Do you have a question about the Stellar Cyber Photon 160 and is the answer not in the manual?
Steps to connect the appliance to a DC power source and press the power button.
Connect the management port to a network and monitor ports to data sources.
Connect an HDMI monitor and USB keyboard to the appliance for access.
Use an RJ45 serial cable for console access with specific baud and data settings.
Access the Photon 160 via SSH using its default IP address and credentials.
The Stellar Cyber Photon 160 is a network appliance designed for data collection and security monitoring within an enterprise environment. It acts as a sensor, gathering data from various network sources and feeding it to a central Data Processor (DP) for analysis within the Stellar Cyber platform. This device is crucial for establishing comprehensive visibility into network traffic and identifying potential security threats.
The primary function of the Photon 160 is to collect raw network data. It achieves this by connecting to data sources through its monitor ports, which can be configured to receive mirrored traffic or connect to network taps. Once connected, the Photon 160 captures this data and forwards it to a designated Stellar Cyber Data Processor. This data forms the foundation for threat detection, incident response, and security analytics performed by the Stellar Cyber GUI. The device is designed to be a distributed component of a larger security infrastructure, extending the reach of the Stellar Cyber platform to various segments of a network. Its role is purely data acquisition and forwarding, making it a critical first step in the security monitoring pipeline.
The Photon 160 offers several features to facilitate its deployment and integration into a network:
Power Connection: The device requires a DC power source. A licensed DC power technician is recommended for connecting the included power cable to ensure proper and safe operation. A power button is provided for easy power control.
Network Connectivity: The Photon 160 includes multiple Ethernet ports for both management and data collection.
Access Methods: The Photon 160 provides flexible options for initial setup and ongoing management:
aella, password: changeme) and a default management IP address (192.168.1.100/24) and gateway (192.168.1.1.Management Configuration: The device allows for comprehensive configuration of its network parameters and integration with the Stellar Cyber platform:
Integration with Stellar Cyber GUI: After initial configuration, the Photon 160 needs to be authorized within the Stellar Cyber GUI. This involves logging into the GUI (using Chrome or Firefox, with default username admin and password changeme), navigating to System | Collection | Sensors, and authorizing the newly connected sensor. This step completes the integration and allows the Photon 160 to begin sending data to the Data Processor for analysis.
While the document primarily focuses on installation and initial setup, some aspects touch upon maintenance:
restart system command is available to apply configuration changes, indicating a mechanism for refreshing the device's operational state after modifications. This is a standard maintenance procedure to ensure new settings take effect.show interface, show gateway, and show dns allow administrators to confirm their network configuration changes, aiding in troubleshooting and verifying correct setup.In summary, the Stellar Cyber Photon 160 is a purpose-built sensor designed for robust data collection in a security monitoring context. Its features emphasize ease of deployment, flexible network integration, secure access, and clear configuration steps to ensure it effectively contributes to the overall Stellar Cyber security solution.
| Form Factor | 1U Rackmount |
|---|---|
| Network Interfaces | 4 x 10GbE SFP+ |
| Operating System | Stellar Cyber OS |
| Network Visibility | Full packet capture |
| Protocol Support | HTTP, HTTPS, DNS, SMTP, FTP |
| Encryption Support | TLS |
| Threat Detection | AI-powered threat detection, behavioral analysis, anomaly detection, signature-based detection |
Loading...