Summary of Contents for Cisco CS-MARS-20-K9 - Security MARS 20
Page 1
User Guide for Cisco Security MARS Local Controller Release 4.2.x December 2006 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Customer Order Number: Text Part Number: 78-17020-01...
Page 2
You can determine whether your equipment is causing interference by turning it off. If the interference stops, it was probably caused by the Cisco equipment or one of its peripheral devices. If the equipment causes interference to radio or television reception, try to correct the interference by using one or more of the following measures: •...
Page 3
1-20 Reporting and Mitigation Devices Overview C H A P T E R Levels of Operation Selecting the Devices to Monitor Understanding Access IP, Reporting IP, and Interface Settings Access IP User Guide for Cisco Security MARS Local Controller 78-17020-01...
Understanding NetFlow Anomaly Detection 2-30 How MARS Uses NetFlow Data 2-31 Guidelines for Configuring NetFlow on Your Network 2-32 Enable Cisco IOS Routers and Switches to Send NetFlow to MARS 2-32 Configuring Cisco CatIOS Switch 2-34 Enable NetFlow Processing in MARS 2-34...
Page 6
Bootstrap the Cisco Firewall Device Enable Telnet Access on a Cisco Firewall Device Enable SSH Access on a Cisco Firewall Device Send Syslog Files From Cisco Firewall Device to MARS Device-Side Tuning for Cisco Firewall Device Syslogs Logging Message Command...
Page 7
Enable the Correct Signatures and Actions Add and Configure a Cisco IDS or IPS Device in MARS Specify the Monitored Networks for Cisco IPS or IDS Device Imported from a Seed File View Detailed Event Data for Cisco IPS Devices...
Page 8
Configure the DPM or EFP 6-33 Host-side Configuration 6-34 Configure the syslog on the UNIX host 6-34 MARS-side Configuration 6-34 Add Configuration Information for the Enterasys Dragon 6-34 Add a Dragon NIDS Device 6-35 User Guide for Cisco Security MARS Local Controller viii 78-17020-01...
Page 9
Configure ePolicy Orchestrator to Generate Required Data Add and Configure ePolicy Orchestrator Server in MARS 8-12 Cisco Incident Control Server 8-13 Configure Cisco ICS to Send Syslogs to MARS 8-14 Add the Cisco ICS Device to MARS 8-15 Define Rules and Reports for Cisco ICS Events...
Page 10
Configure the MARS to Pull or Receive Windows Host Logs 10-9 Windows Event Log Pulling Time Interval 10-11 Define Vulnerability Assessment Information 10-12 Identify Network Services Running on the Host 10-14 User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 11
14-3 Configure Cisco Secure ACS to Generate Logs 14-3 Define AAA Clients 14-5 Configure TACACS+ Command Authorization for Cisco Routers and Switches 14-7 Install and Configure the PN Log Agent 14-7 Upgrade PN Log Agent to a Newer Version 14-10...
Page 12
Bootstrapping Cisco Security Manager Server to Communicate with MARS 16-12 Add a Cisco Security Manager Server to MARS 16-13 Procedure for Invoking Cisco Security Manager Policy Table Lookup from Cisco Security MARS 16-14 Network Summary 17-1 C H A P T E R...
Page 13
Procedures for Layer 2 Path and Mitigation 19-19 Add the Cisco Catalyst 5000 with SNMP as the Access Type. 19-19 Add the Cisco Catalyst 6500 with SNMP as Access Type (Layer 2 only). 19-20 Add the Cisco 7500 Router with TELNET as the Access Type 19-21...
Page 14
View a Query Result in the Report Tab 20-19 Perform a Batch Query 20-20 Reports 20-23 Report Type Views: Total vs. Peak vs. Recent 20-24 Creating a Report 20-25 Working With Existing Reports 20-25 User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 15
21-27 Add, Modify, and Delete a Report Group 21-30 Display Incidents Related to a Rule Group 21-32 Create Query Criteria with Report Groups 21-33 Using Rule Groups in Query Criteria 21-34 User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 16
User Management 23-8 Add a New User 23-9 Add a Service Provider (Cell phone/Pager) 23-11 Search for a User 23-11 Edit or Remove a User 23-12 Create a User Group 23-12 User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 17
Correlating Hard Drive Slots to RAIDSTATUS Command Physical Port Numbers 24-16 Hotswap Procedure To Remove and Add a Hard Drive 24-18 Hotswap CLI Example 24-19 Procedures for the MARS RAID Utility 24-20 24-25 User Guide for Cisco Security MARS Local Controller xvii 78-17020-01...
Page 18
B-14 Back References B-15 Assertions B-16 Lookahead Assertions B-17 Lookbehind Assertions B-17 Using Multiple Assertions B-18 Conditional Subpatterns B-19 Comments B-20 Recursive Patterns B-20 Subpatterns as Subroutines B-21 Callouts B-22 User Guide for Cisco Security MARS Local Controller xviii 78-17020-01...
Page 19
System Rules and Reports A P P E N D I X List of System Rules List of System Reports D-13 L O S S A R Y N D E X User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 20
Contents User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 21
Preface Introduction Thank you for purchasing the Cisco Security Monitoring, Analysis, and Response System (MARS) Local Controller. appliance. This guide will help you get the most value from your MARS Appliance. The information in this document referring to a “MARS appliance” also applies to MARS use as Local Note Controller in a Global Controller architecture.
Chapter 16, “Policy Table Lookup on Cisco Security Manager” explains how to integrate with • Cisco Security Manager and use the policy lookup features in MARS. Chapter 17, “Network Summary” covers the Summary pages which includes the Dashboard, the •...
Page 23
The Product Documentation DVD is a library of technical product documentation on a portable medium. The DVD enables you to access installation, configuration, and command guides for Cisco hardware and software products. With the DVD, you have access to the HTML documentation and some of the PDF files found on the Cisco website at this URL: http://www.cisco.com/univercd/home/home.htm...
Preface Documentation Feedback Ordering Documentation You must be a registered Cisco.com user to access Cisco Marketplace. Registered users may order Cisco documentation at the Product Documentation Store at this URL: http://www.cisco.com/go/marketplace/docstore If you do not have a user ID or password, you can register at this URL: http://tools.cisco.com/RPF/register/register.do...
Page 25
URL: http://www.cisco.com/en/US/support/index.html Access to all tools on the Cisco Support website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a user ID or password, you can register at this URL: http://tools.cisco.com/RPF/register/register.do...
Page 26
Cisco engineer. The TAC Service Request Tool is located at this URL: http://www.cisco.com/techsupport/servicerequest For S1 or S2 service requests, or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in which your production network is down or severely degraded.) Cisco engineers are assigned immediately to S1 and S2 service requests to help keep your business operations running smoothly.
Page 27
Information about Cisco products, technologies, and network solutions is available from various online and printed sources. The Cisco Online Subscription Center is the website where you can sign up for a variety of Cisco • e-mail newsletters and other communications. Create a profile and then select the subscriptions that you would like to receive.
Page 28
Cisco experts and other networking professionals. Join a discussion at this URL: http://www.cisco.com/discuss/networking “What’s New in Cisco Documentation” is an online publication that provides information about the • latest documentation releases for Cisco products. Updated monthly, this online publication is organized by product category to direct you quickly to the documentation for your products.
Page 29
Identify how you want to block detected attacks: block them temporarily or permanently, block • them using MARS-generated rules, using custom rules defined by security operations team, etc. Your remediation policy should: User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 30
1-1). Figure 1-1 Cisco Security Wheel The spokes of the Cisco Security Wheel represent network security as a continual process consisting of four steps: Secure your system. Monitor the network for violations and attacks against your security policy and respond to them.
Page 31
Selecting the Devices to Monitor, page 2-2 • Levels of Operation, page 2-1 • Deployment Planning Guidelines, page 2-1 in Install and Setup Guide for Cisco Security Monitoring, • Analysis, and Response System Device Inventory Worksheet, page 1-18 • User Guide for Cisco Security MARS Local Controller...
Page 32
2-1, in Install and Setup Guide for Cisco Security Monitoring, • Analysis, and Response System Supporting Devices, page 2-1, in Install and Setup Guide for Cisco Security Monitoring, Analysis, and • Response System Required Traffic Flows, page 2-2, in Install and Setup Guide for Cisco Security Monitoring, Analysis, and •...
Page 33
• Supported Reporting and Mitigation Devices, page 3 • • Bootstrap Summary Table, page 2-12 • The log settings sections of the user guides for your reporting devices and mitigation devices User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 34
For example, if you want to add an IPS module to a Cisco ASA device, you must first define the Cisco ASA device and then define the IPS module as a component of that device.
Page 35
Based on this information, MARS generates the list of top signatures that are firing on the network so that Cisco IOS Routers running the DTM feature set can query MARS for the list of signatures they should be running.
Page 36
Result: MARS understands more about the hosts on your network and the services that they run. For more information, see: Host and Device Identification and Detail Strategies, page 2-36 • Device Inventory Worksheet, page 1-18 • IP Management, page 23-3 • Service Management, page 23-7 • User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 37
Appliance-side Tuning Guidelines, page 1-17 • Configuring Logging Policies on Firewall Devices in User Guide for Cisco Security Manager 3.0 • Checklist for Monitoring Phase After you complete the provisioning phase, you must configure MARS to help you realize your broader security goals and requirements.
Page 38
Strategies for Monitoring, Notification, Mitigation, Remediation, and Audit, page 1-16 • Case Management, page 18-1s • User Management, page 23-8 • , page 23-13 • User Role Worksheet, page 1-20 • User Guide for Cisco Security MARS Local Controller 1-10 78-17020-01...
Page 39
MARS MIB Format, page 2-54 • Inspection Rules, page 21-4 • Working with System and User Inspection Rules, page 21-17 • Setting Alerts, page 21-23 • Sending Alerts and Incident Notifications, page 22-1 • User Guide for Cisco Security MARS Local Controller 1-11 78-17020-01...
Page 40
Adding User Defined Log Parser Templates, page 15-1 • Inspection Rules, page 21-4 • Working with System and User Inspection Rules, page 21-17 • Setting Alerts, page 21-23 • • Sending Alerts and Incident Notifications, page 22-1 User Guide for Cisco Security MARS Local Controller 1-12 78-17020-01...
Page 41
For more information, see: Queries and Reports, page 20-1 • Queries, page 20-1 • Perform a Batch Query, page 20-20 • Reports, page 20-23 • • Creating a Report, page 20-25 User Guide for Cisco Security MARS Local Controller 1-13 78-17020-01...
Page 42
Rule and Report Groups, page 21-24 • Event Groups, page 23-2 • • Case Management, page 18-1 • The False Positive Page, page 19-8 Retrieving Raw Messages, page 24-3 • User Guide for Cisco Security MARS Local Controller 1-14 78-17020-01...
Page 43
A-30 • Setting Runtime Logging Levels, page 24-1 Viewing the MARS Backend Log Files, page 24-2 • Viewing the Audit Trail, page 24-3 • Retrieving Raw Messages, page 24-3 • User Guide for Cisco Security MARS Local Controller 1-15 78-17020-01...
Page 44
• Mitigation involves responding to suspicious activity to prevent the spread of anomalies across your network. • Remediation involves responding to successful exploits to clean infected hosts on your network. User Guide for Cisco Security MARS Local Controller 1-16 78-17020-01...
Page 45
For releases 4.2.3 and earlier of MARS, you cannot define drop rules for a NetFlow-based event. Note For these releases, tuning of NetFlow events must be performed on the reporting device. User Guide for Cisco Security MARS Local Controller 1-17 78-17020-01...
Page 46
Tunable. Identifies whether you can perform device-side tuning of the log generation. • Notify. Identifies whether this device can receive notifications from MARS. • Notification format. Identifies the format for any notifications that are sent to this device. • User Guide for Cisco Security MARS Local Controller 1-18 78-17020-01...
Page 47
Table 1-1 Device Inventory Worksheet Management Role in Reporting IP IP Address/ Username/ System/ Required Log Settings/ Tunable Notify Notification Device Name Address Account Password Segment Protocols SNMP RO Community (y/n) (y/n) Format...
Page 48
Reports/Queries. Identifies any reports and queries required to meet the needs of this user role. You must ensure that the user can access these reports and queries. Optionally, you may want to notify the user when scheduled reports are generated. User Guide for Cisco Security MARS Local Controller 1-20 78-17020-01...
Page 49
Chapter 1 STM Task Flow Overview User Role Worksheet Table 1-2 User Role Worksheet MARS Notification Device User Name User Role Account/Role Settings Ownership Inspection Rules Reports/Queries User Guide for Cisco Security MARS Local Controller 1-21 78-17020-01...
Page 50
Chapter 1 STM Task Flow Overview User Role Worksheet User Guide for Cisco Security MARS Local Controller 1-22 78-17020-01...
Page 51
After you complete the initial configuration of Local Controller as described in Install and Setup Guide for Cisco Security Monitoring, Analysis, and Response System, you must determine a monitoring strategy to use for your network. You must also determine a mitigation strategy, if you chose to take advantage of the MARS mitigation features.
Page 52
To enable basic operation, you must complete the initial configuration of the MARS Appliance as described in Install and Setup Guide for Cisco Security Monitoring, Analysis, and Response System. In addition, you must specify the device name and...
Page 53
Table 2-2 identifies the device types, describes what information they can provide, and recommends how to configure these devices within your network. User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 54
Forwarding tables, used to map IP address to MAC address. Administrative access for mitigation push • Device status and resource utilization, such as memory, CPU, and interface/port statistics. NetFlow data 802.1x logs generated during NAC sessions User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 55
Device status information. Identifies whether the device is operational, which allows prediction of possible spread of potential attacks and worms. • SNMP RO Community strings User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 56
IDS and it is reported to MARS, MARS can supported by MARS. either launch a targeted scan using Nessus, or query a vulnerability assessment system that helps determine whether the target was vulnerable. User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 57
URLs and also filtering...regulatory compliance. Database Login/logout to determine the actual user (query report tab on the data). Privilege escalation, brute force crack type stuff, or maybe we want to do regulatory compliance. User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 58
(e.g., NetCache appliances). In addition, not all devices require the definition of interfaces. This section discusses the following three addresses and their relationship to other settings: Access IP, page 2-9 • Reporting IP, page 2-9 • Interface Settings, page 2-10 • User Guide for Cisco Security MARS Local Controller 78-17020-01...
NetFlow and syslog, you must ensure that both message formats are bound to the same source IP address (the reporting IP). In Cisco IOS devices, this common association is not the default so you must change either the syslog or the NetFlow reporting IP address to match the other. If the message types do not originate from a common IP address, one of them is seen as originating from an unreported device and MARS does not parse those events correctly.
NAT and ARP tables. In addition, if you select the FTP access type for device types, such as Cisco ASA and FWSM, you can only discover settings for the admin context. This access method is the least preferred and most limited access method. To enable configuration discovery using FTP access, you must place a copy the device’s configuration file on an FTP server...
In the Password field, enter the password associated with the username specified in the Login field. Step 2 Step 3 If this device supports an enable mode, enter that password in the Enable Password field. User Guide for Cisco Security MARS Local Controller 2-11 78-17020-01...
Bootstrap Summary Table Table 2-3 summaries the settings that you must configure for reporting devices and mitigation devices. It also provides links to any required agent downloads and to detailed configuration information. User Guide for Cisco Security MARS Local Controller 2-12 78-17020-01...
Page 63
Define the log settings to push the correct events to the defined host. Install the policies. VPN Devices Cisco VPN Cisco VPN 3000 Concentrator, page 5-1 Concentrator User Guide for Cisco Security MARS Local Controller 2-13 78-17020-01...
Page 64
Cisco Network IDS Enable RDEP for IDS modules. Cisco IDS 3.1 Sensors, page 6-1 Cisco IDSM Configure the following signature actions: Cisco IDS 4.0 and IPS 5.x Sensors, page 6-5 Alert • (Optional) To view trigger packets, enable the •...
Page 65
Information Server Install and Configure the Snare Agent for IIS, page 12-1 Sun iPlanet — HTTP (from MARS Agent) Install and Configure the Web Agent on UNIX or Linux, page 12-7 User Guide for Cisco Security MARS Local Controller 2-15 78-17020-01...
Generic SNMP Server Enable SNMP access by MARS Appliance. Adding Generic Devices, page 10-1 Other Cisco Security Manager Enable HTTPS access by MARS Appliance Checklist for Security Manager-to-MARS Integration, page 16-6 Bootstrapping Cisco Security Manager Server to Communicate with MARS, page...
Cisco Security MARS Local Controller 4.2.x and 5.2.x document. Devices are added to this list on an ongoing basis via software upgrade packages. See Install and Setup Guide for Cisco Security Monitoring, Analysis, and Response System for details on how to upgrade your MARS Appliance.
NetScreen ScreenOS • For example, you could change the settings for the device type Cisco PIX 6.1 to Cisco PIX 7.0 without having to delete the device and add it again. The benefit of matching the version setting to the deployed device is that it allows MARS to correlate any event types introduced in the more recent version.
Select one of the following pages: Step 1 Admin > Security and Monitoring Devices • Management > IP Management • Check the box next to each device you want to delete. Step 2 User Guide for Cisco Security MARS Local Controller 2-19 78-17020-01...
Admin > System Setup > Security and Monitoring Devices page to fine-tune the device manually. In addition, you must Activate the devices that you add using a seed file (see Activate the Reporting and Mitigation Devices, page 2-27). User Guide for Cisco Security MARS Local Controller 2-20 78-17020-01...
IntruShield Manager, page 6-22. • Cisco Security Agent. While MARS can learn of the CSA agents dynamically, you can also import the initial list of agents using a custom seed file. For more information, see Export CSA Agent Information to File, page 7-6.
