Version 5.2Sourcefire 3D System Installation Guide1
Version 5.2
Terms of Use Applicable to the User Documentation
The legal notices, disclaimers, terms of use, and other information contained herein (the "terms") apply only to
the information discussed in this documentation (the "Documentation") and your use of it. These terms do not
apply to or govern the use of websites controlled by Sourcefire, Inc. or its subsidiaries (collectively, "Sourcefire")
or any Sourcefire-provided products. Sourcefire products are available for purchase and subject to a separate
license agreement and/or terms of use containing very different terms and conditions.
Terms of Use and Copyright and Trademark Notices
The copyright in the Documentation is owned by Sourcefire and is protected by copyright and other intellectual
property laws of the United States and other countries. You may use, print out, save on a retrieval system, and
otherwise copy and distribute the Documentation solely for non-commercial use, provided that you (i) do not
modify the Documentation in any way and (ii) always include Sourcefire's copyright, trademark, and other
proprietary notices, as well as a link to, or print out of, the full contents of this page and its terms.
No part of the Documentation may be used in a compilation or otherwise incorporated into another work or with
or into any other documentation or user manuals, or be used to create derivative works, without the express
prior written permission of Sourcefire. Sourcefire reserves the right to change the terms at any time, and your
continued use of the Documentation shall be deemed an acceptance of those terms.
Sourcefire, the Sourcefire logo, Snort, the Snort and Pig logo, Immunet, ClamAV and certain other trademarks
and logos are trademarks or registered trademarks of Sourcefire, Inc. in the United States and other countries.
Other company, product and service names may be trademarks or service marks of others.
THE DOCUMENTATION AND ANY INFORMATION AVAILABLE FROM IT MAY INCLUDE INACCURACIES OR
TYPOGRAPHICAL ERRORS. SOURCEFIRE MAY CHANGE THE DOCUMENTATION FROM TIME TO TIME.
SOURCEFIRE MAKES NO REPRESENTATIONS OR WARRANTIES ABOUT THE ACCURACY OR SUITABILITY OF
ANY SOURCEFIRE-CONTROLLED WEBSITE, THE DOCUMENTATION AND/OR ANY PRODUCT INFORMATION.
SOURCEFIRE-CONTROLLED WEBSITES, THE DOCUMENTATION AND ALL PRODUCT INFORMATION ARE
PROVIDED "AS IS" AND SOURCEFIRE DISCLAIMS ANY AND ALL EXPRESS AND IMPLIED WARRANTIES,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF TITLE AND THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND/OR FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL SOURCEFIRE BE
LIABLE TO YOU FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, PUNITIVE, OR
CONSEQUENTIAL DAMAGES (INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES, LOSS OF DATA, LOSS OF PROFITS, AND/OR BUSINESS INTERRUPTIONS), ARISING OUT OF OR IN
ANY WAY RELATED TO SOURCEFIRE-CONTROLLED WEBSITES OR THE DOCUMENTATION, NO MATTER HOW
CAUSED AND/OR WHETHER BASED ON CONTRACT, STRICT LIABILITY, NEGLIGENCE OR OTHER TORTUOUS
ACTIVITY, OR ANY OTHER THEORY OF LIABILITY, EVEN IF SOURCEFIRE IS ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES. BECAUSE SOME STATES/JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION
OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATIONS MAY NOT APPLY TO
YOU.
The Documentation may contain "links" to websites that are not created by, or under the control of Sourcefire.
Sourcefire provides such links solely for your convenience, and assumes no responsibility for the availability or
content of such other sites.
2013-Oct-18 16:20
Table of Contents
Chapter 1:Introduction to the Sourcefire 3D System ............................... 8
Sourcefire 3D System Appliances ........................................................................ 9
Version 5.2Sourcefire 3D System Installation Guide7
CHAPTER 1
INTRODUCTIONTOTHE SOURCEFIRE 3D
YSTEM
S
The Sourcefire 3D® System combines the security of an industry-leading
network intrusion protection system with the power to control access to your
network based on detected applications, users, and URLs. You can also use
Sourcefire appliances to serve in a switched, routed, or hybrid (switched and
routed) environment; to perform network address translation (NAT); and to build
secure virtual private network (VPN) tunnels among the virtual routers on
Sourcefire managed devices, or from managed devices to remote devices or
other third-party VPN endpoints.
The Sourcefire Defense Center® provides a centralized management console and
database repository for the Sourcefire 3D System. Managed devices installed on
network segments monitor traffic for analysis.
Devices in a passive deployment monitor traffic flowing across a network, for
example, using a switch SPAN, virtual switch, or mirror port. Passive sensing
interfaces receive all traffic unconditionally and no traffic received on these
interfaces is retransmitted.
Devices in an inline deployment allow you to protect your network from attacks
that might affect the availability, integrity, or confidentiality of hosts on the
network. Inline interfaces receive all traffic unconditionally, and traffic received on
these interfaces is retransmitted unless explicitly dropped by some configuration
in your deployment. Inline devices can be deployed as a simple intrusion
prevention system. You can also configure inline devices to perform access
control as well as manage network traffic in other ways.
This installation guide provides information about deploying, installing, and setting
up Sourcefire appliances (devices and Defense Centers). It also contains
Version 5.2Sourcefire 3D System Installation Guide8
Introduction to the Sourcefire 3D System
Sourcefire 3D System Appliances
hardware specifications and safety and regulatory information for Sourcefire
appliances.
TIP! You can host virtual Defense Centers and devices, which can manage and
be managed by physical appliances. However, virtual appliances do not support
any of the system’s hardware-based features: redundancy, switching, routing, and
so on. For detailed information, see the Sourcefire 3D System Virtual Installation Guide.
The topics that follow introduce you to the Sourcefire 3D System and describe its
key components:
•Sourcefire 3D System Appliances on page 9
•Sourcefire 3D System Components on page 16
•Licensing the Sourcefire 3D System on page 19
•Security, Internet Access, and Communication Ports on page 23
Chapter 1
Sourcefire 3D System Appliances
A Sourcefire appliance is either a traffic-sensing managed device or a managing
Defense Center:
Physical devices are fault-tolerant, purpose-built network appliances available with
a range of throughputs and capabilities. Defense Centers serve as central
management points for these devices, and automatically aggregate and correlate
the events they generate. There are several models of each physical appliance
type; these models are further grouped into series and family.
Many Sourcefire 3D System capabilities are appliance dependent. For more
information, see the following sections:
•Defense Centers on page 9
•Managed Devices on page 10
•Understanding Appliance Series, Models, and Capabilities on page 10
Defense Centers
The Defense Center provides a centralized management point and event
database for your Sourcefire 3D System deployment. Defense Centers, which
can be physical or virtual, aggregate and correlate intrusion, file, malware,
discovery, connection, and performance data. This allows you to monitor the
information that your devices report in relation to one another, and to assess and
control the overall activity that occurs on your network.
Version 5.2Sourcefire 3D System Installation Guide9
Introduction to the Sourcefire 3D System
Sourcefire 3D System Appliances
Key features of the Defense Center include:
•device, license, and policy management
•display of event and contextual information using tables, graphs, and charts
•health and performance monitoring
•external notification and alerting
•real-time threat response using correlation and remediation features
•reporting
For many physical Defense Centers, a high availability (redundancy) feature can
help you ensure continuity of operations.
Managed Devices
Physical Sourcefire devices are fault-tolerant, purpose-built network appliances
available in a range of throughputs. You can also host virtual devices. Devices
deployed passively help you gain insight into your network traffic. Deployed inline,
you can use Sourcefire devices to affect the flow of traffic based on multiple
criteria. You must manage Sourcefire devices with a Defense Center.
Chapter 1
Depending on model and license, managed devices:
•gather detailed information about your organization’s hosts, operating
systems, applications, users, files, networks, and vulnerabilities
•block or allow network traffic based on various network-based criteria, as
well as other criteria including applications, users, URLs, IP address
reputations, and the results of intrusion or malware inspections
•have switching, routing, DHCP, NAT, and VPN capabilities, as well as
configurable bypass interfaces, fast-path rules, and strict TCP enforcement
•have clustering (redundancy) to help you ensure continuity of operations,
and stacking to combine resources from multiple devices
Understanding Appliance Series, Models, and Capabilities
Version 5.2 of the Sourcefire 3D System is available on two series of physical
appliances, as well as virtual appliances. Many Sourcefire 3D System capabilities
are appliance dependent. For more information, see:
•Series 2 Appliances on page 11
•Series 3 Appliances on page 11
•Virtual Appliances on page 12
•Appliances Delivered with Version 5.2 on page 12
•Supported Capabilities by Appliance Model on page 13
Version 5.2Sourcefire 3D System Installation Guide10
Introduction to the Sourcefire 3D System
Sourcefire 3D System Appliances
Series 2 Appliances
Series 2 is the second series of Sourcefire physical appliances. Because of
resource and architecture limitations, Series
Sourcefire 3D System features.
Although Sourcefire does not deliver Version 5.2 on Series 2 appliances other
than 3D500/1000/2000 devices, you can restore the following Series
and Defense Centers to Version 5.2:
•3D2100/2500/3500/4500
•3D6500
•3D9900
•DC500/1000/3000
There is no update path from Version 4.10.x to Version 5.2; you must use an ISO
image to restore your appliances. Reimaging results in the loss of all
configuration and event data on the appliance. You cannot import this data onto
an appliance after a reimage. For more information, see
Appliance to Factory Defaults on page 198.
Chapter 1
2 devices support a restricted set of
2 devices
Restoring a Sourcefire
IMPORTANT!Only reimage your appliances during a maintenance window.
Reimaging resets devices in inline deployments to a non-bypass configuration
and disrupts traffic on your network. For more information, see Traffic Flow During
the Restore Process on page 199.
When running Version 5.2, Series 2 devices automatically have most of the
capabilities associated with a Protection license: intrusion detection and
prevention, file control, and basic access control. However, Series
cannot perform Security Intelligence filtering, advanced access control, or
advanced malware protection. You also cannot enable other licensed capabilities
on a Series
rules, stacking, and tap mode, Series
hardware-based features associated with Series
NAT, and so on.
When running Version 5.2, DC1000 and DC3000 Series 2 Defense Centers
support all the features of the Sourcefire 3D System; the DC500 has more limited
capabilities.
2 device. With the exception of the 3D9900, which supports fast-path
2 devices do not support any of the
3 devices: switching, routing,
2 devices
Series 3 Appliances
Series 3 is the third series of Sourcefire physical appliances. All 7000 Series and
8000
Series devices are Series 3 appliances. 8000 Series devices are more
powerful and support a few features that 7000
Series devices do not.
Version 5.2Sourcefire 3D System Installation Guide11
Introduction to the Sourcefire 3D System
Sourcefire 3D System Appliances
Virtual Appliances
You can host 64-bit virtual Defense Centers and devices on VMware ESX/ESXi.
Virtual Defense Centers can manage up to 25 physical or virtual devices; physical
Defense Centers can manage virtual devices.
Regardless of the licenses installed and applied, virtual appliances do not support
any of the system’s hardware-based features: redundancy, switching, routing, and
so on. Also, virtual devices do not have web interfaces. For detailed information
on virtual appliances, see the Sourcefire 3D System Virtual Installation Guide.
Appliances Delivered with Version 5.2
The following table lists the appliances that Sourcefire delivers with Version 5.2 of
the Sourcefire 3D System.
Version 5.2 Sourcefire Appliances
MODELS/FAMILYSERIESTYPE
Chapter 1
Series 2 devices:
3D500, 3D1000, and 3D2000
70xx Family:
3D7010, 3D7020 and 3D7030
71xx Family:
3D7110, 3D7115, 3D7120m
and 3D7125
81xx Family:
3D8120/8130/8140
82xx Family:
3D8250, 3D8260, 3D8270,
and 3D8290
virtual devicesnonedevice
Series 3 Defense Centers:
DC750/1500/3500
virtual Defense CentersnoneDefense Center
Although Sourcefire does not deliver Version 5.2 on Series 2 appliances other
than 3D500, 3D1000m and 3D2000 devices, you can reimage the following
Series
2 devices and Defense Centers to Version 5.2:
•3D2100/2500/3500/4500
•3D6500
Series 2device
Series 3 (7000 Series)device
Series 3 (7000 Series)device
Series 3 (8000 Series)device
Series 3 (8000 Series)device
Series 3Defense Center
Version 5.2Sourcefire 3D System Installation Guide12
Introduction to the Sourcefire 3D System
Sourcefire 3D System Appliances
•3D9900
•DC500/1000/3000
Reimaging results in the loss of all configuration and event data on the appliance.
See
Restoring a Sourcefire Appliance to Factory Defaults on page 198 for more
information.
Supported Capabilities by Appliance Model
Many Sourcefire 3D System capabilities are appliance dependent. The table
below matches the major capabilities of the system with the appliances that
support those capabilities, assuming you have the correct licenses installed and
applied. For a brief summary of these features and licenses, see
Capabilities by Appliance Model on page 13 and Licensing the Sourcefire 3D
System on page 19.
The Defense Center column for device-based capabilities (such as stacking,
switching, and routing) indicates whether that Defense Center can manage and
configure devices to perform their functions. For example, you can use a Series
DC1000 to manage NAT on Series
is unsupported, while
not relevant to managed devices.
Chapter 1
Supported
2
3 devices. Also, a blank cell means the feature
n/a marks certain Defense Center-based features that are
Supported Capabilities by Appliance Model
FEATURESERIES 2
network discovery:
host, application, and
user
geolocation dataDC1000,
intrusion detection
and prevention (IPS)
Security Intelligence
filtering
access control: basic
network control
access control:
applications
access control: usersDC1000,
DEVICE
SERIES 2
DEFENSE
C
ENTER
DC3000
DC1000,
DC3000
DC3000
SERIES 3
DEVICE
SERIES 3
DEFENSE
C
ENTER
VIRTUAL
DEVICE
VIRTUAL
DEFENSE
C
ENTER
Version 5.2Sourcefire 3D System Installation Guide13
Introduction to the Sourcefire 3D System
Sourcefire 3D System Appliances
Supported Capabilities by Appliance Model (Continued)
Chapter 1
FEATURESERIES 2
access control: literal
URLs
access control: URL
filtering by category
and reputation
file control: by file
type
network-based
advanced malware
protection (AMP)
FireAMP integrationn/an/an/a
fast-path rules3D99008000 Series
strict TCP
enforcement
configurable bypass
interfaces
DEVICE
except
SERIES 2
DEFENSE
C
ENTER
DC1000,
DC3000
DC1000,
DC3000
SERIES 3
DEVICE
where
hardware
limited
SERIES 3
DEFENSE
C
ENTER
VIRTUAL
DEVICE
VIRTUAL
DEFENSE
C
ENTER
tap mode3D9900
switching and
routing
NAT policies
VPN
high availabilityn/aDC1000,
device stacking3D99003D8140,
DC3000
n/aDC1500,
DC3500
82xx Family
n/a
Version 5.2Sourcefire 3D System Installation Guide14
Introduction to the Sourcefire 3D System
Sourcefire 3D System Appliances
Supported Capabilities by Appliance Model (Continued)
Chapter 1
FEATURESERIES 2
DEVICE
device clustering
clustered stacks3D8140,
interactive CLI
SERIES 2
DEFENSE
C
ENTER
SERIES 3
DEVICE
82xx Family
SERIES 3
DEFENSE
C
ENTER
VIRTUAL
DEVICE
VIRTUAL
DEFENSE
C
ENTER
Series 3 Device Chassis Designations
The following section lists the 7000 Series and 8000 Series devices and their
respective chassis hardware codes. The chassis code appears on the regulatory
label on the outside of the chassis, and is the official reference code for hardware
certifications and safety.
7000 Series Chassis Designations
The 7000 Series Chassis Models table lists the chassis designations for the
7000 Series models available world-wide.
7000 Series Chassis Models
3D DEVICE MODELHARDWARE CHASSIS CODE
3D7010, 3D7020, and 3D7030CHRY-1U-AC
3D7110 and 3D7120 (Copper) GERY-1U-8-C-AC
3D7110 and 3D7120 (Fiber)GERY-1U-8-FM-AC
3D7115 and 3D7125GERY-1U-4C8S-AC
Version 5.2Sourcefire 3D System Installation Guide15
Introduction to the Sourcefire 3D System
Sourcefire 3D System Components
8000 Series Chassis Designations
The 8000 Series Chassis Models table lists the chassis designations for the
Series 3 models available world-wide.
8000 Series Chassis Models
3D DEVICE MODELHARDWARE CHASSIS CODE
Chapter 1
3D8120, 3D8130, and 3D8140
(AC power)
3D8120, 3D8130, and 3D8140
(DC power)
3D8250, 3D8260, 3D8270, and 3D8290
(AC power)
3D8250, 3D8260, 3D8270, and 3D8290
(DC power)
Sourcefire 3D System Components
The sections that follow describe some of the key capabilities of the Sourcefire
3D System that contribute to your organization’s security, acceptable use policy,
and traffic management strategy.
TIP! Many Sourcefire 3D System capabilities are appliance model, license, and
user role dependent. Where needed, Sourcefire documentation outlines the
requirements for each feature and task.
