SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
First/Final Draft for Review - FireEye Confidential - August 17, 2013

TM

Inside this Card
• Before You Begin
• Installing the FireEye Appliance
• Quick Set-Up Using the
Front Panel LCD

FireEye™ Appliance
Quick Start
Use this quick start card to install the FireEye appliance in minutes. FireEye appliances can
accurately identify malicious attacks, including targeted attacks specific to a particular
enterprise network. After definitively confirming a targeted malware attack, the FireEye
appliance can block the attack, quarantine the infected machine, and alert administrators
about the incident.

Before You Begin

• Quick Set-Up Using the
Serial Console

• Inspect the package contents and verify that you have received all components listed in
the packing list.

• Where to Go Next

• Ensure that sufficient power is available. FireEye appliances consume approximately
2 amps (220 watts at 110 volts) continuously, with peaks slightly higher.
• Ensure a minimum of 6 inches clearance in the front and back of the chassis.
• Have a serial console cable and laptop or terminal server to serve as the console.
• Have two Ethernet cables.

Installing the FireEye Appliance
1. Install the FireEye appliance in the network rack using one of the following
methods:
• Use a rail kit (purchased from FireEye) to attach the rack and rails to the box. Follow
the instructions in the rail kit box.
• Install a rack tray (purchased from FireEye) and place the appliance on the tray.
Follow the instructions in the tray kit.
NOTE: Mounting the FireEye appliance on the rack using only the front brackets is
not recommended.
FireEye™ Appliance Quick Start

2. Attach Ethernet cables.
• Attach an Ethernet cable to the Management
interface (port 1) and the other end to your
LAN to enable remote access to the FireEye
command-line interface (CLI) and graphical
user interface (GUI).

Serial port

Management
port

Monitoring
interfaces

• Attach an additional Ethernet cable to one of
the monitoring interfaces (ports 3-6 on the
FireEye appliance) and connect the other
end of the cable to the SPAN/mirror port of
the switch that you want to monitor.
3. (Optional) Attach a serial console
cable to the serial port on the
appliance and to a terminal.
• Configure the following settings on the terminal: 115200 bps, 8 data bits, one stop bit, no parity.
NOTE: You can use a serial console to configure the FireEye appliance without first configuring an IP address
and to view all console log messages.
4. Connect power cables and turn the
power on.
• Connect the power cable to the
back of the appliance. Make sure
that the power switch is in the OFF
position when connecting the
power cable.

5. Power on the appliance.
• Turn on the power supply switch
on the back of the appliance.
• Press and hold the green checkmark button on the front panel
LCD for 5 seconds to power on
the appliance.
• Configure the appliance using
one of the following methods:
- Quick Set-Up Using the Front Panel LCD
- Quick Set-Up Using the Serial Console

Power supply switch

Front panel LCD
FireEye™ Appliance Quick Start

Quick Set-Up Using the Front Panel LCD
Perform either the LCD panel set-up steps or the serial console set-up steps. FireEye
recommends using the serial console method, if possible, as described on the next page.
NOTE: You may need to wait after powering on for the FireEye logo to disappear
and the alternating status display to appear.
6. Configure the primary DNS server (optional).

1. Access the LCD menu interface.

View the Primary DNS menu.

Access the menu system.

Enter modify mode.

Access the Network menu.
2. Configure DHCP.

and
and

View DHCP status.

Save when the correct address is displayed.

Enter modify mode.
and

Set DHCP status to yes or no.

7. Configure the appliance domain name (optional).

View the Domain Name menu.

Accept the displayed value.
NOTE: If DHCP is yes, go to step 8. If DHCP is no, go to step 3.

Enter modify mode.
and

3. Configure a static IP address.

and
View the Static IP Addr menu.

and

Change values.
Move between digits in the name.

Save when the correct name is displayed.

Enter modify mode.
and

Change values.
Move between digits in the address.

8. Configure the appliance hostname (optional).

Change values.

View the hostname menu.

Move between digits in the address.

Save when the correct address is displayed.
4. Configure the network mask.

Enter modify mode.
and
and

View the Netmask menu.

Change values.
Move between characters in the hostname.

Save the correct hostname.

Enter modify mode.

9. Save settings.

Repeatedly to increment the netmask and
to decrement it. Example: to set netmask of 255.255.255.0 (/24)

Return to status display mode.

when displayed value is 0.0.0.0, press

Access the menu system.

24 times.

Save when the correct netmask is displayed.
5. Configure the gateway.