Page 72
MARS does not support the following characters in the SNMP RO community string: ' (single quote), " (double quote), < (less than symbol), and > (greater than symbol). Column C EMPTY Empty placeholder column. Column D EMPTY Empty placeholder column. User Guide for Cisco Security MARS Local Controller 2-22 78-17020-01...
Page 73
: for Cisco FWSM 2.3 • FWSM 3: for Cisco FWSM 3.1 • FWSM : for Cisco PIX 6.0, 6.1, 6.2, and 6.3 devices • • : for Cisco PIX 7.0 devices PIX7X • : for Cisco IOS 12.2 (default) •...
Once add a device, you must click Activate for MARS to correctly process events received from that Step 4 device. For more information, see Activate the Reporting and Mitigation Devices, page 2-27. User Guide for Cisco Security MARS Local Controller 2-24 78-17020-01...
Once a device is listed under Monitoring and Reporting Devices, it may be rediscovered, but it will not be added again unless it has been properly deleted (see Delete a Device, page 2-19). User Guide for Cisco Security MARS Local Controller 2-25 78-17020-01...
The Submit action stores the device details in the database. Once you click Submit, your work is saved, even if you drop the administrative connection before clicking Activate. Once you have all of the devices desired for this administrative session, click Activate. Step 2 User Guide for Cisco Security MARS Local Controller 2-27 78-17020-01...
MARS can collect additional data from a select set of reporting devices, which is used to provide reports about CPU utilization, memory utilization, and device saturation. This data can be helpful in detecting anomalies as well in network capacity planning. User Guide for Cisco Security MARS Local Controller 2-28 78-17020-01...
With dynamic vulnerability scanning, the MARS probes the networks that you have specified for weaknesses. These automatic scans commence after a rule has fired that indicates an attack is in progress. Once an attack is underway, these scans accomplish the following: User Guide for Cisco Security MARS Local Controller 2-29 78-17020-01...
Step 3 Understanding NetFlow Anomaly Detection NetFlow is a Cisco technology that supports monitoring network traffic and is supported on all basic IOS images. NetFlow uses an UDP-based protocol to periodically report on flows seen by the Cisco IOS device. A flow is a Layer 7 concept that consists of a session set up, data transfer, and session teardown.
The data provided by NetFlow packets is similar to that provided by SYSLOG, SNMP, or Checkpoint LEA as reported by enterprise-level firewalls, such as Cisco PIX, NetScreen ScreenOS, and Checkpoint Firewall-1. The difference being that NetFlow much more efficient. To receive comparable syslog data from a firewall device, the syslog logging level on the firewall must be set to DEBUG, which degrades firewall throughput at moderate to high traffic loads.
88ed.html Before you configure NetFlow from MARS, you must first configure it on the router or switch. To enable NetFlow on a Cisco IOS router or switch and to push those events to the MARS Appliance, follow these steps: User Guide for Cisco Security MARS Local Controller...
Page 83
Chapter 2 Reporting and Mitigation Devices Overview Data Enabling Features Log in to the Cisco IOS router or switch with administrator’s privileges. Step 1 Enter the following commands: Step 2 Command Purpose Turn on enable mode. enable Enter global configuration mode.
Configuring Cisco CatIOS Switch Some Cisco Catalyst switches support a different implementation of NetFlow that is performed on the supervisor. With the cache-based forwarding model, which is implemented in the Catalyst 55xx running the Route Switch Module (RSM) and NetFlow Feature Card (NFFC), the RSM processes the first flow and the remaining packets in the flow are forwarded by the Supervisor.
Page 85
(see Enable Cisco IOS Routers and Switches to Send NetFlow to MARS, page 2-32. Also, verify you have enabled this traffic to flow between the router or switch and the MARS Appliance on any intermediate gateways, such as routers and firewalls.
MARS. This open allows you to provide vulnerability assessment information to assist in the reduction of false positives. For more information on adding hosts manually, see Add a Host, page 23-5. User Guide for Cisco Security MARS Local Controller 2-36 78-17020-01...
To add a community string for an IP range, follow these steps: To open the Community Strings and Networks page, click Admin > Community Strings and Step 1 Networks. Click the IP Range radio button. Step 2 User Guide for Cisco Security MARS Local Controller 2-37 78-17020-01...
2-39. However, you can also initiate an on-demand discovery. To perform an on-demand discovery, follow these steps: Click Admin > Valid Networks to open the Valid Networks page. Step 1 User Guide for Cisco Security MARS Local Controller 2-38 78-17020-01...
This feature also allows you to pull data from those devices that require interval-based polling. The list to devices that require such polling are: Qualys QualysGuard • eEye REM • FoundStone FoundScan • Check Point log servers • Figure 2-1 Example Scheduled Update for eEye REM User Guide for Cisco Security MARS Local Controller 2-39 78-17020-01...
Daily and the Time of Day • Weekly, the Time of Day, and the Days • Monthly, the Time of the Day, and the Dates • Click Submit. Step 5 User Guide for Cisco Security MARS Local Controller 2-40 78-17020-01...
In addition, you must select Yes in the Monitor Resource Usage box of the General tab for each supported reporting device. Once configured, MARS uses SNMP to poll the device every 5 minutes for the following SNMP OIDs: Bytes in/out of every interface on the device (Cisco IOS, Cisco PIX) • •...
System Rule: Resource Issue: Network Device • Enabling the Required SNMP OIDs for Resource Monitoring Table 2-5 lists the OIDs to enable, on a per device basis, for the supported model and versions. User Guide for Cisco Security MARS Local Controller 2-42 78-17020-01...
MARS supports the NAC initiative by storing and reporting about the NAC-based events generated by the various reporting devices on your network. The devices include:. Cisco Trust Agent. While CTA does not report to MARS, it does report discovered settings to the •...
Page 103
System Rule: Security Posture: Infected - Network Wide • System Rule: Security Posture: Infected - Single Host System Rule: Security Posture: Quarantine - Network Wide • System Rule: Security Posture: Quarantine - Single Host • User Guide for Cisco Security MARS Local Controller 2-53 78-17020-01...
(System Rule: Sudden Traffic Increase To Port) fired and caused red Incident 204368256, starting from Wed Mar 14 12:28:14 2007 to Wed Mar 14 12:28:14 2007" SNMPv2-SMI::enterprises.16686.3.0 "sudden traffic increase to ports: 445 " User Guide for Cisco Security MARS Local Controller 2-54 78-17020-01...
Page 105
Chapter 2 Reporting and Mitigation Devices Overview Integrating MARS with 3 -Party Applications Notifications are sent only from the Local Controller. Note User Guide for Cisco Security MARS Local Controller 2-55 78-17020-01...
MARS. Currently, MARS parses the syslog messages generated by the following devices: Cisco PIX, Cisco IOS, Cisco CatOS, Cisco ICS, Cisco ASA, Cisco FWSM, Cisco VPN 3000, Cisco Secure ACS, Snort IDS, Juniper/Netscreen firewalls, Solaris, Linux, and Microsoft Internet Information Server (ISS), Microsoft Windows running the SNARE agent.
Select Admin > System Setup > Security and Monitor Devices > Add. Do one of the following: Step 2 Select Add SW Security apps on a new host from the Device Type list, and continue with Step 3 • User Guide for Cisco Security MARS Local Controller 2-57 78-17020-01...
MARS Appliance. In the MARS web interface, you should still configure the reporting devices so that MARS can discover their settings and to perform any mitigation operations. User Guide for Cisco Security MARS Local Controller 2-58 78-17020-01...
Cisco IOS Software release 12.2 or later. The type of access that you must enable depends on whether modules are installed in your Cisco router or switch and the role of the device in your network. MARS uses this administrative access to discover the device’s configuration and, at times, to make changes to the device’s running configuration.
Configuring Router and Switch Devices Cisco Router Devices Before you add a Cisco router to MARS, make sure that you have enabled SNMP, Telnet, SSH, or FTP access to the router. The following sections provide guidance on configuring each supported access...
Router(config)#logging <IP address of MARS Appliance> Enable SNMP RO Strings To enable SNMP RO strings for topology discovery on the Cisco IOS device, you must enable the SNMP server and define the RO community. To configure the SNMP RO string settings, follow these steps:...
RADIUS requests to the ACS. To configure the NAC Phase I data on a Cisco router to work with MARS, you must allow EAP over UDP and allow an IP address in the AAA station-id field of the packets. (Cisco Secure ACS includes this detail in its logs.
Page 113
Cisco Switches NAC Phase II enables Cisco switches to act as network access devices. To support this new feature, you must configure the Cisco switch to initiate 802.1x authentication when the link state changes from down to up and periodically if the port remains up but unauthenticated. NAC requires that hosts use 802.1x supplicants, or clients, to authenticate to the Cisco Secure ACS server before gaining access to network services.
Configuring Router and Switch Devices Cisco Router Devices After you configure the switch to act as proxy and it is defined as a AAA client in Cisco Secure ACS, you must ensure that the authentication messages are sent to the MARS Appliance. For 802.1x accounting records, you must ensure that the audit records are written to the RADIUS log on the Cisco Secure ACS server.
Page 115
Selecting the Access Type, page 2-10. (Optional) To enable MARS to retrieve MIB objects for this reporting device, enter the device’s Step 7 read-only community string in the SNMP RO Community field. User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 116
IOS IPS does not refer to an IPS module. It refers to a software feature in the IOS software. The IOS IPS feature is required to enable the DTM functionality in MARS. See Technology Preview: Configuring Distributed Threat Mitigation with Intrusion Prevention System in Cisco Security MARS, page 1 more information. Result: The IOS IPS Information page appears.
Configure the Device Running CatOS to Generate Required Data, page 3-11 • Adding a Cisco switch running to MARS has two distinct steps. First, you add the base module of the switch, providing administrative access to that device. Second, you add any modules that are running in the switch.
URL: IP Access http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/sw_8_4/confg_gd/ip_perm.htm#wp 1019819 Enable SSH Administrative Access To enable configuration discovery using SSH access to the Cisco router or switch, refer to your device documentation or the following URL: IP Access http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/sw_8_4/confg_gd/ip_perm.htm#wp 1019819 Enable FTP-based Administrative Access To enable configuration discovery using FTP access, you must place a copy the Cisco router’s or...
Step 5 switch> (enable) exit Enable Syslog Messages on CatOS To configure a Cisco switch running CatOS to send syslog information to MARS, follow these steps: To enable the syslog server on the switch, enter: Step 1 set logging server enable...
Enable L2 Discovery Messages To enable L2 discovery on your Cisco switches, you must enable the spanning tree protocol (STP) and provide the SNMP RO community string. All L 2 devices must support SNMP STP MIB (IETF RFC 1493).
If the switch is running any version of CatOS, select Cisco Switch-CatOS ANY from the Device • Type list. If the switch is running Cisco IOS 12.2 or later, select Cisco Switch-IOS 12.2 from the Device Type • list. Step 3 Enter the name of the device in the Device Name field.
Cisco IOS 12.2 To add a module, you must first add the base module, which is the Cisco switch. After the base module is defined in the web interface, you can discover the modules that are installed in the switch (click Add Available Module) or add them manually (click Add Module).
Basic guidance for editing these settings can be found in the topics that discuss manually adding these modules. See the following topics for more information: Add Cisco IOS 12.2 Modules Manually, page 3-15 • Cisco Firewall Devices (PIX, ASA, and FWSM), page 4-1 • Cisco IPS Modules, page 6-10.
Page 124
. Step 8 (Optional) To enable MARS to monitor this device for anomalous resource usage, select Yes from the Monitor Resource Usage list. User Guide for Cisco Security MARS Local Controller 3-16 78-17020-01...
<encrypted community string> configure snmp add community readwrite encrypted <encrypted community string> User Guide for Cisco Security MARS Local Controller 3-17 78-17020-01...
You can add any L2 or L3 device to the MARS as long as SNMP is enabled on the device. A generic router refers to any L2 or L3 device that is not listed in the Supported Devices and Software Versions for CS-MARS Local Controller 4.1. User Guide for Cisco Security MARS Local Controller 3-18 78-17020-01...
Any events published by the device to MARS before activation can be queried using the reporting IP address of the device as a match criterion. User Guide for Cisco Security MARS Local Controller 3-19 78-17020-01...
Page 128
Chapter 3 Configuring Router and Switch Devices Generic Router Device User Guide for Cisco Security MARS Local Controller 3-20 78-17020-01...
Configure the Cisco firewall device to accept administrative sessions from MARS (to discover settings). For Cisco ASA, PIX 7.0, and FWSM device types, you configure the admin context to accept these sessions. User Guide for Cisco Security MARS Local Controller...
Configuring Firewall Devices Cisco Firewall Devices (PIX, ASA, and FWSM) To be monitored by MARS, the Cisco ASA, PIX 7.0, and FWSM device types have the following Note two requirements: each context requires a unique routable IP address for sending syslog messages to MARS, and each context must have a unique name (hostname+ domain name).
Page 131
In addition to configuring specific event types and administrative access, syslog messages should be sent to the MARS Appliance. To prepare the Cisco firewall device to send these messages to the MARS Appliance, you must configure the logging settings associated with each firewall device on your network.
Configuring Firewall Devices Cisco Firewall Devices (PIX, ASA, and FWSM) When monitoring a failover pair of Cisco firewall devices, you should designate the primary Cisco firewall device as the device to be monitored. If failover occurs, the secondary device assumes the IP address of the primary, which ensures that session correlation is maintained after the failover.
Page 133
Refer to PIX debug messages for interesting keywords. Cisco recommends enabling debug for optimal use of your STM solution. If a Cisco firewall device is unable to sustain debug-level messages due to performance reasons, the informational level should be used.
Cisco Security Appliance System Log Messages, Version 7.2 http://www.cisco.com/en/US/products/ps6120/products_system_message_guide_book09186a0080 610b8b.html Cisco FWSM “Changing the Severity Level of a System Log Message” in Catalyst 6500 Series Switch and Cisco • 7600 Series Router Firewall Services Module Configuration Guide, 3.1 http://www.cisco.com/en/US/products/hw/switches/ps708/products_module_configuration_guide_ chapter09186a0080577c3e.html#wp1099894 “Disabling a System Log Message”...
09186a00804d7356.html List of Cisco Firewall Message Events Processed by MARS The following list of events are processed by MARS. By changing the severity level for these events to ensure they are within the logging level you have selected, you can typically reduce the load on your firewall logging by 5-15%.
To add and configure a Cisco firewall device, follow these steps: Do one of the following: Step 1 If you are adding an FWSM, you must be on the main page of the Cisco switch to which you are • adding it. On that page, click Add Module.
Page 137
Chapter 4 Configuring Firewall Devices Cisco Firewall Devices (PIX, ASA, and FWSM) If you are adding a PIX security appliance or a Cisco ASA, an Select Admin > System Setup > • Security and Monitor Devices > Add. Select one of the following options from the Device Type list.
Page 138
Configure FTP Access for Devices in MARS, page 2-12 • If you select the FTP access type and you are defining a Cisco ASA, PIX 7.0, or FWSM, you cannot Note discover the non-admin context settings. Therefore, this access type is not recommended.
Activate the Reporting and Mitigation Devices, page 2-27. Add Security Contexts Manually You can manually define security contexts in PIX 7.0, Cisco ASA, or FWSM. Do one of the following: Step 1 (PIX 7.0 and FWSM) Click Add Context.
Step 8 Add Discovered Contexts When you select Discover on a Cisco ASA, PIX 7.0 or FWSM, MARS discovers the contexts that are defined for that firewall device. However, you must still manually add discovered contents. User Guide for Cisco Security MARS Local Controller...
Configuring Firewall Devices Cisco Firewall Devices (PIX, ASA, and FWSM) You cannot discover a module install in a Cisco ASA; you must manually define IPS modules. However, Note the discovered contexts do appear under the Module area on the main page.
Add the Netscreen Device to the MARS web interface. To accomplish these requirements, you must perform two procedures: Bootstrap the NetScreen Device, page 4-15 • Add the NetScreen Device to MARS, page 4-20 • User Guide for Cisco Security MARS Local Controller 4-14 78-17020-01...
In the main screen, on the left hand column click Network > Interfaces. Click Edit next to the appropriate interface to configure for MARS to have access to SNMP and Step 3 Telnet/SSH. User Guide for Cisco Security MARS Local Controller 4-15 78-17020-01...
Page 144
Access Type value of Add the NetScreen Device to MARS, page 4-20. Click Apply then click OK. Step 5 Step 6 Configure the SNMP information by selecting Configure > Report Settings > SNMP. User Guide for Cisco Security MARS Local Controller 4-16 78-17020-01...
Page 145
MARS web interface when adding this device. (Optional) If the community string does not match, click New Community to define one that matches Step 9 the on defined in MARS. User Guide for Cisco Security MARS Local Controller 4-17 78-17020-01...
Page 146
Select the AUTH/SEC for Security Facility and LOCAL0 for Facility. Step 14 For NetScreen 5.0, select the Event Log in addition to Traffic Log. Step 15 Step 16 Click Apply. User Guide for Cisco Security MARS Local Controller 4-18 78-17020-01...
Page 147
Policies on the left hand area. Click Edit then Advance and verify that Logging box is checked. Repeat for all policies which events Step 18 need to be sent to MARS. User Guide for Cisco Security MARS Local Controller 4-19 78-17020-01...
(Optional) To enable MARS to discover settings from this device, enter the administrative IP address in Step 4 the Access IP field. To learn more about the access IP address, its role, and dependencies, see Understanding Access IP, Reporting IP, and Interface Settings, page 2-8. User Guide for Cisco Security MARS Local Controller 4-20 78-17020-01...
Page 149
IP address of the device as a match criterion. For more information on the activate action, see Activate the Reporting and Mitigation Devices, page 2-27. User Guide for Cisco Security MARS Local Controller 4-21 78-17020-01...
NGX is also NG AI R60 OPSEC Open Platform for Security An alliance, certification and integration methodology for products and solutions that integrate into a Check Point infrastructure. Check Point Provider-1 — User Guide for Cisco Security MARS Local Controller 4-22 78-17020-01...