CHAS-1U-AC
CHAS-1U-DC
CHAS-2U-AC
CHAS-2U-DC
Redundancy and Resource Sharing
The redundancy and resource-sharing features of the Sourcefire 3D System allow
you to ensure continuity of operations and to combine the processing resources
of multiple physical devices:
•Defense Center high availability allows you to designate redundant DC1000,
DC1500, DC3000, or DC3500 Defense Centers to manage devices.
•Device stacking allows you to increase the amount of traffic inspected on a
network segment by connecting two to four physical devices in a stacked
configuration.
•Device clustering allows you to establish redundancy of networking
functionality and configuration data between two or more Series 3 devices
or stacks.
Version 5.2Sourcefire 3D System Installation Guide16
Introduction to the Sourcefire 3D System
Sourcefire 3D System Components
Network Traffic Management
The Sourcefire 3D System’s network traffic management features allow Series 3
devices to act as part of your organization’s network infrastructure. You can:
•configure a Layer 2 deployment to perform packet switching between two
or more network segments
•configure a Layer 3 deployment to route traffic between two or more
interfaces
•perform network address translation (NAT)
•build secure VPN tunnels from virtual routers on managed devices to
remote devices or other third-party VPN endpoints
FireSIGHT
FireSIGHT™ is Sourcefire’s discovery and awareness technology that collects
information about hosts, operating systems, applications, users, files, networks,
geolocation information, and vulnerabilities, in order to provide you with a
complete view of your network.
You can use the Defense Center’s web interface to view and analyze data
collected by FireSIGHT. You can also use this data to help you perform access
control and modify intrusion rule states.
Chapter 1
Access Control
Access control is a policy-based feature that allows you to specify, inspect, and
log the traffic that traverses your network. As part of access control, the Security
Intelligence feature allows you to blacklist—deny traffic to and from—specific IP
addresses before the traffic is subjected to deeper analysis.
After Security Intelligence filtering occurs, you can define which and how traffic is
handled by targeted devices, from simple IP address matching to complex
scenarios involving different users, applications, ports, and URLs. You can trust,
monitor, or block traffic, or perform further analysis, such as:
•intrusion detection and prevention
•file control
•file tracking and network-based advanced malware protection (AMP)
Intrusion Detection and Prevention
Intrusion detection and prevention is a policy-based feature, integrated into
access control, that allows you to monitor your network traffic for security
violations and, in inline deployments, to block or alter malicious traffic. An
intrusion policy contains a variety of components, including:
•rules that inspect the protocol header values, payload content, and certain
packet size characteristics
•rule state configuration based on FireSIGHT recommendations
Version 5.2Sourcefire 3D System Installation Guide17
Introduction to the Sourcefire 3D System
Sourcefire 3D System Components
•advanced settings, such as preprocessors and other detection and
performance features
•preprocessor rules that allow you to generate events for associated
preprocessors and preprocessor options
File Tracking, Control, and Malware Protection
To help you identify and mitigate the effects of malware, the Sourcefire 3D
System’s file control, network file trajectory, and advanced malware protection
components can detect, track, and optionally block the transmission of files
(including malware files) in network traffic.
File control is a policy-based feature, integrated into access control, that allows
managed devices to detect and block your users from uploading (sending) or
downloading (receiving) files of specific types over specific application protocols.
Network-based advanced malware protection (AMP) allows the system to inspect
network traffic for malware in specific types of files. When a managed device
detects one of these file types, the Defense Center obtains the file’s disposition
from the Sourcefire cloud. The managed device uses this information to track and
then block or allow the file.
FireAMP is Sourcefire’s enterprise-class, endpoint-based AMP solution. If your
organization has a FireAMP subscription, individual users install FireAMP
Connectors on their computers and mobile devices. These lightweight agents
communicate with the Sourcefire cloud, which in turn communicates with the
Defense Center. In this way, you can use the Defense Center to view malware
detection and quarantines on the endpoints in your organization, as well as to
track the malware’s trajectory.
Chapter 1
Application Programming Interfaces
There are several ways to interact with the system using application programming
interfaces (APIs):
•The Event Streamer (eStreamer) allows you to stream several kinds of event
data from a Sourcefire appliance to a custom-developed client application.
•The database access feature allows you to query several database tables on
a Defense Center, using a third-party client that supports JDBC SSL
connections.
•The host input feature allows you to augment the information in the
network map by importing data from third-party sources using scripts or
command-line files.
•Remediations are programs that your Defense Center can automatically
launch when certain conditions on your network are met. This can not only
automatically mitigate attacks when you are not immediately available to
address them, but can also ensure that your system remains compliant with
your organization’s security policy.
Version 5.2Sourcefire 3D System Installation Guide18
Introduction to the Sourcefire 3D System
Licensing the Sourcefire 3D System
Licensing the Sourcefire 3D System
You can license a variety of features to create an optimal Sourcefire 3D System
deployment for your organization. You must use the Defense Center to control
licenses for itself and the devices it manages.
Sourcefire recommends you add the licenses your organization has purchased
during the initial setup of your Defense Center. Otherwise, any devices you
register during initial setup are added to the Defense Center as unlicensed. You
must then enable licenses on each device individually after the initial setup
process is over. For more information, see
Appliance on page 86.
A FireSIGHT license is included with each Defense Center purchase, and is
required to perform host, application, and user discovery. The FireSIGHT license
on your Defense Center also determines how many individual hosts and users
you can monitor with the Defense Center and its managed devices, as well as
how many users you can use to perform user control. FireSIGHT host and user
license limits are model specific, as listed in the following table.
Chapter 1
Setting Up a Sourcefire 3D System
FireSIGHT Limits by Defense Center Model
DEFENSE CENTER MODELFIRESIGHT HOSTAND USER LIMIT
DC5001000 (no user control)
DC7502000
DC100020,000
DC150050,000
DC3000100,000
DC3500300,000
If your Defense Center was previously running Version 4.10.x, you may be able to
use legacy RNA Host and RUA User licenses instead of a FireSIGHT license. For
more information, see
page 22.
Additional model-specific licenses allow your managed devices to perform a
variety of functions, as follows:
Using Legacy RNA Host and RUA User Licenses on
Protection
A Protection license allows managed devices to perform intrusion detection
and prevention, file control, and Security Intelligence filtering.
Version 5.2Sourcefire 3D System Installation Guide19
Introduction to the Sourcefire 3D System
Licensing the Sourcefire 3D System
Control
A Control license allows managed devices to perform user and application
control. It also allows devices to perform switching and routing (including
DHCP relay), NAT, and to cluster devices and stacks. A Control license
requires a Protection license.
URL Filtering
A URL Filtering license allows managed devices to use regularly updated
cloud-based category and reputation data to determine which traffic can
traverse your network, based on the URLs requested by monitored hosts. A
URL Filtering license requires Protection and Control licenses.
Malware
A Malware license allows managed devices to perform network-based
advanced malware protection (AMP), that is, to detect and block malware in
files transmitted over your network. It also allows you to view trajectories,
which track files transmitted over your network. A Malware license requires a
Protection license.
Chapter 1
VPN
A VPN license allows you to build secure VPN tunnels among the virtual
routers on Sourcefire managed devices, or from managed devices to remote
devices or other third-party VPN endpoints. A VPN license requires Protection
and Control licenses.
Because of architecture and resource limitations, not all licenses can be applied to
all managed devices. In general, you cannot license a capability that a device does
not support; see
The following table summarizes which licenses you can add to your Defense
Center and apply to each device model. The Defense Center rows (for all licenses
except FireSIGHT) indicate whether that Defense Center can manage devices
using those licenses. For example, you can use a Series
VPN deployment using Series
category and reputation-based URL filtering, regardless of the devices it
Supported Capabilities by Appliance Model on page 13.
2 DC1000 to create a
3 devices, but you cannot use a DC500 to perform
Version 5.2Sourcefire 3D System Installation Guide20
Introduction to the Sourcefire 3D System
Licensing the Sourcefire 3D System
manages. Also, a blank cell means the license is unsupported, while n/a marks
Defense Center-based licenses that are not relevant to managed devices.
Supported Licenses by Model
Chapter 1
MODELSFIRESIGHTPROTECTIONCONTROLURL
F
ILTERING
Series 2 devices:
• 3D500/1000/2000
• 3D2100/2500/
3500/4500
• 3D6500
• 3D9900
Series 3 devices:
• 7000 Series
• 8000 Series
virtual devicesn/ano support
DC500 Series 2
Defense Center
DC1000/3000
Series 2 Defense
Centers
DC750/1500/3500
Series 3 Defense
Centers
n/aautomatic,
no Security
Intelligence
n/a
for hardware
features
no Security
Intelligence
no user
control
MALWAREVPN
virtual Defense
Centers
In addition to the information in the table, note that:
•Series 2 devices automatically have Protection capabilities, with the
exception of Security Intelligence filtering.
•Although you can enable a Control license on a virtual device, a virtual
device does not support any of the hardware-based features granted by that
license, such as switching or routing.
•Although the DC500 can manage devices with Protection and Control
licenses, you cannot perform Security Intelligence filtering or user control.
For detailed information on licensing, see the Licensing the Sourcefire 3D System
chapter in the Sourcefire 3D System User Guide.
Version 5.2Sourcefire 3D System Installation Guide21
Introduction to the Sourcefire 3D System
Licensing the Sourcefire 3D System
Using Legacy RNA Host and RUA User Licenses
In Version 4.10.x of the Sourcefire 3D System, RNA Host and RUA User feature
licenses determined your monitored host and user limits, respectively. If your
Defense Center was previously running Version 4.10.x, you can use your legacy
host and user licenses instead of a FireSIGHT license.
Version 5.2 Defense Centers using legacy licenses use the RNA Host limit as the
FireSIGHT host limit and the RUA User limit as both the FireSIGHT user and
authoritative user limit. The FireSIGHT Host License Limit health module alerts
appropriately for your licensed limit.
Note that RNA Host and RUA User limits are cumulative. That is, you can add
multiple licenses of each type to the Defense Center to monitor the total number
of hosts or users allowed by the licenses.
If you later add a FireSIGHT license, the Defense Center uses the higher of the
limits. For example, the FireSIGHT license on the DC1500 supports up to 50,000
hosts and users. If the RNA Host limit on your Version 4.10.x DC1500 was higher
than 50,000, using that legacy host license on the same Defense Center running
Version 5.2 gives you the higher limit. For your convenience, the web interface
displays only the licenses that represent the higher limits.
Chapter 1
IMPORTANT!Because FireSIGHT license limits are matched to the hardware
capabilities of Defense Centers, Sourcefire does not recommend exceeding
them when using legacy licensing. For guidance, contact Sourcefire Support.
Because there is no update path from Version 4.10.x to Version 5.2, you must use
an ISO image to “restore” the Defense Center. Note that reimaging results in the
loss of all configuration and event data on the appliance. You cannot import this
data onto an appliance after a reimage. For more information, see
Sourcefire Appliance to Factory Defaults on page 198.
IMPORTANT!Only reimage your appliances during a maintenance window.
Reimaging resets devices in an inline deployment to a non-bypass configuration
and disrupts traffic on your network until you reconfigure bypass mode. For more
information, see Traffic Flow During the Restore Process on page 199.
During the restore process, you are prompted to delete license and network
settings. Keep these settings, although you can re-add them later if you
accidentally delete them. Note that Version 5.2 Defense Centers cannot manage
Version 4.10.x devices. You can, however, restore and update supported Version
4.10.x devices to the latest version. For more information, see
Sourcefire Appliance to Factory Defaults on page 198.
Restoring a
Restoring a
Version 5.2Sourcefire 3D System Installation Guide22
Introduction to the Sourcefire 3D System
Security, Internet Access, and Communication Ports
Security, Internet Access, and Communication Ports
To safeguard the Defense Center, you must install the Defense Center on a
protected internal network. Although the Defense Center is configured to have
only the necessary services and ports available, you must make sure that attacks
cannot reach it from outside the firewall.
If the Defense Center and the managed device reside on the same network, you
can connect the management interface on the device to the same protected
internal network as the Defense Center. This allows you to securely control the
device from the Defense Center and aggregate the event data generated on the
managed device’s network segment. By using the Defense Center’s filtering
capabilities, you can analyze and correlate data from attacks across your network
to evaluate how well your security policies are being implemented.
Note, however, that Sourcefire appliances are configured to directly connect to
the Internet. Specific features of the Sourcefire 3D System require this direct
connection, and others support use of a proxy server. Additionally, the system
requires that certain ports remain open for basic intra-appliance communication,
as well as to allow you to access appliances’ web interfaces. By default, several
other ports are open to allow the system to take advantage of additional features
and functionality.
For more information, see:
•Internet Access Requirements on page 23
•Open Communication Ports Requirements on page 24
Chapter 1
Internet Access Requirements
By default, Sourcefire appliances are configured to directly connect to the
Internet. Specific features of the Sourcefire 3D System require this direct
connection, while others support use of a proxy server; see the Configuring s
chapter in the Sourcefire 3D System User Guide.
TIP! You can manually upload system software, intrusion rule, GeoDB, and VDB
updates to appliances.
To ensure continuity of operations, both Defense Centers in a high availability pair
must have Internet access. For specific features, the primary Defense Center
contacts the Internet, then shares information with the secondary during the
synchronization process. Therefore, if the primary fails, you should promote the
secondary to primary as described in the Managing Devices chapter in the
Sourcefire 3D System User Guide.
Version 5.2Sourcefire 3D System Installation Guide23
Introduction to the Sourcefire 3D System
Security, Internet Access, and Communication Ports
The following table describes the Internet access requirements of the Sourcefire
3D System.
download RSS feed data from
an external source, including
Sourcefire.
download Security Intelligence
feed data from an external
source, including the
Sourcefire Intelligence Feed.
category and reputation data
for access control, and
perform lookups for
uncategorized URLs.
perform cloud lookups to
determine if files detected in
network traffic contain
malware.
receive endpoint-based
malware events from the
Sourcefire cloud.
download or schedule the
download of an intrusion rule,
GeoDB, VDB, or system
update directly to the
appliance.
Feed data is not synchronized.
The primary Defense Center
downloads feed data and
shares it with the secondary.
In case of primary failure, you
must switch roles.
The primary Defense Center
downloads URL filtering data
and shares it with the
secondary. In case of primary
failure, you must switch roles.
Paired Defense Centers
perform cloud lookups
independently, although file
policies are synchronized.
Cloud connections are not
synchronized. Configure them
on both Defense Centers.
Rule, GeoDB, and VDB
updates are synchronized;
system updates are not. All
appliances that download
updates must have Internet
access.
obtaining whois
information using the IP
address context menu
obtain whois information.Any appliance requesting
whois information must have
Internet access.
Open Communication Ports Requirements
The Sourcefire 3D System requires that ports 443 (inbound) and 8305 (inbound
and outbound) remain open for basic intra-appliance communication, as well as to
allow you to access appliances’ web interfaces.
Version 5.2Sourcefire 3D System Installation Guide24
Introduction to the Sourcefire 3D System
Security, Internet Access, and Communication Ports
By default, several other ports are open to allow the system to take advantage of
additional features and functionality. The following table lists these ports. Note
that DHCP is disabled by default on ports 67 and 68.
Sourcefire 3D System Open Communication Ports Requirements
PORTSDESCRIPTIONPROTOCOLDIRECTIONOPENTHEPORTTO...
22SSH/SSLTCPBidirectionalallow a secure remote connection to the
appliance.
25SMTPTCPOutboundsend email notices and alerts from the
appliance.
53DNSTCPOutbounduse DNS.
67, 68DHCPUDPOutbounduse DHCP. Disabled by default.
Chapter 1
80HTTP TCPOutbound or
Bidirectional
161, 162SNMPUDPBidirectional
(161);
Outbound
(162)
389, 636LDAPTCPOutboundtrack user activity and for authentication.
443HTTPS/AMPQTCPInbound or
Bidirectional
514syslog UDPOutboundsend alerts to a remote syslog server.
allow the RSS Feed dashboard widget to
connect to a remote web server; use for
auto-update.
Adding inbound access allows the
Defense Center to update custom and
third-party Security Intelligence feeds via
HTTP, and to download URL filtering
information.
provide access if you enabled SNMP
polling (inbound) and SNMP traps
(outbound).
access the appliance. Required.
Adding outbound access allows the
Defense Center to download or receive
software updates, VDB and GeoDB
updates, URL filtering information,
secure Security Intelligence feeds, and
endpoint-based (FireAMP) malware
events.
623SOL/LOMUDPBidirectionalallow you to perform Lights-Out
Management (LOM) using a Serial Over
LAN (SOL) connection on a Series 3
appliance.
Version 5.2Sourcefire 3D System Installation Guide25
Introduction to the Sourcefire 3D System
Security, Internet Access, and Communication Ports
Sourcefire 3D System Open Communication Ports Requirements (Continued)
PORTSDESCRIPTIONPROTOCOLDIRECTIONOPENTHEPORTTO...
Chapter 1
1500, 2000database
access
1812, 1813RADIUSUDPOutbound or
3306Sourcefire
User Agent
8302eStreamerTCPBidirectionaluse for an eStreamer client.
8305device
management
8307Host Input
Client API
32137malware cloud
lookups
TCPInboundaccess the Defense Center if external
Bidirectional
TCPInboundallow communication between the
TCPBidirectionalcommunicate between the Defense
TCPBidirectionalcommunicate with the Defense Center
TCPOutboundallow the Defense Center to perform
database access is enabled.
use RADIUS. Adding inbound access
ensures that RADIUS authentication and
accounting function correctly.
