Cisco Intrusion Detection System
Appliance and Module Installation
and Configuration Guide
Version 4.1
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Customer Order Number: DOC-7815597=
Text Part Number: 78-15597-02
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT
NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT
ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR
THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR T HE A CCOMPANYING PRODUCT ARE SET FOR TH IN T HE INFORMATION
PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO
LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class
A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when
the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed
and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a
residential area is likely to cause h armful interference, in which case users will be required to correct the interference at their own expense.
The following information is for FCC comp liance of Cl ass B devices: The equipm ent descr ibed in thi s manual gener ates and may radi ate
radio-frequency energy. If it is not installed in accordance with Cisco’s installation instructions, it may cause interference with radio and television
reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in
part 15 of the FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation.
However, there is no guarantee that interference wi ll not occur in a particular installation.
Modifying the equipm ent wit hout C isco’s written autho rizatio n may re sul t in the equipm ent no lon ger comply ing with FC C re quirem ents for Class
A or Class B digital devices. In that event, your right to use the equ ipment m ay be limit ed by FCC regulati ons, and yo u may be r equi red t o correct
any interference to radio or television communi cations at you r own expense.
You can det ermine wh ether your equipmen t is causing interf erence by turning it off. If the interference stop s, it was probabl y caused by the Cisco
equipment or one of its peripheral devices. If the equipment causes interference to radio or television reception, try to correct the interference by
using one or more of the following measures :
• Turn the television or radio antenna until the interfe rence stops .
• Move the equipment to one side or the other of the te levision or radio .
• Move the equipment farther away from the television or radio.
• Plug the equipment into an outlet that is on a different circuit from the television or radio. (That is , make certain the equi pment and the television
or radio are on circuits controlled by different circuit br eakers or fuses.)
Modifications to this product no t authori zed by Cisco Syst ems, Inc. could void the FCC app roval and negate your authori ty to oper ate the product.
The Cisco implementation of TCP header com pression i s an adap tati on o f a pr ogr am d eveloped by the University of California, Berkeley (UCB) as
PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED
OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICU LAR PURPOSE AND
NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL
DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR
INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
CCSP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We W ork, Live,
Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE,
CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco
Systems logo, Cisco Unity, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare,
GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys,
MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX,
ScriptShare, SlideCast, SMARTnet, StrataView Plus, SwitchProbe, TeleRouter, The Fastest Way to Increase Your Internet Quotient, TransPath, and VCO
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (0411R)
Cisco Intrusion Detection System A pplianc e and Modul e Install ati on and Configuration Guid e
Audience xvii
Conventions xviii
Related Documentation xix
Obtaining Documentation xix
Cisco.com xix
Ordering Documentation xx
Documentation Feedback xx
Obtaining Technical Assistance xxi
CONTENTS
CHAPTER
Cisco Technical Support Website xxi