Page 151
MDS communicates securely with the CMAs that it houses. The SiteManager-1 system operates much the same as Provider-1; however, it is targeted toward large enterprise customers. The Check Point components are the same as those found in Provider-1. User Guide for Cisco Security MARS Local Controller 4-23 78-17020-01...
MARS web interface. The Check Point product line and release, as well as the number of devices managed, determines which tasks you must perform to configure MARS to monitor your Check Point devices. User Guide for Cisco Security MARS Local Controller 4-24 78-17020-01...
SIC DN. This SIC DN is the one used by OPSEC applications, including the management server, to validate the MARS Appliance. You specify this client SIC DN in the MARS User Guide for Cisco Security MARS Local Controller 4-25...
Representing the MARS Appliance in Check Point enables the following supporting tasks: Generate a client SIC DN for the MARS Appliance. • Define policies to allow SIC and syslog traffic between the Check Point components and the MARS • Appliance. User Guide for Cisco Security MARS Local Controller 4-26 78-17020-01...
Page 155
Step 4 Any Check Point policies defined to enable access or send logs to this appliance will reference the appliance by this name. Cisco best practice recommends using the actual hostname of the MARS Appliance. Enter the IP address of the monitoring interface in the MARS Appliance in the IP Address field Step 5 Typically, the monitoring interface is eth0.
Page 156
Add the MARS Appliance as a Host in Step 5 Check Point, page 4-26. Result: This OPSEC application definition is associated with the host that represents the MARS Step 6 Appliance. User Guide for Cisco Security MARS Local Controller 4-28 78-17020-01...
Page 157
Record the contents of the DN field that appears under Secure Internal Communication. Step 13 This value is used to populate the Client Entity SIC Name field of MARS in Add a Check Point Primary Management Station to MARS, page 4-40. User Guide for Cisco Security MARS Local Controller 4-29 78-17020-01...
Page 158
Each management server to which logs are forwarded by remote components. • Each remote log server that does not forward logs to a central management server, either the MDS • or a SmartCenter. Management servers are the following devices: User Guide for Cisco Security MARS Local Controller 4-30 78-17020-01...
Page 159
• The MLM of a Provider-1 or SiteManager-1 NGX (R60) installation. Click Edit. Step 5 The Check Point Host - Management dialog box appears, with the General Properties page selected. User Guide for Cisco Security MARS Local Controller 4-31 78-17020-01...
Page 160
MARS supports only three of the available Check Point authentication mode: CLEAR. Indicates that the traffic is neither authenticated nor encrypted. • • SSLCA. Indicates that the communications need to be authenticated and encrypted using an symmetric key cipher User Guide for Cisco Security MARS Local Controller 4-32 78-17020-01...
Page 161
Such requests will be serviced and the sessions will be neither authenticated nor encrypted. LEA_SERVER port 18187 Check Point uses the following default settings: • For LEA, SSLCA is the authentication method and communications occur over TCP 18184. User Guide for Cisco Security MARS Local Controller 4-33 78-17020-01...
If Check Point firewall components reside between the Check Point components (central management Step 2 and log server) and the MARS Appliance monitoring those components, define the security policies that allow management and log traffic between those devices. User Guide for Cisco Security MARS Local Controller 4-34 78-17020-01...
Page 163
Result: The security policies on the target firewall devices are updated, enabling CPMI and LEA traffic flows between the Check Point components and the MARS Appliance. Using the Check Point log viewer, you can verify that the policies were installed successfully. User Guide for Cisco Security MARS Local Controller 4-35 78-17020-01...
A-56 in the Install and Setup Guide for Cisco Security Monitoring, Analysis, and Response System. Reset the OPSEC Application Certificate of the MARS Appliance If you encounter an error when pulling the certificate as part of defining the Check Point devices in the MARS web interface, you must reset the certificate before you can attempt to pull it again.
Page 165
Click the Communication button under Secure Internal Communication. Result: The Communication dialog box appears. Step 6 Click Reset to reset the certificate. Click Close to close the Communication dialog box. Step 7 User Guide for Cisco Security MARS Local Controller 4-37 78-17020-01...
Page 166
Result: The OPSEC Application that represents MARS is defined and associated to the correct host. You also have obtained the activation key and client SIC DN for later use in Add a Check Point Primary Management Station to MARS, page 4-40. User Guide for Cisco Security MARS Local Controller 4-38 78-17020-01...
Click Activate in MARS. To add a Check Point device in MARS, you must perform the following procedures: • Add a Check Point Primary Management Station to MARS, page 4-40 User Guide for Cisco Security MARS Local Controller 4-39 78-17020-01...
Select Add SW security apps on existing host from the Device Type list. Select the device to which • you want to add the software application and click Add. Continue with Step Specify values for the following fields: Step 3 User Guide for Cisco Security MARS Local Controller 4-40 78-17020-01...
Page 169
CheckPoint Opsec NG FP3. Select this option for Check Point NG FP3 devices. • • CheckPoint Opsec NG AI. Select this option for Check Point NG AI (R55) and Check Point NGX (R60) devices. User Guide for Cisco Security MARS Local Controller 4-41 78-17020-01...
Page 170
SSLCA and data is passed on port 18190. For more information on this setting, see Select the Access Type for LEA and CPMI Traffic, page 4-32. User Guide for Cisco Security MARS Local Controller 4-42 78-17020-01...
Page 171
Otherwise, an error message appears. After the initial pull, the MARS Appliance pulls based on the schedule that you define. For more information, see Scheduling Topology Updates, page 2-39. User Guide for Cisco Security MARS Local Controller 4-43 78-17020-01...
To manually define a child enforcement module that is managed by the primary management station or a log server to which either the primary management station or a child enforcement module publishes its audit and security logs, follow these steps: User Guide for Cisco Security MARS Local Controller 4-44 78-17020-01...
Page 173
Step 4 The Access Information page appears. Click Add under Firewall & Log Server Settings. Step 5 Result: The list of available hosts appears. Do one of the following: Step 6 User Guide for Cisco Security MARS Local Controller 4-45 78-17020-01...
Page 174
Monitoring Device list. (Optional) To enable MARS to retrieve MIB objects for this reporting device, enter the child Step 8 enforcement module’s read-only community string in the SNMP RO Community field. User Guide for Cisco Security MARS Local Controller 4-46 78-17020-01...
This procedure assumes you have been refer to it, and that you are in the middle of defining a primary Note management station or child enforcement module. To define a certificate server, follow these steps: User Guide for Cisco Security MARS Local Controller 4-47 78-17020-01...
SIC communication settings. To edit a discovered log server, follow these steps: User Guide for Cisco Security MARS Local Controller 4-48 78-17020-01...
Page 177
SIC DN of the MDS that manages the CMA. Click Submit to save your changes to this log server. Step 5 Repeat Step 1 through Step 5 for each discovered log server. Step 6 User Guide for Cisco Security MARS Local Controller 4-49 78-17020-01...
To provide this information, you must define the routes manually in the MARS web interface. You will need a list of the routes for all interfaces in the firewall before you attempt to enter this information. User Guide for Cisco Security MARS Local Controller 4-50 78-17020-01...
Page 179
Click Submit to add the route to the list of routes Step 3 Repeat • through Step 3 for each route defined on the firewall. Step 4 Click Close to return to the Access Information page. Step 5 User Guide for Cisco Security MARS Local Controller 4-51 78-17020-01...
To specify that the child enforcement module is acting as its own log server, select Self and continue • with Step 3, omitting the Device Name field. User Guide for Cisco Security MARS Local Controller 4-52 78-17020-01...
Page 181
This name is used in topology maps, queries, and as the primary management station in the Security and Monitoring Device list. For devices that support the discovery operation, such as routers and User Guide for Cisco Security MARS Local Controller 4-53...
Page 182
MARS before activation can be queried using the reporting IP address of the device as a match criterion. For more information on the activate action, see Activate the Reporting and Mitigation Devices, page 2-27. User Guide for Cisco Security MARS Local Controller 4-54 78-17020-01...
Under Firewall & Log Server Settings, check the box next to the child enforcement module that you want Step 5 to remove. Step 6 Click Remove. Result: The Confirmation screen appears. User Guide for Cisco Security MARS Local Controller 4-55 78-17020-01...
You can view the debug messages using the pnlog showlog cpdebug command at the CLI. For more information on pnlog, see pnlog, page A-30 in the Install and Setup Guide for Cisco Security Monitoring, Analysis, and Response System. User Guide for Cisco Security MARS Local Controller 4-56 78-17020-01...
Page 185
Chapter 4 Configuring Firewall Devices Check Point Devices User Guide for Cisco Security MARS Local Controller 4-57 78-17020-01...
Page 186
Chapter 4 Configuring Firewall Devices Check Point Devices User Guide for Cisco Security MARS Local Controller 4-58 78-17020-01...
To configure a Cisco VPN 3000 Concentrator to generate and publish events to the MARS Appliance, you must verify that the correct events are generated in the correct format, and you must direct the Cisco VPN 3000 Concentrator to publish syslog events to the MARS Appliance.
To add the VPN 3000 Concentrator to MARS, follow these steps: Select Admin > Security and Monitor Devices > Add. Step 1 Select either Cisco VPN Concentrator 4.0.1 or Cisco VPN Concentrator 4.7 from the Device Type Step 2 list.
Page 189
SNMP RO Community field. MARS uses the SNMP RO string to read MIBs related to the reporting device’s CPU usage and other device anomaly data. Click Discover. Step 8 Click Submit. Step 9 User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 190
Chapter 5 Configuring VPN Devices Cisco VPN 3000 Concentrator User Guide for Cisco Security MARS Local Controller 78-17020-01...
• Cisco IDS 3.1 Sensors Before you add the Cisco IDS 3.1 device, make sure that you have configured the Cisco IDS device for the MARS to retrieve the device configuration. The device configuration would be used for mapping of the logs received by MARS.
(has to be unique). Figure 6-1 Add MARS Information to Cisco IDS 3.1 Organizations File In the hosts file add a line indicating your MARS appliances’ name associated to the organization that was previously added in the organizations file;...
Page 193
(these numbers are not used by MARS). Figure 6-3 Add MARS Information to Cisco IDS 3.1 Routes File In the destinations file add a line indicating your MARS appliances’ name (as defined in the routes file)
Enter “netrangr” as the Login and its Password. When adding a Cisco IDS 3.1 device, use the netrangr username or some other username that is not the root login for the sensor. Using the root login causes MARS to fail to parse the login prompt correctly, which in turn, cause the Test Connectivity to fail.
Click Submit. Cisco IDS 4.0 and IPS 5.x Sensors Adding a Cisco IDS or IPS network sensor to MARS involves two parts: Bootstrap the Sensor, page 6-5 Add and Configure a Cisco IDS or IPS Device in MARS, page 6-6...
If the signature actions are correctly configured, MARS can display the trigger packet information for the first event that fires a signature on a Cisco IDS or IPS device. MARS is also able to pull the IP log data from Cisco IDS and IPS devices, however, this operation is system intensive. Therefore, you should select the set of signatures that generate IP log data carefully.
Page 197
Chapter 6 Configuring Network-based IDS and IPS Devices Cisco IDS 4.0 and IPS 5.x Sensors Select Cisco IDS 4.0 from the Device Type list. • Figure 6-6 Configure Cisco IDS 4.0 Select Cisco IPS 5.x from the Device Type list.
To define the networks monitored by a sensor, follow these steps: Click Admin > System Setup > Security and Monitor Devices. Step 1 Select the check box next to the Cisco IPS or IDS device that was imported using a seed file. and click Step 2 Edit.
IP log varies based on sensor configuration, by default an IP log contains 30 seconds of packet data. To view this data, you must enable the Pull IP Logs option on the Cisco IPS device under Admin > System Setup > Security and Monitor Devices.
On the Cisco IPS device, enable and alert on the signatures 2000 and 2004. The signatures monitor ICMP messages (pings). Ping a device on the subnet on which the Cisco IPS device is listening. The events are generated and pulled by MARS.
To add an IPS module to a Cisco Switch of Cisco ASA, follow these steps: Click Admin > System Setup > Security and Monitor Devices. Step 1 From the list of devices, select the Cisco switch or Cisco ASA to which you want to add the IPS module Step 2 and click Edit.
Page 202
Configuring Network-based IDS and IPS Devices Cisco IPS Modules For Cisco switches, you can also add a Cisco IPS 4.0 module or an IDS 3.1 module. You configure these modules just as you would a standalone sensor. For instructions on configuring these modules, refer to Cisco IDS 3.1 Sensors, page 6-1...
To perform the major configuration steps required to use Site Protector to forward the SNMP alerts generated by sensors to MARS Appliance, follow these steps: Using the Add Sensor Wizard, register the sensor to Site Protector Console. Step 1 User Guide for Cisco Security MARS Local Controller 6-13 78-17020-01...
Page 204
Chapter 9, Registering Software Managed by SiteProtector, on page 105 at the following URL: http://documents.iss.net/literature/SiteProtector/SPUserGuideforSecurityManagers20SP52.pdf Step 2 Right-click the sensor to edit, and click Edit Settings on the shortcut menu. The Edit Settings dialog appears. User Guide for Cisco Security MARS Local Controller 6-14 78-17020-01...
Page 205
Select the SNMP tab. Click Add to create a new SNMP response object using the IP address of the MARS Appliance. Select the Security Events to configure new SNMP destination. Step 4 User Guide for Cisco Security MARS Local Controller 6-15 78-17020-01...
Page 206
You can also select policies and edit them at the group level. Note Click Edit to configure SNMP response of all the selected policies. Select the MARS Appliance on SNMP tab. Step 5 User Guide for Cisco Security MARS Local Controller 6-16 78-17020-01...
SNMP notification is current.policy a default response when triggered. • Edit the files to specify the IP of the SNMP manager (MARS Appliance) and response.policy the community string. User Guide for Cisco Security MARS Local Controller 6-17 78-17020-01...
Edit each signature to have SNMP as one of its responses, and set the choice for SNMP trap as default. For example, in this original signature: [\template\features\AOLIM_File_Xfer\Response\]; [\template\features\AOLIM_File_Xfer\Response\DISPLAY\]; Choice =S Default; [\template\features\AOLIM_File_Xfer\Response\LOGDB\]; Choice =S LogWithoutRaw; Insert the following bolded lines to make it look similar to the following: User Guide for Cisco Security MARS Local Controller 6-18 78-17020-01...
From the Device Type list, select Add SW Security apps on a new host or Add SW security apps on Step 2 existing host. Step 3 Enter the Device Name. Click Apply. Step 4 Click on Reporting Applications tab. Step 5 User Guide for Cisco Security MARS Local Controller 6-19 78-17020-01...
From the Device Type list, select Add SW Security apps on a new host or Add SW security apps on Step 2 existing host. Enter the Device Name. Step 3 User Guide for Cisco Security MARS Local Controller 6-20 78-17020-01...
Page 211
Step 9 For multiple interfaces, click on General Tab, and add the new interfaces’ name, IP address, and Step 10 network mask. Figure 6-11 Adding Multiple Interfaces Click Apply. Step 11 User Guide for Cisco Security MARS Local Controller 6-21 78-17020-01...
| ip_address | +------------+------------+ | intruvert | 0A010134 | intruvert1 | 0A010135 +------------+------------+ 2 row in set (0.00 sec) You would then edit the above file to appear as: intruvert,0A010134 intruvert1,0A010135 User Guide for Cisco Security MARS Local Controller 6-22 78-17020-01...
Check the Forward Alerts box. Select the For this and child admin domains radio button. Select the severity from the list. Cisco recommends selecting High and Medium severity. Check the Forward Faults box. Select the severity from the list. Cisco recommends selecting Error and above severity.
Page 214
Chapter 6 Configuring Network-based IDS and IPS Devices IntruVert IntruShield Figure 6-12 IntruShield SNMP Forwarder Configuration Click the Add button. Step 6 User Guide for Cisco Security MARS Local Controller 6-24 78-17020-01...
Target Server Port Number: Enter MARS’s port number 162. SNMP Version: 1 Forward Alerts Select the severity from the list. Cisco recommends selecting Informational and above severity. Customize Community: Enter the community string that you want to use. Click Apply and exit the program.
For attack path calculation and mitigation, specify the networks being monitored by the sensor. Do one Step 4 of the following: To manually define the networks, select the Define a Network radio button. Enter the network address in the Network IP field. User Guide for Cisco Security MARS Local Controller 6-26 78-17020-01...
To save the changes made to this management console and the sensors it manages, click Submit. Step 7 Step 8 To enable MARS to start sessionizing events from this module, click Activate. User Guide for Cisco Security MARS Local Controller 6-27 78-17020-01...
Click Admin > System Setup > Security and Monitor Devices > Add Step 2 From the Device Type list, select Add SW Security apps on a new host or Add SW security apps on existing host User Guide for Cisco Security MARS Local Controller 6-28 78-17020-01...
Step 1 Login to the Symantec ManHunt with appropriate username and password. In the main screen, click Setup > Policy > Response Rules, then Response Rules window will appear. Step 2 User Guide for Cisco Security MARS Local Controller 6-29 78-17020-01...
Page 220
Step 5 In the left menu, click SNMP Notification and enter the following information: SNMP Manager IP address: Reporting IP address of MARS Maximum number of SNMP notification: (Example: 100000). User Guide for Cisco Security MARS Local Controller 6-30 78-17020-01...
To enable MARS to start sessionizing events from this module, click Activate. Step 10 NetScreen IDP 2.1 IDP-side Configuration Click NetScreen-Global Pro > IDP Manager > IDP. Step 1 Log in to the IDP Manager. Step 2 User Guide for Cisco Security MARS Local Controller 6-31 78-17020-01...
