Академический Документы
Профессиональный Документы
Культура Документы
Version 7.2.4
Note
Before using this information and the product that it supports, read the information in Notices on page 29.
Product information
This document applies to IBM QRadar Security Intelligence Platform V7.2.4 and subsequent releases unless
superseded by an updated version of this document.
Copyright IBM Corporation 2013, 2014.
US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Contents
Introduction to QRadar FIPS installations . . . . . . . . . . . . . . . . . . . . . v
Chapter 1. QRadar deployment overview
. . . . . . . . . . . . . . . . . . . . . 1
FIPS overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Appliance restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Activation keys and license keys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Integrated Management Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
QRadar components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Prerequisite hardware accessories and desktop software for QRadar installations . . . . . . . . . . . . 4
Physical security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Supported web browsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Enabling document mode and browser mode in Internet Explorer . . . . . . . . . . . . . . . . 6
USB flash drive installations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Creating a bootable USB flash drive with a QRadar appliance . . . . . . . . . . . . . . . . . . 7
Creating a bootable USB flash drive with Microsoft Windows . . . . . . . . . . . . . . . . . . 8
Creating a bootable USB flash drive with Red Hat Linux . . . . . . . . . . . . . . . . . . . 9
Configuring a USB flash drive for serial-only appliances . . . . . . . . . . . . . . . . . . . 10
Installing QRadar with a USB flash drive . . . . . . . . . . . . . . . . . . . . . . . . 10
Upgrading your FIPS-compliant appliance to QRadar 7.2.4 . . . . . . . . . . . . . . . . . . . 11
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 14
. 15
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 17
. 18
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
21
21
21
22
22
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 25
. 26
. 27
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Trademarks . . . . . .
Privacy policy considerations
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 30
. 31
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
iii
iv
Intended audience
This guide is intended for cryptographic operations users or administrators who
are responsible for installing, maintaining, and configuring FIPS enabled QRadar
systems. When you enable FIPS mode, you create an admin user role for general
security services and crypto user role for cryptographic operations.
Technical documentation
To find IBM Security QRadar product documentation on the web, including all
translated documentation, access the IBM Knowledge Center (http://
www.ibm.com/support/knowledgecenter/SS42VS/welcome).
For information about how to access more technical documentation in the QRadar
products library, see Accessing IBM Security Documentation Technical Note
(www.ibm.com/support/docview.wss?rs=0&uid=swg21614644).
Please Note:
Use of this Program may implicate various laws or regulations. including those
related to privacy, data protection, employment, and electronic communications
and storage. IBM Security QRadar may be used only for lawful purposes and in a
lawful manner. Customer agrees to use this Program pursuant to, and assumes all
responsibility for complying with, applicable laws, regulations and policies.
Licensee represents that it will obtain or has obtained any consents, permissions, or
licenses required to enable its lawful use of IBM Security QRadar.
vi
FIPS overview
IBM Security QRadar uses the FIPS 140-2 approved cryptographic provider(s) for
cryptography. The approved Cryptographic Security Kernel is Q1 Labs or Q1 Labs,
an IBM Company, or IBM Corp.
The certificates are listed on the : NIST website (http://csrc.nist.gov/groups/STM/
cmvp/documents/140-1/1401val2012.htm).
Follow these guidelines for your QRadar FIPS appliance:
v Use firmware that is FIPS certified.
v You must enable FIPS mode after your initial appliance installation and
configuration.
v You must enable FIPS mode on any appliance that you restore to factory default
(unconfigured) settings.
Appliance restrictions
Some restrictions apply to IBM Security QRadar FIPS appliances.
These restrictions apply to your QRadar FIPS appliance:
v You cannot use SSH by using the root user account to log in to an appliance that
has FIPS mode enabled. Only the crypto user account or admin user accounts
can use SSH to log in a FIPS enabled QRadar appliance.
v You cannot install this appliance as a virtual machine (VM)
v You cannot install software fixes on QRadar appliances, unless the update is
FIPS certified.
v You cannot disable FIPS mode in QRadar by using your browser. The crypto
user account is the only role that has permissions to disable FIPS mode.
v Do not select MD5 or DES when you configure SNMP responses because these
options are not FIPS-compliant. If these options are chosen when the appliance
is in FIPS mode, the appliance does not execute the response. An error message
that states that the response is invalid is created in the system log.
v High-availability (HA) is not supported on FIPS appliances.
apply for each appliance type. For example, use the IBM Security QRadar
QFlow Collector activation key to install only the QRadar QFlow Collector
modules.