Submitting a Service Request xxii
Definitions of Service Request Severity xxii
Obtaining Additional Publications and Information xxiii
1Introducing the Sensor 1-1
Appliances 1-1
Introducing the Appliance 1-2
How the Appliance Functions 1-3
Your Network Topology 1-4
Placing an Appliance on Your Network 1-6
Deployment Considerations 1-8
Appliance Restrictions 1-9
Setting Up a Terminal Server 1-9
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
v
Contents
Modules 1-12
Introducin g the Cisco Intrusi on Detection System Network Module 1-12
Introducin g the Cisco Catalyst 6500 Series Intrusion Detecti on System
Services Module
Supported Sensors 1-16
Setting the Time on Sensors 1-18
Installation Preparation 1-20
Working in an ESD Environment 1-21
1-14
CHAPTER
CHAPTER
2Installing the IDS-4210 2-1
Front Panel Features and Indicators 2-1
Upgrading the Memory 2-3
Installing the IDS-4210 2-5
Installing the Accessories 2-8
Accessories Package Contents 2-8
Installing and Removing the Bezel 2-9
Installing Center Mount Brackets 2-9
Installing Front Mount Brackets 2-11
3Installing the IDS-4215 3-1
Front and Back Panel Features 3-2
Specifications 3-4
Accessories 3-5
Surface Mounting 3-6
Rack Mounting 3-7
Installing the IDS-4215 3-9
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
vi
78-15597-02
Removing and Replacing the Chassis Cover 3-12
Removing the Chassis Cover 3-13
Replacing the Chassis Cover 3-15
Removing an d R ep lacing the IDE H ar d- D is k D riv e 3-17
Removing the Hard-Disk Drive 3-18
Replacing the Hard-Disk Drive 3-20
Removin g an d R ep l a ci ng the Compact Flash Devi c e 3-21
Removin g th e Co m p ac t Flash Device 3-21
Replacing the Compact Flash Devic e 3-23
Removing and Installing the 4FE Car d 3-25
Removing the 4FE Card 3-25
Installing the 4FE Card 3-27
Contents
CHAPTER
CHAPTER
4Installing the IDS-4220 and IDS-4230 4-1
Front and Back Panel Features 4-2
Recommended Keyboards and Monitors 4-4
Upgrading the IDS-4220-E and IDS-4230-FE to 4.x Software 4-5
Installing the IDS-4220 and ID S-4230 4-6
5Installing the IDS-4235 and IDS-4250 5-1
Front-Panel Features and Indicators 5-2
Back-Panel Features and Indicators 5-4
Specifications 5-5
Installing Sp ar e H ar d-Disk Drives 5-6
Upgrading the BIOS 5-7
Using the TCP Reset Interface 5-8
Installing the IDS-4235 and ID S-4250 5-9
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
vii
Contents
Installing the Accessories 5-11
Accessories Package Contents 5-12
Installing and Removing the Bezel 5-12
Installing the Power Supply 5-13
Installing Optional PCI Cards 5-16
Disconnecting the XL Card Fiber Ports 5-19
Removing and Replacing the SCSI Hard-Disk Drive 5-20
Removing the SCSI Hard-Disk Drive 5-21
Replacing the SCSI Hard-Disk Drive 5-22
Four-Post Rack Installation 5-23
Recommended Tools and Supplies 5-23
Rack Kit Contents 5-23
Installing the Slide Assemblies 5-24
CHAPTER
Installing the Appliance in the Rack 5-26
Installing the Cable-Management Arm 5-28
Routing the Cables 5-32
Two-Post Rack Installation 5-34
Recommended Tools and Supplies 5-35
Rack Kit Contents 5-35
Marking the R ac k 5-35
Installing the Slide Assemblies in the Rack 5-36
6Installing the IPS-4240 and IPS-4255 6-1
Front and Back Panel Features 6-2
Specifications 6-5
Accessories 6-6
Rack Mounting 6-7
Installing the IPS-4240 and IPS-4255 6-9
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
viii
78-15597-02
Contents
CHAPTER
7Installing th e NM-CIDS 7-1
Specifications 7-1
Software and Hardware Requirements 7-2
Hardware Architecture 7-4
Front Panel Features 7-5
Interfaces 7-5
Installation and Removal Instructions 7-6
Required Tools 7-7
Installing the NM-CIDS 7-7
Installing the NM-CIDS Offline 7-7
Installing an NM-CIDS Using OIR Support 7-10
Removing the NM-CIDS 7-11
Removing th e N M-C ID S Of fli ne 7-12
Removing the NM-CIDS Using OIR Support 7-13
Blank Network Module Panels 7-14
CHAPTER
78-15597-02
8Installing the IDSM-2 8-1
Specifications 8-1
Software and Hardware Requirements 8-2
Supported IDSM-2 Configurations 8-3
Using the TCP Reset Interface 8-4
Front Panel Description 8-4
Installation and Removal Instructions 8-5
Required Tools 8-6
Slot Assignments 8-6
Installing the IDSM-2 8-7