Select existing device or Add New device. Step 2 Enter the Device Name, Sensor Name, and its Reporting IP address. Step 3 • Device Name – the DNS entry for this device User Guide for Cisco Security MARS Local Controller 6-32 78-17020-01...
In the left menu, click Notification Rules. Step 3 In the right window, select syslog if it exists. If not, you need to create it: Step 4 Click New Notification Rules and select syslog. User Guide for Cisco Security MARS Local Controller 6-33 78-17020-01...
Click Admin > System Setup > Security and Monitor Devices > Add. Step 2 From the Device Type list, select Add SW Security apps on a new host or Add SW security apps on existing host User Guide for Cisco Security MARS Local Controller 6-34 78-17020-01...
To save your changes, click Submit. Step 6 Step 7 Click Done when you are done adding the sensor. Step 8 To enable MARS to start sessionizing events from this module, click Activate. User Guide for Cisco Security MARS Local Controller 6-35 78-17020-01...
Page 226
Chapter 6 Configuring Network-based IDS and IPS Devices Enterasys Dragon 6.x User Guide for Cisco Security MARS Local Controller 6-36 78-17020-01...
Specific the Events to Generate SNMP Traps for MARS, page 7-2 • Extracting Entercept Agent Information into a CSV file (for Entercept Version 2.5) Entercept agent information is saved in a database file on the Entercept console. Note User Guide for Cisco Security MARS Local Controller 78-17020-01...
Entercept console, instead of typing the mapping for each agent. Create a CSV file for Entercept Agents in Version 2.5 Go to the directory Program Files\Cisco IDS\Console\Database and copy the file Step 1 CoreShield.mdb to another directory, e.g.: C:\temp.
Check the “Is Sensor” check box—which is asking if it is a sensor or not. Step 9 Step 10 Enter the sensor’s Agent Name, which is the agent name for the console if it is an agent. User Guide for Cisco Security MARS Local Controller 78-17020-01...
Step 2 If you need to generate the Entercept Agent CSV file, see Extracting Entercept Agent Information • into a CSV file (for Entercept Version 2.5), page 7-1. Click Submit. Step 3 User Guide for Cisco Security MARS Local Controller 78-17020-01...
Export CSA Agent Information to File, page 7-6. Prior to the 4.1.1 release, CSA was identified by the device type name Cisco CSA 4.0. As part of an Note upgrade, any Cisco CSA 4.0 devices were renamed as Cisco CSA 4.x. This new name includes support for Cisco CSA 4.0 and 4.5.
Export CSA Agent Information to File With the release of MARS 4.1.1, you are no longer required to define each Cisco CSA agent, as they are discovered as a device sends an SNMP notification to the CSA Management Console (CSA MC).
Enter the Device Name and IP addresses if adding a new host. Click Apply. Step 4 Click Reporting Applications tab. Step 5 From the Select Application list, select Cisco CSA 4.x. Step 6 Click Add. Step 7 The Management Console page appears.
Click Admin > Security and Monitoring Devices. Step 1 From the list of devices, select the host running Cisco CSA Management Center, and click Edit. Step 2 Click the Reporting Applications tab, select Cisco CSA Management Center in the Device Type list, Step 3 and click Edit.
Click Admin > Security and Monitoring Devices. Step 1 From the list of devices, select the host running Cisco CSA Management Center, and click Edit. Step 2 Click the Reporting Applications tab, select Cisco CSA Management Center in the Device Type list, Step 3 and click Edit.
Indicates that the identified FTP server is not reachable from the MARS Appliance. You may Status: NoRouteToHostException need to define additional routes or enable traffic flows to ensure the connection is allowed. User Guide for Cisco Security MARS Local Controller 7-10 78-17020-01...
Step 5 Step 6 Under System Hierarchy, right-click the appropriate server group name and unlock the server group by supplying the configured password. Unlocking the server enables you to configure it. User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 238
All Tasks > AMS > Configure. Figure 8-2 Symantec AV AMS Select Send SNMP Trap under each Alert Action, then click Configure. Step 8 User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 239
Select the Local Controller to send the SNMP trap to as defined in Step 3, and then click Next to view the Action Message window. Step 11 Add alert parameters to the Alert message list according to the following information: User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 240
Virus Name: < Virus Name> • File Path: <File Path> • Severity: <Severity> • Source: <Source> • The following list identifies the trap type and the full list of possible fields: Alert: Virus Found User Guide for Cisco Security MARS Local Controller 78-17020-01...
Add Agents from a CSV File, page 8-8.) This topic explains how to manually add a single agent. The value of defining an agent is that is accelerates the discover process; however, it is not required. User Guide for Cisco Security MARS Local Controller 78-17020-01...
Configure ePolicy Orchestrator to Generate Required Data To prepare the ePolicy Orchestrator server to forward SNMP events to MARS, follow these steps: Step 1 Select Start > Program Files > Network Associates > ePolicy Orchestrator 3.x Console. User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 245
In the Server address field, enter the IP address of the eth0 interface, the monitoring interface for the Step 7 MARS Appliance, and click OK. The SNMP server is added to represent the MARS Appliance. User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 246
Appliance. To edit a rule, follow these steps: Click the rule. The Describe Rule wizard page appears. Click Next to proceed to Set Filters page. Under Add or Edit Notification Rule, click the 3. Set Thresholds link. User Guide for Cisco Security MARS Local Controller 8-10 78-17020-01...
Page 247
Set Threshold Values Verify the Aggregation and Throttling values are set as shown in Figure 8-6 on page 8-11. Click Next to proceed to the Create Notifications page. Click Add SNMP Trap. User Guide for Cisco Security MARS Local Controller 8-11 78-17020-01...
To add an ePolicy Orchestrator server to MARS, follow these steps: Step 1 Select Admin > Security and Monitor Devices > Add. From the Device Type list, select Add SW Security apps on a new host. Step 2 User Guide for Cisco Security MARS Local Controller 8-12 78-17020-01...
Outbreak Prevention ACL (OPACL). • Second, as soon as a signature is available, Cisco ICS updates all Cisco IPS and IDS devices running on your network with the signature required to detect and prevent the specific threat. This signature is referred to as an Outbreak Prevention Signature (OPSig).
Cisco ICS now publishes syslog message to MARS. For MARS to be aware of this device, you must add the Cisco ICS device as a software application running on a host and you must click Activate in the web interface.
Microsoft Internet Information Services. In the Device Name field, enter the hostname of the server. Step 3 In the Reporting IP field, enter the IP address of the interface in Cisco ICS server from which the syslog Step 4 messages will originate.
Page 252
Using that information, they could push equivalent ACLs to devices not managed by Cisco ICS. When defining inspection rules or reports, you can access the list of Cisco ICS-specific events by entering Cisco ICS in the Description / CVE: field and clicking Search on the Management > Event Management page of the web interface.
Schedule the interval at which the Foundstone FoundScan server data is pulled by MARS. This section contains the following topics: Configure FoundScan to Generate Required Data, page 9-2 • Add and Configure a FoundScan Device in MARS, page 9-2 • User Guide for Cisco Security MARS Local Controller 78-17020-01...
Step 3 Add and Configure a FoundScan Device in MARS To add a FoundScan device in MARS, follow these steps: Select Admin > Security and Monitor Devices > Add. Step 1 User Guide for Cisco Security MARS Local Controller 78-17020-01...
Schedule the interval at which the eEye REM server data is pulled by MARS. • This section contains the following topics: Configure eEye REM to Generate Required Data, page 9-4 • Add and Configure the eEye REM Device in MARS, page 9-4 • User Guide for Cisco Security MARS Local Controller 78-17020-01...
Add and Configure the eEye REM Device in MARS To add the eEye REM device in MARS, follow these steps: Select Admin > Security and Monitor Devices > Add. Step 1 User Guide for Cisco Security MARS Local Controller 78-17020-01...
Configure QualysGuard to collect the required data, ensuring that the data is current. • • Add the QualysGuard device that represents a report query to MARS using the web interface. User Guide for Cisco Security MARS Local Controller 78-17020-01...
Proxy Settings for the Global Controller or Local Controller, page 6-18 of the “Install and Setup Guide for Cisco Security Monitoring, Analysis, and Response System, Release 4.2.x.” This section contains the following topics: Configure QualysGuard to Scan the Network, page 9-6 •...
Page 259
Enter the username of the account that MARS will use to access the Qualys device in the Login field. Step 6 Enter the password that corresponds to the account identified in Step 5 in the Password field. User Guide for Cisco Security MARS Local Controller 78-17020-01...
The update rule appears in the list on the Topology/Monitored Device Update Scheduler page. Click Activate. Step 8 To perform this discovery on demand, select the check box next to the rule you just defined and click Run Now. User Guide for Cisco Security MARS Local Controller 78-17020-01...
• correctly, If there is no direct connection exists from CS-MARS to Qualys server • The hostname specified in the URL string is correct • Login name and Password is valid. User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 262
Chapter 9 Configuring Vulnerability Assessment Devices Qualys QualysGuard Devices User Guide for Cisco Security MARS Local Controller 9-10 78-17020-01...
MARS. You can enter any syslog or SNMP device into the network topology, configure it to report data to the MARS, and query it using a free-form query. For more information on free form queries, see To Run a Free-form Query, page 20-2. User Guide for Cisco Security MARS Local Controller 10-1 78-17020-01...
*.debug @MARS_hostname where MARS_hostname is the hostname or IP address of the MARS Appliance. Run following commands to restart syslogd so that the changes are process: Step 2 /etc/init.d/syslog stop User Guide for Cisco Security MARS Local Controller 10-2 78-17020-01...
Click Admin > Security and Monitor Devices > Add. Step 1 Figure 10-1 Adding a Solaris or Linux Device From the Device Type list, select Add SW Security apps on a new host. Step 2 User Guide for Cisco Security MARS Local Controller 10-3 78-17020-01...
Select Normal Installation in the Components list and click Next. Select the target Start menu location and click Next. Step 7 Verify the selection options and click Install. Step 8 User Guide for Cisco Security MARS Local Controller 10-5 78-17020-01...
Ensure that the Windows host and MARS Appliance clocks are synchronized. It is recommend that you configure a NTP server for this purpose. For more information, see Specify the Time Settings, page 5-10. User Guide for Cisco Security MARS Local Controller 10-6 78-17020-01...
2000 server, you must set this property to Disabled on each host from which you want the MARS Appliance to pull syslogs. To enabled MARS to pull event log data from a Windows 2000 host, follow these steps: User Guide for Cisco Security MARS Local Controller 10-7 78-17020-01...
Page 270
We recommend you either set a default domain policy, or set the retention method for security event logs on your Windows system to be Overwrite as needed. Otherwise, when the log is full no new event log can be generated on the Windows system. User Guide for Cisco Security MARS Local Controller 10-8 78-17020-01...
If you use Registry Editor incorrectly, you may cause serious problems that may require you to Warning reinstall your operating system. Microsoft Corporation or Cisco Systems, Inc. cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk.
Page 272
Domain name—Identifies the domain name to which the host belongs. • • Host login—Identifies the username with security audit and log permissions. Host password—Identifies that password that authenticates the username provided in the Host • login field. User Guide for Cisco Security MARS Local Controller 10-10 78-17020-01...
If you are using SNARE to push the log data to MARS, then you do not need to enable this setting. To configure the Windows event log pulling time interval, follow these steps: Click Admin > System Parameters > Windows Event Log Pulling Time Interval. Step 1 User Guide for Cisco Security MARS Local Controller 10-11 78-17020-01...
• Edit. Select Admin > Security and Monitor Devices, select the check box next to the desired host, and • click Edit. Click the Vulnerability Assessment Info tab. Step 2 User Guide for Cisco Security MARS Local Controller 10-12 78-17020-01...
Page 275
Identify Network Services Running on Step 5 the Host, page 10-14. Step 6 Click Apply to save the changes made to this host. Step 7 Click Done to close the Host page User Guide for Cisco Security MARS Local Controller 10-13 78-17020-01...
You can enter more services here by clicking Add New Service, or you can click Submit to continue. Step 5 Click Submit to complete the addition of the host. Step 6 User Guide for Cisco Security MARS Local Controller 10-14 78-17020-01...
UNIX/Linux application host. To configure an Oracle database server to write audit logs, follow these steps: Step 1 As sysdba execute cataudit.sql to create audit trail views: [oracle@server]$ sqlplus /nolog User Guide for Cisco Security MARS Local Controller 11-1 78-17020-01...
Add the Oracle Database Server to MARS To represent the Oracle database server in the web interface, follow these steps: Click Admin > Security and Monitor Devices > Add. Step 1 User Guide for Cisco Security MARS Local Controller 11-2 78-17020-01...
To specify the interval at which MARS should pull the event logs from all Oracle database servers on your network, follow these steps: Click Admin > System Parameters > Oracle Event Log Pulling Time Interval. Step 1 User Guide for Cisco Security MARS Local Controller 11-3 78-17020-01...
Page 280
Chapter 11 Configuring Database Applications Oracle Database Server Generic Step 2 Enter the new time interval in seconds. The default value is 300 (five minutes). Click Submit. Step 3 User Guide for Cisco Security MARS Local Controller 11-4 78-17020-01...
MARS, To configure SNARE for web logging, follow thees steps: Click Start > Programs > InterSect Alliance > Audit Configuration. Step 1 User Guide for Cisco Security MARS Local Controller 12-1 78-17020-01...
In Destination, click the Syslog radio button. Step 4 Click OK. Step 5 To configure IIS for web logging Step 1 Click Start > Programs > Administrative Tools > Internet Services Manager. User Guide for Cisco Security MARS Local Controller 12-2 78-17020-01...
Page 283
Configure IIS for Web Logging In the Tree tab on the left, right-click Default Web Site. Step 2 On the shortcut menu, select Properties. Step 3 Figure 12-3 Enable Logging User Guide for Cisco Security MARS Local Controller 12-3 78-17020-01...
Page 284
In the General Properties tab, set the New Log Time Period to Daily. The Log file directory must match the one previously set using the Audit Configuration program. Note In the Extended Properties tab, make sure all available properties are selected. User Guide for Cisco Security MARS Local Controller 12-4 78-17020-01...
Enter the Device Name and IP Addresses if adding a new host. Step 3 Select the Windows from Operation System list Step 4 Click Logging Info Step 5 Step 6 For this configuration, you must check the Receive host log box User Guide for Cisco Security MARS Local Controller 12-5 78-17020-01...
Page 286
Select W3C_EXTENDED_LOG format Step 14 Click Submit. Step 15 Once you have configured and activated both sides, it takes two pulling intervals (default time of 10 Note minutes) before new events appear. User Guide for Cisco Security MARS Local Controller 12-6 78-17020-01...
MARS. Solaris or Linux-side Configuration Cisco provides an opensource logging agent and an associated configuration file for you to use. This agent can be downloaded from the software download center at the following URL: http://www.cisco.com/cgi-bin/tablebuild.pl/cs-mars-misc...
Make sure the Format radio button Use Common Logfile Format is checked. Step 4 If you have made any changes, click OK. Step 5 If necessary, shut down and restart the iPlanet web server. Step 6 User Guide for Cisco Security MARS Local Controller 12-8 78-17020-01...
Click Reporting Applications tab. Step 11 From the Select Application list, select Generic Web Server Generic. Step 12 Step 13 Click Add. Figure 12-9 Linux Operating System Web Log Format User Guide for Cisco Security MARS Local Controller 12-9 78-17020-01...
Page 290
From the Web Log Format list, select appropriately. Step 14 Click Submit. Step 15 Once you have edited a device you must click Activate for the changes to take effect. Note User Guide for Cisco Security MARS Local Controller 12-10 78-17020-01...
In the right side of the window, under Web Access Log Enable, select the Enable the Web Access Log Step 4 checkbox. Under Log Format, select one of the first four formats: Step 5 Web Access Log Default Format • Common Log Format • User Guide for Cisco Security MARS Local Controller 13-1 78-17020-01...
To add the NetCache device in MARS, follow these steps: Select Admin > Security and Monitor Devices > Add. Step 1 From the Device Type list, select Network Appliance NetCache Generic. Step 2 User Guide for Cisco Security MARS Local Controller 13-2 78-17020-01...
Page 293
Step 5 Configure NetCache to Send Syslog to MARS, page 13-1. Step 5 From the Streaming media log format list, select a streaming media log format. Step 6 Click Submit. User Guide for Cisco Security MARS Local Controller 13-3 78-17020-01...
Page 294
Chapter 13 Configuring Web Proxy Devices Network Appliance NetCache Generic User Guide for Cisco Security MARS Local Controller 13-4 78-17020-01...
MARS supports the Cisco Secure ACS software and the Cisco Secure ACS Solution Engine, version 3.3 and later. In the case of Cisco Secure ACS software, support is provided by an agent that resides on the Cisco Secure ACS server. For the Cisco Secure ACS Solution Engine, this agent must reside on a remote logging host.
Configure Cisco Secure ACS server to generate the correct log files and details and define the AAA clients. Install the PN Log Agent on the Cisco Secure ACS server and configure it to forward the correct log files. Add the Cisco Secure ACS server to the MARS web interface You can also configure Cisco Secure ACS to provide command authorization for the MARS Appliance.
Configuring AAA Devices Bootstrap Cisco Secure ACS Add the remote logging host to MARS as a Cisco ACS 3.x reporting device. To perform this task Add and Configure the Cisco ACS Device in MARS, page 14-12, and substitute the ACS server references with the remote logging host.
Page 298
• NAS-IP-Address System-Posture-Token • EAP Type Name • Click Submit. Step 7 Click CVS RADIUS Accounting, and verify that the following attributes appear in the Logged Step 8 Attributes list: User Guide for Cisco Security MARS Local Controller 14-4 78-17020-01...
802335ea.html Define AAA Clients To support the 802.1x features of NAC, you must also define the Cisco switches as AAA clients within Cisco Secure ACS. When defining a AAA client, verify the following settings: User Guide for Cisco Security MARS Local Controller...