You can obtain the activation key from the following locations:
v If you purchased an appliance that is pre-installed with QRadar
software, the activation key is included in a document on the enclosed
CD.
v If you purchased QRadar software or virtual appliance download, a list
of activation keys is included in the Getting Started document. The
Getting Started is attached to the confirmation email.
License key
Your system includes a temporary license key that provides you with
access to QRadar software for five weeks. After you install the software
and before the default license key expires, you must add your purchased
licenses.
The following table describes the restrictions for the default license key:
Table 1. Restrictions for the default license key for QRadar SIEM installations
Usage
Limit
750
5000
200000
User limit
10
300
Table 2. Restrictions for the default license key for QRadar Log Manager installations
Usage
Limit
750
5000
User limit
10
300
You can configure Integrated Management Module to share an Ethernet port with
the IBM Security QRadar product management interface. However, to reduce the
risk of losing the connection when the appliance is restarted, configure Integrated
Management Module in dedicated mode.
To configure Integrated Management Module, you must access the system BIOS
settings by pressing F1 when the IBM splash screen is displayed. For more
information about configuring Integrated Management Module, see the Integrated
Management Module User's Guide on the CD that is shipped with your appliance.
Related concepts:
Prerequisite hardware accessories and desktop software for QRadar installations
on page 4
Before you install IBM Security QRadar products, ensure that you have access to
the required hardware accessories and desktop software.
QRadar components
IBM Security QRadar consolidates event data from log sources that are used by
devices and applications in your network.
Important: Software versions for all IBM Security QRadar appliances in a
deployment must be same version and fix level. Deployments that use different
versions of software are not supported.
QRadar deployments can include the following components:
QRadar QFlow Collector
Passively collects traffic flows from your network through span ports or
network taps. The IBM Security QRadar QFlow Collector also supports the
collection of external flow-based data sources, such as NetFlow.
You can install a QRadar QFlow Collector on your own hardware or use
one of the QRadar QFlow Collector appliances.
Restriction: The component is available only for QRadar SIEM
deployments.
QRadar Console
Provides the QRadar product user interface. The interface delivers
real-time event and flow views, reports, offenses, asset information, and
administrative functions.
In distributed QRadar deployments, use the QRadar Console to manage
hosts that include other components.
Magistrate
A service running on the QRadar Console, the Magistrate provides the core
processing components. You can add one Magistrate component for each
deployment. The Magistrate provides views, reports, alerts, and analysis of
network traffic and security events.
The Magistrate component processes events against the custom rules. If an
event matches a rule, the Magistrate component generates the response
that is configured in the custom rule.
For example, the custom rule might indicate that when an event matches
the rule, an offense is created. If there is no match to a custom rule, the
Magistrate component uses default rules to process the event. An offense is
an alert that is processed by using multiple inputs, individual events, and
Chapter 1. QRadar deployment overview
events that are combined with analyzed behavior and vulnerabilities. The
Magistrate component prioritizes the offenses and assigns a magnitude
value that is based on several factors, including number of events, severity,
relevance, and credibility.
QRadar Event Collector
Gathers events from local and remote log sources. Normalizes raw log
source events. During this process, the Magistrate component examines the
event from the log source and maps the event to a QRadar Identifier
(QID). Then, the Event Collector bundles identical events to conserve
system usage and sends the information to the Event Processor.
QRadar Event Processor
Processes events that are collected from one or more Event Collector
components. The Event Processor correlates the information from QRadar
products and distributes the information to the appropriate area,
depending on the type of event.
The Event Processor also includes information that is gathered by QRadar
products to indicate behavioral changes or policy violations for the event.
When complete, the Event Processor sends the events to the Magistrate
component.
For more information about each component, see the Administration Guide.
Hardware accessories
Ensure that you have access to the following hardware components:
v Monitor and keyboard, or a serial console
v Uninterrupted Power Supply (UPS) for all systems that store data, such as
QRadar Console, Event Processor components, or QRadar QFlow Collector
components
v Null modem cable if you want to connect the system to a serial console
Important: QRadar products support hardware-based Redundant Array of
Independent Disks (RAID) implementations, but do not support software-based
RAID installations.
Physical security
Labels are required for FIPS physical security and must be installed before you
place the appliance in the server rack.
If your appliance did not include labels for FIPS physical security or did not
contain a sufficient number of labels, you must contact your sales representative to
receive additional labels.