View the Gateway menu.
Enter modify mode.
and
and

Change values.
Move between digits in the address.

Save when the correct address is displayed.

Access save settings menu.
Enter modify mode.
Select Yes.
Save settings.

NOTE: Changes do not take effect until you perform
step 9, even though the LCD may appear to reflect the
desired configuration settings.
FireEye™ Appliance Quick Start

Quick Set-Up Using the Serial Console
Perform either the LCD panel set-up steps or the serial console set-up steps. FireEye
recommends using the serial console method, if possible, as described on this page.
1. Make sure that the appliance is installed and powered on and that the console
terminal is properly configured and active (page 1).
2. Log in to the console with user name admin and no password.
3. Enter yes to use the configuration wizard, and then respond as shown below.
1. Hostname?

Enter the hostname for the appliance.

2. Use DHCP on ether1 interface?

Enter yes to use DHCP or no to manually configure your IP address and network settings.
If DHCP is selected, you will be immediately sent to step 8.

3. Primary IP address?

Enter the IP address for the management interface.

4. Netmask?

Enter the network mask in A.B.C.D format.

5. Default gateway?

Enter the gateway IP address for the management interface.

6. Primary DNS server?

Enter the DNS server IP address.

7. Domain name?

Enter the domain for the management interface.

8. Enable NTP?

Enter yes to use default public Network Time Protocol (NTP) servers (pool.ntp.org or time.nist.gov) to set the
system time or no to configure the time manually at a later time.

9. Admin password?

Enter a new administrator password. Press <Enter> to keep the default admin.

10. Product license key?

Enter the license key or press <Enter> to use an evaluation license.

11. Enable MAX
security-contents updates?

Enter yes to enable download of new security content from the FireEye Malware Analysis and Exchange Network (MAX) network.

12. Enable MAX
security-contents uploads?

Enter yes to enable uploading of security statistics and content to the MAX network.

13. MAX user name?

Enter a user name for access to the MAX network.

14. MAX password?

Enter and then confirm a password for access to the MAX network. Press <Enter> to leave unchanged.

4. After all the questions are answered, the wizard summarizes the answers. To change an answer, enter the step
number. To save changes and exit, press <enter>.

Where to Go Next
You can now access the FireEye appliance management GUI using any of the following methods:
• Web browser using HTTPS. Open a web browser (Firefox or Internet Explorer), and enter https://[appliance IP address
or hostname]. Log in with the user name admin and the password that was entered during set-up (default admin).
• Serial console or Management port CLI using SSH.
For more information, see the following documents:
• FireEye Appliance Operator’s Guide—Contains information on configuring and monitoring FireEye appliances.
• FireEye CMS Operator’s Guide—Contains a product overview and information about how to use the FireEye Central
Management System (CMS) to configure and administer the FireEye appliance.
• FireEye Appliance CLI Command Reference Guide—Contains a description of the commands that make up the CLI of the
FireEye appliance.

TM

FireEye, Inc.
1390 McCarthy Boulevard
Milpitas, CA 95035
www.fireeye.com

Part Number 230-QS4000-A6
© 2008-2009 FireEye, Inc. All rights reserved.
FireEye and the FireEye logo are either trademarks or trade names of
FireEye, Inc. All other trademarks are the property of their respective owners.

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Team 3 project
Team 3 projectTeam 3 project
Team 3 project
 
BOSS OS
BOSS OSBOSS OS
BOSS OS
 
Sandbox Atlatma Teknikleri ve Öneriler
Sandbox Atlatma Teknikleri ve ÖnerilerSandbox Atlatma Teknikleri ve Öneriler
Sandbox Atlatma Teknikleri ve Öneriler
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
Microsoft LAPS - Local Administrator Password Solution
Microsoft LAPS - Local Administrator Password SolutionMicrosoft LAPS - Local Administrator Password Solution
Microsoft LAPS - Local Administrator Password Solution
 
VERİTABANI SIZMA TESTLERİ
VERİTABANI SIZMA TESTLERİVERİTABANI SIZMA TESTLERİ
VERİTABANI SIZMA TESTLERİ
 
Log yönetimi ve siem
Log yönetimi ve siemLog yönetimi ve siem
Log yönetimi ve siem
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
 
Ofansif ve Defansif Powershell
Ofansif ve Defansif PowershellOfansif ve Defansif Powershell
Ofansif ve Defansif Powershell
 
