Adapter FAQs
QRadar® Risk Manager uses adapters to connect and get configuration information from network devices.
- Do adapters support all devices and versions that QRadar SIEM supports?
- Do all adapters support the same features, for example, OSPF routing?
- What user-access level does the adapter require to get device configuration?
- How do you configure credentials to access your network devices?
- What credential fields do you need to complete for each device?
- How do you configure protocols for your devices?
- How do you add your network devices to QRadar Risk Manager?
Do adapters support all devices and versions that QRadar SIEM supports?
Adapters are a separate integration and are used by QRadar Risk Manager only to import device configurations. To view a list of supported adapters, see Supported adapters.
Do all adapters support the same features, for example, OSPF routing?
The range of supported features such as routing support and NAT support vary with the adapters. See Adapter features.
What user-access level does the adapter require to get device configuration?
The required access level varies by adapter, but it is restricted to read-only for most adapters. See Supported adapters and view the user-access level requirements when you select an adapter.
How do you configure credentials to access your network devices?
You must configure credentials to allow QRadar Risk Manager to connect to devices in your network. Administrators use Configuration Monitor to input device credentials. Individual device credentials can be saved for a specific network device. If multiple network devices use the same credentials, you can assign credentials to a group. For more information, see the IBM QRadar Risk Manager User Guide.
What credential fields do you need to complete for each device?
Some adapters might require only a username and password while others might need extra credentials, for example, Cisco IOS might require an enable password. See Supported adapters and view the required credential parameters in the tables.
How do you configure protocols for your devices?
Use Network Groups, which contain protocols that you can use to enable connectivity to IP/CIDR/ address ranges for devices. For more information, see the IBM QRadar Risk Manager User Guide.
How do you add your network devices to QRadar Risk Manager?
Method | Description |
---|---|
Add devices individually | Use this method if you want to run a test backup of a few devices, for example, to check that your credentials and protocols are correctly configured. |
Device discovery | Use this method if you have an IP/CIDR address range with SNMP community strings that are
configured for each device and you want to find all devices in that address range. You must have SNMP get community strings defined in your credential set for device discovery to work. |
Discovery from management device | Use this method for devices that are managed by a supported management system such as Check Point SMS. |
Import devices | If you have several devices in your network, this method is the most reliable. |
For information about adding network devices to QRadar Risk Manager, see the IBM QRadar Risk Manager User Guide.