Verifying the IDSM-2 Installation 8-11
Removing the IDSM-2 8-13
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
4.x Software Release Examples 9-6
Upgrading Cis co IDS Software from Version 4.0 to 4.1 9-8
Using the Recovery/Upgrade CD with the Appliance 9-9
Applying for a Cisco.com Account with Cryptographic Access 9-11
IDS Bulletin 9-12
10Configuring the Sensor Using the CLI 10-1
Sensor Initial Configuration Tasks 10-2
Initializing the Sensor 10-2
Assigning and Enabling the Sensing Interface 10-9
Sensing Interfaces 10-11
Creating the Service Account 10-12
Logging in to the Sensor 10-14
Changing a Password 10-15
Adding a User 10-16
Removing a User 10-17
Adding Trusted Hosts 10-18
Adding Known Hosts to the SSH Known Hosts List 10-19
Configuring the Sensor to Use an NTP Server as its Time Source 10-21
Configuring a Cisco Router to be a n NTP Server 10-22
Sensor Adminis trative Tasks 10-24
Displaying the Current Version and Configuration Information 10-24
Creating and Usi ng a Backup Configuration File 10-28
Displaying and Clearing Events 10-28
Rebooting or Powering Down the Appliance 10-30
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
x
78-15597-02
Displaying T ech Support Information 10-31
Displaying a nd Clearing Statistics 10-33
Sensor Configuration Tasks 10-35
Configuring Signatures 10-35
Configurin g Alarm Channel System Variables 10-35
Configuring Alarm Channel Even t Filters 10-37
Viewing Signature Engine Parameters 10-39
Configuring Virtual Sensor System Variables 10-42
Tuning Signature Engines 10-45
IP Logging 10-50
Manual IP Loggi ng for a Specific IP Address 10-51
Automatic IP Logging for a Specific Signature 10-53
Disabling IP Logging 10-55
Contents
Copying IP Log Files to Be Viewed 10-56
Configuring Blocking 10-57
Understanding Blocking 10-57
Before Configuring Blocking 10-59
Supported Blocking Devices 10-59
Configuring Blocking Properties 10-60
Configuring Addresses Never to Block 10-65
Configuring Logical Devices 10-66
Configuring Blocking Devic es 10-67
Configuring the Sensor to be a Maste r Blocking Sensor 10-73
Obtaining a List of Blocked Hosts and Connections 10-75
How to Set up Manual Blocking and How to Unblock 10-76
NM-CIDS Configuration Tasks 10-77
Configuring Cisco IDS Interfaces on the Router 10-78
Establishing Cisco IDS Console Sessions 10-80
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
Using the Session Command 10-80
Suspending a Ses sion and Returning t o the Router 10-81
xi
Contents
Closing an Open Se ssion 10-81
Using Telnet 10-82
Rebooting the NM-CIDS 10-83
Setting Up Packe t Capture 10-84
Checking the Status of the Cisco IDS Software 10-85
Supported Cisco IOS Commands 10-86
IDSM-2 Configuration Tasks 10-87
Configurin g the Catalyst 6500 Series Switch for Command and Control
Access to the ID S M-2
Preventive Maintenance B-1
Disaster Recovery B-2
Troubleshooting the 4200 Series Appliance B-4
Communication B-4
Cannot Access the Sensor Through th e IDM or Telnet and/or SSH B-5
IDM Cannot Access the Sensor B-7
Access List Misconfiguration B-10
Duplicate IP Address Shuts Interface Down B-10
SensorApp and Ale rting B-11
Sensing Proce ss Not Running B-11
Physical Connectivity, SPAN, or VACL Port Issue B-12
Unable to See Alerts B-14
Sensor Not Seeing Packets B-15
Cleaning Up a Corrupted SensorApp Configuration B-16
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
xiv
Running SensorApp in Single CPU Mode B-17
Bad Memory on the IDS-4250-XL B-18
78-15597-02
Blocking B-18
Verifying NAC is Running B-19
Verifying NAC is Connecting B-20
Device Access Is sues B-22
Verifying the Interfaces/Directions on the Network Device B-23
Enabling SSH Connections to the Net w ork Device B-24
Blocking Not Occurring for a Signature B-25
Verifying the Master Blocking Sensor Configurat ion B-26
Logging B-28
Enabling Debug Logging B-28
Zone Names B-31
Directing cidLog Messages to SysLog B-31
NTP B-33
Contents
Verifying that the Sensor is Synchronized with the NTP Server B-34
NTP Server Connec tivity Problem B-35
NTP Reconfiguration Defect B-35
TCP Reset B-37
Reset Not Occurr ing for a Signature B-37
Using the TCP Reset Interface B-39
Software Upgrade B-39