Android sandbox
Android sandboxAndroid sandbox
Android sandbox
 
Modul Training Membangun Sistem Lab From Home (LFH)
Modul Training Membangun Sistem Lab From Home (LFH)Modul Training Membangun Sistem Lab From Home (LFH)
Modul Training Membangun Sistem Lab From Home (LFH)
 
10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips
 
Android Media player
Android Media playerAndroid Media player
Android Media player
 
Log Analysis
Log AnalysisLog Analysis
Log Analysis
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Chặn tùy chỉnh symantec endpoint protection client
Chặn tùy chỉnh symantec endpoint protection clientChặn tùy chỉnh symantec endpoint protection client
Chặn tùy chỉnh symantec endpoint protection client
 
Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0 Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0
 
Pentest rapor örnek
Pentest rapor örnekPentest rapor örnek
Pentest rapor örnek
 

Destaque

Fireeye definitive-guide-next-gen-threat-protection-2
Fireeye definitive-guide-next-gen-threat-protection-2Fireeye definitive-guide-next-gen-threat-protection-2
Fireeye definitive-guide-next-gen-threat-protection-2
drewz lin
 
FireEye System Engineer (FSE) Certification
FireEye System Engineer (FSE) CertificationFireEye System Engineer (FSE) Certification
FireEye System Engineer (FSE) Certification
Yasser Amir
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Edge Pereira
 
StackOverflow
StackOverflowStackOverflow
StackOverflow
Susam Pal
 

Destaque (20)

FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
FireEye
FireEyeFireEye
FireEye
 
FireEye Systems Engineer
FireEye Systems EngineerFireEye Systems Engineer
FireEye Systems Engineer
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted Attacks
 
Fireeye definitive-guide-next-gen-threat-protection-2
Fireeye definitive-guide-next-gen-threat-protection-2Fireeye definitive-guide-next-gen-threat-protection-2
Fireeye definitive-guide-next-gen-threat-protection-2
 
FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not
 
FireEye System Engineer (FSE) Certification
FireEye System Engineer (FSE) CertificationFireEye System Engineer (FSE) Certification
FireEye System Engineer (FSE) Certification
 
FireEye Junior System Engineer
FireEye Junior System Engineer FireEye Junior System Engineer
FireEye Junior System Engineer
 
FireEye Engineering
FireEye Engineering FireEye Engineering
FireEye Engineering
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
 
[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers
 
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatchDetecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
 
StackOverflow
StackOverflowStackOverflow
StackOverflow
 
The Seven Deadly Sins of Incident Response
The Seven Deadly Sins of Incident ResponseThe Seven Deadly Sins of Incident Response
The Seven Deadly Sins of Incident Response
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
 
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
 
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointExtending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
 
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
 
Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best Practices
 
Top 10 Security Vulnerabilities (2006)
Top 10 Security Vulnerabilities (2006)Top 10 Security Vulnerabilities (2006)
Top 10 Security Vulnerabilities (2006)
 

Semelhante a Fire Eye Appliance Quick Start

Digium ip pbx admin-manual
Digium  ip pbx admin-manualDigium  ip pbx admin-manual
Digium ip pbx admin-manual
janamejay1978
 
Smart homes using android
Smart homes using androidSmart homes using android
Smart homes using android
Droidcon Berlin
 
Wireless lab4902
Wireless lab4902Wireless lab4902
Wireless lab4902
mark scott
 
Voice Primer Lab.pdf
Voice Primer Lab.pdfVoice Primer Lab.pdf
Voice Primer Lab.pdf
acaldere
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_Lab
Taishaun Owens
 

Semelhante a Fire Eye Appliance Quick Start (20)

SunEyes T Series User Manual
SunEyes T Series User ManualSunEyes T Series User Manual
SunEyes T Series User Manual
 
ArubaOS 6.3.x Quick Start Guide
ArubaOS 6.3.x Quick Start GuideArubaOS 6.3.x Quick Start Guide
ArubaOS 6.3.x Quick Start Guide
 
Aruba os 6.3.x quick start guide
Aruba os 6.3.x quick start guideAruba os 6.3.x quick start guide
Aruba os 6.3.x quick start guide
 
7106506104 tl wa701-nd(eu)_2.0_qig
7106506104 tl wa701-nd(eu)_2.0_qig7106506104 tl wa701-nd(eu)_2.0_qig
7106506104 tl wa701-nd(eu)_2.0_qig
 
manual vvtk camera_st7501
manual vvtk camera_st7501manual vvtk camera_st7501
manual vvtk camera_st7501
 