Two sets of tamper-proof labels are included with your IBM Security QRadar FIPS
appliance for a total of forty (40) tamper-proof labels. These labels are numbered
with a 7-digit code for your appliance.
Important: Ensure the location is free of dust or debris before installing a
tamper-proof label.
Attach the tamper-proof labels firmly in the locations illustrated in the following
graphic:
Supported versions
Mozilla Firefox
Supported versions
9.0
Google Chrome
10.0
Procedure
1. In your Internet Explorer web browser, press F12 to open the Developer Tools
window.
2. Click Browser Mode and select the version of your web browser.
3. Click Document Mode.
v For Internet Explorer V9.0, select Internet Explorer 9 standards.
v For Internet Explorer V10.0, select Internet Explorer 10 standards.
Related concepts:
Prerequisite hardware accessories and desktop software for QRadar installations
on page 4
Before you install IBM Security QRadar products, ensure that you have access to
the required hardware accessories and desktop software.
Supported versions
The following appliances or operating systems can be used to create a bootable
USB flash drive:
v A QRadar v7.2.1 appliance or later
v A Linux system that is installed with Red Hat Enterprise Linux 6.4
v Microsoft Windows Vista
v Microsoft Windows 7
v Microsoft Windows 2008
v Microsoft Windows 2008R2
Installation overview
Follow this procedure to install QRadar software from a USB flash drive:
1. Create the bootable USB flash drive.
2. Install the software for your QRadar appliance.
Procedure
1. Download the QRadar ISO image file.
a. Access the IBM Support website (www.ibm.com/support).
b. Locate the IBM Security QRadar ISO file that matches the version of the
QRadar appliance.
c. Copy the ISO image file to a /tmp directory on your QRadar appliance.
2. Using SSH, log in to your QRadar system as the root user.
3. Insert the USB flash drive in the USB port on your QRadar system.
It might take up to 30 seconds for the system to recognize the USB flash drive.
4. Type the following command to mount the ISO image:
mount -o loop /tmp/<name of the ISO image>.iso /media/cdrom
5. Type the following commend to copy the USB creation script from the
mounted ISO to the /tmp directory.
cp /media/cdrom/post/create-usb-key.py /tmp/
7. Press Enter.
8. Press 1 and type the path to the ISO file. For example,
/tmp/<name of the iso image>.iso
9. Press 2 and select the drive that contains your USB flash drive.
10. Press 3 to create your USB key.
The process of writing the ISO image to your USB flash drive takes several
minutes to complete. When the ISO is loaded onto the USB flash drive, a
confirmation message is displayed.
11. Press q to quit the USB key script.
12. Remove the USB flash drive from your QRadar system.
Chapter 1. QRadar deployment overview
13. To free up space, remove the ISO image file from the /tmp file system.
What to do next
If your connection to the appliance is a serial connection, see Configuring a flash
drive for serial only appliances.
If your connection to the appliance is keyboard and mouse (VGA), see Installing
QRadar with a USB flash drive.
Procedure
1. Extract the Create-USB-Install-Key (CUIK) tool to the c:\cuik directory.
2. Copy the .zip files for PeaZip Portable 4.8.1 and SYSLINUX 4.06 to the
cuik\deps folder.
For example, c:\cuik\deps\peazip_portable-4.8.1.WINDOWS.zip and
c:\cuik\deps\syslinux-4.06.zip.
You do not need to extract the .zip files. The files need only to be available in
the cuik/deps directory.
3. Insert the USB flash drive into the USB port on your computer.
4. Verify that the USB flash drive is listed by drive letter and that it is accessible
in Microsoft Windows.
What to do next
If your connection to the appliance is a serial connection, see Configuring a flash
drive for serial only appliances.
If your connection to the appliance is keyboard and mouse (VGA), see Installing
QRadar with a USB flash drive.
Procedure
1. Download the QRadar ISO image file.
a. Access the IBM Support website (www.ibm.com/support).
b. Locate the IBM Security QRadar ISO file.
c. Copy the ISO image file to a /tmp directory on your QRadar appliance.
2. Update your Linux- based system to include these packages.
v syslinux
v mtools
v dosfstools
v parted
For information about the specific package manager for your Linux system,
see the vendor documentation.
3. Log in to your system as the root user.
Chapter 1. QRadar deployment overview
4. Insert the USB flash drive in the front USB port on your system.
It might take up to 30 seconds for the system to recognize the USB flash drive.