IDS-4235 and IDS -4250 Hang During A Software Upgrade B-40
Which Updates to Apply and in Which Order B-40
Issues With Automatic Update B-41
Verifying the Version of the IDSM-2 and NM-CIDS 4.1(4) Images B-42
Updating a Sensor with the Update Stored on the Sensor B-43
Troubleshooting the IDSM-2 B-44
Diagnosing IDSM-2 Problems B-44
Switch Commands for Troubleshooting B-46
Status LED Off B-46
Status LED On But IDSM-2 Does Not Come Online B-48
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
xv
Contents
Cannot Communica te With IDSM-2 Command and Control Port B-49
Using the TCP Reset Interface B-51
Connecting a Serial Cable to the IDSM-2 B-51
Gathering Inf o rm a tion B-52
show tech-support Command B-52
show tech-support Command B-53
Displaying Te ch Support Information B-53
show tech-suppo rt Command Output B-55
show version Command B-56
show version Command B-57
Displaying the Current Version B-57
show configuration/more current-config Command B-60
show statistics Command B-61
G
LOSSARY
show statistics Command B-61
Displaying St atistics B-62
show statistics Command Output B-63
show interfaces Command B-64
show interfaces Command B-64
show interfaces Command Output B-65
show events Command B-66
Sensor Events B-67
show events Command B-67
Displaying and Clearing Events B-68
show events Command Output B-69
cidDump Script B-70
Uploading and Accessing Files on the Cisco FTP Site B-71
I
NDEX
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
xvi
78-15597-02
Preface
This guide de scri bes h ow to i nstal l ap plianc es and m odule s an d p rovides ba sic
configuration proced ures using t he CLI.
This preface contains the following topics:
•Audience, page xvii
•Conventions, page xviii
Audience
•Related Docume ntat ion , page xix
•Obtaining Do cu ment ation , pa ge xix
•Documentation Feedba ck, page xx
•Obtaining Technical Assistance, page xxi
•Obtaining Additional Publications and Information, page xxiii
This guide i s inte nded fo r audi ence s who nee d to do the fo llowing :
•Install appliances and modules.
•Secure their network with sensors.
•Detect intrusion on their networks and monitor subsequent alarms.
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
xvii
Conventions
Conventions
This guide uses the fol lowing conventions:
ItemConvention
Commands and keywordsboldface font
Variables for wh ich you supply valuesitalic font
Preface
Displayed session and system inform ation
Information you enter
screen font
boldface screen font
Variables you enteritalic screen font
Menu items a nd button na mesboldface font
Selecting a menu itemOption > Networ k Preferences
NoteMeans reader take note. Notes contain helpful suggestions or references to
material not covered in the gui de.
CautionMeans reader be careful. In this situation, you might do som ethin g that cou ld
result in equipment dam age or loss of dat a.
Warning
This warning symbol means danger. You are in a situation that could cause
bodily injury. To see translations of the warnings that in this publication, refer
to the Regulatory Compliance and Safety Information document that
accompanied this device.
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
xviii
78-15597-02
Preface
Related Documentation
NoteWe sometimes update the printed and electronic documentation after original
publication. Ther ef or e, yo u sh ould a ls o review the doc ume nta tio n on Ci sco .com
for any updates.
The following product docum entati on is available:
•Cisco Intrusion D etect ion Syst em ( IDS) Hardware and Software Version 4.1
Documentation Guide
•Quick Start Guide for the Cisco Intrusio n Detection Sy stem Ve rsion 4.1
•Regulatory Compliance and Safet y Informat ion for the Ci sco Intrusio n
Detection System 42 00 Series Appl iance Senso r
Related Do cu m entation
•Installing and Using the Ci sco Intrusion Detect ion System Devic e Manager
and Event Viewer Version 4.1
•Cisco Intrusion De tectio n Sy stem C om mand Ref erence Version 4.1
•Release Notes for Cisco Intru sion Dete ction Syst em Version 4. 1
Refer to the Cisco In trusi on D etec tion Syst em (ID S) H ardware and Software
Version 4.1 Docu mentatio n Guid e for information on how to access this
documentation .