Ccna icnd1-labs - exercices
Ccna icnd1-labs - exercicesCcna icnd1-labs - exercices
Ccna icnd1-labs - exercices
 
Interconnecting cisco networking devices part-1
Interconnecting cisco networking devices part-1Interconnecting cisco networking devices part-1
Interconnecting cisco networking devices part-1
 
Wi fi ruckus config
Wi fi ruckus configWi fi ruckus config
Wi fi ruckus config
 
Digium ip pbx admin-manual
Digium  ip pbx admin-manualDigium  ip pbx admin-manual
Digium ip pbx admin-manual
 
Aruba cppm 6_1_user_guide
Aruba cppm 6_1_user_guideAruba cppm 6_1_user_guide
Aruba cppm 6_1_user_guide
 
Smart homes using android
Smart homes using androidSmart homes using android
Smart homes using android
 
Wireless lab4902
Wireless lab4902Wireless lab4902
Wireless lab4902
 
Project Pt1
Project Pt1Project Pt1
Project Pt1
 
Voice Primer Lab.pdf
Voice Primer Lab.pdfVoice Primer Lab.pdf
Voice Primer Lab.pdf
 
System installation in CCTV
System installation in CCTVSystem installation in CCTV
System installation in CCTV
 
Digital video recorder
Digital video recorderDigital video recorder
Digital video recorder
 
Configuring a cisco 2901 router
Configuring a cisco 2901 routerConfiguring a cisco 2901 router
Configuring a cisco 2901 router
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_Lab
 
NVR3000 Wizard & Basic Configuration
NVR3000 Wizard & Basic ConfigurationNVR3000 Wizard & Basic Configuration
NVR3000 Wizard & Basic Configuration
 
Quick Installation Guide EWS7952FP
Quick Installation Guide EWS7952FPQuick Installation Guide EWS7952FP
Quick Installation Guide EWS7952FP
 

Mais de Content Rules, Inc.

Mais de Content Rules, Inc. (20)

Taxonomy and Terminology: The Crossroad of Controlled Vocabulary
Taxonomy and Terminology: The Crossroad of Controlled VocabularyTaxonomy and Terminology: The Crossroad of Controlled Vocabulary
Taxonomy and Terminology: The Crossroad of Controlled Vocabulary
 
Taking Your Content to Global Proportinos - Global Website Best Practices
Taking Your Content to Global Proportinos - Global Website Best PracticesTaking Your Content to Global Proportinos - Global Website Best Practices
Taking Your Content to Global Proportinos - Global Website Best Practices
 
Do Personas Work in a Global Marketplace?
Do Personas Work in a Global Marketplace?Do Personas Work in a Global Marketplace?
Do Personas Work in a Global Marketplace?
 
Processing Source Terminology - Localization World 2014
Processing Source Terminology - Localization World 2014Processing Source Terminology - Localization World 2014
Processing Source Terminology - Localization World 2014
 
Global content strategy meetup 10_16_14
Global content strategy meetup 10_16_14Global content strategy meetup 10_16_14
Global content strategy meetup 10_16_14
 
Your Brain on XML: Structured Content and Operational Efficiency
Your Brain on XML: Structured Content and Operational EfficiencyYour Brain on XML: Structured Content and Operational Efficiency
Your Brain on XML: Structured Content and Operational Efficiency
 
WikiProject Medicine: Breaking Down Barriers to Save Lives
WikiProject Medicine: Breaking Down Barriers to Save LivesWikiProject Medicine: Breaking Down Barriers to Save Lives
WikiProject Medicine: Breaking Down Barriers to Save Lives
 
Content rules overview and global readiness
Content rules overview and global readinessContent rules overview and global readiness
Content rules overview and global readiness
 
Security Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleSecurity Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training Sample
 
Preparing the Sentriant CE150 for Operation Module 7
 - - Training Sample
Preparing the Sentriant CE150 for Operation Module 7
 -  - Training SamplePreparing the Sentriant CE150 for Operation Module 7
 -  - Training Sample
Preparing the Sentriant CE150 for Operation Module 7
 - - Training Sample
 
NetApp Word Cloud - Marketing Sample
NetApp Word Cloud - Marketing SampleNetApp Word Cloud - Marketing Sample
NetApp Word Cloud - Marketing Sample
 
How to Write Using International English - Excerpt
How to Write Using International English - ExcerptHow to Write Using International English - Excerpt
How to Write Using International English - Excerpt
 