5. Type the following command to mount the ISO image:
mount -o loop /tmp/<name of the ISO image>.iso /media/cdrom
6. Type the following command to copy the USB creation script from the
mounted ISO to the /tmp directory.
cp /media/cdrom/post/create-usb-key.py /tmp/
8. Press Enter.
9. Press 1 and type the path to the ISO file. For example,
/tmp/Rhe664QRadar7_2_4_<build>.iso
10. Press 2 and select the drive that contains your USB flash drive.
11. Press 3 to create your USB key.
The process of writing the ISO image to your USB flash drive takes several
minutes to complete. When the ISO is loaded onto the USB flash drive, a
confirmation message is displayed.
12. Press q to quit the USB key script.
13. Remove the USB flash drive from your system.
What to do next
If your connection to the appliance is a serial connection, see Configuring a flash
drive for serial only appliances.
If your connection to the appliance is keyboard and mouse (VGA), see Installing
QRadar with a USB flash drive.
Procedure
1. Insert the bootable USB flash drive into the USB port of your appliance.
2. On your USB flash drive, locate the syslinux.cfg file.
3. Edit the syslinux configuration file to change the default installation from
default linux to default serial.
4. Save the changes to the syslinux configuration file.
What to do next
You are now ready to install QRadar with the USB flash drive.
10
Procedure
1. Install all necessary hardware.
2. Choose one of the following options:
v Connect a notebook to the serial port at the back of the appliance.
v Connect a keyboard and monitor to their respective ports.
3. Insert the bootable USB flash drive into the USB port of your appliance.
4. Restart the appliance.
Most appliances can boot from a USB flash drive by default. If you are
installing QRadar software on your own hardware, you might have to set the
device boot order to prioritize USB.
After the appliance starts, the USB flash drive prepares the appliance for
installation. This process can take up to an hour to complete.
5. When the Red Hat Enterprise Linux menu is displayed, select one of the
following options:
v If you connected a keyboard and monitor, select Install or upgrade using
VGA console.
v If you connected a notebook with a serial connection, select Install or
upgrade using Serial console.
6. Type SETUP to begin the installation.
7. When the login prompt is displayed, type root to log in to the system as the
root user.
The user name is case-sensitive.
8. Press Enter and follow the prompts to install QRadar.
The complete installation process is documented in the product Installation
Guide.
11
12
Setting
9600
Stop Bits
Data bits
Parity
None
Procedure
1. If you are using your own appliance, mount the QRadar ISO image
a. Create the /media/cdrom directory by typing the following command:
mkdir /media/cdrom
b. Obtain the QRadar software.
c. Mount the QRadar ISO image by typing the following command:
mount -o loop <path to the QRadar ISO> /media/cdrom
d. To begin the installation, type the following command:
/media/cdrom/setup
2. Accept the End User License Agreement (EULA).
Tip: Press the Spacebar key to advance through the document.
If you are installing QRadar on your own appliance, you are prompted to
continue the installation. This process might take up to several hours.
3. When you are prompted for the activation key, enter the 24-digit, 4-part,
alphanumeric string that you received from IBM.
13
4.
5.
6.
7.
The letter I and the number 1 (one) are treated the same. The letter O and the
number 0 (zero) are also treated the same.
For the type of setup, select normal.
Select the IP address type:
v Select Yes to auto-configure QRadar for IPv6.
v Select No to configure an IP address manually QRadar for IPv4 or IPv6.
In the wizard, enter a fully qualified domain name in the Hostname field.
In the IP address field, enter a static IP address, or use the assigned IP
address.
Important: If you are configuring this host as a primary host for a high
availability (HA) cluster, and you selected Yes for auto-configure, you must
record the automatically-generated IP address. The generated IP address is
entered during HA configuration.
For more information, see the IBM Security QRadar High Availability Guide.
8. If you do not have an email server, enter localhost in the Email server name
field.
9. Click Finish.
10. In the Root password field, create a password that meets the following
criteria:
v Contains at least 5 characters
v Contains no spaces
v Can include the following special characters: @, #, ^, and *.
11. Follow the instructions in the installation wizard to complete the installation.
The installation process might take several minutes.
12. Apply your license key.
a. Log in to QRadar:
https://IP_Address_QRadar
The default Username is admin. The Password is the password of the root
user account.
b.
c.
d.
e.
f.
14
Procedure
1. Use SSH to log in to QRadar as a root user.
2. Enter the following command:
/opt/qradar/fips/setup/fips_setup.py --enable
If any required cryptographic files are missing, the output alerts you to the
missing files.