Page 300
The attack path can not be calculated for a NAC 802.1x security incident when the events triggering the Note incident are reported to the MARS Appliance by Cisco Secure ACS. However, the MARS Appliance knows the switch port to block so you can mitigate without the attack path.
Configure TACACS+ Command Authorization for Cisco Routers and Switches You can use the TACACS+ feature of Cisco Secure ACS to authorize the command sets that MARS is allowed to execute on a reporting device. The use of this feature is not required by MARS. However, if you are using this feature on your routers and switches, you must ensure that MARS is allowed to execute specific commands.
Page 302
Step 7 From the Application Name list, select the Cisco ACS-Failed Attempts. Click on the … button to select the appropriate log where all Cisco Secure ACS logs are stored. In this Step 8 example after selecting Failed Attempts application, be sure to select the matching log file, Failed Attempts active log.
Page 303
Failed Attempts active • Passed Authentications active • RADIUS Accounting active • Result: The configured files appear in the List of Log Files to Monitor list. Step 10 Select File > Activate. User Guide for Cisco Security MARS Local Controller 14-9 78-17020-01...
To upgrade to the new PN Log Agent from an existing installation, you must perform the following steps: On the Cisco Secure ACS or syslog server where PN Log Agent is running, uninstall the old agent. Step 1 To uninstall the old agent, click Start > Control Panel > Add/Remove Programs.
Page 305
Warning in case some attribute data in the file exceeds CS-MARS limit for an individual attribute value and shall be split. MARS raw message length... MARS will store the data after splitting it into multiple events Informational User Guide for Cisco Security MARS Local Controller 14-11 78-17020-01...
In the Device Name field, enter the hostname of the server or the remote logging host. Step 3 Step 4 In the Reporting IP field, enter the IP address of the interface in Cisco Secure ACS server or the remote logging host from which the syslog messages will originate. Step 5...
Page 307
Install and Configure the PN Log Agent, page 14-7. The Cisco ACS 3.x option supports both Cisco Secure ACS 3.x and Cisco Secure ACS 4.0. No explicit Note 4.0 option exists for Cisco Secure ACS.
Page 308
Chapter 14 Configuring AAA Devices Add and Configure the Cisco ACS Device in MARS User Guide for Cisco Security MARS Local Controller 14-14 78-17020-01...
Application as Reporting Device, page 15-13. Until each of these tasks is completed, MARS is unable to parse the logs from the reporting device, even if it is receiving those events. User Guide for Cisco Security MARS Local Controller 15-1 78-17020-01...
Click the User Defined Log Parser Templates Step 2 Figure 15-1 User Defined Log Parser Template On the next screen, click Add button which is located next to the Device/Application type list Step 3 User Guide for Cisco Security MARS Local Controller 15-2 78-17020-01...
Software - An application running on a host and the host can be configured to send logs to the • MARS Appliance Enter the Vendor, Model and Version for the Device or Application. (For Example, Cisco PIX 7.0) Step 5 Click Submit.
Page 312
(for example) from the list above the Event Type select window and click Get) New Event Types can be added by clicking Add below the Event Type list. Step 8 User Guide for Cisco Security MARS Local Controller 15-4 78-17020-01...
Page 313
Add new Event type and its information and click Submit (optional) Step 9 Click Apply - the Patterns link will become enabled. Step 10 Click the Patterns link. Step 11 User Guide for Cisco Security MARS Local Controller 15-5 78-17020-01...
Page 314
(Appendix B, “Regular Expression Reference.” for details on syntax). Note that a KEY can be an empty string. A log format consists of several KEY-VALUE sub-pattern pairs. User Guide for Cisco Security MARS Local Controller 15-6 78-17020-01...
Page 315
Pattern Name list, a user can add new value names to identify value patterns that may be commonly used in their logs. In the above figure, the value pattern captures all word-character strings that may also include the characters ‘-‘, ‘/’ and ‘+’. User Guide for Cisco Security MARS Local Controller 15-7 78-17020-01...
Page 316
The above is for a source port. PORT_NUMBER is the Pattern Name, provided for the above Value Pattern with the Description above. Repeat for every position of Pattern definition. Step 23 User Guide for Cisco Security MARS Local Controller 15-8 78-17020-01...
Page 317
Configuring Custom Devices Adding User Defined Log Parser Templates Figure 15-10 The above example is a 12 KEY-VALUE sub-pattern pieces. Figure 15-11 Log template for the device type ‘Vendor1 Model1 1.2’ . User Guide for Cisco Security MARS Local Controller 15-9 78-17020-01...
Page 318
The parsing patterns for ‘HTTP Status OK’ are specified to match the following example raw message reported in an event. 155.98.65.40 - - [21/Nov/2004:21:08:47 -0800] "GET /~shash/ HTTP/1.0" 200 1633 "-" "Lynx/2.8.2rel.1 libwww-FM/2.14" User Guide for Cisco Security MARS Local Controller 15-10 78-17020-01...
Page 319
Details on how to specify the value format are given in Appendix F. Several pattern names with a few of the commonly used date/time formats have been predefined. User Guide for Cisco Security MARS Local Controller 15-11 78-17020-01...
Page 320
Chapter 15 Configuring Custom Devices Adding User Defined Log Parser Templates Figure 15-16 Position 3 Key Pattern for HTTP Status OK Figure 15-17 Pattern log for HTTP Status OK User Guide for Cisco Security MARS Local Controller 15-12 78-17020-01...
Fill in name and other host details and click Apply. Step 5 Click on Reporting Applications. Step 6 Select Application (e.g., Apache Webserver.1.1) from the list and click Add. Step 7 User Guide for Cisco Security MARS Local Controller 15-13 78-17020-01...
Page 322
Select either SNMP TRAP or SYSLOG as the Reporting Method in the resulting window, and click Step 8 Submit. This option determines what type of traffic will be processed by the custom log parser. Step 9 Click Done. User Guide for Cisco Security MARS Local Controller 15-14 78-17020-01...
When MARS receives a syslog from a Cisco PIX firewall, Cisco Adaptive Security Appliance (Cisco ASA), Cisco Firewall Services Module (Cisco FWSM), or Cisco IOS, and can derive the five tuple information required to establish an event (source IP, destination IP, source port, destination port, and...
Page 324
Chapter 16 Policy Table Lookup on Cisco Security Manager Overview of Cisco Security Manager Policy Table Lookup Figure 16-1 Cisco Security MARS Policy Table Query Process Click the Policy Table Lookup icon. MARS authenticates to Security Failed Manager with the Security Manager Username and Password.
If the deployed and committed views are not identical, the access rule generating the MARS event may not be visible in the policy table displayed by MARS. For further information on Cisco Security Manager operation, please access the documentation at the following URL: http://www.cisco.com/en/US/products/ps6498/tsd_products_support_series_home.html...
MARS Local Controller running software version 4.2.1 or more recent version. • Cisco Security Manager version 3.0.1 or more recent • MARS configured for operation with Cisco Security Manager as explained in the section, Checklist • for Security Manager-to-MARS Integration, page 16-6...
• views. The access rule causing the MARS event may not be visible in the policy table. To examine the deployed policies view of a device, you must login to the device or Cisco Security Manager directly. MARS examines only Layer 3 ACLs for traffic events on the supported reporting devices. The policy •...
Policy Table Lookup on Cisco Security Manager Checklist for Security Manager-to-MARS Integration An error occurred while querying policies from Cisco Security Manager. Reason: Failed to retrieve policy information from CSM. Reason: Cisco Security Manager Internal error: Failed to get interfaces in the device! The device LC2DTM was discovered by CSM without any errors.
Page 329
FWSM support is supported only in Cisco Security Manager Enterprise Edition (Professional-50) and higher, Note The Professional version includes support for the management of Cisco Catalyst® 6500 Series switches and associated services modules; the Standard versions do not include this support.
Page 330
2-1, in Install and Setup Guide for Cisco Security Monitoring, • Analysis, and Response System Supporting Devices, page 2-1, in Install and Setup Guide for Cisco Security Monitoring, Analysis, and • Response System Required Traffic Flows, page 2-2, in Install and Setup Guide for Cisco Security Monitoring, Analysis, and •...
Page 331
Enable discovery of the device settings. • While many Cisco devices support the EMBLEM syslog format, this format is not compatible with MARS. Note As part of this task, you must verify that the devices are not reporting to the MARS Appliance using the EMBLEM format.
Page 332
Supported Reporting and Mitigation Devices in the (CSV Keyword column) in the document “Supported • Devices and Software Versions for Cisco Security MARS Local Controller 4.2.x and 5.2.x” Verify Connectivity with the Reporting and Mitigation Devices, page 2-26 • Activate the Reporting and Mitigation Devices, page 2-27 •...
Page 333
(CSV Keyword column) in the document “Supported • Devices and Software Versions for Cisco Security MARS Local Controller 4.2.x and 5.2.x” Procedure for Invoking Cisco Security Manager Policy Table Lookup from Cisco Security MARS, page • 16-14 Perform policy lookups as required.
Using Security Manager for mitigation response. While MARS suggests ACL changes to mitigate attacks, and in the case of Layer 2 devices such as Cisco switches, it can push changes to layer 2 device via the “Big Red” button (which shuts down a port on a switch), you must ensure accuracy between the policy defined in Security Manager and the configuration running on the managed devices.
Device Name — Enter the name of the device. This name must exactly match the hostname shown in the Cisco Security Manager user interface. MARS maps this name to the reporting IP address. This name is used in topology maps, queries, and as the primary management station in the Security and Monitoring Device list.
Procedure for Invoking Policy Table Lookup from Cisco Security MARS Do the following steps to view a Cisco Security Manager policy table from the Cisco Security MARS: Log on to MARS as an Administrator or Security Analyst. Step 1 Identify the incident or event to investigate.
Page 337
Chapter 16 Policy Table Lookup on Cisco Security Manager Procedure for Invoking Cisco Security Manager Policy Table Lookup from Cisco Security MARS Figure 16-2 Recent Incidents on MARS Summary Page Step 3 Click Incident ID of the incident to examine. The Incident Page appears as shown in Figure 16-3.
Page 338
Chapter 16 Policy Table Lookup on Cisco Security Manager Procedure for Invoking Cisco Security Manager Policy Table Lookup from Cisco Security MARS Figure 16-4 MARS Multiple Events Pop-up Window Click the Security Manager icon in the Policy field of the appropriate event. One of the following two...
Page 339
MARS event or incident. If the committed and deployed views are identical, locating the policy is simplified. A MARS event can be generated from a deployed access rule not visible in the committed view. Login to Cisco Security Manager or the specific device to alter the security rule creating the MARS Step 7 event.
Page 340
Chapter 16 Policy Table Lookup on Cisco Security Manager Procedure for Invoking Cisco Security Manager Policy Table Lookup from Cisco Security MARS User Guide for Cisco Security MARS Local Controller 16-18 78-17020-01...
Logging In To login to the Local Controller, enter its IP or DNS address into the browser address field. The login Step 1 box appears. Figure 17-1 Local Controller Login Box User Guide for Cisco Security MARS Local Controller 17-1 78-17020-01...
Click any of the seven tabs to navigate to the pages relevant to the tab’s sub-tabs, as shown in Figure 17-3 though Figure 17-8. Do not use the browser navigation buttons with the MARS Appliance GUI (for example, Back, Note Forward, Refresh, or Stop). User Guide for Cisco Security MARS Local Controller 17-2 78-17020-01...
Page 343
Network Summary Navigation within the MARS Appliance Figure 17-3 Summary Tab Figure 17-4 Incidents Tab Figure 17-5 Query/Reports Tab Figure 17-6 Rules Tab Figure 17-7 Management Tab Figure 17-8 Administration Tab User Guide for Cisco Security MARS Local Controller 17-3 78-17020-01...
Figure 17-10 Help Page Click About to display the software version number running on the MARS. Click Documentation to display URLs to MARS documentation on the Cisco Systems, Inc. website (http://www.cisco.com). Your Suggestions Welcomed The Feedback button appears at the bottom of most pages, a shown in Figure 17-10.
Page 345
To send your comments to the MARS development engineering team, type in your email address and comments then click Submit. When you click the Include log file a MARS log file is sent with your message. User Guide for Cisco Security MARS Local Controller 17-5 78-17020-01...
Figure 17-12. Figure 17-12 Summary Tab Dashboard When you first view the Summary page after upgrading the Local Controller, expect a small delay while Note the Java Server pages recompile. User Guide for Cisco Security MARS Local Controller 17-6 78-17020-01...
Page 347
Summary Page Figure 17-13 The Working Areas on the Dashboard Subtabs Tabs Case Bar (Local Controller only) Recent incidents information Links to Cases assigned to you. HotSpot and Attack diagrams Charts User Guide for Cisco Security MARS Local Controller 17-7 78-17020-01...
Networks start to show immediate action in the events and sessions categories. Note that the 24 Hour Events table and the Events and Sessions chart are different ways of presenting the same information. User Guide for Cisco Security MARS Local Controller 17-8...
17-10. You can start drilling-down attack paths in the Attack Diagram by clicking the Path icon Drilling-down into these diagrams is one of the fastest ways to uncover real-time information about your network. User Guide for Cisco Security MARS Local Controller 17-9 78-17020-01...
Page 350
If you click No on the SVG auto-installer, the Local Controller does not prompt you to install it again. If you want to run the auto-installer, open the browser and click Tools > Internet Options > General > Delete Cookies. User Guide for Cisco Security MARS Local Controller 17-10 78-17020-01...
Alt+click to use the hand to move the image. • Ctrl+click to use the magnifying glass to zoom in. • Ctrl+click and drag to select an area. • • Ctrl+shift+click to use the magnifying glass to zoom out. User Guide for Cisco Security MARS Local Controller 17-11 78-17020-01...
Attacks: All - Top Rules Fired • Rated by the highest number of incidents fired. Activity: All - Top Event Types • Rated by the highest numbers of events of that type. User Guide for Cisco Security MARS Local Controller 17-12 78-17020-01...
Sets chart to represent the sum of all zones or quarter (the last 3 months), or year. each individual zone (Global Controller only). Displays a larger version of the chart. Displays the chart legend. The chart legend User Guide for Cisco Security MARS Local Controller 17-13 78-17020-01...
Page 354
In the following Incidents chart, you can see the top incidents for the week, starting eight days in the past. Figure 17-22 Eight Days of Incidents A more drastic spike in red is not offset by the Incident spikes are built upon each other green incident User Guide for Cisco Security MARS Local Controller 17-14 78-17020-01...
The reports that you can select from are pre-defined. When you create your own reports, you can select those to display. See Reports, page 20-23 for more information. User Guide for Cisco Security MARS Local Controller 17-15 78-17020-01...
Page 356
Chapter 17 Network Summary Summary Page User Guide for Cisco Security MARS Local Controller 17-16 78-17020-01...
When a case is closed, you can still email it, annotate it, add device information, and include a reference Note to another case. Case information collected on incidents, sessions, queries, reports and mitigation logs are forensic evidence pertinent to the following: User Guide for Cisco Security MARS Local Controller 18-1 78-17020-01...
Page 358
To generate an HTML document of the View Case page content that can be emailed, click View Case Document at the bottom of the View Case page. Graphs and charts plotted from reports are also captured in the Case Document. User Guide for Cisco Security MARS Local Controller 18-2 78-17020-01...
The Case Bar displays by default. When displayed, the Case Bar appears at the top of each page. The Case Bar must be displayed to create or modify a case. Hiding the Case Bar To hide the Case Bar, perform the following steps: User Guide for Cisco Security MARS Local Controller 18-3 78-17020-01...
Display the Case Bar as described in the section, Hide and Display the Case Bar. Step 1 Click New Case. Step 2 The Add a New Case Dialog box appears, as shown in Figure 18-5. User Guide for Cisco Security MARS Local Controller 18-4 78-17020-01...
Edit and Change the Current Case Editing the Current Case To edit the Current Case complete the following procedure: User Guide for Cisco Security MARS Local Controller 18-5 78-17020-01...
Navigate to the page to be captured in the case. In the example, the Query page is selected. Step 2 Click Add this. . . on the Case Bar. Step 3 Figure 18-8 Case Bar Add Button User Guide for Cisco Security MARS Local Controller 18-6 78-17020-01...
Case Document. By default, all items are selected. Click Show Include to show only those items selected for the Case Document. Show Include does not function for cases created in Cisco Security MARS version 4.1.1. Step 4 Click View Case Document at the bottom of the View Case page.
Page 364
Click Submit to send the Case Document to the recipients. Step 7 The email is sent and the case history is updated to show the email event as the lastest item of the case history. User Guide for Cisco Security MARS Local Controller 18-8 78-17020-01...
For example, if your network is probed for a DoS attack and then attacked, a rule fires when it sees the follow up attack. The incident displays the instances of this attack. User Guide for Cisco Security MARS Local Controller 19-1...
Incidents are collections of events and sessions that meet the criteria for a rule, each having helped to cause the rule to fire. An incident’s duration only includes the events that contributed to the incident firing. User Guide for Cisco Security MARS Local Controller 19-2 78-17020-01...
Page 367
Incident Path • The icon that takes you to the incident’s path diagram. Incident Vector • The icon that takes you to the source, event type, and destination diagram. User Guide for Cisco Security MARS Local Controller 19-3 78-17020-01...
Enter the ID into the appropriate field. Step 1 Click the Show button. Step 2 To view a partially hidden rule Click the Show button next to the Rule Description. User Guide for Cisco Security MARS Local Controller 19-4 78-17020-01...
Path and Incident Vector diagrams (L2 or L3 attack path information) Links to Session and Incident Detail pages of Links to the Event Type Details pages all incidents within the session User Guide for Cisco Security MARS Local Controller 19-5 78-17020-01...
False Positive invalid scenario False Positive False Negative Attack/Alarm (noise) True False Negative Intrusion/True Alarm Based on the valid cases in Table 19-1, we can clearly distinguish the false positive terminology: User Guide for Cisco Security MARS Local Controller 19-6 78-17020-01...