Obtaining Documentation
Cisco documentati on and a dditi onal l itera tur e are available on Cisco.com . Cisc o
also provides several ways to obtain technical assistance and other technical
resources. These section s explain h o w to obtain technica l information from Cisco
Systems.
Cisco.com
You can access the most current Cisco documentation at this URL:
http://www.cisco.com/univercd/home/home.htm
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
xix
Documentation Feedback
You can access the Cisco website at this URL:
http://www.cisco.com
You can access international Cisco websites at this URL:
•Nonregistered Cisco.com users can orde r documen tation thro ugh a loca l
account representa tive by calling Cisco Systems Corpor ate Head quarte rs
(California, US A) at 40 8 526-7208 o r, elsewhere in N orth A meri ca, by
calling 1 800 553-NETS (6387) .
Documentation Feedback
You can send comme nts ab out technic al docum entati on to bug-doc@c isco.com.
You can submit comments by using the response card (if present) behind the front
cover of your document or by writing to the followin g address:
Cisco Systems
Attn: Customer Docu ment Orde ring
170 West Tasman Drive
San Jose, CA 951 34- 988 3
We ap prec iate yo ur comm ents .
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
xx
78-15597-02
Preface
Obtaining Technical Ass istance
For all customers, partners, resellers, and distributors who hold valid Cisco
service contracts, Cisco Technical Support provides 24-hour-a-day,
award-winning technica l assistan ce. The Ci sco Technical Support We bsite on
Cisco.com features extensive online support resou rces. In addi tion, Cisco
Technical Assistance Cente r (TAC) engi neers provide tel ephone sup port. If you
do not hold a valid Ci sco se rv ice c ontr act , cont act y our r esel ler.
Cisco Technical Support Website
The Cisco Technical Support Website provides online do cume nts a nd tools fo r
troubleshooting and re solvin g t ec hnic al issues w ith C isco pr oduc ts and
technologies. Th e web site is available 2 4 h ours a d ay, 365 days a year, at this
URL:
Obtaining Technical Assistance
http://www.cisco.com/techsupport
Access to all tools on the Cisco Technical Support Website require s a Cisco.com
user ID and pa ssword. If you have a valid servi ce contract but do not have a user
ID or password, you can register at thi s URL:
http://tools.cisco.com/RPF/register/register.do
NoteUse the Cisco Product Id entification (CPI ) tool to locate your prod uct seri al
number before submitting a web or phone request for service. You can access the
CPI tool from the Cisco Technical Support We bsite by clicking the Tools &
Resources link under Documentation & Tools.Choose Cisco Product
Identification Tool from the Alphabetical Index drop-down list, or click the
Cisco Product Identification Tool link under Alerts & RMAs. Th e CPI tool
offers three search optio ns: by product ID or model na me; by tree view; or for
certain product s, by copying and pasting show co mm and o ut put. Se ar ch r esu lt s
show an illustration of your product with the serial number label location
highlighted. Loca te the se rial numbe r label on you r produc t and record the
information before placing a service call.
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
xxi
Obtaining Technical Assistance
Submitting a Service Request
Using the online TAC Ser vice Re quest Tool is the fastest way to open S3 and S4
service request s. (S3 a nd S4 ser vic e reque sts ar e t hose i n w hic h y our n etwor k is
minimally impaire d or for wh ich you requ ire prod uct inform ation .) After you
describe your situa tio n, t he TAC Servi ce Requ est Tool provides recommen ded
solutions. If your i ssue is not res olved using th e recomm ende d resour ces, your
service request is assigned to a Cisco TAC engineer. The TAC Service Request
Tool is located at this URL:
http://www.cisco.com/techsupport/servicerequest
For S1 or S2 service requests or if you do not have Internet acc ess, cont act the
Cisco TAC by telephone. (S1 or S2 se rvic e r eque sts a re t hos e i n wh ich you r
production network is down or severely degraded.) Cisco TAC engineers are
assigned immedi atel y t o S1 and S2 servi ce re quest s to hel p keep y our busine ss
operations running smoothly.