3. Type Yes to enable FIPS mode.
4. Enter a password for the crypto user account. The password must meet the
following criteria:
contain at least 6 characters.
include one special character such as a period, comma, $, !, %, ^, or *.
5. Re-enter the crypto password to confirm.
6. Enter a password for the admin user account. The password must meet the
following criteria:
contain at least 6 characters
include one special character such as a period, comma, $, !, %, ^, or *.
7. Re-enter the admin password to confirm.
8. Type reboot to restart your QRadar appliance.
After the appliance restarts services, FIPS mode is enabled.
Repeat this process to enable FIPS mode on each additional managed host in
your deployment. The QRadar Console is the final appliance that you enable in
FIPS mode.
What to do next
You are now ready to disable automatic updates on your FIPS appliances. For
more information, see Disabling automatic updates.
15
Procedure
1. Open your web browser.
2. Log in to QRadar:
https://<IP address>
Username: admin
Password: <root password>
Where <IP address> is the IP address of the QRadar Console.
3. Click Log in To QRadar.
A default license key provides you access to QRadar for five weeks. For more
information about updating your license key, see the IBM Security QRadar
Administration Guide.
4. Click the Admin tab.
5. On the navigation menu, click System Configuration.
6. Click the Auto Update icon.
7.
8.
9.
10.
16
Procedure
1. Use SSH to log in to QRadar as the FIPS crypto user.
Username: crypto
Password: <password>
2. Enter one of the following admin commands:
Table 5. Supported FIPS crypto commands
Command
Description
commit
17
Description
deploy
disable_fips
fips_self_check
get_logs
mod_log4j
reboot
shell
shutdown
help
exit
Procedure
1. Use SSH to log in to IBM Security QRadar as the FIPS admin user.
2. Enter one of the following admin commands:
18
Description
commit
deploy
get_logs
mod_log4j
reboot
shell
shutdown
help
exit
19
20
FIPS self-check
You can use the command-line interface to verify whether FIPS is enabled on your
appliance.
Procedure
1. Use SSH to log in to IBM Security QRadar as the crypto user.
2. Type fips_self_check.
The output displays the status of your FIPS appliance.
Verifying Operating
Verifying installed
libgcrypt... (OK) (OK)
Verifying Ariel Log
FIPS mode: ON
Disabling FIPS
You can use the command-line interface and crypto user account to disable FIPS
mode on an IBM Security QRadar appliance.
Procedure
1. Use SSH to log in to the QRadar FIPS appliance as a crypto user.
2. Enter the following command:
disable_fips
3. Type Yes to disable FIPS mode.
4. Type reboot to restart your QRadar appliance.
After the appliance restarts services, FIPS mode is disabled. To disable FIPS
mode, repeat this process on each additional appliance that is added to the
Console as a managed host.
21
Procedure
1. Use SSH to log in to IBM Security QRadar as the FIPS crypto user.
2. Type service --list.
3. Type service <service name> <start | stop | restart>.
Example: In the following example, the Tomcat server is restarted.
service tomcat restart
4. Type exit to log out of the shell command line interface.
Procedure
1. Use SSH to log in to QRadar as the FIPS admin or crypto user.
2. Type shell.
3. Enter edit <file name> to start editing a system configuration file.
Example: In the following example, the apps.conf is edited.
edit /store/configservices/staging/globalconfig/apps.conf
4. Save your changes.
5. Type exit to exit the command shell.
6. Type commit --changes <file name> to view the changes that are made to your
configuration file.
Example: In the following example, changes to the apps.conf file are viewed.
changes /store/configservices/staging/globalconfig/apps.conf
7. Type commit to apply the configuration file changes to your FIPS enabled
appliance.
The file is updated on your FIPS appliance when you see the following
message.
Committed changes for /store/configservices/staging/globalconfig/
apps.conf \
Procedure
1. Log in as the crypto user and disable FIPS mode on all appliances in your
deployment by typing the following command:
disable_fips
22
23
24
Procedure
1. Log in as the root user.
2. Type the following command:
qchange_netsetup
3. Follow the instructions in the wizard to complete the configuration.
The following table contains descriptions and notes to help you configure the
network settings.
Table 7. Description of network settings for an all-in-one QRadar Console
Network Setting
Description
Host name
Optional
Optional
Used to access the server, usually from a
different network or the Internet.
Configured by using Network Address
Translation (NAT) services on your network
or firewall settings on your network. (NAT
translates an IP address in one network to a
different IP address in another network).