Page 371
Therefore, the attack never reaches the target. Cisco Security Agent detects an attack and blocks it. • An unconfirmed false positive is where, after further analysis, the firing event is believed to be invalid primarily due to the attack being against an invalid target.
Query field False Positive type and severity icon Launches the Security Device Information popup window Launches Port Information popup window Launches False Positive Sessions Details popup window User Guide for Cisco Security MARS Local Controller 19-8 78-17020-01...
After you determine that a false positive is true, and you have clicked the No button, click Next. Step 1 Step 2 Make a final confirmation that this is a true positive, and click the Confirm button. User Guide for Cisco Security MARS Local Controller 19-9 78-17020-01...
For some 802.1X switch configurations, it is not possible for CS-MARS to determine the correct Note physical interface to which to push a mitigation command. This occurs for switches, such as the Cisco Catalyst 3550 Multilayer switch, where a FastEthernet and a Gigabit Ethernet port can have the same module/port designation (for example, 0/1).
Prerequisites for Mitigation with 802.1X Network Mapping To perform mitigation with 802.1X network mapping with CS-MARS, the following prerequisites are required: Cisco switch running Cisco CatOS or IOS and configured with IEEE 802.1X Port Based Network • Access Control protocol The switch Reporting IP address must be configured on the CS-MARS Security and Monitoring •...
Page 376
19-9, CS-MARS does not have sufficient static information to identify a Layer 2 enforcement device, but can suggest mitigation commands for discovered Layer 3 devices (Cisco PIX firewall, and a Cisco router). Layer 3 mitigation commands must be configured manually on the Layer 3 devices.
Page 377
Click Dynamic Info to view Layer 2 mitigation recommendations derived from 802.1X configurations. Step 4 The Dynamic Mitigation window appears with host name, IP address, MAC address, and connection status as shown in Figure 19-10. User Guide for Cisco Security MARS Local Controller 19-13 78-17020-01...
Page 378
The Push button is red and functional when the 802.1X target host is present on the network, Note and CS-MARS has command access to the enforcement device otherwise, it appears gray and is not functional. User Guide for Cisco Security MARS Local Controller 19-14 78-17020-01...
Click Dynamic Info to display current connection information, as shown in Figure 19-11. Dynamic information can be derived from 802.1X configurations, Cisco Security Agents, or from other security software suites. The current connection information is the most recent network information available for the selected IP address.
Page 380
To mitigate a device of Access Type SNMP you must have the SNMP Read/Write Community String. Note Click the Yes button to confirm the mitigation command and have it take effect. User Guide for Cisco Security MARS Local Controller 19-16 78-17020-01...
IP address on a virtual private network (VPN). MARS can identify the attacking host if the VPN IP address of the host was supplied by a Cisco 3000 Series VPN Concentrator configured as a MARS reporting device.
SNMP. The SNMP RO community string is always required on Layer 2 devices for L2 mitigation. If the switches are interconnected, make sure STP (Spanning Tree Protocol) is enabled and • configured on them. User Guide for Cisco Security MARS Local Controller 19-18 78-17020-01...
SNMP: For the Login ID, enter the user name and Password needed to access the switch. – – For Enable Password, enter the password to get into Cisco enable mode. User Guide for Cisco Security MARS Local Controller 19-19 78-17020-01...
Click the Test Connectivity button to have the MARS discover the device. Step 7 Click the Submit button. Add the Cisco Catalyst 6500 with SNMP as Access Type (Layer 2 only). Click Admin > Security and Monitor Devices > Add. Step 1...
Chapter 19 Incident Investigation and Mitigation Layer 2 Path and Mitigation Configuration Example For Enable Password, enter the password to get into Cisco enable mode. – Enter its SNMP RO Community. – TELNET: For the Login ID, enter the user name and Password needed to access the switch.
Enter its SNMP RO Community. – SNMP: – For the Login ID, enter the user name and Password needed to access the switch. For Enable Password, enter the password to get into Cisco enable mode. – Enter its SNMP RO Community. – SSH: For the Login ID, enter the user name and Password needed to access the switch.
Page 387
In the following Query Event Data screen use the result format All Matching Sessions and query events from Source IP 10.1.252.250 and Destination IP 65.54.153.118 over the last 10 minutes. User Guide for Cisco Security MARS Local Controller 19-23 78-17020-01...
Page 388
Step 3 use Windows RPC DCOM Overflow), click the icon under the Graph column to view the topology paths. The first topology path to appear is the Layer 3 topology graph: User Guide for Cisco Security MARS Local Controller 19-24 78-17020-01...
Page 389
Layer 2 Path and Mitigation Configuration Example Figure 19-21 Layer 3 topology graph Under Topology Path Graph, click the Layer 2 Path button to view the Layer 2 topology graph: User Guide for Cisco Security MARS Local Controller 19-25 78-17020-01...
Incident Details screen, click the Mitigate link that corresponds with the Session or Event Type you want to mitigate (in this case, Windows RPC DCOM Overflow). The Mitigation Information screen appears. User Guide for Cisco Security MARS Local Controller 19-26 78-17020-01...
Page 391
If the device where the mitigation command to be downloaded is a Layer 3 device, the Push button Note shown in red on the Mitigation Information screen is greyed out and you must use the suggested commands directly on the device to mitigate the compromised host. User Guide for Cisco Security MARS Local Controller 19-27 78-17020-01...
Page 392
The SNMP RW community string must be enabled for the MARS to download a mitigation command to Note a device using the Access Type SNMP. Click Yes to confirm the mitigation of the device. Step 3 User Guide for Cisco Security MARS Local Controller 19-28 78-17020-01...
Click on a field value to open the dialog box without opening dialog box for the field. for that field. Save the query as a report or as a rule. Click Submit Inline to run the query. User Guide for Cisco Security MARS Local Controller 20-1 78-17020-01...
Under Search String enter strings to query; under Operation, select the operation (AND, OR, NOT). For Step 3 the final item in the list, select None. Step 4 Click the Apply button. Click the Submit button to run the query. Step 5 User Guide for Cisco Security MARS Local Controller 20-2 78-17020-01...
Submit Batch. Your query is submitted, and you are automatically taken to the Batch Query tab. If your query is very large, you may only be give the options of Save as Rule, Save as Report, or Submit Batch. Figure 20-6 Change Query Criteria User Guide for Cisco Security MARS Local Controller 20-3 78-17020-01...
Click QUERY/REPORTS, then click the Batch Query tab. Step 1 Step 2 Click Resubmit. The Status of the query changes to In Progress. User Guide for Cisco Security MARS Local Controller 20-4 78-17020-01...
Returns the most reported event types. Ranked by either: number of sessions containing at least one of the event type or by bytes transmitted in sessions that contain events that meet the query criteria. User Guide for Cisco Security MARS Local Controller 20-5...
Page 398
Protocol Ranking • Returns most used protocols. Ranked by either: number of sessions with that protocol or by bytes transmitted in sessions that contain events that meet the query criteria. User Guide for Cisco Security MARS Local Controller 20-6 78-17020-01...
Result Format that you use when you run the query. • Session Count The number of sessions that contain events that meet the criteria that contributed to the incident. User Guide for Cisco Security MARS Local Controller 20-7 78-17020-01...
Use Only Firing Events Select this if you want only events that fired incidents to return information. Maximum Number of Rows Returned Select the number of rows that you want displayed. User Guide for Cisco Security MARS Local Controller 20-8 78-17020-01...
Sources Selected field, clicking Select All will de-select them.) Use the Equal and Not Equal buttons to bring highlighted items from the Sources Available field into the Sources Selected field. Filter sources from this drop-down list. User Guide for Cisco Security MARS Local Controller 20-9 78-17020-01...
IP addresses present on devices in the system or user entered dotted quads. IP ranges • The range of addresses between two dotted quads. Networks • Topologically valid networks. Devices • The hosts and reporting devices present in the system. User Guide for Cisco Security MARS Local Controller 20-10 78-17020-01...
Event Types • No constraint on the event type. Event types • Events that have been merged into types. • Event type groups Groups of event types. Device Devices • User Guide for Cisco Security MARS Local Controller 20-11 78-17020-01...
Restricts the query to the sub-set of events that contributed to the incidents of rules that have the specified notifications as part of their actions. (See Table 21-1Rule Fields and Arguments, page 21-6 more information.) User Guide for Cisco Security MARS Local Controller 20-12 78-17020-01...
Window, or right-click {link on MARS interface}>Open in New Window). Multiple real-time queries can operate in multiple browser instances at the same time, but you must login to MARS with each browser instance. User Guide for Cisco Security MARS Local Controller 20-13 78-17020-01...
From the Result Format dropdown list, select a format that can be ranked by time. The formerly grayed-out Real Time radio button becomes clickable. Click the Real Time radio button, and select Raw events or Sessionized Events from the dropdown list. User Guide for Cisco Security MARS Local Controller 20-14 78-17020-01...
Page 407
Real-time results begin to scroll up from the bottom of the page within 5 seconds, as shown in Figure 20-16. Real-time raw events are shown in this example. User Guide for Cisco Security MARS Local Controller 20-15 78-17020-01...
Page 408
Click the active links within a real-time event record to view the related pop-up windows. For example, Step 5 the Reporting Device Information pop-up window is shown in Figure 20-17. User Guide for Cisco Security MARS Local Controller 20-16 78-17020-01...
This section explains how to create and view a long-duration query on the MARS. There are two ways to perform a long-duration query on the MARS: Modifying an existing report. User Guide for Cisco Security MARS Local Controller 20-17 78-17020-01...
Page 410
To query using a report, follow these steps: In the QUERY / REPORTS tab, click the Reports tab to obtain the Main Report window. Step 1 User Guide for Cisco Security MARS Local Controller 20-18 78-17020-01...
Click the Submit button to run the report and return to the Main Report window. Step 4 View a Query Result in the Report Tab To view a query in the Report tab, follow these steps: User Guide for Cisco Security MARS Local Controller 20-19 78-17020-01...
This type of long-duration query can take a long time to perform and is more suitable for a shorter duration of time. Only Admin users can perform a batch query. Note User Guide for Cisco Security MARS Local Controller 20-20 78-17020-01...
Page 413
Figure 20-22 Query window In the Query window, click the Edit button to change the query criteria. The Query Event Data window Step 2 appears. Figure 20-23 Query Event Data window User Guide for Cisco Security MARS Local Controller 20-21 78-17020-01...
Page 414
To watch the status of the query in real-time, you can use the Batch Query tab drop-down list to change Step 5 the Page Refresh Rate from Never (the default) to 1 minute, 3 minutes, 5 minutes, 10 minutes, 15 minutes, or 30 minutes. User Guide for Cisco Security MARS Local Controller 20-22 78-17020-01...
100, maximum number of event/session reports is 1,000. 2. As of Cisco Security MARS Release 4.1.5. In Release 4.1.3, and 4.1.4, report results are retained for one year in the MARS database before they are automatically purged. In Releases prior to Release 4.1.3, report results are retained indefinately. The purge interval cannot be changed.
From the drop-down list on the bottom of the page, select either: Step 2 – View HTML: to view the report as an HTML file. – View CSV: to view the report as a CSV file. User Guide for Cisco Security MARS Local Controller 20-25 78-17020-01...
Page 418
Navigating to the Recipients column by clicking its criteria Step 4 Edit the report, and click the Apply button to apply changes to the report. Click the Submit button to finalize the report. Step 5 User Guide for Cisco Security MARS Local Controller 20-26 78-17020-01...
Page 419
In some situation such as filtering out specific IP source, user should create a new report. Email notification of a global generated report will be sent from the Global Controller and not the Note Local Controller. User Guide for Cisco Security MARS Local Controller 20-27 78-17020-01...
Page 420
Chapter 20 Queries and Reports Reports User Guide for Cisco Security MARS Local Controller 20-28 78-17020-01...
Appendix D, “System Rules and Reports.” A rule cannot be deleted, it can be made active or inactive. Note Figure 21-1 shows a portion of the Inspection Rules page of the Rules tab. User Guide for Cisco Security MARS Local Controller 21-1 78-17020-01...
Planning an Attack Start to detail your plan. You want to penetrate a network. You’d like to avoid detection and identification if possible. You want root access on a host. User Guide for Cisco Security MARS Local Controller 21-2 78-17020-01...
For device types supported by CS-MARS, this should not be necessary. To define a new parser template, see Adding User Defined Log Parser Templates, page 15-1 Add Parser Log Templates for the Custom Device/Application, page 15-3. User Guide for Cisco Security MARS Local Controller 21-3 78-17020-01...
Events that match active drop rules are not used to construct incidents. Because the Global Controller does not receive events from reporting devices, rather it receives them from Local Controllers, you cannot define drop rules for the Global Controller. User Guide for Cisco Security MARS Local Controller 21-4 78-17020-01...
2.) It correlates the same value of a cell across rule lines, e.g., a probe from a source address AND an attack from that same source address. User Guide for Cisco Security MARS Local Controller 21-5...
Page 426
The row number. Open ( Identifies the open of a clause. Displays the open braces you create a Clauses are used to compare one or clauses. more compound conditions in a rule. User Guide for Cisco Security MARS Local Controller 21-6 78-17020-01...
Page 427
The hosts and reporting devices present in the system. IP addresses IP addresses present on devices in the system or user entered dotted quads. IP ranges The range of addresses between two dotted quads. User Guide for Cisco Security MARS Local Controller 21-7 78-17020-01...
Page 428
IP ranges—The range of addresses The range of addresses between two between two dotted quads. dotted quads. Service Name A TCP/IP-based network service, identified by protocol and port, defined within the packet. User Guide for Cisco Security MARS Local Controller 21-8 78-17020-01...
Page 429
• $ANY_BOTH_PORT5 $ANY_DEST_PORT1 to • ANY_DEST_PORT5 $ANY_SRC_PORT1 • $TCP_BOTH_PORT1, • $TCP_BOTH_PORT2 $TCP_DEST_PORT1 to • $TCP_DEST_PORT5 $TCP_SRC_PORT1, • $TCP_SRC_PORT2 $UDP_BOTH_PORT1, • $UDP_BOTH_PORT2 $UDP_DEST_PORT1 to • $UDP_DEST_PORT5 $UDP_SRC_PORT1, • $UDP_SRC_PORT2 User Guide for Cisco Security MARS Local Controller 21-9 78-17020-01...
Page 430
All events • Event type groups—Groups of • event types. SAME • • DISTINCT Red Severity Event Types—Displays all severe event types Yellow Severity Event Types—Displays all yellow event types User Guide for Cisco Security MARS Local Controller 21-10 78-17020-01...
Page 431
Variables—Signify any single • user, only useful for lines in tandem with the same variable. Invalid User Name—Specifies • that this condition is met when the user name reported is invalid. User Guide for Cisco Security MARS Local Controller 21-11 78-17020-01...
Page 432
Close Identifies the close of a clause. User Guide for Cisco Security MARS Local Controller 21-12 78-17020-01...
Page 433
(e.g., Y must happen after X).The condition of this line must be met, and then the condition of the next line must be met before the compound condition is met. User Guide for Cisco Security MARS Local Controller 21-13 78-17020-01...
Page 434
Count login attempts have occurred over a value is reached or the time period 10-minute period that counter can be expires. reset. User Guide for Cisco Security MARS Local Controller 21-14 78-17020-01...
Page 435
TCP session.) See the Technology Preview: Configuring Distributed Threat Mitigation with Intrusion Prevention System in Cisco Security MARS, page 1 document for DTM configuration information. User Guide for Cisco Security MARS Local Controller 21-15 78-17020-01...
Rule for Same Host, Destination, Same Port Denied In this example, the rule fires when 20 of the specified events occur that have the same source and destination addresses, and identical destination port numbers. User Guide for Cisco Security MARS Local Controller 21-16 78-17020-01...
Note Upgrade the MARS software regularly to obtain new and updated System Inspection rules. For more information, see the Install and Setup Guide for Cisco Security Monitoring, Analysis, and Response System. To view a list of System Inspection rules, see Appendix D, “System Rules and Reports.”...
The Rule Wizard can only be invoked from the Inspections Rule page. To edit a rule with the Rule Wizard, follow these steps: Step 1 Select the check box of the rule to edit. User Guide for Cisco Security MARS Local Controller 21-18 78-17020-01...
Navigate to the Inspection Rules page. Step 1 Click Add. Step 2 Enter a name and description for the rule, then click Next. Step 3 Select Source IP address. Step 4 User Guide for Cisco Security MARS Local Controller 21-19 78-17020-01...
Page 440
When you are asked, “Are you done defining the rule conditions,” you can: Step 6 Click the Yes button for a single line rule. Continue to add repetition requirements (counts), – alert information, and valid time ranges for each line. User Guide for Cisco Security MARS Local Controller 21-20 78-17020-01...
When you change the status to inactive, the rule displays only on the inactive rules page. Step 3 To display inactive Drop Rules, select Inactive from the View dropdown list. Duplicate a Drop Rule Check the box next to the rule. Step 1 User Guide for Cisco Security MARS Local Controller 21-21 78-17020-01...
Add a Drop Rule Step 1 Click Add. Enter a name and description for the rule, and click Next. Step 2 Select your sources. Step 3 Figure 21-8 Drop Rule Creation Form User Guide for Cisco Security MARS Local Controller 21-22 78-17020-01...
You have two options for learning about rules that have fired: you can log in and view the appropriate pages in the HTML interface or you can have MARS send alerts to external devices and users. Actions provide instructions to MARS on the second method. User Guide for Cisco Security MARS Local Controller 21-23 78-17020-01...
Rule and Report Groups This section contains the following subsections: Rule and Report Group Overview, page 21-25 • Global Controller and Local Controller Restrictions for Rule and Report Groups, page 21-26 • User Guide for Cisco Security MARS Local Controller 21-24 78-17020-01...