P03 swisher val_developing a global content strategy_swisher
P03 swisher val_developing a global content strategy_swisherP03 swisher val_developing a global content strategy_swisher
P03 swisher val_developing a global content strategy_swisher
 
Planning Your Global Content Strategy
Planning Your Global Content StrategyPlanning Your Global Content Strategy
Planning Your Global Content Strategy
 
The Seven Components of a Global Content Strategy
The Seven Components of a Global Content StrategyThe Seven Components of a Global Content Strategy
The Seven Components of a Global Content Strategy
 
Using Language to Change the World - Translators Without Borders
Using Language to Change the World - Translators Without BordersUsing Language to Change the World - Translators Without Borders
Using Language to Change the World - Translators Without Borders
 
Google Course Lecture
Google Course LectureGoogle Course Lecture
Google Course Lecture
 
Thinking Strategically About Content Destined for Machine Translation
Thinking Strategically About Content Destined for Machine TranslationThinking Strategically About Content Destined for Machine Translation
Thinking Strategically About Content Destined for Machine Translation
 
Shepherding Your Content for Operational Efficiency
Shepherding Your Content for Operational EfficiencyShepherding Your Content for Operational Efficiency
Shepherding Your Content for Operational Efficiency
 
It Starts With The Source - Source English Terminology in a Multi-Channel, Gl...
It Starts With The Source - Source English Terminology in a Multi-Channel, Gl...It Starts With The Source - Source English Terminology in a Multi-Channel, Gl...
It Starts With The Source - Source English Terminology in a Multi-Channel, Gl...
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Fire Eye Appliance Quick Start