Ports 1812 and 1813 are the default, but
you can configure RADIUS to use other
ports instead. For more information, see
the Sourcefire 3D System User Guide.
Defense Center and Sourcefire User
Agents.
Center and managed devices. Required.
during client/server authentication.
cloud lookups to determine if a file
detected in network traffic contains
malware, and to track file trajectories.
Version 5.2Sourcefire 3D System Installation Guide26
CHAPTER 2
UNDERSTANDING DEPLOYMENT
The Sourcefire 3D System can be deployed to accommodate the needs of each
unique network architecture. The Defense Center provides a centralized
management console and database repository for the Sourcefire 3D System.
Devices are installed on network segments to collect traffic connections for
analysis.
Devices in a passive deployment monitor traffic flowing across a network using a
switch SPAN, virtual switch, or mirror port to collect data about the nature of the
traffic traversing your network. Devices in an inline deployment allow you to
monitor your network for attacks that might affect the availability, integrity, or
confidentiality of hosts on the network. A device can be deployed in an inline,
switched, routed, or hybrid (Layer 2/Layer3) environment.
To learn more about your deployment options, see the following sections for
more information:
•Understanding Deployment Options on page 28 provides some factors to
consider when designing your deployment.
•Understanding Interfaces on page 28 explains the different between
interfaces and how they function in your deployment.
•Connecting Devices to Your Network on page 32 describes how to use a
hub, span, and network tap in your deployment.
•Deployment Options on page 36 describes a basic deployment and
identifies the primary functional locations within it.
•Deploying with Access Control on page 43 describes the advantages of
using access control in an inline deployment.
Version 5.2Sourcefire 3D System Installation Guide27
Understanding Deployment
Understanding Deployment Options
•Using a Multi-Port Managed Device on page 48 explains how to use a
managed device for multiple networks or for use as a virtual router or virtual
switch in your network deployment.
•Complex Network Deployments on page 50 explains advanced deployment
scenarios, such as using a VPN or having multiple entry points.
For additional information about deployments, consult the Best Practices Guide,
available from the Sourcefire sales department.
Understanding Deployment Options
Your deployment decisions will be based on a variety of factors. Answering these
questions can help you understand the vulnerable areas of your network and
clarify your intrusion detection and prevention needs:
•Will you be deploying your managed device with passive or inline
interfaces? Does your device support a mix of interfaces, some passive and
others inline? See Understanding Interfaces on page 28 for more
information.
•How will you connect the managed devices to the network? Hubs? Taps?
Spanning ports on switches? Virtual switches? See Connecting Devices to
Yo u r N et wo r k on page 32 for more information.
•Do you want to detect every attack on your network, or do you only want to
know about attacks that penetrate your firewall? Do you have specific
assets on your network such as financial, accounting, or personnel records,
production code, or other sensitive, protected information that require
special security policies? See Deployment Options on page 36 for more
information.
•Do you provide VPN or modem access for remote workers? Do you have
remote offices that also require an IPS deployment? Do you employ
contractors or other temporary employees? Are they restricted to specific
network segments? Do you integrate your network with the networks of
other organizations such as customers, suppliers, or business partners? See
Complex Network Deployments on page 50 for more information.
Chapter 2
Understanding Interfaces
The sections that follow describe how different interfaces affect the capabilities of
the Sourcefire 3D System. In addition to passive and inline interfaces, you can
Version 5.2Sourcefire 3D System Installation Guide28
Understanding Deployment
Understanding Interfaces
also have routed, switched, and hybrid interfaces. See the following sections for
more information:
•Passive Interfaces on page 29
•Inline Interfaces on page 29
•Switched Interfaces on page 30
•Routed Interfaces on page 31
•Hybrid Interfaces on page 32
Passive Interfaces
You can configure a passive IPS deployment to monitor traffic flowing across a
network using a switch SPAN, virtual switch, or mirror port, allowing traffic to be
copied from other ports on the switch. Passive interfaces allow you to inspect
traffic within the network without being in the flow of network traffic. When
configured in a passive deployment, the system cannot take certain actions such
as blocking or shaping traffic. Passive interfaces receive all traffic unconditionally
and do not retransmit received traffic.
LICENSE: Any
S
UPPORTED DEVICES: Any
Chapter 2
You can configure one or more physical ports on a managed device as passive
interfaces. For more information, see
page 32.
Inline Interfaces
LICENSE: Any
S
UPPORTED DEVICES: Any
You configure an inline IPS deployment transparently on a network segment by
binding two ports together. Inline interfaces allow you to install a device in any
network configuration without the configuration of adjacent network devices.
Inline interfaces receive all traffic unconditionally, then retransmit all traffic
received on these interfaces except traffic explicitly dropped.
You can configure one or more physical ports on a managed device as inline
interfaces. You must assign a pair of inline interfaces to an inline set before they
can handle traffic in an inline deployment.
IMPORTANT!If you configure an interface as an inline interface, the adjacent port
on its NetMod automatically becomes an inline interface as well to complete the
pair.
Configurable bypass inline sets allow you to select how your traffic is handled if
your hardware fails completely (for example, the device loses power). You may
determine that connectivity is critical on one network segment, and, on another
Connecting Devices to Your Network on
Version 5.2Sourcefire 3D System Installation Guide29
Understanding Deployment
Understanding Interfaces
network segment, you cannot permit uninspected traffic. Using configurable
bypass inline sets, you can manage the traffic flow of your network traffic in one
of the following ways:
•Bypass: an interface pair configured for bypass allows all traffic to flow if the
•Non-bypass: an interface pair configured for non-bypass stops all traffic if
Configure the inline set as bypass to ensure that traffic continues to flow if your
device fails. Configure the inline set as non-bypass to stop traffic if the device
fails. Note that reimaging resets appliances in bypass mode to a non-bypass
configuration and disrupts traffic on your network until you reconfigure bypass
mode. For more information, see
page 199.
Chapter 2
device fails. The traffic bypasses the device and any inspection or other
processing by the device. Bypass allows uninspected traffic across the
network segment, but ensures that the network connectivity is maintained.
the device fails. Traffic that reaches the failed device does not enter the
device. Non-bypass does not permit traffic to pass uninspected, but the
network segment loses connectivity if the device fails. Use non-bypass
interfaces in deployment situations where network security is more
important than loss of traffic.
Traffic Flow During the Restore Process on
All appliances can contain configurable bypass interfaces. The 8000 Series
appliances can also contain NetMods with interfaces that cannot be configured
for bypass. For more information on NetMods, see
page 185.
Advanced options vary by appliance and can include tap mode, propagate link
state, transparent inline mode, and strict TCP mode. For information on how to
configure your inline interface sets, see Configuring Inline Sets in the Sourcefire 3D System User Guide. For more information on using inline interfaces, see
Connecting Devices to Your Network on page 32.
Switched Interfaces
LICENSE: Control
S
UPPORTED DEVICES: Series 3
You can configure switched interfaces on a managed device in a Layer 2
deployment to provide packet switching between two or more networks. You can
also configure virtual switches on managed devices to operate as standalone
broadcast domains, dividing your network into logical segments. A virtual switch
uses the media access control (MAC) address from a host to determine where to
send packets.
8000 Series Modules on
Version 5.2Sourcefire 3D System Installation Guide30
Understanding Deployment
Understanding Interfaces
Switched interfaces can have either a physical or logical configuration:
•Physical switched interfaces are physical interfaces with switching
•Logical switched interfaces are an association between a physical interface
Virtual switches can operate as standalone broadcast domains, dividing your
network into logical segments. A virtual switch uses the media access control
(MAC) address from a host to determine where to send packets. When you
configure a virtual switch, the switch initially broadcasts packets through every
available port on the switch. Over time, the switch uses tagged return traffic to
learn which hosts reside on the networks connected to each port.
You can configure your device as a virtual switch and use the remaining interfaces
to connect to network segments you want to monitor. To use a virtual switch on
your device, create physical switched interfaces and then follow the instructions
for Setting Up Virtual Switches in the Sourcefire 3D System Guide.
Chapter 2
configured. Use physical switched interfaces to handle untagged VLAN
traffic.
and a VLAN tag. Use logical interfaces to handle traffic with designated
VLAN tags.
Routed Interfaces
LICENSE: Control
S
UPPORTED DEVICES: Series 3
You can configure routed interfaces on a managed device in a Layer 3 deployment
so that it routes traffic between two or more interfaces. You must assign an IP
address to each interface and assign the interfaces to a virtual router to route
traffic.
You can configure routed interfaces for use with a gateway virtual private network
(gateway VPN) or with network address translation (NAT). For more information,
see
Deploying a Gateway VPN on page 41 and Deploying with Policy-Based NAT
on page 42.
You can also configure the system to route packets by making packet forwarding
decisions according to the destination address. Interfaces configured as routed
interfaces receive and for ward the Layer 3 traffic. Routers obtain the destination
from the outgoing interface based on the forwarding criteria, and access control
rules designate the security policies to be applied.
Routed interfaces can have either a physical or logical configuration:
•Physical routed interfaces are physical interfaces with routing configured.
Uses physical routed interfaces to handle untagged VLAN traffic.
•Logical switched interfaces are an association between a physical interface
and a VLAN tag. Use logical interfaces to handle traffic with designated
VLAN tags.
Version 5.2Sourcefire 3D System Installation Guide31
Understanding Deployment
Connecting Devices to Your Network
To use routed interfaces in a Layer 3 deployment, you must configure virtual
routers and assign routed interfaces to them. A virtual router is a group of routed
interfaces that route Layer 3 traffic.
You can configure your device as a virtual router and use the remaining interfaces
to connect to network segments you want to monitor. You can also enable strict
TCP enforcement for maximum TCP security. To use a virtual router on your
device, create physical routed interfaces on your device and then follow the
instructions for Setting Up Virtual Routers in the Sourcefire 3D System User Guide.
Hybrid Interfaces
LICENSE: Control
S
UPPORTED DEVICES: Series 3
You can configure logical hybrid interfaces on managed devices that allow the
Sourcefire 3D System to bridge traffic between virtual routers and virtual
switches. If IP traffic received on interfaces in a virtual switch is addressed to the
MAC address of an associated hybrid logical interface, the system handles it as
Layer 3 traffic and either routes or responds to the traffic depending on the
destination IP address. If the system receives any other traffic, it handles it as
Layer 2 traffic and switches it appropriately.
To create a hybrid interface, you first configure a virtual switch and virtual router,
then add the virtual switch and virtual router to the hybrid interface. A hybrid
interface that is not associated with both a virtual switch and a virtual router is not
available for routing, and does not generate or respond to traffic.
You can configure hybrid interfaces with network address translation (NAT) to
pass traffic between networks. For more information, see
Policy-Based NAT on page 42.
Chapter 2
Deploying with
If you want to use hybrid interfaces on your device, define a hybrid interface on
the device and then follow the instructions for Setting Up Hybrid Interfaces in the
Sourcefire 3D System User Guide.
Connecting Devices to Your Network
You can connect your managed devices to your network in several ways.
Configure a hub or network tap using either passive or inline interfaces, or a span
port using passive interfaces. The following sections describe supported
connection methods and cabling considerations:
•Using a Hub on page 33
•Using a Span Port on page 33
•Using a Network Tap on page 33
•Cabling Inline Deployments on Copper Interfaces on page 34
•Special Cases on page 36
Version 5.2Sourcefire 3D System Installation Guide32
Understanding Deployment
Connecting Devices to Your Network
Using a Hub
An Ethernet hub is a simple way to ensure that the managed device can see all
the traffic on a network segment. Most hubs of this type take the IP traffic meant
for any of the hosts on the segment and broadcast it to all the devices connected
to the hub. Connect the interface set to the hub to monitor all incoming and
outgoing traffic on the segment. Using a hub does not guarantee that the
detection engine sees every packet on a higher volume network because of the
potential of packet collision. For a simple network with low traffic, this is not likely
to be a problem. In a high-traffic network, a different option may provide better
results. Note that if the hub fails or loses power, the network connection is
broken. In a simple network, the network would be down.
Some devices are marketed as hubs but actually function as switches and do not
broadcast each packet to every port. If you attach your managed device to a hub,
but do not see all the traffic, you may need to purchase a different hub or use a
switch with a Span port.
Using a Span Port
Chapter 2
Many network switches include a span port that mirrors traffic from one or more
ports. By connecting an interface set to the span port, you can monitor the
combined traffic from all ports, generally both incoming and outgoing. If you
already have a switch that includes this feature on your network, in the proper
location, then you can deploy the detection on multiple segments with little extra
equipment cost beyond the cost of the managed device. In high-traffic networks,
this solution has its limitations. If the span port can handle 200Mbps and each of
three mirrored ports can handle up to 100Mbps, then the span port is likely to
become oversubscribed and drop packets, lowering the effectiveness of the
managed device.
Using a Network Tap
Network taps allow you to passively monitor traffic without interrupting the
network flow or changing the network topology. Taps are readily available for
different bandwidths and allow you to analyze both incoming and outgoing
packets on a network segment. Because you can monitor only a single network
segment with most taps, they are not a good solution if you want to monitor the
traffic on two of the eight ports on a switch. Instead, you would install the tap
between the router and the switch and access the full IP stream to the switch.
By design, network taps divide incoming and outgoing traffic into two different
streams over two different cables. Managed devices offer multi-port options that
recombine the two sides of the conversation so that the entire traffic stream is
evaluated by the decoders, the preprocessors, and the detection engine.
Version 5.2Sourcefire 3D System Installation Guide33
Understanding Deployment
Connecting Devices to Your Network
Cabling Inline Deployments on Copper Interfaces
If you deploy your device inline on your network and you want to use your
device’s bypass capabilities to maintain network connectivity if the device fails,
you must pay special attention to how you cable the connections.
If you deploy a device with fiber bypass capable interfaces, there are no special
cabling issues beyond ensuring that the connections are securely fastened and
the cables are not kinked. However, if you are deploying devices with copper
rather than fiber network interfaces, then you must be aware of the device model
that you are using, because different device models use different network cards.
Note that some 8000
The network interface cards (NICs) in the device support a feature called
Auto-Medium Dependent Interface Crossover (Auto-MDI-X), which allows
network interfaces to configure automatically whether you use a straight-through
or crossover Ethernet cable to connect to another network device. The
and Bypass Characteristics table lists the various devices and whether they
bypass as straight-through or crossover connections.
Chapter 2
Series NetMods do not allow bypass configuration.
Devices
Devices and Bypass Characteristics
DEVICEFAILSOPENAS...
3D500/1000/2000straight-through
7000 Seriescrossover
8000 Seriescrossover
For a managed device that bypasses with a straight-through connection, wire the
device as would normally be done with the device live on the network. In most
cases you should use one straight-through cable and one crossover cable to
connect the device to the two endpoints.
Straight-Through Bypass Connection Cabling
Version 5.2Sourcefire 3D System Installation Guide34
Understanding Deployment
Connecting Devices to Your Network
For a managed device that bypasses with a crossover connection, wire the device
as would normally be done without a device deployed. The link should work with
power to the device removed. In most cases you should use two straight-through
cables to connect the device to the two endpoints.
Crossover Bypass Connection Cabling
The Valid Configurations for Hardware Bypass and table indicates where you
should use crossover or straight-through cables in your hardware bypass
configurations. Note that a Layer 2 port functions as a straight-through (MDI)
endpoint in the deployment, and a Layer 3 port functions as a crossover (MDIX)
endpoint in the deployment. The total crossovers (cables and appliances) should
be an odd number for bypass to function properly.
Chapter 2
Valid Configurations for Hardware Bypass
ENDPOINT 1CABLEMANAGED
D
EVICE
MDIX===MDI
MDIX==MDI
MDI==XMDI
MDI===MDIX
MDIX=X=MDIX
MDI=X=MDI
MDIXXXMDI
MDIXXX=MDI
IMPORTANT!In the Valid Configurations for Hardware Bypass table, = indicates
a straight-through cable or managed device bypass connection, and X indicates a
crossover cable or managed device bypass connection.
CABLEENDPOINT 2
Note that every network environment is likely to be unique, with endpoints that
have different combinations of support for Auto-MDI-X. The easiest way to
Version 5.2Sourcefire 3D System Installation Guide35
Understanding Deployment
Deployment Options
confirm that you are installing your device with the correct cabling is to begin by
connecting the device to its two endpoints using one crossover cable and one
straight-through cable, but with the device powered down. Ensure that the two
endpoints can communicate. If they cannot communicate, then one of the cables
is the incorrect type. Switch one (and only one) of the cables to the other type,
either straight-through or crossover.
After the two endpoints can successfully communicate with the inline device
powered down, power up the device. The Auto-MDI-X feature ensures that the
two endpoints will continue to communicate. Note that if you have to replace an
inline device, you should repeat the process of ensuring that the endpoints can
communicate with the new device powered down to protect against the case
where the original device and its replacement have different bypass
characteristics.
The Auto-MDI-X setting functions correctly only if you allow the network
interfaces to auto-negotiate. If your network environment requires that you turn
off the Auto Negotiate option on the Network Interface page, then you must
specify the correct MDI/MDIX option for your inline network interfaces. See
Configuring Inline Interfaces in the Sourcefire 3D System User Guide for more
information.