Note The procedures described in this section are valid for both the Local and Global Controllers, except that the Case Bar does not appear on the Global Controller HTML interface. User Guide for Cisco Security MARS Local Controller 21-26 78-17020-01...
Click Add. The selected rules appear in the lefthand pane of the dialog box. To remove a rule from the group, highlight the item in the lefthand pane and click Remove. User Guide for Cisco Security MARS Local Controller 21-27 78-17020-01...
Page 448
Select the rule group to delete in the Group pulldown filter. Step 3 Click Delete Group. The Delete Group dialog box appears listing the rules in the group to be deleted. You are prompted to confirm deletion. User Guide for Cisco Security MARS Local Controller 21-28 78-17020-01...
Page 449
Chapter 21 Rules Rule and Report Groups Click Yes. Step 4 The rule group no longer appears in the Group dropdown filters on the Incident and Inspection Rules pages. User Guide for Cisco Security MARS Local Controller 21-29 78-17020-01...
Step 5 The selected reports appear in the lefthand pane of the dialog box. To remove a report from the group, highlight the item in the lefthand pane and click Remove. User Guide for Cisco Security MARS Local Controller 21-30 78-17020-01...
Page 451
Step 5 Deleting a Report Group Navigate to the Reports page, as shown in Figure 21-13. Step 1 Select the report group to delete in the Group pulldown filter. Step 2 User Guide for Cisco Security MARS Local Controller 21-31 78-17020-01...
Select the rule group in the dropdown filter above the Matched Rules column, as shown in Figure 21-16. The Incidents page will display only those incidents that occurred from rules firing in the selected rule group. Figure 21-16 Rule Group on Incidents Page User Guide for Cisco Security MARS Local Controller 21-32 78-17020-01...
Selecting a Report Within the Report Group to Make a Query Select the report in the secondary dropdown list. Step 3 The Query criteria are automatically populated per the selected report. User Guide for Cisco Security MARS Local Controller 21-33 78-17020-01...
To remove rules, highlight the items to remove in the lefthand pane, then click Remove. Click Apply. Step 6 The selected rules appear in the Rules field of the Query Event Data bar. User Guide for Cisco Security MARS Local Controller 21-34 78-17020-01...
Sending Alerts and Incident Notifications A Cisco Systems MARS alert action is a signal transmitted to people or devices as notification that a MARS rule has fired, and that an incident has been logged. Alert actions can only be configured through the Action parameter of a rule.
Page 456
Distributed Threat Mitigation • configured within the MARS device administration pages. See the section, Reporting and Mitigation Devices Overview, page 2-1 information on configuring individual devices to work with MARS. User Guide for Cisco Security MARS Local Controller 22-2 78-17020-01...
Page 457
Mon May 15 08:47:26 2006 Fired Rule Id: 134473 Fired Rule: System Rule: CS-MARS Database Partition Usage Incident Id: 597842933 For more details about this incident, please go to: https://MyLatest/Incidents/IncidentDetails.jsp?Incident_Id=597842933 User Guide for Cisco Security MARS Local Controller 22-3 78-17020-01...
To send alert actions, MARS must be configured to communicate with an e-mail server. To configure the e-mail server settings, follow these steps: Click Admin > Configuration Information. Step 1 The Device Configuration window appears, as shown in Figure 22-1. User Guide for Cisco Security MARS Local Controller 22-4 78-17020-01...
Action dialog box. An alert action determines which alert notifications are sent to which users or user groups when the rule fires. You can edit or delete existing alert actions or create a new one. User Guide for Cisco Security MARS Local Controller 22-5 78-17020-01...
Page 460
Proceed to Step to complete the procedure. – Create a new alert action. • Click Add. – The Alert recipients page appears in an a new window, as shown in Figure 22-3. User Guide for Cisco Security MARS Local Controller 22-6 78-17020-01...
Page 461
Page—Users or user groups can receive an alpha-numeric electronic page on their pagers or pager-enabled mobile telephones. • SMS—Users or groups can receive a text message on their SMS-enabled mobile telephones. User Guide for Cisco Security MARS Local Controller 22-7 78-17020-01...
Page 462
• Distributed Threat Mitigation—For more information on this feature, see Technology Preview: • Configuring Distributed Threat Mitigation with Intrusion Prevention System in Cisco Security MARS, page For SNMP and Syslog, you must configure the receiving systems to receive notifications. Note Click the Change Recipient button to add or remove a recipient for a notification type.
Page 463
You are returned to the Alert Recipients Window. Repeat Step through Step until you have assigned recipients to all the notification types you have Step 10 selected. Click Submit. Step 11 User Guide for Cisco Security MARS Local Controller 22-9 78-17020-01...
Click Add on the Select (user) dialog box when creating an alert notification. See “Configure a Rule • to Send an Alert Action” section on page 22-5. The User Configuration page appears, as shown in Figure 22-6. User Guide for Cisco Security MARS Local Controller 22-10 78-17020-01...
Page 465
If you are not creating a notification by pager, go to Step Step 5 For notification by pager, you must specify a service provider (cell phone or pager company). From the Step 6 Service Provider field, select New Provider. User Guide for Cisco Security MARS Local Controller 22-11 78-17020-01...
The selected names appear in the right-hand side of the dialog box. Click Submit. Step 5 You are returned to the User Management tab. This ends the Create a Custom User Group procedure. User Guide for Cisco Security MARS Local Controller 22-12 78-17020-01...
Click Submit. Step 5 You are returned to the User Management tab. This ends the Add a User to a Custom User Group procedure. User Guide for Cisco Security MARS Local Controller 22-13 78-17020-01...
Chapter 22 Sending Alerts and Incident Notifications Add a User to a Custom User Group User Guide for Cisco Security MARS Local Controller 22-14 78-17020-01...
To open the Event Management sub-tab, click the Management > Event Management tabs. On the Event Management page, you can search and filter events and event groups, and work with groups of events. User Guide for Cisco Security MARS Local Controller 23-1 78-17020-01...
Click each group in the Chosen and Available fields to highlight it. Click it again to de-highlight it. Step 4 Click Add or Remove to move highlighted items as needed. Click Submit. Step 5 User Guide for Cisco Security MARS Local Controller 23-2 78-17020-01...
Enter the text that you want to search for in the Search field. Step 1 Click Search. Step 2 Filter by Groups From the Select Group list, select the group. User Guide for Cisco Security MARS Local Controller 23-3 78-17020-01...
Add a Network, IP Range, or Variable Step 1 Select Management > IP Management. The IP Management page appears. Figure 23-2 Add a Network, IP Range, or Variable Step 2 Click Add. User Guide for Cisco Security MARS Local Controller 23-4 78-17020-01...
A host managed by a reporting device defined under the Admin > Security and Monitoring Devices • tab, such as a host running Cisco Security Agent and discovered by MARS when processing the logs provided by the CSA Management Console.
Check the box next to the host that you want to edit. Step 2 If you are editing interface or IP mask information, make your changes here and click Submit. Step 3 User Guide for Cisco Security MARS Local Controller 23-6 78-17020-01...
Click Submit. Step 5 Edit a Group of Services You can not edit system-defined groups. Note Select the group in the Select Group list. Step 1 Click Edit Group. Step 2 User Guide for Cisco Security MARS Local Controller 23-7 78-17020-01...
To access the User Management page, click either Management > User Management or Admin > User Management. User Guide for Cisco Security MARS Local Controller 23-8 78-17020-01...
To add a new user, follow these steps: From the Management > User Management tab, click Add. The User Configuration page appears, as Step 1 shown in Figure 23-4. User Guide for Cisco Security MARS Local Controller 23-9 78-17020-01...
Page 478
Short Message Service (SMS) number—for example, 8885551212@servprov.com • Work telephone number • Home telephone number • FAX number • Pager number— may also be a mobile telephone number, for example, 5552345678 • User Guide for Cisco Security MARS Local Controller 23-10 78-17020-01...
Click Submit to close the User Configuration page and return to the User Management tab. Step 5 Search for a User Enter the text that you want to search for in the Search field. Step 1 Click Search. Step 2 User Guide for Cisco Security MARS Local Controller 23-11 78-17020-01...
To remove users from the group, select the users from the left hand side with Ctrl+click . Click Remove. Step 4 The selected names move to the righthand side of the dialog box. Click Submit. You are returned to the User Management tab. Step 5 User Guide for Cisco Security MARS Local Controller 23-12 78-17020-01...
Chapter 23 Management Tab Overview User Management Filter by Groups From the Select Group list, select the group. Only the members of the group are displayed. User Guide for Cisco Security MARS Local Controller 23-13 78-17020-01...
Page 482
Chapter 23 Management Tab Overview User Management User Guide for Cisco Security MARS Local Controller 23-14 78-17020-01...
Hardware Maintenance Tasks—MARS 100, 100E, 200, GCM, and GC, page 24-11 • For information about upgrading, backing up, and restoring data on the MARS Appliance, see the following sections of the Install and Setup Guide for Cisco Security Monitoring, Analysis, and Response System: Performing Command Line Administration Tasks, page 6-1 •...
Last: The present time minus the number of days, hours, and minutes entered. • • Start/End: Absolute literal time ranges defined by the date to the minute. Select user, group, etc. Step 2 Select the source. Step 3 Click Submit. Step 4 User Guide for Cisco Security MARS Local Controller 24-2 78-17020-01...
This section contains the following topics: • Retrieve Raw Messages From Archive Server, page 24-4 • Retrieve Raw Messages From a Local Controller, page 24-5 User Guide for Cisco Security MARS Local Controller 24-3 78-17020-01...
Use WinZip or another archive expansion program to extract the contents of the Gzip archive file. Step 6 Once the textfile is extracted from the GNU Zip archive format, its contents resemble the following: Step 7 User Guide for Cisco Security MARS Local Controller 24-4 78-17020-01...
Review the Cached Files time range information, and then do one of the following: Step 5 If you want data from within this time range, you do not need for Force Generate Files. • User Guide for Cisco Security MARS Local Controller 24-5 78-17020-01...
Page 488
33750»Wed Jul 27 16:16:06 PDT 2005»BR-FW-1»10.4.1.1 Mon Jan 6 11:05:34 2003 <134>Jan 06 2003 11:03:53: %PIX-6-302001: Built inbound TCP connection 21000 for faddr 10.1.2.4/9000 gaddr 10.1.5.20/80 laddr 10.1.5.20/80 where it reads: device ID>>date>>device name>>raw message. User Guide for Cisco Security MARS Local Controller 24-6 78-17020-01...
If the two match, the presented certificate is considered valid. This approach allows MARS to validate certificates without knowledge of revocation lists and to operate in a network without an Internet connection. User Guide for Cisco Security MARS Local Controller 24-7 78-17020-01...
Page 490
Admin > System Maintenance > Upgrade page. • Discovery operation. (SSH) Test Connectivity operation. (SSL) • Cisco IDS, IPS, and IOS IPS router Event Processing (RDEP or SDEE over SSH) • CSM Policy Query Integration (SSL) • Qualys Report Discovery. (SSL) •...
The following procedures explain how to upgrade under the specific circumstances: Upgrade a Certificate or Fingerprint Interactively, page 24-10 • Upgrade a Certificate Manually, page 24-10 • Upgrade a Fingerprint Manually, page 24-10 • User Guide for Cisco Security MARS Local Controller 24-9 78-17020-01...
Step 4 If the value is correct, click Yes. Step 5 Monitoring Certificate Status and Changes To support the certificate management features in MARS, the following system inspection rule exists: User Guide for Cisco Security MARS Local Controller 24-10 78-17020-01...
There is the danger of explosion if the battery is replaced incorrectly. Replace the battery only with Warning the same or equivalent type recommended by the manufacturer. Dispose of used batteries according to the manufacturer’s instructions. Statement 1015 User Guide for Cisco Security MARS Local Controller 24-11 78-17020-01...
The following MARS Appliances are equipped with a Parallel IDE/ATA Redundant Array of Inexpensive Disks (RAID) controller card: CS-MARS-100E-K9 • CS-MARS-100-K9 • CS-MARS-200-K9 • CS-MARS-GCM-K9 • • CS-MARS-GC-K9 All other MARS appliances running software version 4.X or prior have software RAID controllers. User Guide for Cisco Security MARS Local Controller 24-12 78-17020-01...
To match original performance, hotswapped hard drives should be the same make, model and size as the Note original hard drives. RAID Procedures for MARS Appliances 100, 100E, 200, GCM, and GC This section pertains only to the MARS 100, 100E, 200, GCM, and GC appliances. User Guide for Cisco Security MARS Local Controller 24-13 78-17020-01...
Page 496
SUBUNIT 0: RAID 1: OK SUBUNIT 0: CBOD: OK PHYSICAL PORT: 7 LOGICAL PORT: 0 SUBUNIT 1: CBOD: OK PHYSICAL PORT: 4 LOGICAL PORT: 1 SUBUNIT 1: RAID 1: REBUILDING (1%) User Guide for Cisco Security MARS Local Controller 24-14 78-17020-01...
Page 497
Rebuilding—A subunit is being rebuilt. Array efficiency is not yet optimal. • Degraded—At least one physical disk in the array cannot be accessed. Troubleshooting is advised to prevent possible data loss. User Guide for Cisco Security MARS Local Controller 24-15 78-17020-01...
Table 24-2 shows how the hard drive slots in the chassis correspond to the port and physical port numbers as reported in the CLI. User Guide for Cisco Security MARS Local Controller 24-16 78-17020-01...
Page 499
1. The stated storage capacity is the sum of the rated capacity of all the hard drives and does reflect bytes reserved for the RAID overhead on each drive. Figure 24-4 Hard Drive Slot Numbering for MARS Local Controller 200 and Global Controllers User Guide for Cisco Security MARS Local Controller 24-17 78-17020-01...
At the CLI prompt, enter hotswap add disk. Be sure to use the same slot number (disk) as in Step Step 6 A message informs you that the hard drive (disk) is added successfully (to the logical array). Insert the new Cisco field-replaceable hard drive unit. Step 7 Lock the hard drive into place. Step 8 Step 9 Close and lock the drive bay door.
Subunit 1: CBOD: OK Physical Port: 0 Logical Port: 1 Procedures for the MARS RAID Utility This section pertains only to the MARS 100, 100E, 200, GCM, and GC appliances. User Guide for Cisco Security MARS Local Controller 24-20 78-17020-01...
Page 503
Select Array Unit 0. The status of the array is Degraded if one of the drives in an array is degraded. Step 4 A selected item is marked with an asterisk in the leftmost column. Step 5 Select Rebuild Array then press F8 to complete. User Guide for Cisco Security MARS Local Controller 24-21 78-17020-01...
Page 504
A screen appears listing the ports and the hard drives of the array that will be deleted. Within the RAID utility, you can use the following keystrokes to highlight the corresponding GUI button: Alt-C—Create Array Alt-D—Delete Array Alt-M—Maintain Array Alt-R—Rebuild Array User Guide for Cisco Security MARS Local Controller 24-22 78-17020-01...
Page 505
Note Shutdown the MARS Appliance with the shutdown CLI command. Step 2 Powerup the MARS Appliance. Press Alt-3 to access the RAID utility when the following message Step 3 appears: User Guide for Cisco Security MARS Local Controller 24-23 78-17020-01...
Page 506
A degraded physical port at this stage can indicate a defective hard drive, and improperly inserted hard drive, a loose hard drive cable connection, or a defective RAID controller card. User Guide for Cisco Security MARS Local Controller 24-24 78-17020-01...
Page 507
Hardware Maintenance Tasks—MARS 100, 100E, 200, GCM, and GC An array that has not completed rebuilding in two hours could indicate a defective RAID controller card. This ends the Delete and Create the RAID 10 Array procedure. User Guide for Cisco Security MARS Local Controller 24-25 78-17020-01...
Page 508
Chapter 24 System Maintenance Hardware Maintenance Tasks—MARS 100, 100E, 200, GCM, and GC User Guide for Cisco Security MARS Local Controller 24-26 78-17020-01...
A P P E N D I X Cisco Security MARS XML API Reference This appendix provides resources for creating XML applications that integrate Cisco Security MARS XML data into third-party applications. XML Schema Overview The XML schema are written in conformance with the standard World Wide Web Consortium (W3C) XML schema language.
<TimeStamp>May 23, 2007 8:13:09 AM PDT</TimeStamp> <ReportingDevice id="128783" /> <RawMessage>Wed May 23 08:13:09 2007 <134>%PIX-2-106001: Inbound TCP connection denied from 10.3.50.200/15330 to 248.64.35.88/3890 flags FIN on interface inside</RawMessage> <FalsePositiveType>NOT_AVAILABLE</FalsePositiveType> <EventEndPoints> <Source ipaddress="10.3.50.200" /> User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 511
<ReportingDevice id="128783" /> <RawMessage>Wed May 23 08:13:10 2007 <134>%PIX-2-106016: Deny IP spoof from (10.3.50.200) to 105.74.127.53 on interface inside</RawMessage> <FalsePositiveType>NOT_AVAILABLE</FalsePositiveType> <EventEndPoints> <Source ipaddress="10.3.50.200" /> <Destination ipaddress="105.74.127.53" /> <SourcePort>0</SourcePort> <DestinationPort>0</DestinationPort> <Protocol>0</Protocol> </EventEndPoints> <NATtedEndPoints> User Guide for Cisco Security MARS Local Controller 78-17020-01...
– hh:mm:ss is hours, minutes, seconds hh are 1–9, 10–12 mm are 00–60 ss are 00–60 AM or PM – TZD is time zone designator (PDT, PST, MDT, MST, etc.) – User Guide for Cisco Security MARS Local Controller 78-17020-01...
Perl documentation and in a number of books, some of which have copious examples. Jeffrey Friedl's "Mastering Regular Expressions", published by O'Reilly, covers regular expressions in great detail. This description of PCRE's regular expressions is intended as reference material. User Guide for Cisco Security MARS Local Controller 78-17020-01...
