Upon completion of this chapter, you will be able to perform the following tasks: • Define features and key concepts of the Security Monitor.. • Administer Security Monitor event rules
Trang 1Chapter 16
Trang 2Upon completion of this chapter, you will be able
to perform the following tasks:
• Define features and key concepts of the Security Monitor.
• Install and verify the Security Monitor functionality.
• Monitor IDS devices with the Security Monitor.
• Administer Security Monitor event rules.
• Use the reporting features of the Security Monitor.
• Administer the Security Monitor server.
Trang 3Introduction
Trang 4What Is the Security Monitor?
The Security Monitor provides event
collection, viewing, and reporting
capability for network devices.
Trang 5Security Monitor Features
The following are the Security Monitor
features:
• Monitors the following devices:
– Sensor appliances – IDS Modules
– IOS Routers – PIX Firewalls
Trang 6Installation
Trang 7Installation Requirements
• Hardware
– IBM PC-compatible computer with 800 MHz or faster
– Color monitor capable of viewing 256 colors
– CD-ROM drive – 100 Mbps or faster network connection
• Memory—1 GB of RAM minimum
• Disk drive space
– 12 GB minimum – NTFS
• Software
Trang 8Client Access Requirements
• Hardware—IBM PC-compatible computer with a 300 MHz or faster
• Memory—256 MB of RAM minimum
• Disk drive space—400 MB virtual memory
• Software
– Windows 98 and NT 4.0
– Windows 2000 Professional with Service Pack 2
– Windows 2000 Server/Advanced Server with Service Pack 2
• Browser
– Internet Explorer 6.0 or later (recommended)
– Netscape Navigator 4.79 or later
Trang 9Installation Overview
• VMS Common Services is required for the
Security Monitor.
• VMS Common Services provides the
CiscoWorks server-based components, software libraries, and software packages developed for the Security Monitor.
Trang 10Security Monitor Installation
Trang 11Component and Database Location
Selection
Trang 12Database Password
and Syslog Port
Trang 13Communication Properties
Trang 14Upgrade Process
Trang 15Getting Started
Trang 16CiscoWorks Login
Trang 17CiscoWorks User
Authorization Roles
• CiscoWorks user authorization roles allow different
privileges within the VMS and the Security Monitor:
– Help Desk—Read-only for the entire system
– Approver—Read-only for the entire system
– Network Operator—Read-only for the rest of the system
and generates reports
– Network Administrator—Configures devices, and
modifies reports and rules
– System Administrator—Performs all operations
• Users can be assigned multiple authorization roles.
Trang 18CiscoWorks Add User
Choose Server Configuration>Setup>Security>Add Users.
Trang 19Security Monitor Launch
Choose VPN/Security Management>Management Center>Security Monitor.
Trang 20Action buttons
Trang 21Security Monitor Configuration
Trang 22Security Monitor Configuration
Security Monitor configuration operations are:
• Adding Devices—Security Monitor monitors the following types of
Trang 23Choose Devices.
Trang 24RDEP Devices—Add
Choose Devices and Select Add.
Trang 25RDEP Devices—Add (cont.)
Trang 26PostOffice Devices—Add
Trang 27IOS IDS Devices—Add
Trang 28Choose Devices and Select Import.
Trang 29Devices—Import (cont.)
Trang 30Choose Monitor>Connections.
Trang 31Choose Monitor>Statistics.
Trang 32Monitor—Statistics (cont.)
Trang 33Event Notification
• Event notification is completed by creating event rules.
• The following tasks are involved in creating an event rule:
– Assign a name to the event rule.
– Define the event filter criteria.
– Assign the event rule action.
– Define the event rule threshold and interval.
– Activate the event rule.
Trang 34Event Rules—Step 1
Choose Admin>Event Rules>Add.
Trang 35Event Rules—Step 2
Trang 36Event Rules—Step 3
Trang 37Event Rules—Step 4
Trang 38Event Rules—Activation
Choose Admin>Event Rules>Activate.
Trang 39Event Viewer
Trang 40Event Viewer
Trang 41Security Monitor—Event Viewer
Choose Monitor>Events.
Trang 42Event Viewer Options
Configuring the Event Viewer involves understanding the following options:
• Suspending and Resuming New Events
• Changing Display Preferences
• Creating Graphs
• View Option
Trang 43Event Viewer—Moving Columns
Trang 44Event Viewer—Deleting Rows and Columns
Choose Monitor>Events>Delete.
Trang 45Event Viewer—Collapsing Columns
Choose Monitor>Events>Collapse.
Trang 46Event Viewer—Setting the Event Expansion
Boundary
Trang 47Event Viewer—Expanding Columns
Choose Monitor>Events>Expand.
Trang 48Event Viewer—Suspending and Resuming
New Events
Trang 49Event Viewer—Changing Display
Preferences
Choose Monitor>Events>Preferences.
Trang 50Event Viewer—Creating Graph
Choose Monitor>Events>Graph.
Trang 51Event Viewer—View Option
Choose Monitor>Events>View.
Trang 52Administration and Reporting
Trang 53Security Monitor Administration
Trang 54Admin—Database Rules
Choose Admin>Database Rules>Add.
Trang 55Admin—Database Rules (cont.)
Choose Admin>Database Rules>Add>Next.
Trang 56Admin—System Configuration Settings
Choose Admin>System Configuration.
Trang 57Admin—PostOffice Settings
Choose Admin>System Configuration>Postoffice Settings.
Trang 58Admin—Defining Event Viewer Preferences
Trang 59Admin—Defining Event Viewer Preferences
(cont.)
Choose Admin>Event Viewer>Your Preferences.
Trang 60Security Monitor Reports
Trang 61Choose Reports>Generate.
Trang 62Reports—Generate (cont.)
Trang 63Reports—Schedule Report
Trang 64Reports—View
Choose Reports>View.
Trang 65Summary
Trang 66• To efficiently monitor the events from multiple devices on your network, you can
configure Event Rules for Security Monitor.
Trang 67Summary (cont.)
• Event Rules enables you to perform one of the following
actions when Security Monitor receives certain events:
– Send an email notification
– Generate an audit (console) message
– Execute a script
• Event Viewer enables you to view the alerts received by your
monitored devices in a graphical interface
• Security Monitor can generate reports based on the information stored in the Security Monitor database.
Trang 68Lab Exercise
Trang 69idsmP
.6
idsmQ 4
sensorP
.4 sensorQ
.100
172.30.Q.0 172.30.P.0
Lab Visual Objective
.10
172.26.26.0 150
.50
WEB FTP
RBB