Chapter 2
Special Cases
Connecting 8000 Series Devices
8000 Series managed devices do not support half duplex network links; they also
do not support differences in speed or duplex configurations at opposite ends of a
connection. To ensure a stable network link, you must either auto-negotiate on
both sides of the connection, or set both sides to the same static speed.
Changing Your Remote Console
When you change your remote console from Physical Serial Port to Lights-Out
Management or from Lights-Out Management to Physical Serial Port on 70xx
Family devices, you may have to reboot the appliance twice to see the expected
LILO boot prompt.
TIP! 3D2100/2500/3500/4500 devices do not have functional serial ports.
Deployment Options
When you place your managed device on a network segment, you can monitor
traffic using an intrusion detection system or protect your network from threats
using an intrusion prevention system.
Version 5.2Sourcefire 3D System Installation Guide36
Understanding Deployment
Deployment Options
You can also deploy your managed device to function as a virtual switch, virtual
router, or gateway VPN. Additionally, you can use policies to route traffic or control
access to traffic on your network. For more information, see the following
sections:
•Deploying with a Virtual Switch on page 37
•Deploying with a Virtual Router on page 38
•Deploying with Hybrid Interfaces on page 40
•Deploying a Gateway VPN on page 41
•Deploying with Policy-Based NAT on page 42
•Deploying with Access Control on page 43
Deploying with a Virtual Switch
You can create a virtual switch on your managed device by configuring inline
interfaces as switched interfaces. The virtual switch provides Layer 2 packet
switching for your deployment. Advanced options include setting a static MAC
address, enabling spanning tree protocol, enabling strict TCP enforcement, and
dropping bridge protocol data units (BPDUs) at the domain level. For information
on switched interfaces, see
A virtual switch must contain two or more switched interfaces to handle traffic.
For each virtual switch, the system switches traffic only to the set of ports
configured as switched interfaces. For example, if you configure a virtual switch
with four switched interfaces, when the system receives traffic packets through
one port it only broadcasts these packets to the remaining three ports on the
switch.
LICENSE: Control
S
UPPORTED DEVICES: Series 3
Chapter 2
Switched Interfaces on page 30.
To configure a virtual switch to allow traffic, you configure two or more switched
interfaces on a physical port, add and configure a virtual switch, and then assign
the virtual switch to the switched interfaces. The system drops any traffic
received on an external physical interface that does not have a switched interface
waiting for it. If the system receives a packet with no VLAN tag and you have not
configured a physical switched interface for that port, it drops the packet. If the
system receives a VLAN-tagged packet and you have not configured a logical
switched interface, it also drops the packet.
You can define additional logical switched interfaces on the physical port as
needed, but you must assign a logical switched interface to a virtual switch to
handle traffic.
Virtual switches have the advantage of scalability. When you use a physical
switch, you are limited by the number of available ports on the switch. When you
replace your physical switch with a virtual switch, you are limited only by your
bandwidth and the level of complexity you want to introduce to your deployment.
Version 5.2Sourcefire 3D System Installation Guide37
Understanding Deployment
Deployment Options
Use a virtual switch where you would use a Layer 2 switch, such as workgroup
connectivity and network segmentation. Layer 2 switches are particularly
effective where workers spend most of their time on their local segment. Larger
deployments (for example, deployments that contain broadcast traffic, Voice-overIP, or multiple networks) can use virtual switches on smaller network segments of
the deployment.
When you deploy multiple virtual switches on the same managed device, you can
maintain separate levels of security as dictated by the needs of each network.
Virtual Switches on a Managed Device
Chapter 2
In this example, the managed device monitors traffic from two separate
networks, 172.16.1.0/20 and 192.168.1.0/24. Although both networks are
monitored by the same managed device, the virtual switch passes traffic only to
those computers or servers on the same network. Traffic can pass from
computer A to computer B through the 172.16.1.0/24 virtual switch (indicated by
the blue line) and from computer B to computer A through the same virtual
switch (indicated by the green line). Similarly, traffic can pass to and from the file
and web servers through the 192.168.1.0/24 virtual switch (indicated by the red
and orange lines). However, traffic cannot pass between the computers and the
web or file servers because the computers are not on the same virtual switch as
the servers.
For more information on configuring switched interfaces and virtual switches, see
Setting Up Virtual Switches in the Sourcefire 3D System User Guide.
Deploying with a Virtual Router
LICENSE: Control
S
UPPORTED DEVICES: Series 3
You can create a virtual router on a managed device to route traffic between two
or more networks, or to connect a private network to a public network (for
example, the Internet). The virtual router connects two routed interfaces to
provide Layer 3 packet forwarding decisions for your deployment according to the
destination address. Optionally, you can enable strict TCP enforcement on the
virtual router. For more information on routed interfaces, see
on page 31. You must use a virtual router with a gateway VPN. For more
information, see Deploying a Gateway VPN on page 41.
Routed Interfaces
Version 5.2Sourcefire 3D System Installation Guide38
Understanding Deployment
Deployment Options
A virtual router can contain either physical or logical routed configurations from
one or more individual devices within the same broadcast domain. You must
associate each logical interface with a VLAN tag to handle traffic received by the
physical interface with that specific tag. You must assign a logical routed interface
to a virtual router to route traffic.
To configure a virtual router, you set up routed interfaces with either physical or
logical configurations. You can configure physical routed interfaces for handling
untagged VLAN traffic. You can also create logical routed interfaces for handling
traffic with designated VLAN tags. The system drops any traffic received on an
external physical interface that does not have a routed interface waiting for it. If
the system receives a packet with no VLAN tag and you have not configured a
physical routed interface for that port, it drops the packet. If the system receives a
VLAN-tagged packet and you have not configured a logical routed interface, it also
drops the packet.
Virtual routers have the advantage of scalability. Where physical routers limit the
number of networks you can connect, multiple virtual routers can be configured
on the same managed device. Putting multiple routers on the same device
reduces the physical complexity of your deployment, allowing you to monitor and
manage multiple routers from one device.
Use a virtual router where you would use a Layer 3 physical router to forward
traffic between multiple networks in your deployment, or to connect your private
network to a public network. Virtual routers are particularly effective in large
deployments where you have many networks or network segments with different
security requirements.
When you deploy a virtual routers on your managed device, you can use one
appliance to connect multiple networks to each other, and to the Internet.
Chapter 2
Virtual Routers on a Managed Device
In this example, the managed device contains a virtual router to allow traffic to
travel between the computers on network 172.16.1.0/20 and the servers on
network 192.168.1.0/24 (indicated by the blue and green lines). A third interface
Version 5.2Sourcefire 3D System Installation Guide39
Understanding Deployment
Deployment Options
on the virtual router allows traffic from each network to pass to the firewall and
back (indicated by the red and orange lines).
For more information, see Setting Up Virtual Routers in the Sourcefire 3D System User Guide.
Deploying with Hybrid Interfaces
You can create a hybrid interface on a managed device to route traffic between
Layer 2 and Layer 3 networks using a virtual switch and a virtual router. This
provides one interface that can both route local traffic on the switch and route
traffic to and from an external network. For best results, configure policy-based
NAT on the interface to provide network address translation on the hybrid
interface. See
A hybrid interface must contain one or more switched interfaces and one or more
routed interfaces. A common deployment consists of two switched interfaces
configured as a virtual switch to pass traffic on a local network and virtual routers
to route traffic to networks, either private or public.
To create a hybrid interface, you first configure a virtual switch and virtual router,
then add the virtual switch and virtual router to the hybrid interface. A hybrid
interface that is not associated with both a virtual switch and a virtual router is not
available for routing, and does not generate or respond to traffic.
LICENSE: Control
S
UPPORTED DEVICES: Series 3
Deploying with Policy-Based NAT on page 42.
Chapter 2
Hybrid interfaces have the advantage of compactness and scalability. Using a
single hybrid interface combines both Layer 2 and Layer 3 traffic routing functions
in a single interface, reducing the number of physical appliances in the
deployment and providing a single management interface for the traffic.
Use a hybrid interface where you need both Layer 2 and Layer 3 routing
functions. This deployment can be ideal for small segments of your deployment
where you have limited space and resources.
When you deploy a hybrid interface, you can allow traffic to pass from your local
network to an external or public network, such as the Internet, while addressing
separate security considerations for the virtual switch and virtual router in the
hybrid interface.
Version 5.2Sourcefire 3D System Installation Guide40
Understanding Deployment
Deployment Options
Hybrid Interface on a Managed Device
In this example, computer A and computer B are on the same network and
communicate using a Layer 2 virtual switch configured on the managed device
(indicated by the blue and green lines). A virtual router configured on the
managed device provides Layer 3 access to the firewall. A hybrid interface
combines the Layer 2 and Layer 3 capabilities of the virtual switch and virtual
router to allow traffic to pass from each computer through the hybrid interface to
the firewall (indicated by the red and orange lines).
Chapter 2
For more information, see Setting Up Hybrid Interfaces in the Sourcefire 3D
System User Guide.
Deploying a Gateway VPN
LICENSE: VPN
S
UPPORTED DEVICES: Series 3
You can create a gateway virtual private network (gateway VPN) connection to
establish a secure tunnel between a local gateway and a remote gateway. The
secure tunnel between the gateways protects communication between them.
You configure the Sourcefire 3D System to build secure VPN tunnels from the
virtual routers of Sourcefire managed devices to remote devices or other
third-party VPN endpoints using the Internet Protocol Security (IPSec) protocol
suite. After the VPN connection is established, the hosts behind the local
gateway can connect to the hosts behind the remote gateway through the secure
VPN tunnel. The VPN endpoints authenticate each other with either the Internet
Key Exchange (IKE) version 1 or version 2 protocol to create a security association
for the tunnel. The system runs in either IPSec authentication header (AH) mode
or the IPSec encapsulating security payload (ESP) mode. Both AH and ESP
provide authentication, and ESP also provides encryption.
Version 5.2Sourcefire 3D System Installation Guide41
Understanding Deployment
Deployment Options
A gateway VPN can be used in a point-to-point, star, or mesh deployment:
•Point-to-point deployments connect two endpoints with each other in a
•Star deployments establish a secure connection between a hub and
•Mesh deployments connect all endpoints together by means of VPN
For more information on gateway VPN configuration and deployments, see
Gateway VPN in the Sourcefire 3D System User Guide.
Chapter 2
direct one-to-one relationship. Both endpoints are configured as peer
devices, and either device can initiate the secured connection. At least one
device must be a VPN-enabled managed device.
Use a point-to-point deployment to maintain your network security when a
host at a remote location uses public networks to connect to a host in your
network.
multiple remote endpoints (leaf nodes). Each connection between the hub
node and an individual leaf node is a separate VPN tunnel. Typically, the hub
node is the VPN-enabled managed device, located at the main office. Leaf
nodes are located at branch offices and initiate most of the traffic.
Use a star deployment to connect an organization’s main and branch office
locations using secure connections over the Internet or other third-party
network to provide all employees with controlled access to the
organization’s network.
tunnels. This offers redundancy in that when one endpoint fails, the
remaining endpoints can still communicate with each other.
Use a mesh deployment to connect a group of decentralized branch office
locations to ensure that traffic can travel even if one or more VPN tunnels
fails. The number of VPN-enabled managed devices you deploy in this
configuration controls the level of redundancy.
Deploying with Policy-Based NAT
LICENSE: Control
S
UPPORTED DEVICES: Any
You can use policy-based network address translation (NAT) to define policies that
specify how you want to perform NAT. You can target your policies to a single
interface, one or more devices, or entire networks.
You can configure static (one-to-one) or dynamic (one-to-many) translation. Note
that dynamic translations are order-dependent where rules are searched in order
until the first matching rule applies.
Policy-based NAT typically operates in the following deployments:
•Hide your private network address.
When you access a public network from your private network, NAT
translates your private network address to your public network address.
Your specific private network address is hidden from the public network.
Version 5.2Sourcefire 3D System Installation Guide42
Understanding Deployment
Deployment Options
•Allow access to a private network service.
•Redirect traffic between multiple private networks.
Using policy-based NAT removes the need for additional hardware and
consolidates the configuration of your intrusion detection or prevention system
and NAT into a single user interface. For more information, see Using NAT
Policies in the Sourcefire 3D System User Guide.
Deploying with Access Control
Chapter 2
When a public network accesses your private network, NAT translates your
public address to your private network address. The public network can
access your specific private network address.
When a server on a private network accesses a server on a connected
private network, NAT translates the private addresses between the two
private networks to ensure there is no duplication in private addresses and
traffic can travel between them.
LICENSE: Any
S
UPPORTED DEVICES: Any
Access control is a policy-based feature that allows you to specify, inspect, and
log the traffic that can enter, exit, or travel within your network. The following
section describes how access control can function in your deployment. See the
Sourcefire 3D System User Guide for more information on this feature.
An access control policy determines how the system handles traffic on your
network. You can add access control rules to your policy to provide more granular
control over how you handle and log network traffic.
An access control policy that does not include access control rules uses one of
the following default actions to handle traffic:
•block all traffic from entering your network
•trust all traffic to enter your network without further inspection
•allow all traffic to enter your network, and inspect the traffic with a network
discovery policy only
•allow all traffic to enter your network, and inspect the traffic with intrusion
and network discovery policies
Access control rules further define how traffic is handled by targeted devices,
from simple IP address matching to complex scenarios involving different users,
applications, ports, and URLs. For each rule, you specify a rule action, that is,
whether to trust, monitor, block, or inspect matching traffic with an intrusion or
file policy.
Access control can filter traffic based on Security Intelligence data, a feature that
allows you to specify the traffic that can traverse your network, per access control
policy, based on the source or destination IP address. This feature can create a
blacklist of disallowed IP addresses whose traffic is blocked and not inspected.
Version 5.2Sourcefire 3D System Installation Guide43
Understanding Deployment
Deployment Options
The sample deployment illustrates common network segments. Deploying your
managed devices in each of these locations serves different purposes. The
following sections describe typical location recommendations:
•Inside the Firewall on page 44 explains how access control functions on
•On the DMZ on page 45 explains how access control within the DMZ can
•On the Internal Network on page 46 explains how access control can
•On the Core Network on page 46 explains how an access control policy
•On a Remote or Mobile Network on page 47 explains how access control
Inside the Firewall
Chapter 2
traffic that passes through the firewall.
protect outward-facing servers.
protect your internal network from intentional or accidental attack.
with strict rules can protect your critical assets.
can monitor and protect the network from traffic at remote locations or on
mobile devices.
Managed devices inside the firewall monitor inbound traffic allowed by the
firewall or traffic that passes the firewall due to misconfiguration. Common
network segments include the DMZ, the internal network, the core, mobile
access, and remote networks.
The diagram below illustrates traffic flow through the Sourcefire 3D System, and
provide some details on the types of inspection performed on that traffic. Note
that the system does not inspect fast-pathed or blacklisted traffic. For traffic
handled by an access control rule or default action, flow and inspection depend on
the rule action. Although rule actions are not shown in the diagram for simplicity,
the system does not perform any kind of inspection on trusted or blocked traffic.
Additionally, file inspection is not supported with the default action.
An incoming packet is first checked against any fast-path rules. If there is a match,
the traffic is fast-pathed. If there is no match, Security Intelligence-based filtering
determines if the packet is blacklisted. If not, any access control rules are applied.
Version 5.2Sourcefire 3D System Installation Guide44
Understanding Deployment
Deployment Options
If the packet meets the conditions of a rule, traffic flow and inspection depend on
the rule action. If no rules match the packet, traffic flow and inspection depend on
the default policy action. (An exception occurs with Monitor rules, which allow
traffic to continue to be evaluated.) The default action on each access control
policy manages traffic that has not been fast-pathed or blacklisted, or matched by
any non-Monitor rule. Note that fast-path is available only for 8000
3D9900 devices.
You can create access control rules to provide more granular control over how you
handle and log network traffic. For each rule, you specify an action (trust, monitor,
block, or inspect) to apply to traffic that meets specific criteria.
On the DMZ
The DMZ contains outward-facing servers (for example, web, FTP, DNS, and
mail), and may also provide services such as mail relay and web proxy to users on
the internal network.
Content stored in the DMZ is static, and changes are planned and executed with
clear communication and advance notice. Attacks in this segment are typically
inbound and become immediately apparent because only planned changes
should occur on the servers in the DMZ. An effective access control policy for this
segment tightly controls access to services and searches for any new network
events.
Servers in the DMZ can contain a database that the DMZ can query via the
network. Like the DMZ, there should be no unexpected changes, but the
database content is more sensitive and requires greater protection than a web
site or other DMZ service. A strong intrusion policy, in addition to the DMZ access
control policy, is an effective strategy.
A managed device deployed on this segment can detect attacks directed to the
Internet that originate from a compromised server in the DMZ. Monitoring
network traffic using Network Discovery can help you monitor these exposed
servers for changes (for example, an unexpected service suddenly appearing) that
could indicate a compromised server in the DMZ.
Chapter 2
Series and
Version 5.2Sourcefire 3D System Installation Guide45
Understanding Deployment
Deployment Options
On the Internal Network
A malicious attack can originate from a computer on your internal network. This
can be a deliberate act (for example, an unknown computer appears unexpectedly
on your network), or an accidental infection (for example, a work laptop infected
off-site is connected to the network and spreads a virus). Risk on the internal
network can also be outbound (for example, a computer sends information to a
suspicious external IP address).
This dynamic network requires a strict access control policy for all internal traffic
in addition to outbound traffic. Add access control rules to tightly control traffic
between users and applications.