Thus the sequence \0\x\07 specifies two binary zeros followed by a BEL character (code value 7). Make sure you supply two digits after the initial zero if the pattern character that follows is itself an octal digit. User Guide for Cisco Security MARS Local Controller 78-17020-01...
For compatibility with Perl, \s does not match the VT character (code 11). This makes it different from the the POSIX "space" class. The \s characters are HT (9), LF (10), FF (12), CR (13), and space (32). User Guide for Cisco Security MARS Local Controller 78-17020-01...
Letter Lower case letter Modifier letter Other letter Title case letter Upper case letter Mark Spacing mark Enclosing mark Non-spacing mark Number Decimal number Letter number Other number Punctuation Connector punctuation User Guide for Cisco Security MARS Local Controller 78-17020-01...
Thus, they are independent of multiline mode. These three assertions are not affected by the User Guide for Cisco Security MARS Local Controller 78-17020-01...
Note that the sequences \A, \Z, and \z can be used to match the start and end of the subject in both modes, and if all branches of a pattern start with \A it is always anchored, whether PCRE_MULTILINE is set or not. User Guide for Cisco Security MARS Local Controller 78-17020-01...
The newline character is never treated in any special way in character classes, whatever the setting of the PCRE_DOTALL or PCRE_MULTILINE options is. A class such as [^a] will always match a newline. User Guide for Cisco Security MARS Local Controller 78-17020-01...
(not quite the same as \s) upper upper case letters word "word" characters (same as \w) xdigit hexadecimal digits User Guide for Cisco Security MARS Local Controller 78-17020-01...
(and it will therefore show up in data extracted by the pcre_fullinfo() function). An option change within a subpattern affects only that part of the current pattern that follows it, so (a(?i)b)c User Guide for Cisco Security MARS Local Controller B-10 78-17020-01...
As a convenient shorthand, if any option settings are required at the start of a non-capturing subpattern, the option letters may appear between the "?" and the ":". Thus the two patterns (?i:saturday|sunday) (?:(?i)saturday|sunday) User Guide for Cisco Security MARS Local Controller B-11 78-17020-01...
For example, {,6} is not a quantifier, but a literal string of four characters. User Guide for Cisco Security MARS Local Controller B-12...
Page 527
If the PCRE_UNGREEDY option is set (an option which is not available in Perl), the quantifiers are not greedy by default, but individual ones can be made greedy by following them with a question mark. In other words, it inverts the default behaviour. User Guide for Cisco Security MARS Local Controller B-13 78-17020-01...
If we use atomic grouping for the previous example, the matcher would give up immediately on failing to match "foo" the first time. The notation is a kind of special parenthesis, starting with (?> as in this example: User Guide for Cisco Security MARS Local Controller B-14 78-17020-01...
Outside a character class, a backslash followed by a digit greater than 0 (and possibly further digits) is a back reference to a capturing subpattern earlier (that is, to its left) in the pattern, provided there have been that many previous capturing left parentheses. User Guide for Cisco Security MARS Local Controller B-15 78-17020-01...
An assertion is a test on the characters following or preceding the current matching point that does not actually consume any characters. The simple assertions coded as \b, \B, \A, \G, \Z, \z, ^ and $ are described above. User Guide for Cisco Security MARS Local Controller B-16 78-17020-01...
This is an extension compared with Perl (at least for 5.8), which requires all branches to match the same length of string. An assertion such as User Guide for Cisco Security MARS Local Controller B-17...
"foo" preceded by six characters, the first of which are digits and the last three of which are not "999". For example, it doesn't match "123abcfoo". A pattern to do that is User Guide for Cisco Security MARS Local Controller B-18...
If the condition is not a sequence of digits or (R), it must be an assertion. This may be a positive or negative lookahead or lookbehind assertion. Consider this pattern, again containing non-significant white space, and with the two alternatives on the second line: (?(?=[^a-z]*[a-z]) \d{2}-[a-z]{3}-\d{2} \d{2}-\d{2}-\d{2} ) User Guide for Cisco Security MARS Local Controller B-19 78-17020-01...
If this were part of a larger pattern, you would not want to recurse the entire pattern, so instead you could use this: ( \( ( (?>[^()]+) | (?1) )* \) ) User Guide for Cisco Security MARS Local Controller B-20 78-17020-01...
If the syntax for a recursive subpattern reference (either by number or by name) is used outside the parentheses to which it refers, it operates like a subroutine in a programming language. An earlier example pointed out that the pattern (sens|respons)e and \1ibility User Guide for Cisco Security MARS Local Controller B-21 78-17020-01...
The day of month (1-31). Equivalent to %m/%d/%y. (This is the American style date, very confusing to non-Americans, especially since %d/%m/%y is widely used in Europe. The ISO 8601 standard format is %Y-%m-%d.) User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 538
The year within century (0-99). When a century is not otherwise specified, values in the range 69-99 refer to years in the twentieth century (1969-1999); values in the range 00-68 refer to years in the twenty-first century (2000-2068). User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 539
The week number of the year (Sunday as the first day of the week) using the locale's alternative numeric symbols. The number of the weekday (Sunday=0) using the locale's alternative numeric symbols. User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 540
%I, and %P is accepted as a synonym for %p. Finally The number of seconds since the epoch, i.e., since 1970-01-01 00:00:00 UTC. Leap seconds are not counted unless leap second support is available. User Guide for Cisco Security MARS Local Controller 78-17020-01...
Spyware are malicious applications that can be installed on a computer without the knowledge of the user, e.g. when one visits a web site or clicks on an advertising link or installs file User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 542
• This rule detects connectivity issues between CS-MARS and IOS - CS-MARS may not be able to dynamically turn on ACTIVE signatures on IOS. • System Rule: CS-MARS Database Partition Usage. User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 543
- such activities include excessive denies and scans, connection to backdoors, attempts to propagate worms etc. The presence of such activities may indicate that the host is compromised. System Rule: Misc. Attacks: Access Web Customer Data. • User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 544
This rule detects attempts to modify windows registry entries on a host. System Rule: Modify Host: Security. • This rule detects attempts to modify the security settings on a host. System Rule: Modify Host: Service. • User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 545
SMTP, HTTP, POP3 running on non-standard ports, (d) uncommon protocols such as FSP. System Rule: Network Activity: Windows Popup Spam. • This correlation detects excessive traffic (likely pop up spam) from the same source to the Windows Messenger service. User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 546
System Rule: New Malware Prevention Deployment Failed. • This rule detects that Cisco Incident Control Server (ICS) has failed to deploy ACLs or signatures to routers and IPS devices for preventing a new virus/worm/malware outbreak. System Rule: New Malware Traffic Match.
Page 547
(e.g. Windows L2TP, PPTP based RAS, IPSec etc.), followed by a successful logon. A password guessing attack consists of multiple login failures and may sometimes be caused by a user forgetting the password. System Rule: Password Attack: SNMP - Attempt. • User Guide for Cisco Security MARS Local Controller 78-17020-01...
Page 548
System Rule: Resource Issue: IOS IPS DTM. • This rule detects that a Cisco IOS router has too little memory for running the required set of ACTIVE IPS signatures. CS-MARS was not successful in downloading the complete ACTIVE signature set.
Page 549
TRANSITION state. A host enters the TRANSITION state when it is not running the Cisco Trust Agent (CTA) software and requires an out-of-band audit by an audit server to move it out of TRANSITION state to any one of HEALTHY, INFECTED, QUARANTINE, CHECKUP or UNKNOWN states.
Page 550
This rule detects excessive NAC status query failures from distinct hosts to the same Network Access Device (NAD). A Status query failure indicates a change in posture detected by the Cisco Trust Agent (CTA) after the initial authorization. Excessive status query failures may indicate a sign of end point instability caused by the user enabling or disabling agents.
Page 551
The attacks include buffer overflows, remote command execution attempts, privilege escalation attempts to become root, denial of service attempts etc. System Rule: Server Attack: RPC - Success Likely. • User Guide for Cisco Security MARS Local Controller D-11 78-17020-01...
Page 552
This correlation rule detects significant network status state change events such as system failing, failover occuring, interface cards coming up and down etc. • System Rule: State Change: SCADA Modbus. User Guide for Cisco Security MARS Local Controller D-12 78-17020-01...
Page 553
• This report details AAA based access (e.g. to the network or to specific devices). • Activity: AAA Based Access - All Events. Activity: AAA Based Access - All Events User Guide for Cisco Security MARS Local Controller D-13 78-17020-01...
Page 554
Activity: AAA Based Access Failure - All Events. • This report details all failed AAA (e.g. RADIUS, TACACS) based access attempts. Typically mechanisms such as 802.1x, network device access, Cisco NAC use AAA servers for access control. Activity: AAA Based Access Failure - All Events. •...
Page 555
This report ranks the session sources of all events seen by MARS over the past hour. This report is used by pages in the Summary tab. Activity: All - Top Sources. • Activity: All - Top Sources Activity: All - Top Users. • User Guide for Cisco Security MARS Local Controller D-15 78-17020-01...
Page 556
A backdoor event can be either an attempt to connect to a backdoor or a response from a server running a backdoor. Activity: Backdoor - Top Event Types. • User Guide for Cisco Security MARS Local Controller D-16 78-17020-01...
Page 557
Activity: Database Login Successes - Top Servers. • Activity: Database Login Successes - Top Servers Activity: Database Login Successes - Top Users. • This report ranks the database users by the number of successful logins. User Guide for Cisco Security MARS Local Controller D-17 78-17020-01...
Page 558
Activity: Database Regular Command Failures - All Events. • This report lists the event details for all failed non-privileged database command execution attempts. Activity: Database Regular Command Failures - All Events. • User Guide for Cisco Security MARS Local Controller D-18 78-17020-01...
Page 559
This report ranks the destination hosts to which attacks have been targeted but denied. Activity: Denies - Top Destinations. • Activity: Denies - Top Destinations Activity: Denies - Top Sources. • User Guide for Cisco Security MARS Local Controller D-19 78-17020-01...
Page 560
This report provides details for events that represent an user attempting to increase access rights on a particular host. Such attempts can happen remotely or from the local console and can be reported by Network or Host IDS devices or the hosts themselves User Guide for Cisco Security MARS Local Controller D-20 78-17020-01...
Page 561
This report records the Microsoft Windows system events, e.g. startup, shutdown, LSA registration, audit event discards, etc. Activity: Host System Events - All Events. • Activity: Host System Events - All Events Activity: Host User/Group Management - All Events. • User Guide for Cisco Security MARS Local Controller D-21 78-17020-01...
Page 562
This report provides a general usage pattern of the network. Activity: Network Usage - Top Destination Ports. • User Guide for Cisco Security MARS Local Controller D-22 78-17020-01...
Page 563
Activity: New Malware Prevention Deployment Failure - All Events. • This report lists all devices to which ACL and signature deployment attempts by a Cisco Incident Control Server, in response to a new virus/worm/malware outbreak, failed. Activity: New Malware Prevention Deployment Failure - All Events.
Page 564
Scans involve activities such as searching for alive hosts, open services on such hosts and detecting host configuration and application settings. Activity: Scans - Top Destination Ports. • Activity: Scans - Top Destination Ports • Activity: Scans - Top Destinations. User Guide for Cisco Security MARS Local Controller D-24 78-17020-01...
Page 565
Activity: Security Posture: NAC Agentless - Top Hosts. • This report captures the distribution of NAC tokens for end hosts that do not have Cisco Trust Agent (CTA) software. In this case, the posture validation is done either locally by the Network Access Device or via the Audit Server.
Page 566
System Rules and Reports List of System Reports This report captures the distribution of NAC tokens for end hosts that do not have Cisco Trust Agent (CTA) software. In this case, the posture validation is done either locally by the Network Access Device or via the Audit Server.
Page 567
For these end hosts, the NAD directly permits network access without consulting the posture validation server. • Activity: Security Posture: NAC Static Auth - Top NADs. User Guide for Cisco Security MARS Local Controller D-27 78-17020-01...
Page 568
This report details the top hosts that failed the status queries from the Network Access Devices (NAD). Such failures occur after initial authorization whenever there is a change in posture detected by the Cisco Trust Agent (CTA) on the end host. Such failures may be caused by user frequently enabling or disabling CTA agents.
Page 569
Activity: Vulnerable Host Found via VA Scanner. This report lists vulnerable hosts and associated vulnerabilities found by importing information from Vulnerability Analysis (VA) scanners. • Activity: Vulnerable Host Found via VA Scanner. User Guide for Cisco Security MARS Local Controller D-29 78-17020-01...
Page 570
Attacks: All - Top Rules Fired. • Attacks: All - Top Rules Fired Attacks: All - Top Sources. • This report ranks the sources of attack events seen by MARS over the past hour. User Guide for Cisco Security MARS Local Controller D-30 78-17020-01...
Page 571
Attacks: Password - All Events. • This report details all password attack events. Attacks: Password - All Events. • This report details all password attack events. Attacks: Password - Top Destinations. • User Guide for Cisco Security MARS Local Controller D-31 78-17020-01...
Page 572
Attacks: Uncommon or Anomalous Traffic - Top Event Types. • Attacks: Uncommon or Anomalous Traffic - Top Event Types • Attacks: Virus/Worms - Top Sources. This report ranks addresses that are the source of virus/worm propagation attempts. User Guide for Cisco Security MARS Local Controller D-32 78-17020-01...
Page 573
Configuration Issues: Network - Top Reporting Devices. • Configuration Issues: Network - Top Reporting Devices • Configuration Issues: Server - All Events. User Guide for Cisco Security MARS Local Controller D-33 78-17020-01...
Page 574
• This report lists event details for all events related to resource issues with the CS-MARS device, e.g. dropped events or netflow, etc. Resource Issues: CS-MARS - All Events. • User Guide for Cisco Security MARS Local Controller D-34 78-17020-01...
Page 575
This report summarizes the events that represent resource issues with servers. These are likely to be Host IDS events. Resource Issues: Server - Top Reporting Devices. • Resource Issues: Server - Top Reporting Devices Resource Utilization: Bandwidth: Inbound - Top Interfaces. • User Guide for Cisco Security MARS Local Controller D-35 78-17020-01...
Page 576
Resource Utilization: Memory - Top Devices. • This report ranks the memory utilization of the devices managed by PN-MARS. • Resource Utilization: Memory - Top Devices. Resource Utilization: Memory - Top Devices User Guide for Cisco Security MARS Local Controller D-36 78-17020-01...
Page 577
Groups of similar security events. An event type is the normalized signature from a reporting device. Event Types An event that resembles a valid security threat, but is not. False Positive An event that contributed to a rule firing. Firing Events User Guide for Cisco Security MARS Local Controller GL-1 78-17020-01...
Page 578
A user-defined request to the database on an automatic or on-demand basis. Report A discovered device that reports information – usually in the form of logs – to a MARS STM appliance. Reporting Device User Guide for Cisco Security MARS Local Controller GL-2 78-17020-01...
Page 579
NetFlow events, but the device is not defined in the appliance. Without a definition, MARS is unable to correlate events correctly as it needs to know which message format to use in parsing. A valid security threat. True Positive User Guide for Cisco Security MARS Local Controller GL-3 78-17020-01...
Page 580
Glossary User Guide for Cisco Security MARS Local Controller GL-4 78-17020-01...
Page 581
22-10, 23-9 user group 23-12 adding IP groups 23-4 adding service provider 22-11, 23-11 admin roles, see user management 23-9 Adobe SVG 17-10 alert action 21-15 Distributed Threat Management 21-15 User Guide for Cisco Security MARS Local Controller IN-1 78-17020-01...
Page 582
Cisco Secure ACS, 802.1x feature support 14-5 destination network ranking 20-6 Cisco Secure ACS, 802.1x support 14-1 destination ranking 20-6 Cisco Secure ACS, audit logs required by MARS 14-3 device,re-add 2-19 Cisco Secure ACS, bootstrap 14-3 devices Cisco Secure ACS, event logs studied by MARS...
Page 583
20-6 19-3 event type ranking 20-5 instances 19-6 Expand All matched rule 19-5 19-3 expired certificate severity 24-9 19-3 time 19-3 time ranges 19-4 incidents table User Guide for Cisco Security MARS Local Controller IN-3 78-17020-01...
Page 584
24-2 20-6 network ranking 20-6 Network Status tab Incidents 17-12 Top Destinations 17-13 MAC address report 20-7 Top Event Types 17-12 management Top Sources 17-13 events 23-1 23-3 User Guide for Cisco Security MARS Local Controller IN-4 78-17020-01...
Page 585
20-6 protocol ranking 20-6 unknown event report 20-7 public networks 2-38 use only firing events 20-8 event type grouping 20-11 event types 20-11 20-11 operation 20-12, 21-13 FOLLOWED-BY 20-12, 21-13 User Guide for Cisco Security MARS Local Controller IN-5 78-17020-01...
Page 586
20-24 variables 20-10 report views, recent 20-25 time range report views, total 20-24 last 20-8 rules start and end times 20-8 destination IP zone 20-12 21-8 query devices 21-8 User Guide for Cisco Security MARS Local Controller IN-6 78-17020-01...
Page 587
21-7 Simple Network Management Protocol Network Groups 21-7 See SNMP. 21-15 networks 21-7 SNMP RO, unsupported characters 2-9, 2-22, 2-29 variables 21-7 Snort runtime logging 24-1 syslog format expectation 6-28 User Guide for Cisco Security MARS Local Controller IN-7 78-17020-01...
Page 588
Topology variables 20-10, 20-11, 21-7, 21-8 toggle device display 17-12 traffic flows identify and enable 1-4, 16-8 troubleshoot,cannot add device 2-19 troubleshoot,cannot re-add device 2-19 tuning false positives 19-5, 19-9 User Guide for Cisco Security MARS Local Controller IN-8 78-17020-01...