Preface
To ope n a servic e request by telephone, use one of the fo llowing numb ers:
Asia-Pacific: +61 2 8446 7411 (Austral ia: 1 800 805 227 )
EMEA: +32 2 704 55 55
USA: 1 800 553-2447
For a complete list of Cisco TAC contacts, go to this URL:
http://www.cisco.com/techsupport/contacts
Definitions of Service Request Severity
To ensure that all service requests are reported in a standard format, Cisco has
established severity definitions.
Severity 1 (S1)—Your network is “down,” or there i s a crit ical impa ct to your
business operations. Yo u and Cisco w ill comm it all nece ssary resour ces ar ound
the clock to resolve the situation.
Severity 2 (S2)—Operation of an existing network is severely degraded, or
significant aspects o f y our business opera ti on ar e negatively affected by
inadequate perfor ma nce of Cisco pro duct s. You and Cisco will commit full-time
resources during normal business hours to resolve the situati on.
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
xxii
78-15597-02
Preface
Obtaining Additional Publications and Inform ation
Severity 3 (S3) —Operational performance of your network is impaired, but most
business operations remain functional. You and Cisco will commit resources
during normal business hours to restor e service t o satisfact ory levels.
Severity 4 (S4)—You require infor mation or as sistance with Cisco produc t
capabilities, installation, or configuration. There is little or no effect on your
business operations.
Obtaining Additional Publication s and In formation
Information abo ut C isco pr odu cts, tech nol ogies, a nd ne twork solu tio ns is
available from various online and printed sources.
•Cisco Marketplace provides a variety of Cisco book s, refere nce guid es, and
logo merch and ise. Visit Cisco Ma rketp l ace, t h e co mpa ny st or e, a t thi s UR L:
http://www.cisco.com/go/marketplace/
•The Cisco Product Catalog describes the networking products offered by
Cisco Systems, as well as ordering and customer support services. Access the
Cisco Product Catalog at thi s URL:
http://cisco.com/univercd/cc/td/doc/pcat/
•Cisco Press publishes a wide range o f gen er al network ing, tra ining a nd
certification titles. Both new and experienced users will benefit from these
publications. For curren t Cisco Press titles and other information , go to Cisco
Press at this URL:
http://www.ciscopress.com
•Pa cket magaz ine is the Cisc o System s technic al user magaz ine for
maximizing Intern et an d networking investments. Each quarte r, Packet
delivers coverage of the latest industry trends, technology breakthroughs, and
Cisco products and solution s, as well as ne twork deployment and
troubleshooting ti ps, c onfigura tion exa mp les, cust om er c as e st udie s,
certification and training information, and links to scores of in-depth online
resources. You can access Packet magazine at this URL:
http://www.cisco.com/packet
•iQ Magazine is the quarterly publ icat ion from Ci sco Sy stem s d esign ed t o
help growing comp an ies learn how th ey ca n u se techn ol ogy to i ncr ea se
revenue, streamline their business, and expand services. The publication
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
xxiii
Obtaining Additional Publications and Information
identifies the chal leng es facin g these compan ies and the tec hnologi es to help
solve them, using real-world case studies and business strategies to help
readers make sound techn ology investment decisions. You can access iQ
Magazine at thi s URL:
http://www.cisco.com/go/iqmagazine
•Internet Protocol Journal is a qua rte rly jour nal pub lished by Ci sco Syste ms
for engineerin g p rofe ssiona ls involved in designing , developing, and
operating public and private internets and intranets. You can access the
Internet Protocol Jour nal at this URL:
http://www.cisco.com/ipj
•Worl d-cla ss networking training is available from Cisco. You can view
current offerings at thi s URL:
http://www.cisco.com/en/US/learning/index.html
Preface
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
xxiv
78-15597-02
CHAPTER
1
Introducing the Sensor
This chapter i ntr odu ces t h e sen sor a nd provi des i nf orma tion y ou shou l d k now
before you instal l the sensor. In this guide, the te rm “sensor” refers to all models
unless specifically noted otherwise. See Supported Sensors, page 1-16, for a
complete list of suppor ted sensors and their model numbers.