Chapter 2
On the Core Network
Core assets are those assets critical to the success of your business and must be
protected at all cost. Although core assets vary depending on the nature of your
business, typical core assets include financial and management centers or
intellectual property repositories. If the security on the core assets is breached,
your business can be destroyed.
Although this segment must be readily available for your business to function, it
must be tightly restricted controlled. Access control should ensure that these
assets cannot be reached by those network segments with the highest risk, such
Version 5.2Sourcefire 3D System Installation Guide46
Understanding Deployment
Deployment Options
as remote networks or mobile devices. Always use the most aggressive control
on this segment, with strict rules for user and application access.
On a Remote or Mobile Network
Remote networks, located off-site, often use a virtual private network (VPN) to
provide access to the primary network. Mobile devices and the use of personal
devices for business purposes (for example, using a “smart phone” to access
corporate email) are becoming increasingly common.
Chapter 2
These networks can be highly dynamic environments with rapid and continual
change. Deploying a managed device on a dedicated mobile or remote network
allows you to create a strict access control policy to monitor and manage traffic to
and from unknown external sources. Your policy can reduce your risk by rigidly
limiting how users, network, and applications access core resources.
Version 5.2Sourcefire 3D System Installation Guide47
Understanding Deployment
Using a Multi-Port Managed Device
Using a Multi-Port Managed Device
The managed device offers multiple sensing ports on its network modules. You
can use the multi-port managed devices to:
•recombine the separate connections from a network tap
•capture and evaluate traffic from different networks
•perform as a virtual router
•perform as a virtual switch
IMPORTANT!Although each port is capable of receiving the full throughput for
which the device is rated, the total traffic on the managed device cannot exceed
its bandwidth rating without some packet loss.
Deploying a multi-port managed device with a network tap is a straightforward
process. The following diagram shows a network tap installed on a high-traffic
network segment.
Chapter 2
In this scenario, the tap transmits incoming and outgoing traffic through separate
ports. When you connect the multi-port adapter card on the managed device to
the tap, the managed device is able to combine the traffic into a single data
stream so that it can be analyzed.
Version 5.2Sourcefire 3D System Installation Guide48
Understanding Deployment
Using a Multi-Port Managed Device
Note that with a gigabit optical tap, as shown in the illustration below, both sets
of ports on the managed device are used by the connectors from the tap.
Chapter 2
You can use the virtual switch to replace both the tap and the switch in your
deployment. Note that if you replace the tap with a virtual switch, you lose the tap
packet delivery guarantee.
Version 5.2Sourcefire 3D System Installation Guide49
Understanding Deployment
Complex Network Deployments
You can also create interfaces to capture data from separate networks. The
following diagram shows a single device with a dual-port adapter and two
interfaces connected to two networks.
In addition to using one device to monitor both network segments, you can use
the virtual switch capability of the device to replace both switches in your
deployment.
Chapter 2
Complex Network Deployments
Your enterprise’s network may require remote access, such as using a VPN, or
have multiple entry points, such as a business partner or banking connection. The
following sections describe some of the issues involved with these deployments:
•Integrating with VPNs on page 51
•Detecting Intrusions on Other Points of Entry on page 51
•Deploying in Multi-Site Environments on page 53
•Integrating Managed Devices within Complex Networks on page 55
Version 5.2Sourcefire 3D System Installation Guide50
Understanding Deployment
Complex Network Deployments
Integrating with VPNs
Virtual private networks, or VPNs, use IP tunneling techniques to provide the
security of a local network to remote users over the Internet. In general, VPN
solutions encrypt the data payload in an IP packet. The IP header is unencrypted
so that the packet can be transmitted over public networks in much the same way
as any other packet. When the packet arrives at its destination network, the
payload is decrypted and the packet is directed to the proper host.
Because network appliances cannot analyze the encrypted payload of a VPN
packet, placing managed devices outside the terminating endpoints of the VPN
connections ensures that all packet information can be accessed. The following
diagram illustrates how managed devices can be deployed in a VPN environment.
Chapter 2
You can replace the firewall and the tap on either side of the VPN connection with
the managed device. Note that if you replace the tap with a managed device, you
lose the tap packet delivery guarantee.
Detecting Intrusions on Other Points of Entry
Many networks include more than one access point. Instead of a single border
router that connects to the Internet, some enterprises use a combination of the
Internet, modem banks, and direct links to business partner networks. In general,
you should deploy managed devices near firewalls (either inside the firewall,
outside the firewall, or both) and on network segments that are important to the
integrity and confidentiality of your business data. The following diagram shows
Version 5.2Sourcefire 3D System Installation Guide51
Understanding Deployment
Complex Network Deployments
how managed devices can be installed at key locations on a complex network
with multiple entry points.
Chapter 2
Version 5.2Sourcefire 3D System Installation Guide52
Understanding Deployment
Complex Network Deployments
You can replace the firewall and the router with the managed device deployed on
that network segment.
Chapter 2
Deploying in Multi-Site Environments
Many organizations want to extend intrusion detection across a geographically
disparate enterprise and then analyze all the IPS data from one location. The
Sourcefire 3D System supports this by offering the Defense Center, which
aggregates and correlates events from managed devices deployed throughout
the organization’s many locations. Unlike deploying multiple managed devices and
Defense Centers in the same geographic location on the same network, when
deploying managed devices in disparate geographic locations, you must take
precautions to ensure the security of the managed devices and the data stream.
To secure the data, you must isolate the managed devices and Defense Center
from unprotected networks. You can do this by transmitting the data stream from
Version 5.2Sourcefire 3D System Installation Guide53
Understanding Deployment
Complex Network Deployments
the managed devices over a VPN or with some other secure tunneling protocol as
shown in the following diagram.
Chapter 2
Version 5.2Sourcefire 3D System Installation Guide54
Understanding Deployment
Complex Network Deployments
You can replace the firewalls and routers with the managed device deployed in
each network segment.
Chapter 2
Integrating Managed Devices within Complex Networks
You can deploy managed devices in more complex network topologies than a
simple multi-sector network. This section describes the issues surrounding
network discovery and vulnerability analysis when deploying in environments
where proxy servers, NAT devices, and VPNs exist, in addition to information
about using the Sourcefire Defense Center to manage multiple managed devices
and the deployment and management of managed devices in a multi-site
environment.
Version 5.2Sourcefire 3D System Installation Guide55
Understanding Deployment
Complex Network Deployments
Integrating with Proxy Servers and NAT
Network address translation (NAT) devices or software may be employed across a
firewall, effectively hiding the IP addresses of internal hosts behind a firewall. If
managed devices are placed between these devices or software and the hosts
being monitored, the system may incorrectly identify the hosts behind the proxy
or NAT device. In this case, Sourcefire recommends that you position managed
devices inside the network segment protected by the proxy or NAT device to
ensure that hosts are correctly detected.
Integrating with Load Balancing Methods
In some network environments, “server farm” configurations are used to
perform network load balancing for services such as web hosting, FTP storage
sites, and so on. In load balancing environments, IP addresses are shared
between two or more hosts with unique operating systems. In this case, the
system detects the operating system changes and cannot deliver a static
operating system identification with a high confidence value. Depending on the
number of different operating systems on the affected hosts, the system may
generate a large number of operating system change events or present a static
operating system identification with a lower confidence value.
Chapter 2
Other Detection Considerations
If an alteration has been made to the TCP/IP stack of the host being identified, the
system may not be able to accurately identify the host operating system. In some
cases, this is done to improve performance. For instance, administrators of
Windows hosts running the Internet Information Services (IIS) Web Server are
encouraged to increase the TCP window size to allow larger amounts of data to
be received, thereby improving performance. In other instances, TCP/IP stack
alteration may be used to obfuscate the true operating system to preclude
accurate identification and avoid targeted attacks. The likely scenario that this
intends to address is where an attacker conducts a reconnaissance scan of a
network to identify hosts with a given operating system followed by a targeted
attack of those hosts with an exploit specific to that operating system.
Version 5.2Sourcefire 3D System Installation Guide56
CHAPTER 3
INSTALLINGA SOURCEFIRE 3D SYSTEM
PPLIANCE
A
Sourcefire appliances are easily installed on your network as part of a larger
Sourcefire 3D System deployment. You install devices on network segments to
inspect traffic and generate intrusion events based on the intrusion policy applied
to it. This data is transmitted to a Defense Center, which manages one or more
devices to correlate data across your full deployment, and coordinate and respond
to threats to your security.
See the following sections for more information about installing a Sourcefire
appliance:
•Included Items on page 58
•Security Considerations on page 58
•Identifying the Management Interfaces on page 58
•Identifying the Sensing Interfaces on page 61
•Using Devices in a Stacked Configuration on page 74
•Installing the Appliance in a Rack on page 80
•Redirecting Console Output on page 82
•Testing an Inline Bypass Interface Installation on page 83
Version 5.2Sourcefire 3D System Installation Guide57
Installing a Sourcefire 3D System Appliance
Included Items
Included Items
The following is a list of components that ship with Sourcefire appliances. As you
unpack the system and the associated accessories, check that your package
contents are complete as follows:
•one Sourcefire appliance
•power cord (two power cords are included with appliances that include
redundant power supplies)
•Category 5e Ethernet straight-through cables: one for a Defense Center;
two for a managed device
•one rack-mounting kit (not applicable to the 3D500/1000/2000; required tray
and rack-mounting kit available separately for the 3D7010/7020/7030)
Security Considerations
Before you install your appliance, Sourcefire recommends that you consider the
following:
•Locate your Sourcefire 3D System appliance in a lockable rack within a
secure location that prevents access by unauthorized personnel. Place a
desktop device (3D500/1000/2000) within a secure location that prevents
access by unauthorized personnel.
•Allow only trained and qualified personnel to install, replace, administer, or
service the Sourcefire appliance.
•Always connect the management interface to a secure internal
management network that is protected from unauthorized access.
•Identify the specific workstation IP addresses that can be allowed to access
appliances. Restrict access to the appliance to only those specific hosts
using Access Lists within the appliance’s system policy. For more
information, see the Sourcefire 3D System User Guide.
Chapter 3
Identifying the Management Interfaces
You connect each appliance in your deployment to the network using the
management interface. This allows the Defense Center to communicate with and
administer the devices it manages.
Sourcefire appliances are delivered on different hardware platforms. Make sure
you refer to the correct illustration for your appliance as you follow the installation
procedure:
•Sourcefire Defense Center 750 on page 59
•Sourcefire Defense Center 1500 on page 59
•Sourcefire Defense Center 3500 on page 60
Version 5.2Sourcefire 3D System Installation Guide58
Installing a Sourcefire 3D System Appliance
Management Interface
Management Interface
Management Interface
Identifying the Management Interfaces
•Sourcefire 3D500/1000/2000 on page 60
•Sourcefire 7000 Series on page 60
•Sourcefire 8000 Series on page 61
Sourcefire Defense Center 750
The DC750 is available as a 1U appliance.
The following illustration of the rear of the chassis indicates the location of the
management interface on a DC750 (Rev 1).
DC750 (Rev 1)
Chapter 3
The following illustration of the rear of the chassis indicates the location of the
management interface on a DC750 (Rev 2).
DC750 (Rev 2)
Sourcefire Defense Center 1500
The DC1500 is available as a 1U appliance. The following illustration of the rear of
the chassis indicates the location of the management interface.
Version 5.2Sourcefire 3D System Installation Guide59
Installing a Sourcefire 3D System Appliance
Management Interface
Management Interface
eth0
Management Interface
Identifying the Management Interfaces
Sourcefire Defense Center 3500
The DC3500 is available as a 1U appliance. The following illustration of the rear of
the chassis indicates the location of the management interface.
Sourcefire 3D500/1000/2000
The 3D500/1000/2000 is available as a desktop appliance. The following
illustration indicates the location of the management interface.
Chapter 3
Sourcefire 7000 Series
The 3D7010, 3D7020, and 3D7030 are 1U appliances that are one-half the width
of the chassis tray. The following illustration of the front of the chassis indicates
the management interface.
Version 5.2Sourcefire 3D System Installation Guide60
Installing a Sourcefire 3D System Appliance
Management Interface
Management Interface
Management Interface
Identifying the Sensing Interfaces
The 3D7110/7120 and the 3D7115/7125 are available as 1U appliances. The
following illustration of the rear of the chassis indicates the location of the
management interface.
Sourcefire 8000 Series
The 3D8120/8130/8140 is available as a 1U appliance. The following illustration of
the rear of the chassis indicates the location of the management interface.
Chapter 3
The 3D8250 is available as a 2U appliance. The 3D8260/8270/8290 is available as
a 2U appliance with one, two, or three secondary 2U appliances. The following
illustration of the rear of the chassis indicates the location of the management
interface for each 2U appliance.
Identifying the Sensing Interfaces
Managed devices connect to network segments using sensing interfaces. The
number of segments each device can monitor depends on the number of sensing
interfaces on the device and the type of connection (passive, inline, routed, or
switched) that you want to use on the network segment.
Version 5.2Sourcefire 3D System Installation Guide61
Installing a Sourcefire 3D System Appliance
Sensing Interfaces
eth1eth2eth3eth4
Identifying the Sensing Interfaces
The following sections describe the sensing interfaces for each managed device.
For information on connection types, see
•To locate the sensing interfaces on the 3D500/1000/2000, see Sourcefire
3D500/1000/2000 on page 62.
•To locate the sensing interfaces on the 7000 Series, see Sourcefire
7000 Series on page 63.
•To locate the module slots on the 8000 Series on the Sourcefire
8000 Series on page 67.
•To locate the sensing interfaces on the 8000 Series NetMods, see
8000 Series Modules on page 68.
Sourcefire 3D500/1000/2000
The 3D500/1000/2000 is available as a desktop appliance. The following
illustration indicates the locations of the sensing interfaces.
Chapter 3
Understanding Interfaces on page 28.
You can use the sensing interfaces to passively sense up to four separate
network segments.
You also can use paired interfaces in inline or inline with bypass mode, which
allows you to deploy the device as an intrusion prevention system. The 3D500
can monitor one network when deployed inline, while the 3D1000 and 3D2000
can monitor two networks inline.
If you want to take advantage of the device’s automatic bypass capability, you
must connect either the two interfaces on the left (eth1 and eth2) or the two
interfaces on the right (eth3 and eth 4) to a network segment. This allows traffic
to flow even if the device fails or loses power. You must also use the web
interface to configure the interface set as inline with bypass.
If you configure the interfaces as inline without using the bypass capability, you
can use any two of the interfaces on the device as an inline pair.
IMPORTANT!By default, the initial setup process supports one inline bypass
interface pair for eth1 and eth2. For more information, see the Sourcefire 3D
System User Guide.
Version 5.2Sourcefire 3D System Installation Guide62
Installing a Sourcefire 3D System Appliance
Sensing Interfaces
Link LED
Link LED
Activity LED
Activity LED
Bypass LED
Identifying the Sensing Interfaces
Sourcefire 7000 Series
The Sourcefire 7000 Series is available in the following configurations:
•1U device one-half the width of the rack tray with eight copper interfaces,
each with configurable bypass capability.
•1U device with either eight copper interfaces or eight fiber interfaces, each
with configurable bypass capability
•1U device with four copper interfaces with configurable bypass capability
and eight small form-factor pluggable (SFP) ports without bypass capability
3D7010/7030/7030
The 3D7010/7020/7030 is delivered with eight copper port sensing interfaces,
each with configurable bypass capability. The following illustration of the front of
the chassis indicates the location of the sensing interfaces.
Eight Port 1000BASE-T Copper Configurable Bypass Interfaces
Chapter 3
You can use these connections to passively monitor up to eight separate network
segments. You can also use paired interfaces in inline or inline with bypass mode
to deploy the device as an intrusion prevention system on up to four networks.
If you want to take advantage of the device’s automatic bypass capability, you
must connect two interfaces vertically (interfaces 1 and 2, 3 and 4, 5 and 6, or 7
and 8) to a network segment. Automatic bypass capability allows traffic to flow
even if the device fails or loses power. After you cable the interfaces, you use the
web interface to configure a pair of interfaces as an inline set and enable bypass
mode on the inline set.
Version 5.2Sourcefire 3D System Installation Guide63
Installing a Sourcefire 3D System Appliance
Sensing Interfaces
Link LED
Activity LEDBypass LED
Sensing Interfaces
Identifying the Sensing Interfaces
3D7110/7120
The 3D7110/7120 is delivered with eight copper port sensing interfaces, or eight
fiber port sensing interfaces, each with configurable bypass capability. The
following illustration of the front of the chassis indicates the location of the
sensing interfaces.
3D7110/7120 Copper Interfaces
Eight-Port 1000BASE-T Copper Interfaces
Chapter 3
You can use these connections to passively monitor up to eight separate network
segments. You can also use paired interfaces in inline or inline with bypass mode
to deploy the device as an intrusion prevention system on up to four networks.
If you want to take advantage of the device’s automatic bypass capability, you
must connect either the two interfaces on the left or the two interfaces on the
right to a network segment. Automatic bypass capability allows traffic to flow
even if the device fails or loses power. After you cable the interfaces, you use the
web interface to configure a pair of interfaces as an inline set and enable bypass
mode on the inline set.