25
Procedure
1. To remove managed hosts, log in to QRadar:
https://IP_Address_QRadar
The Username is admin.
a. Click the Admin tab.
b. Click the Deployment Editor icon.
c. In the Deployment Editor window, click the System View tab.
d. For each managed host in your deployment, right-click the managed host
and select Remove host.
e. On the Admin tab, click Deploy Changes.
2. To change network settings on the QRadar Console, use SSH to log in to
QRadar as the root user.
The user name is root.
a. Type the following command: qchange_netsetup.
b. Follow the instructions in the wizard to complete the configuration,
The following table contains descriptions and notes to help you configure
the network settings.
Table 8. Description of network settings for a multi-system QRadar Console deployment
Network Setting
Description
Host name
Optional
Optional
Used to access the server, usually from a
different network or the Internet.
Configured by using Network Address
Translation (NAT) services on your network
or firewall settings on your network. (NAT
translates an IP address in one network to a
different IP address in another network).
26
Procedure
1. Use SSH to log in to the IBM Security QRadar product as the root user.
The user name is root.
Chapter 5. Network settings management
27
28
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY 10504-1785 U.S.A.
For license inquiries regarding double-byte character set (DBCS) information,
contact the IBM Intellectual Property Department in your country or send
inquiries, in writing, to:
Intellectual Property Licensing
Legal and Intellectual Property Law
IBM Japan Ltd.
19-21, Nihonbashi-Hakozakicho, Chuo-ku
Tokyo 103-8510, Japan
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or
implied warranties in certain transactions, therefore, this statement may not apply
to you.
This information could include technical inaccuracies or typographical errors.
Changes are periodically made to the information herein; these changes will be
incorporated in new editions of the publication. IBM may make improvements
and/or changes in the product(s) and/or the program(s) described in this
publication at any time without notice.
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
Copyright IBM Corp. 2013, 2014
29
IBM may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
170 Tracer Lane,
Waltham MA 02451, USA
Such information may be available, subject to appropriate terms and conditions,
including in some cases, payment of a fee.
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
Any performance data contained herein was determined in a controlled
environment. Therefore, the results obtained in other operating environments may
vary significantly. Some measurements may have been made on development-level
systems and there is no guarantee that these measurements will be the same on
generally available systems. Furthermore, some measurements may have been
estimated through extrapolation. Actual results may vary. Users of this document
should verify the applicable data for their specific environment.
Information concerning non-IBM products was obtained from the suppliers of
those products, their published announcements or other publicly available sources.
IBM has not tested those products and cannot confirm the accuracy of
performance, compatibility or any other claims related to non-IBM products.
Questions on the capabilities of non-IBM products should be addressed to the
suppliers of those products.
All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
All IBM prices shown are IBM's suggested retail prices, are current and are subject
to change without notice. Dealer prices may vary.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
If you are viewing this information softcopy, the photographs and color
illustrations may not appear.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corporation in the United States, other countries,
or both. If these and other IBM trademarked terms are marked on their first
occurrence in this information with a trademark symbol ( or ), these symbols
30
indicate U.S. registered or common law trademarks owned by IBM at the time this
information was published. Such trademarks may also be registered or common
law trademarks in other countries. A current list of IBM trademarks is available on
the Web at Copyright and trademark information (www.ibm.com/legal/
copytrade.shtml).
The following terms are trademarks or registered trademarks of other companies:
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered
trademarks or trademarks of Adobe Systems Incorporated in the United States,
and/or other countries.
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Oracle and/or its affiliates.
31
32
Index
Numerics
140-2
FIPS
add managed host 22
disable FIPS mode 21
disabling 21
edit configuration file 22
restart service 22
self-check 21
A
activation keys
description 1
admin account shell commands
appliance restrictions 1
architecture
components 3
18
components
description 3
Console
components 3
installing 13
crypto account shell commands 17
Cryptographic Module Validation
Program (CMVP) 1
Cryptographic Security Kernel 1
customer support
contact information v
15
21
Q
QRadar Console
installing 13
QRadar QFlow Collector
component description
installing
managed host 13
QRadar Console 13
using USB flash drive 6
Integrated Management Module
See also Integrated Management
Module
overview 3
L
license keys
description
Magistrate
component description
managed hosts
installing 13
S
software requirements
description 4
T
technical library
location v
preparing
installation
I
6
G
general requirements
browser mode
Internet Explorer web browser
N
network administrator
description v
network settings
all-in-one Console 25
changing 25
multi-system deployment
21
W
26
web browser
supported versions
33