This chapter contains the following topics:
•Appliances, pa ge 1-1
•Modules, page 1-12
•Supported Sensors, page 1-16
Appliances
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
•Setting the Time on Sensors, page 1-18
•Installation Preparation, page 1-20
•Worki n g in an ES D E nvironment, p age 1-21
This section describes the appliance and contains the following topics:
•Introducing the Ap plian ce, page 1-2
•How the Appliance Fun ction s, page 1-3
•Your Network Topology, page 1-4
•Placing an App l iance on Your Network, pa ge 1-6
•Deployment Conside rations, pa ge 1-8
1-1
Appliances
•Appliance Restr ictions , page 1-9
•Setting Up a Terminal Server, page 1-9
Introducing the Appliance
The appliance is a high-pe rfor manc e, plug-a nd-pla y device. The a pplia nce is a
component of th e In tr usion D etec tio n Sy stem ( IDS ), a n etwork-b as ed, re al-t ime
intrusion detection system. See Supported Sensors, page 1-16, for a list of
supported applian ces.
You can use th e C omm a nd Li ne I nt erfac e (C LI ), IDS Device M an ager, or
Management Center for IDS Sens ors to configure th e applian ce. Refer t o your
IDS manager d ocume nta tio n. To access IDS docum enta tion on Cisc o.co m, re fer
to Cisco Intrusion Dete ction Syst em (IDS) H ardware and Software Version 4.1 Documentation Guide that shipped with your appliance.
Chapter 1 Introducing the Sensor
You can configure the appliance to respond to recognized signatures as it captures
and analyze s ne twor k tr affic. These r espon ses inc lu de l og ging th e event,
forwarding the event to the I DS man ager, perform ing a TCP rese t, ge nera ting a n
IP log, capturing the alert trigger packet, and/or reconfiguring a router.
After being installed at key points in the network, the appliance monitors and
performs real-time analysis of ne twork traffic by looking for anoma lies and
misuse based on an extensive, embedded signature lib rary. When the system
detects unauthorized activity, appliances can terminate the specific connection,
permanently block the att acking host, log the inciden t, and send an alert to the I DS
manager . Other le gitimate connections continue to operate indep endently without
interruption.
Appliances ca n al so moni tor and an aly ze sy sl og me ssa ges fr om Cisco rou ter s t o
detect and re port n etwork sec urity po l icy viol ati ons .
Appliances are opt imiz ed for spe cific data ra tes an d are pa ckag ed in Et hernet ,
Fast Ethernet, a nd G igabit Et herne t c on figurati ons. I n sw itc hed e nvironments,
appliances must be c onnected to the switch ’s Swi tched Port Ana lyzer (SPAN) port
or VLAN Access Control lis t (VACL) capture port.
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
1-2
78-15597-02
Chapter 1 Introducing the Sensor
How the Appliance Functions
This section explains how the appliance captures network traffic.
Each appliance comes with at least two interfaces. In a typical installation, one
interface monitors (sniffs) the desired network segment, and the other interface
(command and cont rol) com municat es with the IDS manager a nd other netwo rk
devices. The monitoring inte rface is in pro miscuous mode, mean ing it has n o IP
address and is not vi sibl e on the m on itore d segm en t.
NoteWith the addition of the 4-port Fast Ethernet NIC card, the IDS-4235, IDS-4250,
and the IDS-4215 have six interfaces. With the addition of the 2-port XL card, the
IDS-4250 has four interfaces. With the addition of the SX card, the IDS-4250 has
three interfaces.
Appliances
The comman d a nd cont r ol i nte rfa ce i s always Ethe rn et. Thi s inte r face has a n
assigned IP address, which allows it to communicate with the IDS manager
workstation or network devices (typically a Cisco router). Because this interface
is visible on the network, you should use encryption to maintain data privacy.
Secure Shell (SSH) is used to protect the Command Line Interface (CLI) and the
Transaction Layer Security/Secure Sockets Layer (TLS/SSL) is used to protect
the IDS manager workstation. Both SSH and T LS/SSL are enabled by default o n
the IDS manager workstations .
When responding to attacks, the appliance can do the following:
•Insert TCP resets via th e monitoring interface.