3D7110/7120 Fiber Interfaces
Version 5.2Sourcefire 3D System Installation Guide64
You can use these connections to passively monitor up to eight separate network
segments. You can also use paired interfaces in inline or inline with bypass mode
to deploy the device as an intrusion prevention system on up to four networks.
TIP! For best performance, use the interface sets consecutively. If you skip any
interfaces, you may experience degraded performance.
Chapter 3
If you want to take advantage of the device’s automatic bypass capability, you
must connect either the two interfaces on the left or the two interfaces on the
right to a network segment. Automatic bypass capability allows traffic to flow
even if the device fails or loses power. After you cable the interfaces, you use the
web interface to configure a pair of interfaces as an inline set and enable bypass
mode on the inline set.
3D7115/7125
The 3D7115 and 3D7125 devices are delivered with four-port copper interfaces
with configurable bypass capability, and eight hot-swappable small form-factor
pluggable (SFP) ports without bypass capability. The following illustration of the
front of the chassis indicates the location of the sensing interfaces.
3D7115/7125 Copper and SFP Interfaces
Version 5.2Sourcefire 3D System Installation Guide65
Installing a Sourcefire 3D System Appliance
Link LED
Activity LEDBypass LED
Sample FiberSample Copper
Front with Bale
Rear with Contacts
Identifying the Sensing Interfaces
Four 1000BASE-T Copper Interfaces
You can use the copper interfaces to passively monitor up to four separate
network segments. You can also use paired interfaces in inline or inline with
bypass mode to deploy the device as an intrusion prevention system on up to two
networks.
If you want to take advantage of the device’s automatic bypass capability, you
must connect either the two interfaces on the left or the two interfaces on the
right to a network segment. Automatic bypass capability allows traffic to flow
even if the device fails or loses power. After you cable the interfaces, you use the
web interface to configure a pair of interfaces as an inline set and enable bypass
mode on the inline set.
Chapter 3
SFP Interfaces
When you install Sourcefire SFP transceivers into the SFP sockets, you can
passively monitor up to eight separate network segments. You can also use
paired interfaces in inline, non-bypass mode to deploy the device as an intrusion
detection system on up to four networks.
Sourcefire SFP transceivers are available in 1G copper, 1G short range fiber, or 1G
long range fiber, and are hot-swappable. You can use any combination of copper
or fiber transceivers in your device in either passive or inline configuration. Note
that SFP transceivers do not have bypass capability and should not be used in
intrusion prevention deployments. To ensure compatibility, use only SFP
transceivers available from Sourcefire. See
or 3D7125 on page 251 for more information.
Sample SFP Transceivers
Using SFP Transceivers on a 3D7115
Version 5.2Sourcefire 3D System Installation Guide66
Installing a Sourcefire 3D System Appliance
Link LED
Activity LED
Identifying the Sensing Interfaces
SFP Sockets
Sourcefire 8000 Series
The Sourcefire 8000 Series is available as a 1U device with a 10G network switch
or a 2U device with either a 10G or a 40G network switch. This device can be
shipped fully assembled, or you can install the network modules (NetMods) that
contain the sensing interfaces.
IMPORTANT!If you install a NetMod in an incompatible slot on your device (for
example, inserting a 40G NetMod in slots 1 and 4 on a 3D8250) or a NetMod is
otherwise incompatible with your system, an error or warning message appears
in the web interface of the managing Defense Center when you attempt to
configure the NetMod. Contact Sourcefire Support for assistance.
Chapter 3
The following modules contain configurable bypass sensing interfaces:
•a quad-port 1000BASE-T copper interface with configurable bypass
capability
•a quad-port 1000BASE-SX fiber interface with configurable bypass capability
•a dual-port 10GBASE (MMSR or SMLR) fiber interface with configurable
bypass capability
•a dual-port 40GBASE-SR4 fiber interface with configurable bypass capability
(2U devices only)
The following modules contain non-bypass sensing interfaces:
•a quad-port 1000BASE-T copper interface without bypass capability
•a quad-port 1000BASE-SX fiber interface without bypass capability
•a dual-port 10GBASE (MMSR or SMLR) fiber interface without bypass
capability
In addition, a stacking module combines the resources of two or more identically
configured appliances. The stacking module is optional on the 3D8140 and
3D8250, and is provided in the 3D8260/8270/8290 stacked configurations.
WARNING! Modules are not hot-swappable. See Inserting and Removing
8000 Series Modules on page 255 for more information.
Version 5.2Sourcefire 3D System Installation Guide67
Installing a Sourcefire 3D System Appliance
Module Slots
1
2
3
Module Slots
4
5
7
1
2
3
6
Identifying the Sensing Interfaces
The following illustrations of the front of the chassis indicates the location of the
module slots that contain the sensing interfaces.
81xx Family Front Chassis View
82xx Family Front Chassis View
Chapter 3
8000 Series Modules
The 8000 Series can be delivered with the following modules with configurable
bypass capability:
•a quad-port 1000BASE-T copper interface with configurable bypass
capability. See Quad-Port 1000BASE-T Copper Configurable Bypass
NetMod on page 69 for more information.
•a quad-port 1000BASE-SX fiber interface with configurable bypass
capability. See Quad-Port 1000BASE-SX Fiber Configurable Bypass NetMod
on page 69 for more information.
•a dual-port 10GBASE (MMSR or SMLR) fiber interface with configurable
bypass capability. See Dual-Port 10GBASE (MMSR or SMLR) Fiber
Configurable Bypass NetMod on page 70 for more information.
•a dual-port 40GBASE-SR4 fiber interface with configurable bypass
capability. See Dual-Port 40GBASE-SR4 Fiber Configurable Bypass NetMod
on page 71 for more information.
Version 5.2Sourcefire 3D System Installation Guide68
Installing a Sourcefire 3D System Appliance
Link LED
Activity LED Bypass LED
Ports Bypass LED Activity LEDs
Link LEDs
Identifying the Sensing Interfaces
The 8000 Series can be delivered with the following modules without
configurable bypass capability:
•a quad-port 1000BASE-T copper interface without bypass capability. See
Quad-Port 1000BASE-T Copper Non-Bypass NetMod on page 72 for more
information.
•a quad-port 1000BASE-SX fiber interface without bypass capability. See
Quad-Port 1000BASE-SX Fiber Non-Bypass NetMod on page 72 for more
information.
•a quad-port 10GBASE (MMSR or SMLR) fiber interface without bypass
capability. See Quad-Port 10GBASE (MMSR or SMLR) Fiber Non-Bypass
NetMod on page 72 for more information.
A stacking module is optional on the 3D8140 and 3D8250, and is provided in the
3D8260/8270/8290 stacked configurations. See
page 73 for more information.
You can use these connections to passively monitor up to four separate network
segments. You also can use paired interfaces in inline or inline with bypass mode,
which allows you to deploy the device as an intrusion prevention system on up to
two networks.
If you want to take advantage of the device’s automatic bypass capability, you
must connect either the two interfaces on the left or the two interfaces on the
right to a network segment. This allows traffic to flow even if the device fails or
loses power. You must also use the web interface to configure a pair of interfaces
as an inline set and enable bypass mode on the inline set.
You can use this configuration to passively monitor up to four separate network
segments. You also can use paired interfaces in inline or inline with bypass mode,
which allows you to deploy the managed device as an intrusion prevention
system on up to two separate networks.
TIP! For best performance, use the interface sets consecutively. If you skip
interfaces, you may experience degraded performance.
If you want to take advantage of a device’s automatic bypass capability, you must
connect the two interfaces on the left or the two interfaces on the right to a
network segment. This allows traffic to flow even if the device fails or loses
power. You must also use the web interface to configure a pair of interfaces as an
inline set and enable bypass mode on the inline set.
Dual-Port 10GBASE (MMSR or SMLR) Fiber Configurable Bypass NetMod
Chapter 3
The dual-port 10GBASE fiber configurable bypass configuration uses LC-type
(Local Connector) optical transceivers. Note that these can be either MMSR or
SMLR interfaces.
You can use this configuration to passively monitor up to two separate network
segments. You also can use paired interfaces in inline or inline with bypass mode,
which allows you to deploy the managed device as an intrusion prevention
system on a single network.
TIP! For best performance, use the interface sets consecutively. If you skip
interfaces, you may experience degraded performance.
If you want to take advantage of a device’s automatic bypass capability, you must
connect two interfaces to a network segment. This allows traffic to flow even if
the device fails or loses power. You must also use the web interface to configure
a pair of interfaces as an inline set and enable bypass mode on the inline set.
Version 5.2Sourcefire 3D System Installation Guide70
Installing a Sourcefire 3D System Appliance
Link LED
Activity LED
Bypass LED
Port
Second 40G NetModFirst 40G NetModNot Available for 40G NetMod
You can use the 40G NetMod only in the 3D8270/8290 or a 40G-capable
3D8250/8260. If you attempt to create a 40G interface on a device that is not
40G-capable, the 40G interface screen on its managing Defense Center web
interface displays red. A 40G-capable device displays “3D 8250-40G” on the LCD
Panel.
You can use this configuration to passively monitor up to two separate network
segments. You also can use the paired interface in inline or inline with bypass
mode, which allows you to deploy the device as an intrusion prevention system
on one network.
You can use up to two 40G NetMods. Install the first 40G NetMod in slots 3 and 7,
and the second in slots 2 and 6. You cannot use a 40G NetMod in slots 1 and 4.
Chapter 3
40G NetMod Placement
If you want to take advantage of a device’s automatic bypass capability, you must
use the web interface to configure a pair of interfaces as an inline set and enable
bypass mode on the inline set.
Version 5.2Sourcefire 3D System Installation Guide71
Installing a Sourcefire 3D System Appliance
Link LED
Activity LED
Link LED
Activity LED
Ports
Activity LED Ports
Link LED
Identifying the Sensing Interfaces
Quad-Port 1000BASE-T Copper Non-Bypass NetMod
You can use these connections to passively monitor up to four separate network
segments. You also can use paired interfaces in inline configuration on up to two
network segments.
You can use these connections to passively monitor up to four separate network
segments. You also can use paired interfaces in inline configuration on up to two
network segments.
TIP! For best performance, use the interface sets consecutively. If you skip
interfaces, you may experience degraded performance.
Quad-Port 10GBASE (MMSR or SMLR) Fiber Non-Bypass NetMod
Version 5.2Sourcefire 3D System Installation Guide72
Installing a Sourcefire 3D System Appliance
Link LED
Activity LED
Identifying the Sensing Interfaces
The quad-port 10GBASE fiber non-bypass configuration uses LC-type (Local
Connector) optical transceivers with either MMSR or SMLR interfaces.
WARNING! The quad-port 10G BASE non-bypass NetMod contains
non-removable small form-factor pluggable (SFP) transceivers. Any attempt to
remove the SFPs can damage the module.
You can use these connections to passively monitor up to four separate network
segments. You also can use paired interfaces in inline configuration on up to two
network segments.
TIP! For best performance, use the interface sets consecutively. If you skip
interfaces, you may experience degraded performance.
8000 Series Stacking Module
A stacking module combines the resources of two or more identically configured
appliances. The stacking module is optional on the 3D8140 and 3D8250, and is
provided in the 3D8260/8270/8290 stacked configurations.
Chapter 3
The stacking module allows you to combine the resources of two devices, using
one as the primary device and one as the secondary. Only the primary device has
sensing interfaces.
•The 3D8140 and 3D8250 can be delivered with the stacking module.
•The 3D8260 is delivered with one stacking module in the primary device
and one stacking module in the secondary device.
•The 3D8270 is delivered with two stacking modules in the primary device
and one stacking module in each of the two secondary devices.
•The 3D8290 is delivered with three stacking modules in the primary device,
and one stacking module in each of the three secondary devices.
For more information on using stacked devices, see Using Devices in a Stacked
Configuration.
Version 5.2Sourcefire 3D System Installation Guide73
Installing a Sourcefire 3D System Appliance
Using Devices in a Stacked Configuration
Using Devices in a Stacked Configuration
You can increase the amount of traffic inspected on network segments by
combining the resources of identically configured devices in a stacked
configuration. One device is designated as the primary device and is connected to
the network segments. All other devices are designated secondary devices, and
are used to provide additional resources to the primary device. A Defense Center
creates, edits, and manages the stacked configuration.
The primary device contains sensing interfaces and one set of stacking interfaces
for each secondary device connected to it. You connect the sensing interfaces on
the primary device to the network segments you want to monitor in the same
way as a non-stacked device. You connect the stacking interfaces on the primary
device to the stacking interfaces on the secondary devices using the stacking
cables. Each secondary device is connected directly to the primary device using
the stacking interfaces. If a secondary device contains sensing interfaces, they
are not used.
You can stack devices in the following configurations:
•two 3D8140s
•up to four 3D8250s
•a 3D8260 (a 10G-capable primary device and a secondary device)
•a 3D8270 (a 40G-capable primary device and two secondary devices)
•a 3D8290 (a 40G-capable primary device and three secondary devices)
For the 3D8260 and 3D8270, you can stack additional devices for a total of four
devices in the stack.
One device is designated as the primary device and is displayed on the Defense
Center’s web interface with the primary role. All other devices in the stacked
configuration are secondary and displayed in the web interface with the
secondary role. You use the combined resources as a single entity except when
viewing information from the stacked devices.
Connect the primary device to the network segments you want to analyze in the
same way that you would connect a single 3D8140 or 3D8250. Connect the
secondary devices to the primary device as indicated in the stack cabling diagram.
After the devices are physically connected to the network segments and to each
other, use a Defense Center to establish and manage the stack.
Chapter 3
The following sections provide more information on how to connect and manage
stacked devices:
•Connecting the 3D8140 on page 75
•Connecting the 3D8250/8260/8270/8290 on page 75
•Using the 8000 Series Stacking Cable on page 79
•Managing Stacked Devices on page 79
Version 5.2Sourcefire 3D System Installation Guide74
Installing a Sourcefire 3D System Appliance
Primary
Secondary
Using Devices in a Stacked Configuration
Connecting the 3D8140
You can connect two 3D8140s in a stacked configuration. You must use one
8000
Series stacking cable to create the physical connection between the
primary device and the secondary device. For more information on using the
stacking cable, see
Install the devices in your rack so you can easily connect the cable between the
stacking modules. You can install the secondary device above or below the
primary device.
Connect the primary device to the network segments you want to analyze in the
same way that you would connect a single 3D8140. Connect the secondary
device directly to the primary device.
The following graphic shows a primary device with a secondary device installed
below the primary device.
Using the 8000 Series Stacking Cable on page 79.
Chapter 3
To connect a 3D8140 secondary device:
Use an 8000 Series stacking cable to connect the left stacking interface on
the primary device to the left stacking interface on the secondary device,
then use the Defense Center that manages the devices to establish the
stacked device relationship in the system. Note that the right stacking
interface is not connected. See Managing Stacked Devices on page 79.
Connecting the 3D8250/8260/8270/8290
You can connect any of the following configurations:
•up to four 3D8250s
•a 3D8260 (a 10G-capable primary device and a secondary device)
•a 3D8270 (a 40G-capable primary device and two secondary devices)
•a 3D8290 (a 40G-capable primary device and three secondary devices)
For the 3D8260 and 3D8270, you can stack additional devices for a total of four
devices in the stack.
You must use two 8000 Series stacking cables for each secondary device you
want to connect to the primary device. For more information on using the
stacking cable, see
Using the 8000 Series Stacking Cable on page 79.
Version 5.2Sourcefire 3D System Installation Guide75
Installing a Sourcefire 3D System Appliance
Primary
Secondary
Primary
Secondary
Using Devices in a Stacked Configuration
Install the devices in your rack so you can easily connect the cables between the
stacking modules. You can install the secondary devices above or below the
primary device.
Connect the primary device to the network segments you want to analyze in the
same way that you would connect a single 3D8250. Connect each secondary
device directly to the primary device as required for the number of secondary
devices in the configuration.
3D8250 Primary Device with One Secondary Device
The following example shows a 3D8250 primary device and one secondary
device. The secondary device is installed below the primary device. Note that the
secondary device contains no sensing interfaces.
Chapter 3
3D8260 - 3D8250 Primary Device and One Secondary Device
The following example shows a 3D8260 configuration, which includes a
10G-capable 3D8250 primary device and one dedicated secondary device. The
secondary device is installed below the primary device.
Version 5.2Sourcefire 3D System Installation Guide76
Installing a Sourcefire 3D System Appliance
Primary
Secondary
Secondary
Using Devices in a Stacked Configuration
3D8270 - 3D8250 (40G) Primary Device and Two Secondary Devices
The following example shows a 3D8270, which includes a 40G-capable 3D8250
primary device and two dedicated secondary devices. One secondary device is
installed above the primary device and the other is installed below the primary
device.
Chapter 3
3D8290 - 3D8250 (40G) Primary Device and Three Secondary Devices
The following example shows a 3D8290, which includes a 40G-capable 3D8250
primary device and three dedicated secondary devices. One secondary device is
Version 5.2Sourcefire 3D System Installation Guide77
Installing a Sourcefire 3D System Appliance
Primary
Secondary
Secondary
Secondary
Using Devices in a Stacked Configuration
installed above the primary device and two secondary devices are installed below
the primary device.
Chapter 3
To connect a 3D8250 secondary device:
1.Use an 8000 Series stacking cable to connect the left interface on the
stacking module on the primary device to the left interface on the stacking
module on the secondary device.
