ON THIS PAGE
Option 1: Deploy a Dedicated JSA Vulnerability Manager Processor Appliance
Option 2: Move the Vulnerability Processor from Your Console to Your Managed Host
Deploying a Dedicated JSA Vulnerability Manager Processor Appliance
Moving Your Vulnerability Processor to a Managed Host or Console
Removing a Vulnerability Processor from Your Console or Managed Host
Options for Moving the Vulnerability Processor in Your JSA Vulnerability Manager Deployment
If required, you can move the vulnerability processor from your JSA console to a dedicated JSA Vulnerability Manager managed host appliance.
For example, you might move your vulnerability processing capability to a managed host to minimize disk space impact on your JSA console.
You can have only one vulnerability processor in your deployment. Also, you must deploy the vulnerability processor only on a JSA console or JSA Vulnerability Manager managed host processor appliance.
To move the vulnerability processor, choose one of the following options:
Option 1: Deploy a Dedicated JSA Vulnerability Manager Processor Appliance
To deploy a processor appliance you must complete the followings tasks:
Install a dedicated JSA Vulnerability Manager processor appliance.
Add the managed host processor appliance to your JSA console by using the System and License Management tool on the Admin tab.
When you select the managed host option, the processor is automatically removed from the JSA console.
Option 2: Move the Vulnerability Processor from Your Console to Your Managed Host
If the vulnerability processor is on your JSA console, then later you can move your vulnerability processor to a previously installed JSA Vulnerability Manager managed host processor appliance.
At any time, you can move the vulnerability processor back to your JSA console.
Deploying a Dedicated JSA Vulnerability Manager Processor Appliance
You can deploy a dedicated JSA Vulnerability Manager processor appliance as a managed host.
When you deploy your vulnerability processor to a managed host, all vulnerabilities are processed on the managed host.
After you deploy processing to a dedicated JSA Vulnerability Manager managed host, any scan profiles or scan results that are associated with a JSA console processor are not displayed. You can continue to search and view vulnerability data on the Manage Vulnerabilities pages.
Ensure that a dedicated JSA Vulnerability Manager managed host is installed. For more information, see the Juniper Secure Analytics Installation Guide for your product.
Log in to JSA console as an administrator:
https://IP_Address_JSA
The default user name is admin. The password is the password of the root user account that was entered during the installation.
On the navigation menu, click Admin.
In the System Configuration pane, click System and License Management.
From the host table, click the JSA console host, and click Deployment Actions >Add Host.
Enter the IP address and password for the host.
To create an SSH tunnel on port 22, select Encrypt Host Connections.
Note:Do not select Remote Tunnel Initiation for encryption on managed hosts.
To enable encryption compression for communications with a host, select Encryption Compression.
To enable NAT for a managed host, select Network Address Translation and add the following information:
Table 1: NAT Configuration Field
Description
NAT Group
If the managed host is on the same subnet as the JSA console, select the JSA console that is on the NATed network.
If the managed host is not on the same subnet as the JSA console, select the managed host that is on NATed network.
Public IP
The managed host uses this IP address to communicate with other managed hosts in different networks that use NAT.
The NATed network must use static NAT.
Click Add.
Note:Don't close the window until the process for adding the host completes.
Close the System and License Management window.
On the Admin tab toolbar, click Advanced >Deploy Full Configuration.
Click OK.
Moving Your Vulnerability Processor to a Managed Host or Console
If required, you can move your vulnerability processor between a JSA Vulnerability Manager managed host appliance and your JSA console.
Ensure that a dedicated JSA Vulnerability Manager managed host is installed.
On the navigation menu, click Admin.
Click System and License Management > Deployment Actions > Manage Vulnerability Deployment.
Click Enable Processor.
Select the managed host or console from the Processor list.
If your processor is on the managed host, you can select only the JSA console.
Click Save.
On the Admin tab toolbar, select Advanced >Deploy Full Configuration.
Click OK.
After you change your vulnerability processor deployment, you must wait for your deployment to fully configure. In the Scan Profiles page, the following message is displayed: : JSA Vulnerability Manager is in the process of being deployed.
Verifying That a Vulnerability Processor is Deployed
In JSA Vulnerability Manager, you can verify that your vulnerability processor is deployed on a JSA console or JSA Vulnerability Manager managed host.
Log in to the JSA console.
On the navigation menu, click Admin.
Click System and License Management > Deployment Actions > Manage Vulnerability Deployment.
Verify that the processor is displayed on Processor list.
Removing a Vulnerability Processor from Your Console or Managed Host
If required, you can remove the vulnerability processor from a JSA console or JSA Vulnerability Manager managed host.
Log in to the JSA console.
On the navigation menu, click Admin.
Click System and License Management > Deployment Actions > Vulnerability Deployment Management.
Click the Enable Processor check box to deselect it.
Click Remove.
Click Save.
Close the System and License Management window.
On the Admin tab toolbar, select Advanced >Deploy Full Configuration.
Click OK.