NoteThe TCP reset action is only appropriate as an action selection on
those signatures that are associated with a TCP-based service. If
selected as an action on non-TCP-based services, no action is taken.
Additionally, TCP resets are not guaranteed to tear down an offending
session because of limita tions in the TCP pr otocol. O n the
IDS-4250-XL, TCP re sets are se nt throug h the TCP Rese t interface.
•Make access control lis t (ACL) changes on routers th at the appli ance
manages.
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
1-3
Appliances
NoteACLs may block only future traffic, not current traffic.
•Generate IP session logs
IP session logs are used to gather information about unauthorized use. IP log
files are written wh en a cert ain e vent or ev ents occu r that you hav e conf igured
the appliance to look for.
Because the appliance is not in the d ata path, it ha s a negligi ble impact on ne twork
performance. However, there are limitations on the data spee ds it can moni tor.
Your Network Topology
Before you dep loy an d c on figure y our a pp lianc es , y ou shoul d under stand t he
following about your ne twork :
Chapter 1 Introducing the Sensor
•The size and c om plexity of yo ur ne twork .
•Connections betw een your ne twork and othe r networks (and the Inte rnet).
•The amount and type of network tra ffic on your network.
This knowledge will he lp you determ ine how many appliances ar e requ ired, t he
hardware configurati on for each applianc e (for exam ple, th e size and type of
network interfac e c ards) , and h ow many IDS mana ge rs ar e ne eded .
The appliance monitors all traffic across a given network segment. With that in
mind, you should consider all the connections to the network you want to protect.
These connections fall into four categories, or locations, as illustrated in
Figure 1-1 on page 1-5.
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
1-4
78-15597-02
Chapter 1 Introducing the Sensor
Figure 1-1Major Types of Network Connections
Appliances
Internet
Business
partner
1
Appliance
E-commerce
network
ApplianceAppliance
3
Appliance
Dial-up
server
Research and
Development
network
83874
42
In location one, the appliance is placed to monitor traffic between the
E-commerce (protected ) network and the Internet. Th is is referred to as perim eter
protection an d i s the mo st c ommon d ep loymen t fo r an a pplian ce. T his loc at ion
can be shared with firewall protection and is discussed in Placing an Applia nce on
Your Network, page 1-6.
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
78-15597-02
In location two, the appliance is monitoring an extranet connection with a
business partner. Although most companies h ave defined policie s on the u se an d
security of this type of co nnec tion, the re is no guarant ee tha t the network of a
partner is ade qua te ly pr ote cte d. Co nse quent ly, an outsider may e nte r your
network through t his t ype o f co nnect ion . Th ese extra ne t c on necti ons may have
firewalls as well.
In location three, the a pplia nce is monitoring the netwo rk si de o f a r emo te a cc ess
server. Although t his c on necti on m ay be o nly for emp loyee use, it could be
vulnerable to external attack.
In location four, the appliance is monitoring an intr anet connectio n. F or e xa mple,
the protected net work of one depa rtm ent m a y cont ai n an e -com me rce s ite whe re
all the acc ess type s de scr ibe d so far a re r e quire d. T he n etwor k of anot her
department may co ntain c ompany-spec ific researc h and development or oth er
engineering info rmat ion and shou ld be given additional pro tectio n.
1-5
Appliances
Determine which segments of the network you want to monitor to determine the
location for the applianc e. Remember, each appliance maintains a securit y policy
configured for the se gme nt it is monitoring . The security policies can be standard
across the organization or unique for each appliance. You may consider changing
your network topology to force traffic across a given monitored network segment.
There are always operational trade-offs when going through this process. The end
result should be a rough idea of the number of appliances required to protect the
desired network.
Placing an Appliance on Your Network
You can place an appliance in front of or behind a firewall. Each position has
benefits and drawbacks.
Placing an appliance in front of a firewall allows the appliance to monitor all
incoming and outgoing network traffic. However, when deployed in this manner,
the appliance does not detect traffic that is internal to the network. An internal
attacker taking advantage of vulnerabilities in network services would remain
undetected by th e extern al ap plian ce (s ee Figure 1-2 on p age 1-7).
Chapter 1 Introducing the Sensor
Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
1-6
78-15597-02
Loading...
+ 420 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.