2.Use a second 8000 Series stacking cable to connect the right interface on the
Version 5.2Sourcefire 3D System Installation Guide78
stacking module on the primary device to the right interface on the stacking
module on the secondary device.
3.Repeat steps 1 and 2 for each secondary device you want to connect.
4.Use the Defense Center that manages the devices to establish the stacked
device relationship and manage their joint resources. See Managing Stacked
Devices on page 79.
Installing a Sourcefire 3D System Appliance
Latch Release Tab
Keyed Cable End
Latch
Using Devices in a Stacked Configuration
Using the 8000 Series Stacking Cable
The 8000 Series stacking cable has identically-keyed ends, each with a latch to
secure the cable in the device and a latch release tab.
Use 8000 Series stacking cables to create the physical connection between the
primary device and each secondary device as required for each device
configuration. The 3D8250/8260/8270/8290 requires two cables per connection
and the 3D8140 requires one cable. Devices do not need to be powered down to
insert or remove the stacking cable.
Chapter 3
WARNING! Use only the Sourcefire 8000 Series stacking cable when cabling
your devices. Using unsupported cables can create unforeseen errors.
Use the Defense Center to manage the stacked devices after you have physically
connected the devices.
To insert an 8000 Series stacking cable:
To insert the cable, hold the cable end with release tab facing up, then insert
the keyed end into the port on the stacking module until you hear the latch
click into place.
To remove an 8000 Series stacking cable:
To remove the cable, pull on the release tab to release the latch, then remove
the cable end.
Managing Stacked Devices
A Defense Center establishes the stacked relationship between the devices,
controls the interface sets of the primary device, and manages the combined
resources in the stack. You cannot manage interface sets on the local web
interface of a stacked device.
After the stacked relationship is established, each device inspects traffic
separately using a single, shared detection configuration. If the primary device
fails, traffic is handled according to the configuration of the primary device (that is,
as if the stacked relationship did not exist). If the secondary device fails, the
primary device continues to sense traffic, generate alerts, and send traffic to the
failed secondary device where the traffic is dropped.
Version 5.2Sourcefire 3D System Installation Guide79
Installing a Sourcefire 3D System Appliance
Installing the Appliance in a Rack
For information on establishing and managing stacked devices, see Managing
Stacked Devices in the Sourcefire 3D System User Guide.
Installing the Appliance in a Rack
The Sourcefire 3D System is delivered on different hardware platforms. You can
rack-mount all Sourcefire appliances, including the 3D500/1000/2000 desktop
devices (with purchase of a 1U mounting kit). When you install an appliance, you
must also make sure that you can access the appliance’s console. To access the
console for initial setup, connect to a Sourcefire appliance in one of the following
ways:
Keyboard and Monitor/KVM
You can connect a USB keyboard and VGA monitor to any Sourcefire
appliance, which is useful for rack-mounted appliances connected to a
keyboard, video, and mouse (KVM) switch.
Chapter 3
Ethernet Connection to Management Interface
Configure a local computer, which must not be connected to the internet,
with the following s:
•IP address:
•netmask: 255.255.255.0
•default gateway: 192.168.45.1
Using an Ethernet cable, connect the network interface on the local computer
to the management interface on the appliance. To interact with the appliance,
use terminal emulation software such as HyperTerminal or XModem. The
settings for this software are 9600 baud, 8 data bits, no parity checking, 1
stop bit, and no flow control.
Note that the management interface on a physical Sourcefire appliance is
preconfigured with a default IPv4 address. However, you can reconfigure the
management interface with an IPv6 address as part of the setup process.
After initial setup, you can access the console in the following additional ways:
192.168.45.2
Serial Connection/Laptop
You can use a serial cable to connect a computer to any Sourcefire appliance
except the 3D2100/2500/3500/4500 devices. To interact with the appliance,
use terminal emulation software as described above.
Lights-Out Management Using Serial over LAN
The LOM feature allows you to perform a limited set of management actions
on a Series 3 appliance, including restoring to factory defaults, using a Serial
over LAN (SOL) connection. For more information, see Setting up Lights-Out
Management on page 219.
Version 5.2Sourcefire 3D System Installation Guide80
Installing a Sourcefire 3D System Appliance
Installing the Appliance in a Rack
By default, Sourcefire appliances direct initialization status, or init, messages to
the VGA port. If you want to use the physical serial port or SOL to access the
console, Sourcefire recommends you redirect console output to the serial port
after you complete initial setup. For more information, see
Output on page 82.
To install the appliance:
1.Mount the appliance in your rack using the mounting kit and its supplied
instructions.
Optionally, you can deploy the 3D500/1000/2000 as a desktop device.
2.Connect to the appliance using either a keyboard and monitor or Ethernet
connection.
3.If you are using a keyboard and monitor to set up the appliance, use an
Ethernet cable now to connect the management interface to a protected
network segment.
If you plan to perform the initial setup process by connecting a computer
directly to the appliance’s physical management interface, you will connect
the management interface to the protected network when you finish setup.
Chapter 3
Redirecting Console
4.For a managed device, connect the sensing interfaces to the network
segments you want to analyze using the appropriate cables for your
interfaces:
•Copper Sensing Interfaces: If your device includes copper sensing
interfaces, make sure you use the appropriate cables to connect them
to your network; see Cabling Inline Deployments on Copper Interfaces
on page 34.
•Fiber Adapter Card: For devices with a fiber adapter card, connect the
LC connectors on the optional multimode fiber cable to two ports on
the adapter card in any order. Connect the SC plug to the network
segment you want to analyze.
•Fiber Tap: If you are deploying the device with an optional fiber optic
tap, connect the SC plug on the optional multimode fiber cable to the
“analyzer” port on the tap. Connect the tap to the network segment
you want to analyze.
•Copper Tap: If you are deploying the device with an optional copper tap,
connect the A and B ports on the left of the tap to the network segment
you want to analyze. Connect the A and B ports on the right of the tap
(the “analyzer” ports) to two copper ports on the adapter card.
For more information about options for deploying the managed device, see
Understanding Deployment Options on page 28.
Note that if you are deploying a device with bypass interfaces, you are taking
advantage of your device’s ability to maintain network connectivity even if the
device fails. See Testing an Inline Bypass Interface Installation on page 83 for
information on installation and latency testing.
Version 5.2Sourcefire 3D System Installation Guide81
Installing a Sourcefire 3D System Appliance
Redirecting Console Output
5.Attach the power cord to the appliance and plug into a power source.
If your appliance has redundant power supplies, attach power cords to both
power supplies and plug them into separate power sources. Note that the
3D500/1000/2000 does not have a power switch. This device turns on when
you connect the power supply.
6.Turn on the appliance.
If you are using a direct Ethernet connection to set up the appliance, confirm
that the link LED is on for both the network interface on the local computer
and the management interface on the appliance. If the management interface
and network interface LEDs are not lit, try using a crossover cable. For more
information, see Cabling Inline Deployments on Copper Interfaces on
page 34.
7.Continue with the next chapter, Setting Up a Sourcefire 3D System Appliance
on page 86.
Redirecting Console Output
Chapter 3
By default, Sourcefire appliances direct initialization status, or init, messages to
the VGA port. If you restore an appliance to factory defaults and delete its license
and network settings, the restore utility also resets console output to VGA. If you
want to use the physical serial port or SOL to access the console, Sourcefire
recommends you redirect console output to the serial port after you complete
initial setup.
TIP! 3D2100/2500/3500/4500 devices do not have functional serial ports.
To redirect console output, run a script from the appliance’s shell. The following
table lists the console you should use depending on the way you plan to access
the appliance.
Console Redirection Options
APPLIANCEVGA (DEFAULT)PHYSICAL SERIALLOM VIA SOL
3D500/1000/2000
3D2100/2500/3500/4500
3D6500
3D9900
tty0ttyS0
tty0
tty0ttyS1
tty0ttyS1
n/an/a
n/a
n/a
n/a
Version 5.2Sourcefire 3D System Installation Guide82
Installing a Sourcefire 3D System Appliance
Testing an Inline Bypass Interface Installation
Console Redirection Options (Continued)
APPLIANCEVGA (DEFAULT)PHYSICAL SERIALLOM VIA SOL
Chapter 3
Series 2 Defense Centers
all Series 3 appliances
Note that while all Series 3 appliances support LOM, 7000 Series devices do not
support LOM and physical serial access at same time. However, the console
setting is the same regardless of which you want to use.
To redirect the console output:
A
CCESS: Admin
1.Using your keyboard/monitor or serial connection, log into the appliance using
an account with Administrator privileges. The password is the same as the
password for the appliance’s web interface.
The prompt for the appliance appears.
2.At the prompt, access
•On a Defense Center or Series 2 managed device, type
provide the password again.
•On a Series 3 managed device, type
Then, type
The root prompt appears.
3.Set the console output by typing the following:
/usr/local/sf/bin/set_console.sh -c
where
as described in the Console Redirection Options table above.
console_value
sudo su - and provide the password again.
tty0ttyS0
tty0ttyS0ttyS0
root privileges on the appliance:
expert to display the shell prompt.
console_value
represents the way you plan to access the appliance,
n/a
sudo su - and
4.To implement your changes, reboot the appliance by typing
The appliance reboots.
reboot.
Testing an Inline Bypass Interface Installation
Managed devices with bypass interfaces provide the ability to maintain network
connectivity even when the device is powered off or inoperative. It is important to
Version 5.2Sourcefire 3D System Installation Guide83
Installing a Sourcefire 3D System Appliance
Testing an Inline Bypass Interface Installation
ensure that you properly install these devices and quantify any latency introduced
by their installation.
IMPORTANT!Your switch’s spanning tree discovery protocol can cause a
30-second traffic delay. Sourcefire recommends that you disable the spanning
tree during the following procedure.
The following procedure, applicable only to copper interfaces, describes how to
test the installation and ping latency of an inline bypass interface. You will need to
connect to the network to run ping tests and connect to the managed device
console.
To test a device with inline bypass interface installation:
A
CCESS: Admin
1.Ensure that the interface set type for the appliance is configured for inline
bypass mode.
See Configuring Inline Sets in the Sourcefire 3D System User Guide for
instructions on configuring an interface set for inline bypass mode.
Chapter 3
2.Set all interfaces on the switch, the firewall, and the device sensing interfaces
to auto-negotiate.
IMPORTANT!Cisco devices require auto-negotiate when using auto-MDIX
on the device.
3.Power off the device and disconnect all network cables.
Reconnect the device and ensure you have the proper network connections.
Check cabling instructions for crossover versus straight-through from the
device to the switches and firewalls, see Cabling Inline Deployments on
Copper Interfaces on page 34.
4.With the device powered off, ensure that you can ping from the firewall
through the device to the switch.
If the ping fails, correct the network cabling.
5.Run a continuous ping until you complete step 10.
6.Power the device back on.
7.Using your keyboard/monitor or serial connection, log into the device using an
account with Administrator privileges. The password is the same as the
password for the device’s web interface.
The prompt for the device appears.
Version 5.2Sourcefire 3D System Installation Guide84
Installing a Sourcefire 3D System Appliance
Testing an Inline Bypass Interface Installation
8.Shut down the device:
•On a Series 2 device, type
At the root prompt, shut down the appliance by typing
now
.
•On a Series 3 device, type
You can also shut down the device using its web interface; see the Managing
Devices chapter in the Sourcefire 3D System User Guide. As most devices
power off, they emit an audible click sound. The click is the sound of relays
switching and the device going into hardware bypass.
9.Wait 30 seconds.
Verify that your ping traffic resumes.
10. Power the device back on, and verify that your ping traffic continues to pass.
11. For appliances that support tap mode, you can test and record ping latency
results under the following sets of conditions:
•device powered off
•device powered on, policy with no rules applied, inline intrusion policy
protection mode
•device powered on, policy with no rules applied, inline intrusion policy
protection tap mode
•device powered on, policy with tuned rules applied, inline intrusion
policy protection mode
Ensure that the latency periods are acceptable for your installation. For
information on resolving excessive latency problems, see Configuring Packet
Latency Thresholding and Understanding Rule Latency Thresholding in the
Sourcefire 3D System User Guide.
Chapter 3
sudo su -, then type your password again.
shutdown -h
system shutdown.
Version 5.2Sourcefire 3D System Installation Guide85
CHAPTER 4
SETTING UPA SOURCEFIRE 3D SYSTEM
PPLIANCE
A
After you deploy and install a Sourcefire appliance, you must complete a setup
process that allows the new appliance to communicate on your trusted
management network. You must also change the administrator password and
accept the end user license agreement (EULA).
The setup process also allows you to perform many initial administrative-level
tasks, such as setting the time, registering and licensing devices, and scheduling
updates. The options you choose during setup and registration determine the
default interfaces, inline sets, zones, and policies that the system creates and
applies.
The purpose of these initial configurations and policies is to provide an
out-of-the-box experience and to help you quickly set up your deployment, not to
restrict your options. Regardless of how you initially configure a device, you can
change its configuration at any time using the Defense Center. In other words,
choosing a detection mode or access control policy during setup, for example,
does not lock you into a specific device, zone, or policy configuration.
For more information on each of the steps in the initial setup process, see the
following sections:
•Understanding the Setup Process on page 87 outlines the setup process,
which depends on the appliance’s model and whether you have physical
access to the appliance.
IMPORTANT!If you are not already familiar with the setup process,
Sourcefire strongly recommends you read this section first.
Version 5.2Sourcefire 3D System Installation Guide86
Setting Up a Sourcefire 3D System Appliance
Understanding the Setup Process
•Configuring Network Settings Using a Script on page 90 explains how to
use a script to specify network settings that allow a new appliance to
communicate on your management network. This step is required for all
Defense Centers and Series 2 devices that you are accessing using a
keyboard and monitor.
•Performing Initial Setup on a Series 3 Device Using the CLI on page 91
explains how to use an interactive command line interface (CLI) to perform
the setup process on a Series 3 device.
•Initial Setup Page: Devices on page 93 explains how to use any device’s
web interface to complete its initial setup.
•Initial Setup Page: Defense Centers on page 100 explains how to use a
Defense Center’s web interface to complete its initial setup.
•Next Steps on page 109 contains guidance on the post-setup tasks you may
want to perform as you set up your Sourcefire 3D System deployment.
WARNING! The procedures in this chapter explain how to set up an appliance
without powering it down. However, if you need to power down for any reason,
use the procedure in the Managing Devices chapter in the Sourcefire 3D System User Guide, the
or the
shutdown -h now command from an appliance’s shell (sometimes called
expert mode).
system shutdown command from the CLI on a Series 3 device,
Chapter 4
Understanding the Setup Process
After you deploy and install a new Sourcefire appliance, as described in earlier
chapters of this guide, you must complete a setup process. Before you begin the
setup, make sure that you can meet the following conditions.
Appliance Model
You must know which appliance you are setting up. A Sourcefire appliance
is either a traffic-sensing managed device or a managing Defense Center:
There are several models of each appliance type; these models are further
grouped into series and family. For more information, see Understanding
Appliance Series, Models, and Capabilities on page 10.
Access
To set up a new appliance, you must connect using either keyboard and
monitor/KVM (keyboard, video, and mouse) or a direct Ethernet connection
to the appliance’s management interface. After initial setup, you can
configure the appliance for serial access. For more information, see
Installing the Appliance in a Rack on page 80.
Version 5.2Sourcefire 3D System Installation Guide87
Setting Up a Sourcefire 3D System Appliance
Understanding the Setup Process
Information
You have, at minimum, the information needed to allow the appliance to
communicate on your management network: an IPv4 or IPv6 management IP
address, a netmask or prefix length, and a default gateway.
If you know how the appliance is deployed, the setup process is also a good
time to perform many initial administrative-level tasks, including registration
and licensing.
TIP! If you are deploying multiple appliances, set up your devices first, then their
managing Defense Center. The initial setup process for a device allows you to
preregister it to a Defense Center; the setup process for a Defense Center allows
you to add and license preregistered managed devices.
After you complete setup, you will use the Defense Center‘s web interface to
perform most management and analysis tasks for your deployment. Physical
managed devices have a restricted web interface that you can use only to
perform basic administration. For more information, see
For details on how to set up each type of Sourcefire appliance, see:
Chapter 4
Next Steps on page 109 .
•Setting Up a Series 2 Appliance or Series 3 Defense Center on page 88
•Setting Up a Series 3 Device on page 89
TIP! If you are setting up an appliance after restoring it to factory defaults (see
Restoring a Sourcefire Appliance to Factory Defaults on page 198) and you did not
delete the appliance’s license and network settings, you can use a computer on
your management network to browse directly to the appliance’s web interface to
perform the setup. Skip to Initial Setup Page: Devices on page 93 or Initial Setup
Page: Defense Centers on page 100.
Setting Up a Series 2 Appliance or Series 3 Defense Center
SUPPORTED DEVICES: Series 2
S
UPPORTED DEFENSE CENTERS: Series 2, Series 3
The following diagram illustrates the choices you can make when setting up
Series
2 devices and Defense Centers, as well as Series 3 Defense Centers:
Version 5.2Sourcefire 3D System Installation Guide88
Setting Up a Sourcefire 3D System Appliance
Understanding the Setup Process
To set up any Series 2 appliance or a Series 3 Defense Center:
A
CCESS: Admin
1.If you are using a keyboard and monitor, run a script that helps you configure
settings to allow the appliance to communicate on your management
network; see Configuring Network Settings Using a Script on page 90.
