1. Trang chủ
  2. » Giáo Dục - Đào Tạo

Tài Liệu CCNA - Enterprise Intrusion Detection System Monitoring And Reporting

69 299 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 69
Dung lượng 3,98 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Upon completion of this chapter, you will be able to perform the following tasks: • Define features and key concepts of the Security Monitor.. • Administer Security Monitor event rules

Trang 1

Chapter 16

Trang 2

Upon completion of this chapter, you will be able

to perform the following tasks:

Define features and key concepts of the Security Monitor.

Install and verify the Security Monitor functionality.

Monitor IDS devices with the Security Monitor.

Administer Security Monitor event rules.

Use the reporting features of the Security Monitor.

Administer the Security Monitor server.

Trang 3

Introduction

Trang 4

What Is the Security Monitor?

The Security Monitor provides event

collection, viewing, and reporting

capability for network devices.

Trang 5

Security Monitor Features

The following are the Security Monitor

features:

Monitors the following devices:

Sensor appliancesIDS Modules

IOS RoutersPIX Firewalls

Trang 6

Installation

Trang 7

Installation Requirements

Hardware

IBM PC-compatible computer with 800 MHz or faster

Color monitor capable of viewing 256 colors

CD-ROM drive100 Mbps or faster network connection

Memory—1 GB of RAM minimum

Disk drive space

12 GB minimumNTFS

Software

Trang 8

Client Access Requirements

Hardware—IBM PC-compatible computer with a 300 MHz or faster

Memory—256 MB of RAM minimum

Disk drive space—400 MB virtual memory

Software

Windows 98 and NT 4.0

Windows 2000 Professional with Service Pack 2

Windows 2000 Server/Advanced Server with Service Pack 2

Browser

Internet Explorer 6.0 or later (recommended)

Netscape Navigator 4.79 or later

Trang 9

Installation Overview

VMS Common Services is required for the

Security Monitor.

VMS Common Services provides the

CiscoWorks server-based components, software libraries, and software packages developed for the Security Monitor.

Trang 10

Security Monitor Installation

Trang 11

Component and Database Location

Selection

Trang 12

Database Password

and Syslog Port

Trang 13

Communication Properties

Trang 14

Upgrade Process

Trang 15

Getting Started

Trang 16

CiscoWorks Login

Trang 17

CiscoWorks User

Authorization Roles

CiscoWorks user authorization roles allow different

privileges within the VMS and the Security Monitor:

Help Desk—Read-only for the entire system

Approver—Read-only for the entire system

Network Operator—Read-only for the rest of the system

and generates reports

Network Administrator—Configures devices, and

modifies reports and rules

System Administrator—Performs all operations

Users can be assigned multiple authorization roles.

Trang 18

CiscoWorks Add User

Choose Server Configuration>Setup>Security>Add Users.

Trang 19

Security Monitor Launch

Choose VPN/Security Management>Management Center>Security Monitor.

Trang 20

Action buttons

Trang 21

Security Monitor Configuration

Trang 22

Security Monitor Configuration

Security Monitor configuration operations are:

Adding Devices—Security Monitor monitors the following types of

Trang 23

Choose Devices.

Trang 24

RDEP Devices—Add

Choose Devices and Select Add.

Trang 25

RDEP Devices—Add (cont.)

Trang 26

PostOffice Devices—Add

Trang 27

IOS IDS Devices—Add

Trang 28

Choose Devices and Select Import.

Trang 29

Devices—Import (cont.)

Trang 30

Choose Monitor>Connections.

Trang 31

Choose Monitor>Statistics.

Trang 32

Monitor—Statistics (cont.)

Trang 33

Event Notification

Event notification is completed by creating event rules.

The following tasks are involved in creating an event rule:

Assign a name to the event rule.

Define the event filter criteria.

Assign the event rule action.

Define the event rule threshold and interval.

Activate the event rule.

Trang 34

Event Rules—Step 1

Choose Admin>Event Rules>Add.

Trang 35

Event Rules—Step 2

Trang 36

Event Rules—Step 3

Trang 37

Event Rules—Step 4

Trang 38

Event Rules—Activation

Choose Admin>Event Rules>Activate.

Trang 39

Event Viewer

Trang 40

Event Viewer

Trang 41

Security Monitor—Event Viewer

Choose Monitor>Events.

Trang 42

Event Viewer Options

Configuring the Event Viewer involves understanding the following options:

Suspending and Resuming New Events

Changing Display Preferences

Creating Graphs

View Option

Trang 43

Event Viewer—Moving Columns

Trang 44

Event Viewer—Deleting Rows and Columns

Choose Monitor>Events>Delete.

Trang 45

Event Viewer—Collapsing Columns

Choose Monitor>Events>Collapse.

Trang 46

Event Viewer—Setting the Event Expansion

Boundary

Trang 47

Event Viewer—Expanding Columns

Choose Monitor>Events>Expand.

Trang 48

Event Viewer—Suspending and Resuming

New Events

Trang 49

Event Viewer—Changing Display

Preferences

Choose Monitor>Events>Preferences.

Trang 50

Event Viewer—Creating Graph

Choose Monitor>Events>Graph.

Trang 51

Event Viewer—View Option

Choose Monitor>Events>View.

Trang 52

Administration and Reporting

Trang 53

Security Monitor Administration

Trang 54

Admin—Database Rules

Choose Admin>Database Rules>Add.

Trang 55

Admin—Database Rules (cont.)

Choose Admin>Database Rules>Add>Next.

Trang 56

Admin—System Configuration Settings

Choose Admin>System Configuration.

Trang 57

Admin—PostOffice Settings

Choose Admin>System Configuration>Postoffice Settings.

Trang 58

Admin—Defining Event Viewer Preferences

Trang 59

Admin—Defining Event Viewer Preferences

(cont.)

Choose Admin>Event Viewer>Your Preferences.

Trang 60

Security Monitor Reports

Trang 61

Choose Reports>Generate.

Trang 62

Reports—Generate (cont.)

Trang 63

Reports—Schedule Report

Trang 64

Reports—View

Choose Reports>View.

Trang 65

Summary

Trang 66

To efficiently monitor the events from multiple devices on your network, you can

configure Event Rules for Security Monitor.

Trang 67

Summary (cont.)

Event Rules enables you to perform one of the following

actions when Security Monitor receives certain events:

Send an email notification

Generate an audit (console) message

Execute a script

Event Viewer enables you to view the alerts received by your

monitored devices in a graphical interface

Security Monitor can generate reports based on the information stored in the Security Monitor database.

Trang 68

Lab Exercise

Trang 69

idsmP

.6

idsmQ 4

sensorP

.4 sensorQ

.100

172.30.Q.0 172.30.P.0

Lab Visual Objective

.10

172.26.26.0 150

.50

WEB FTP

RBB

Ngày đăng: 23/10/2015, 18:07

🧩 Sản phẩm bạn có thể quan tâm

w