  • 1. First/Final Draft for Review - FireEye Confidential - August 17, 2013 TM Inside this Card • Before You Begin • Installing the FireEye Appliance • Quick Set-Up Using the Front Panel LCD FireEye™ Appliance Quick Start Use this quick start card to install the FireEye appliance in minutes. FireEye appliances can accurately identify malicious attacks, including targeted attacks specific to a particular enterprise network. After definitively confirming a targeted malware attack, the FireEye appliance can block the attack, quarantine the infected machine, and alert administrators about the incident. Before You Begin • Quick Set-Up Using the Serial Console • Inspect the package contents and verify that you have received all components listed in the packing list. • Where to Go Next • Ensure that sufficient power is available. FireEye appliances consume approximately 2 amps (220 watts at 110 volts) continuously, with peaks slightly higher. • Ensure a minimum of 6 inches clearance in the front and back of the chassis. • Have a serial console cable and laptop or terminal server to serve as the console. • Have two Ethernet cables. Installing the FireEye Appliance 1. Install the FireEye appliance in the network rack using one of the following methods: • Use a rail kit (purchased from FireEye) to attach the rack and rails to the box. Follow the instructions in the rail kit box. • Install a rack tray (purchased from FireEye) and place the appliance on the tray. Follow the instructions in the tray kit. NOTE: Mounting the FireEye appliance on the rack using only the front brackets is not recommended.
  • 2. FireEye™ Appliance Quick Start 2. Attach Ethernet cables. • Attach an Ethernet cable to the Management interface (port 1) and the other end to your LAN to enable remote access to the FireEye command-line interface (CLI) and graphical user interface (GUI). Serial port Management port Monitoring interfaces • Attach an additional Ethernet cable to one of the monitoring interfaces (ports 3-6 on the FireEye appliance) and connect the other end of the cable to the SPAN/mirror port of the switch that you want to monitor. 3. (Optional) Attach a serial console cable to the serial port on the appliance and to a terminal. • Configure the following settings on the terminal: 115200 bps, 8 data bits, one stop bit, no parity. NOTE: You can use a serial console to configure the FireEye appliance without first configuring an IP address and to view all console log messages. 4. Connect power cables and turn the power on. • Connect the power cable to the back of the appliance. Make sure that the power switch is in the OFF position when connecting the power cable. 5. Power on the appliance. • Turn on the power supply switch on the back of the appliance. • Press and hold the green checkmark button on the front panel LCD for 5 seconds to power on the appliance. • Configure the appliance using one of the following methods: - Quick Set-Up Using the Front Panel LCD - Quick Set-Up Using the Serial Console Power supply switch Front panel LCD
  • 3. FireEye™ Appliance Quick Start Quick Set-Up Using the Front Panel LCD Perform either the LCD panel set-up steps or the serial console set-up steps. FireEye recommends using the serial console method, if possible, as described on the next page. NOTE: You may need to wait after powering on for the FireEye logo to disappear and the alternating status display to appear. 6. Configure the primary DNS server (optional). 1. Access the LCD menu interface. View the Primary DNS menu. Access the menu system. Enter modify mode. Access the Network menu. 2. Configure DHCP. and and View DHCP status. Save when the correct address is displayed. Enter modify mode. and Set DHCP status to yes or no. 7. Configure the appliance domain name (optional). View the Domain Name menu. Accept the displayed value. NOTE: If DHCP is yes, go to step 8. If DHCP is no, go to step 3. Enter modify mode. and 3. Configure a static IP address. and View the Static IP Addr menu. and Change values. Move between digits in the name. Save when the correct name is displayed. Enter modify mode. and Change values. Move between digits in the address. 8. Configure the appliance hostname (optional). Change values. View the hostname menu. Move between digits in the address. Save when the correct address is displayed. 4. Configure the network mask. Enter modify mode. and and View the Netmask menu. Change values. Move between characters in the hostname. Save the correct hostname. Enter modify mode. 9. Save settings. Repeatedly to increment the netmask and to decrement it. Example: to set netmask of 255.255.255.0 (/24) Return to status display mode. when displayed value is 0.0.0.0, press Access the menu system. 24 times. Save when the correct netmask is displayed. 5. Configure the gateway. View the Gateway menu. Enter modify mode. and and Change values. Move between digits in the address. Save when the correct address is displayed. Access save settings menu. Enter modify mode. Select Yes. Save settings. NOTE: Changes do not take effect until you perform step 9, even though the LCD may appear to reflect the desired configuration settings.
  • 4. FireEye™ Appliance Quick Start Quick Set-Up Using the Serial Console Perform either the LCD panel set-up steps or the serial console set-up steps. FireEye recommends using the serial console method, if possible, as described on this page. 1. Make sure that the appliance is installed and powered on and that the console terminal is properly configured and active (page 1). 2. Log in to the console with user name admin and no password. 3. Enter yes to use the configuration wizard, and then respond as shown below. 1. Hostname? Enter the hostname for the appliance. 2. Use DHCP on ether1 interface? Enter yes to use DHCP or no to manually configure your IP address and network settings. If DHCP is selected, you will be immediately sent to step 8. 3. Primary IP address? Enter the IP address for the management interface. 4. Netmask? Enter the network mask in A.B.C.D format. 5. Default gateway? Enter the gateway IP address for the management interface. 6. Primary DNS server? Enter the DNS server IP address. 7. Domain name? Enter the domain for the management interface. 8. Enable NTP? Enter yes to use default public Network Time Protocol (NTP) servers (pool.ntp.org or time.nist.gov) to set the system time or no to configure the time manually at a later time. 9. Admin password? Enter a new administrator password. Press <Enter> to keep the default admin. 10. Product license key? Enter the license key or press <Enter> to use an evaluation license. 11. Enable MAX security-contents updates? Enter yes to enable download of new security content from the FireEye Malware Analysis and Exchange Network (MAX) network. 12. Enable MAX security-contents uploads? Enter yes to enable uploading of security statistics and content to the MAX network. 13. MAX user name? Enter a user name for access to the MAX network. 14. MAX password? Enter and then confirm a password for access to the MAX network. Press <Enter> to leave unchanged. 4. After all the questions are answered, the wizard summarizes the answers. To change an answer, enter the step number. To save changes and exit, press <enter>. Where to Go Next You can now access the FireEye appliance management GUI using any of the following methods: • Web browser using HTTPS. Open a web browser (Firefox or Internet Explorer), and enter https://[appliance IP address or hostname]. Log in with the user name admin and the password that was entered during set-up (default admin). • Serial console or Management port CLI using SSH. For more information, see the following documents: • FireEye Appliance Operator’s Guide—Contains information on configuring and monitoring FireEye appliances. • FireEye CMS Operator’s Guide—Contains a product overview and information about how to use the FireEye Central Management System (CMS) to configure and administer the FireEye appliance. • FireEye Appliance CLI Command Reference Guide—Contains a description of the commands that make up the CLI of the FireEye appliance. TM FireEye, Inc. 1390 McCarthy Boulevard Milpitas, CA 95035 www.fireeye.com Part Number 230-QS4000-A6 © 2008-2009 FireEye, Inc. All rights reserved. FireEye and the FireEye logo are either trademarks or trade names of FireEye, Inc. All other trademarks are the property of their respective owners.