manuals.online logo
Brands
  1. Home
  2. •
  3. Brands
  4. •
  5. COUNTERFLOW AI
  6. •
  7. Switch
  8. •
  9. COUNTERFLOW AI ThreatEye Forensics Operating and maintenance manual

COUNTERFLOW AI ThreatEye Forensics Operating and maintenance manual

SAFETY, COMPLIANCE, AND PRODUCT DISPOSAL
CLASS ONE LASER PRODUCT
Warning: This unit is fitted with optical transmitter
modules that are class 1 lasers. Use of controls,
adjustments or performance of procedures other
than those specified herein might result in hazardous
light exposure.
Read and take careful note of the guidelines in the
Dell Product Information Guide regarding:
•Safety and precautions that you should take during
the installation
•EMC compliance with FCC and other regulations
•Recycling and disposal of this product
UNPACK AND INSTALL HARDWARE
Unpack the ThreatEye ForensicsR7240DA01 unit and
install it in a rack or similar. See the Dell Product
Information Guide for details about unpacking the
ThreatEye Forensics unit.
The unit comes with sliding rails and a cable
management arm for mounting into a standard 19-inch
rack system. We recommend installing all cables into
the cable management arm to make it easier to access
the unit later without damaging the cables.
•Ensure that the ThreatEye Forensics unit is powered
off.
•Plug the transceiver modules into the capture network
ports. Make sure that the latch is firmly secured, and
connect the fiber-optic cable, if applicable.
Caution: To avoid exposure to laser light, do not remove
the protective plugs from the transceiver modules until
the fiber-optic cables are ready to be connected.
Retain and replace the plugs if the cables are removed.
•Connect a network cable to any management port.
•Connect one or more of the fiber capture network
ports to the network that you want to capture traffic
from. All ports are 1 Gbps capable, and depending on
your unit, Ports 1 and 2 are also 10 Gbps capable.
•If you need external time synchronization, plug the
supplied PTP time synchronization cable into the
connector.
•Connect two power cords to the redundant power
supply in the ThreatEye Forensics unit.
DN-1049 Rev. 3
Disclaimer: This document is intended for informational purposes only. Any information herein is believed to be reliable. However, Counterflow AI assumes no responsibility for the accuracy of the
information. Counterflow AI reserves the right to change the document and the products described without notice. Counterflow AI and the authors disclaim any and all liabilities. Counterflow AI is a
trademark used under license by Counterflow AI A/S. All other logos, trademarks and service marks are the property of the respective third parties. Copyright ©Counterflow AI A/S 2019.All rights
reserved.
IN THE BOX
The ThreatEye Forensics box contains the
following items:
•ThreatEye Forensics unit - model R7240DA01
•Cable management kit
•Sliding rails
•2 sets of international power cords
•Accessory kit:
•USB stick with software image for reinstallation
•PTP time synchronization cable
•4 transceiver modules (dual rate 1/10 Gbps)
•Dell Product Information Guide
•Counterflow AI Installation Quick Start (this guide)
•Counterflow AI Software Licensing Agreement
ThreatEye Forensics Flex 4x1/10 Gbps
R7240DA01 Installation Quick Start
•Select Configure network from the menu and press
ENTER.
•In the ThreatEye Forensics IP Settings prompt,
change the IP address, subnet mask and/or gateway
to your preference.
•Press A and ENTER to apply your changes, or U and
ENTER to use DHCP.
Connect to the ThreatEye ForensicsUI using your
preferred browser. On the dashboard, use the
ADMIN tab to review your settings.
DEFAULT LOGIN
•Username: admin
•Password: pandion
Important: For security reasons, change the password
for the default admin user.
INITIALIZING STORAGE UNITS
WARNING: All existing data is lost when you initialize
a storage unit.
•Click the ADMIN tab.
•In the CONTROL widget, click Factory Reset
under Power Controls.
•When the ThreatEye Forensics Flex has reset, the
ThreatEye Forensics Flex storage units are
detected and ready for use.
FURTHER DOCUMENTATION
Enter the URL https://yourIPaddress/api where
yourIPaddress is the IP address or host name of
the ThreatEye Forensics unit. This opens the
interactive API documentation.
Further documentation can be accessed from the
Help icon on the ThreatEye Forensics User
Interface toolbar.
For information about iDrac, see the supplied Dell
Product Information Guide.
CONFIGURATION
CONNECTING STORAGE UNITS
Using one or more storage interconnect cables, connect
the ThreatEye Forensics Flex storage units through the
external HD Mini-SAS connectors as shown in the
image above.
Important: Ensure that the HD Mini-SAS connector is
correctly inserted in the ThreatEye Forensics Flex
recorder, and locked, when connecting to a ThreatEye
Forensics Flex storage unit. The connector has a latch
tab that physically locks the connection. The space
between the server chassis of the Pandion recorder unit
and the port casing is very small and can prevent the latch
tab from locking into the port casing. You can test if the
connection is locked by gently pulling the connector cable
after you have plugged it in.
IP ADDRESS
The Pandion has a static IP address of 192.168.100.100.
Note: If you need to change the IP address:
•Plug a monitor and keyboard into the Pandion unit, and
power it on.

This manual suits for next models

1

Popular Switch manuals by other brands

Alfa Network APS08 Specifications

Alfa Network

Alfa Network APS08 Specifications

BEP Marine 701-MDVS Operation and installation instructions

BEP Marine

BEP Marine 701-MDVS Operation and installation instructions

Siemens SIMATIC NET RUGGEDCOM RS969 installation manual

Siemens

Siemens SIMATIC NET RUGGEDCOM RS969 installation manual

Linksys SR2024C Product data

Linksys

Linksys SR2024C Product data

Nortel BayStack 380 Using

Nortel

Nortel BayStack 380 Using

Ross Synergy Q Operator's manual

Ross

Ross Synergy Q Operator's manual

Raritan PX3TS user guide

Raritan

Raritan PX3TS user guide

Emos P5723T manual

Emos

Emos P5723T manual

Buhler NT 61-Z0-Atex Installation and operation instructions for

Buhler

Buhler NT 61-Z0-Atex Installation and operation instructions for

Microsemi 9002GHO user guide

Microsemi

Microsemi 9002GHO user guide

Enterasys SecureStack C2 C2G170-24 Hardware installation guide

Enterasys

Enterasys SecureStack C2 C2G170-24 Hardware installation guide

PROCET EN-S4P Quick installation guide

PROCET

PROCET EN-S4P Quick installation guide

Exsys EX-6002 manual

Exsys

Exsys EX-6002 manual

Yamaha SWR2310-28GT owner's manual

Yamaha

Yamaha SWR2310-28GT owner's manual

gofanco KVMHD2-2P user guide

gofanco

gofanco KVMHD2-2P user guide

H3C S6800 Series Command reference

H3C

H3C S6800 Series Command reference

Eaton Cutler-Hammer CHGENLC100ATS1SE O & M Manual

Eaton

Eaton Cutler-Hammer CHGENLC100ATS1SE O & M Manual

Lindy 32330 user manual

Lindy

Lindy 32330 user manual

manuals.online logo
manuals.online logoBrands
  • About & Mission
  • Contact us
  • Privacy Policy
  • Terms and Conditions

Copyright 2025 Manuals.Online. All Rights Reserved.