If you are setting up a reimaged appliance and you kept your network settings
as part of the restore process, or if you are accessing the appliance via a
direct Ethernet connection, skip to the next step.
2.Complete the setup process by browsing to the appliance’s web interface
from a computer on your management network:
•To complete the setup of a managed device using its web interface, see
Initial Setup Page: Devices on page 93.
•To complete the setup of a Defense Center using its web interface, see
Initial Setup Page: Defense Centers on page 100.
Setting Up a Series 3 Device
SUPPORTED DEVICES: Series 3
The following diagram illustrates the choices you can make when setting up
Series
3 devices:
Chapter 4
Your access to a Series 3 device determines how you set it up. You have the
following options:
•Regardless of how you are connected to the device, you can use the CLI to
set it up; see Performing Initial Setup on a Series 3 Device Using the CLI on
page 91.
•If you are accessing the appliance via a direct Ethernet connection, you can
browse to the appliance’s web interface from a local computer; see Initial
Setup Page: Devices on page 93.
If you are setting up a reimaged device and you kept your network settings as part
of the restore process, you can access the CLI via SSH or a Lights-Out
Version 5.2Sourcefire 3D System Installation Guide89
Setting Up a Sourcefire 3D System Appliance
Configuring Network Settings Using a Script
Management (LOM) connection. You can also browse to the device’s web
interface from a computer on your management network.
Configuring Network Settings Using a Script
SUPPORTED DEVICES: Series 2
After you install a new Defense Center or Series 2 device, or delete its network
settings as part of a reimage, you must configure the appliance to communicate
on your management network. Complete this step by running a script at the
console.
The Sourcefire 3D System provides a dual stack implementation for both IPv4 and
IPv6 management environments. First, the script prompts you to configure (or
disable) IPv4 management settings, then IPv6. For IPv6 deployments, you can
retrieve settings from a local router. You must provide the IPv4 or IPv6
management IP address, netmask or prefix length, and default gateway.
When following the script’s prompts, for multiple-choice questions, your options
are listed in parentheses, such as
such as
[y]. Press Enter to confirm a choice.
(y/n). Defaults are listed in square brackets,
Chapter 4
Note that the script prompts you for much of the same setup information that the
appliance’s setup web page does. For more information, see
page 96 (device) and Network Settings on page 103 (Defense Center).
To configure network settings using a script:
A
CCESS: Admin
1.At the console, log into the appliance.
Use
admin as the username and Sourcefire as the password.
2.At the admin prompt, switch to the root user by typing
typing the password again if prompted.
3.At the root prompt, run the following script:
/usr/local/sf/bin/configure-network
4.Follow the script’s prompts.
Configure (or disable) IPv4 management settings first, then IPv6. If you
manually specify network settings, you must:
•enter IPv4 addresses, including the netmask, in dotted decimal form.
For example, you could specify a netmask of 255.255.0.0.
•enter IPv6 addresses in colon-separated hexadecimal form. For an IPv6
prefix, specify the number of bits; for example, a prefix length of 112.
5.Confirm that your settings are correct.
If you entered settings incorrectly, type
can then enter the correct information. The console may display messages as
your settings are implemented.
n at the prompt and press Enter. You
Network Settings on
sudo su -, then
Version 5.2Sourcefire 3D System Installation Guide90
Setting Up a Sourcefire 3D System Appliance
Performing Initial Setup on a Series 3 Device Using the CLI
6.Log out of the appliance.
7.Your next step depends on the appliance:
•To complete the setup of a managed device using its web interface,
continue with Initial Setup Page: Devices on page 93.
•To complete the setup of a Defense Center using its web interface,
continue with Initial Setup Page: Defense Centers on page 100.
Chapter 4
Performing Initial Setup on a Series 3 Device Using the CLI
SUPPORTED DEVICES: Series 3
Optionally, you can use the CLI to configure Series 3 devices instead of using the
device’s web interface. When you first log in to a newly configured device using
the CLI, you must read and accept the EULA. Then, follow the setup prompts to
change the administrator password, configure the device’s network settings and
detection mode. Finally, register the device to the Defense Center that will
manage it.
When following the setup prompts, options are listed in parentheses, such as
(y/n)
. Defaults are listed in square brackets, such as [y]. Press Enter to confirm
a choice.
Note that the CLI prompts you for much of the same setup information that a
device’s setup web page does. For detailed information on these options, see
Initial Setup Page: Devices on page 93.
To complete the initial setup on a Series 3 device using the CLI:
A
CCESS: Admin
1.Log into the device. Use
password.
•For a Series 3 device attached to a monitor and keyboard, log in at the
console.
•If you connected a computer to the management interface of a Series 3
device using an Ethernet cable, SSH to the interface’s default IPv4
address: 192.168.45.45.
The device immediately prompts you to read the EULA.
2.Read and accept the EULA.
3.Change the password for the
privileges and cannot be deleted.
Sourcefire recommends that you use strong password that is at least eight
alphanumeric characters of mixed case and includes at least one numeric
character. Avoid using words that appear in a dictionary. For more information,
see Change Password on page 95.
admin as the username and Sourcefire as the
admin account. This account has Administrator
Version 5.2Sourcefire 3D System Installation Guide91
Setting Up a Sourcefire 3D System Appliance
Performing Initial Setup on a Series 3 Device Using the CLI
4.Configure network settings for the device.
First configure (or disable) IPv4 management settings, then IPv6. If you
manually specify network settings, you must:
•enter IPv4 addresses, including the netmask, in dotted decimal form.
For example, you could specify a netmask of 255.255.0.0.
•enter IPv6 addresses in colon-separated hexadecimal form. For an IPv6
prefix, specify the number of bits; for example, a prefix length of 112.
For more information, see Network Settings on page 96. The console may
display messages as your settings are implemented.
5.Select whether you want to allow changing of the device’s network settings
using the LCD panel.
WARNING!Enabling this option can present a security risk. You need only
physical access, not authentication, to configure network settings using the
LCD panel. For more information, see Using the LCD Panel on a Series 3
Device on page 111.
Chapter 4
6.Specify the detection mode based on how you deployed the device.
For more information, see Detection Mode on page 98. The console may
display messages as your settings are implemented. When finished, the
device reminds you to register this device to a Defense Center, and displays
the CLI prompt.
7.To use the CLI to register the device to the Defense Center that will manage
it, continue with the next section, Registering a Series 3 Device to a Defense
Center Using the CLI.
You must manage devices with a Defense Center. If you do not register the
device now, you must log in later and register it before you can add it to a
Defense Center.
8.Log out of the appliance.
Registering a Series 3 Device to a Defense Center Using the CLI
SUPPORTED DEVICES: Series 3
If you configured a Series 3 device using the CLI, Sourcefire recommends that
you use the CLI to register the device to a Defense Center at the conclusion of
the setup script. It is easiest to register a device to its Defense Center during the
initial setup process, because you are already logged into the device’s CLI.
To register a device, use the configure manager add command. A unique
alphanumeric registration key is always required to register a device to a Defense
Center. This is a simple key that you specify, and is not the same as a license key.
Version 5.2Sourcefire 3D System Installation Guide92
Setting Up a Sourcefire 3D System Appliance
Initial Setup Page: Devices
In most cases, you must provide the Defense Center’s hostname or the IP
address along with the registration key, for example:
configure manager add DC.example.com my_reg_key
However, if the device and the Defense Center are separated by a NAT device,
enter a unique NAT ID along with the registration key, and specify
instead of the hostname, for example:
1.Log in to the device as a user with Configuration CLI access level:
•If you are performing the initial setup from the console, you are already
logged in as the
•Otherwise, SSH to the device’s management IP address or host name.
Chapter 4
DONTRESOLVE
admin user, which has the required access level.
2.At the prompt, register the device to a Defense Center using the
manager add
configure manager add {
IPv6_address
where:
•
{
hostname
specifies either the fully qualified host name or IP address of the
Defense Center. If the Defense Center is not directly addressable, use
DONTRESOLVE.
•
reg_key
a device to the Defense Center.
•
nat_id
is an optional alphanumeric string used during the registration
process between the Defense Center and the device. It is required if
the hostname is set to
3.Log out of the appliance.
The device is ready to be added to a Defense Center.
Initial Setup Page: Devices
For all managed devices (except Series 3 devices that you configured using the
CLI; see
you must complete the setup process by logging into the device’s web interface
and specifying initial configuration options on a setup page.
You must change the administrator password, specify network settings if you
have not already, and accept the EULA. You can also preregister the device to a
Defense Center and specify a detection mode; the detection mode and other
options you choose during registration determine the default interfaces, inline
Performing Initial Setup on a Series 3 Device Using the CLI on page 91),
configure
command, which has the following syntax:
hostname
| DONTRESOLVE}
|
IPv4_address
|
|
IPv4_address
reg_key [nat_id
IPv6_address
| DONTRESOLVE}
|
]
is the unique alphanumeric registration key required to register
DONTRESOLVE.
Version 5.2Sourcefire 3D System Installation Guide93
Setting Up a Sourcefire 3D System Appliance
Initial Setup Page: Devices
sets, and zones that the system creates, as well as the policies that it initially
applies to managed devices.
To complete the initial setup on a physical managed device using its web interface:
A
CCESS: Admin
Chapter 4
1.Direct your browser to
of the device’s management interface.
•For a device connected to a computer with an Ethernet cable, direct the
browser on that computer to the default management interface IPv4
address:
•For a device where network settings are already configured, use a
computer on your management network to browse to the IP address of
the device’s management interface.
The login page appears.
2.Log in using admin as the username and Sourcefire as the password.
The setup page appears. See the following sections for information on
completing the setup:
•Change Password on page 95
•Network Settings on page 96
•Series 3 Device LCD Panel Configuration on page 97
•Remote Management on page 97
•Time Settings on page 98
•Detection Mode on page 98
•Automatic Backups on page 100
•End User License Agreement on page 100
https://192.168.45.45/.
https://
mgmt_ip
/, where
mgmt_ip
is the IP address
3.When you are finished, click Apply.
The device is configured according to your selections. After an intermediate
page appears, you are logged into the web interface as the
has the Administrator role.
admin user, which
Version 5.2Sourcefire 3D System Installation Guide94
Setting Up a Sourcefire 3D System Appliance
Initial Setup Page: Devices
4.Log out of the device.
The device is ready to be added to its managing Defense Center.
IMPORTANT!If you connected directly to the device using an Ethernet cable,
disconnect the computer and connect the device’s management interface to
the management network. If you need to access the device’s web interface
at any time, direct a browser on a computer on the management network to
the IP address or host name that you configured during setup.
Change Password
You must change the password for the admin account. This account has
Administrator privileges and cannot be deleted.
Chapter 4
Sourcefire recommends that you use a strong password that is at least eight
alphanumeric characters of mixed case and includes at least one numeric
character. Avoid using words that appear in a dictionary.
Version 5.2Sourcefire 3D System Installation Guide95
Setting Up a Sourcefire 3D System Appliance
Initial Setup Page: Devices
Network Settings
A device’s network settings allow it to communicate on your management
network. If you already configured the device’s network settings, this section of
the page may be pre-populated.
Chapter 4
The Sourcefire 3D System provides a dual stack implementation for both IPv4 and
IPv6 management environments. You must specify the management network
protocol (IPv4, IPv6, or Both). Depending on your choice, the setup page displays
various fields where you must set the IPv4 or IPv6 management IP address,
netmask or prefix length, and default gateway:
•For IPv4, you must set the address and netmask in dotted decimal form (for
example: a netmask of 255.255.0.0).
•For IPv6 networks, you can select the Assign the IPv6 address using router
autoconfiguration check box to automatically assign IPv6 network settings.
Otherwise, you must set the address in colon-separated hexadecimal form
and the number of bits in the prefix (for example: a prefix length of 112).
You can also specify up to three DNS servers, as well as the host name and
domain for the device.
Version 5.2Sourcefire 3D System Installation Guide96
Setting Up a Sourcefire 3D System Appliance
Initial Setup Page: Devices
Series 3 Device LCD Panel Configuration
SUPPORTED DEVICES: Series 3
If you are configuring a Series 3 device, select whether you want to allow
changing of the device’s network settings using the LCD panel.
WARNING! Enabling this option can represent a security risk. You need only
physical access, not authentication, to configure network settings using the LCD
panel. For more information, see Using the LCD Panel on a Series 3 Device on
page 111.
Remote Management
Chapter 4
You must manage a Sourcefire device with a Defense Center. For your
convenience, the setup page allows you to preregister the device to the Defense
Center that will manage it.
Leave the Register This Device Now check box enabled, then specify the IP address
or fully qualified domain name of the managing Defense Center as the
Management Host. Also, type the alphanumeric Registration Key you will later use to
register the device to the Defense Center. Note that this is a simple key that you
specify, and is not the same as the license key.
IMPORTANT!If the device and Defense Center are separated by a network
address translation (NAT) device, defer device registration until after you complete
the initial setup. See the Managing Devices chapter in the Sourcefire 3D System User Guide for more information.
Version 5.2Sourcefire 3D System Installation Guide97
Setting Up a Sourcefire 3D System Appliance
Initial Setup Page: Devices
Time Settings
You can set the time for a device either manually or via network time protocol
(NTP) from an NTP server, including the Defense Center. Sourcefire recommends
that you use the Defense Center as the NTP server for its managed devices.
You can also specify the time zone used on the local web interface for the admin
account. Click the current time zone to change it using a pop-up window.
Detection Mode
Chapter 4
The detection mode you choose for a device determines how the system initially
configures the device’s interfaces, and whether those interfaces belong to an
inline set or security zone.
The detection mode is not a setting you can change later; it is simply an option
you choose during setup that helps the system tailor the device’s initial
configurations. In general, you should choose a detection mode based on how
your device is deployed:
Passive
Choose this mode if your device is deployed passively, as an intrusion
detection system (IDS). In a passive deployment, you can perform file and
malware detection, Security Intelligence monitoring, as well as network
discovery.
Inline
Choose this mode if your device is deployed inline, as an intrusion prevention
system (IPS). An IPS usually fails open and allows non-matching traffic.
Version 5.2Sourcefire 3D System Installation Guide98
Setting Up a Sourcefire 3D System Appliance
Initial Setup Page: Devices
In an inline deployment, you can also perform network-based advanced
malware protection (AMP), file control, Security Intelligence filtering, and
network discovery.
Although you can select the inline mode for any device, keep in mind that
inline sets using the following interfaces lack bypass capability:
•non-bypass NetMods on 8000 Series devices
•SFP transceivers on 71xx Family devices
IMPORTANT!Reimaging resets devices in inline deployments to a non-bypass
configuration; this disrupts traffic on your network until you reconfigure bypass
mode. For more information, see Traffic Flow During the Restore Process on
page 199.
Access Control
Choose this mode if your device is deployed inline as part of an access
control deployment, that is, if you want to perform application, user, and URL
control. A device configured to perform access control usually fails closed and
blocks non-matching traffic. Rules explicitly specify the traffic to pass.
You should also choose this mode if you want to take advantage of your
device’s specific hardware-based capabilities, which include (depending on
model): clustering, strict TCP enforcement, fast-path rules, switching,
routing, DHCP, NAT, and VPN.
In an access control deployment, you can also perform malware protection,
file control, Security Intelligence filtering, and network discovery.
Chapter 4
Network Discovery
Choose this mode if your device is deployed passively, to perform host,
application, and user discovery only.
The following table lists the interfaces, inline sets, and zones that the system
creates depending on the detection mode you choose.
Initial Configurations Based on Detection Mode
DETECTION MODESECURITY ZONESINLINE SETSINTERFACES
InlineInternal and
External
PassivePassivenonefirst pair assigned to
Default
Inline Set
first pair added to Default
Inline Set—one to the
Internal and one to the
External zone
Passive zone
Version 5.2Sourcefire 3D System Installation Guide99
Setting Up a Sourcefire 3D System Appliance
Initial Setup Page: Defense Centers
Initial Configurations Based on Detection Mode (Continued)
DETECTION MODESECURITY ZONESINLINE SETSINTERFACES
Access Controlnonenonenone
Chapter 4
Network
Discovery
Note that security zones are a Defense Center-level configuration which the
system does not create until you actually register the device to the Defense
Center. Upon registration, if the appropriate zone (Internal, External, or Passive)
already exists on the Defense Center, the registration process adds the listed
interfaces to the existing zone. If the zone does not exist, the system creates it
and adds the interfaces. For detailed information on interfaces, inline sets, and
security zones, see the Sourcefire 3D System User Guide.
Passivenonefirst pair assigned to
Passive zone
Automatic Backups
The device provides a mechanism for archiving data so that configuration and
event data can be restored in case of failure. As part of the initial setup, you can
Enable Automatic Backups.
Enabling this setting creates a scheduled task that creates a weekly backup of the
configurations on the device.
End User License Agreement
Read the EULA carefully and, if you agree to abide by its provisions, select the
check box. Make sure that all the information you provided is correct, and click
Apply. The device is configured according to your selections and is ready to be
added to its managing Defense Center.
Initial Setup Page: Defense Centers
For all Defense Centers, you must complete the setup process by logging into the
Defense Center’s web interface and specifying initial configuration options on a
setup page. You must change the administrator password, specify network
settings if you haven’t already, and accept the EULA.
Version 5.2Sourcefire 3D System Installation Guide100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.