefire Defense Center Web Services Credentials

    Parameter

    Description

    Username

    A valid user name to log in to the Sourcefire Defense Center.

    Password

    The password for the device.

  7. On the navigation menu, click Discover from Defense Center.

  8. Enter values for the IP address and user credentials, click OK and then click GO.

  9. Select the device that you added to the device list, and click Backup and then click Yes.

After you add all of the required devices, you can configure protocols. For more information, see the Juniper Secure Analytics Risk Manager User Guide.