Configuring the IDS Device Manager
The IDS Device Manager is probably the easiest management tool to use. The installation is relatively painless and the price is right. It comes installed on the sensor and is free with the purchase of the sensor software. You will see that just about everything you did with the other management applications, you can do with IDM. The only exception to this is that you can only configure one sensor at a time—the one you are logged on to. For most of us though, the graphical interface is familiar territory and easy to maneuver through.
There are four tabs located at the top of the screen just underneath the application name. The tabs are named Device, Configuration, monitoring, and Administration. You'll use these tabs to make any configuration changes, tune signatures, view current and archived logs, and perform other tasks. Note at the very top right-hand side of the screen, buttons for Logout, Apply Changes, Help, NSDB, and About.
The Device Tab
The Device tab allows you to make some basic configuration changes to your sensors. Just under the tab is a menu bar with one option, Sensor Setup. Here, you can make basic sensor modifications, like those done in sysconfig-sensor. You can also configure SSH, set the time, and change passwords (see Figure 4.40).
To make network changes, follow these steps:
-
Select Network. Figure 4.41 displays these settings, which are similar to those in sysconfig-sensor, with a few added fields.
-
Make changes to your sensor configuration in this screen. Ensure your Host ID is unique and your organization name and ID match the rest of your IDS infrastructure.
-
The PostOffice Port defaults to port 45000. In the Route Up and Route Down Alarm Level boxes, select how you want the two alarms to be displayed in your event viewer. The route going down defaults to high. This is fairly important and should catch your attention. The route coming back up may be less important so it is marked as informational, as shown in Figure 4.42, and may not even be displayed on your event viewer, depending on your configuration.
-
Select the Heartbeat Interval Multiplier. The Heartbeat is the number of seconds between queries for PostOffice services. Enable or disable TLS/SSL. TLS/SSL is on by default and the port is 443.
-
Click Allowed Hosts.
-
On the screen, you can add specific IP addresses or entire networks that can access the sensor (see Figure 4.43). Try to be as specific as possible. Least privilege is a good practice when giving access.
Note The idea of least privilege is quite simple in definition but rather difficult when put into practice. It requires that a user be given only the necessary privileges to perform a job. First, the user's job is identified and a minimum set of privileges is associated with the job function, thus allowing the user to perform the job with those privileges and nothing more.
-
Select Remote Access. In this window, you can specify whether to allow or disallow FTP or Telnet. Make your selection and click OK.
-
Click Generate Host Key and the system generates a new key, replacing the old one. The changes take affect once applied. Do not forget to update the fingerprint on remote systems (see Figure 4.44).
-
Select Time to modify the system time.
-
Version 3.1 allows you to modify the time, date, and time zone.
-
Version 4.0 provides more granularity allowing changes to time, date, time zone, UTC settings, NTP settings, daylight savings, and the duration of daylight savings.
-
-
Select Password if you need to change the passwords for the accounts root or netrangr.
-
Once you have completed any sensor configurations, select Finished.
The Configuration Tab
In the Configuration tab, you can configure the sensing engines: Communications, Logging, and Blocking. You also have the option to restore default settings in this screen. Take your time and hopefully you wont have to restore defaults. Keep in mind, signature tuning is time-consuming.
The sensing engine configuration is for tuning and enabling/disabling signatures. You can tune all of the signatures, specify the level of traffic, what port is used, even filter certain signatures that you do not want to see. You can also configure IP Fragmentation Reassembly Options (see Figure 4.45).
Notice that the different types of signatures are represented in groups on the screen. They have circles next to them that are either clear, half-filled, or filled. The clear circle means that none of the signatures in that specific group are enabled. The half circle means at least one signature is enabled, while a full circle means that all of the signatures are enabled.
If you want to enable all of the signatures in a certain group, put a check in the box next to the group, and click Enable at the bottom of the screen. To disable all of the signatures in a group, put a check in the box next to the group, and click Disable.
To configure or tune a signature, follow these steps:
-
Select a signature group. The screen should display all of the signatures in that group. If there is more than a single screen of signatures, scroll to the bottom of the screen and select the signature IDs to move to.
-
Once you have selected the signature to tune, click the little notepad icon next to the signature name. You should get a screen similar to that shown in Figure 4.46.
-
Make the changes necessary to meet the requirements in your security policy. If you move your cursor over the field name, it will tell you what needs to be entered in the field next to the name (see Figure 4.47).
-
Once you have tuned all of your signatures, use the Apply Changes button to have them implemented.
The Remote Hosts screen in the Configuration tab is used to specify hosts that receive events from the sensor. (Refer to Figure 4.48.)
The Event Logging screen in the Configuration tab is to define at what level an event gets logged, as well as what type of alarms are logged (see Figure 4.49).
The Blocking screen is used to configure blocking and shunning. Be extremely cautious when configuring blocking. You do not want to deny access to a customer, client, or business partner (see Figure 4.50).
The Restore Defaults screen does exactly what it says. It sets all of your configurations back to factory defaults.
The Monitoring Tab
In the Monitoring tab you have the ability to view logs, interface statistics, and download the event viewer. To view interface statistics, simply click Sensing Interface Statistics. It may take a few moments for the statistics to be displayed. The display resembles Figure 4.51.
To view event logs, follow these steps:
-
Select Logs. Here you can view Error and Command Logs, IP Session Logs, Current and Archived Event Logs, and System Messages.
-
Choose Current Events. The resulting output should resemble that shown in Figure 4.52.
The full output would look something like this:
3,10000030,2003/06/16,20:30:36,20003/06/16,14:30:36,10008,8,100,OUT,OUT,
5,2001,0,TCP/IP,192.168.2.5,10.0.0.32,0,0,0.0.0.0,
It's not very easy to read, but that's what the Event Viewer is for. It translates it all into easy-to-read records. We'll discuss the Event Viewer shortly. Table 4.2 describes each field in the .csv log file.
Field Value | Field Type |
---|---|
3 | Record Type |
10000030 | Record ID |
2003/06/16 | GMT Date Stamp |
20:30:36 | GMT Time Stamp |
2003/06/16 | Local Date Stamp |
14:30:36 | Local Time Stamp |
10008 | Application ID |
8 | Host ID |
100 | Organization ID |
OUT | Source Direction |
OUT | Destination Direction |
5 | Alarm Level |
2001 | Signature ID |
0 | SubSignature ID |
TCP | Protocol |
192.168.2.5 | Source Address |
10.0.0.32 | Destination Address |
0 | Source Port |
0 | Destination Port |
0.0.0.0 | Router Address |
With this in mind, let's run through downloading the Event Viewer from IDM so we can look at events in a format that's a little easier on the eyes. To download the Event Viewer, follow these steps:
-
From the Monitoring tab, select IDS Event Viewer from the menu bar. The screen should have a couple of links to choose from (see Figure 4.53).
-
Click the Event Viewer Readme link and review the signature updates and features.
-
Click the Download the Windows NT/2000 IDS Event Viewer link. This will initiate the download process to your workstation.
-
If there are signature updates, the link will be highlighted for you to download. Download if necessary.
-
Close this screen. (We discuss installing and configuring it later.)
The Administration Tab
In the Administration tab, you can configure automatic updates, view system information, run diagnostics on your sensor, set up severity levels for events, and start and stop processes. The two most useful options here are viewing system information and setting up automatic updates. To view the system information, click System Information in the menu bar (see Figure 4.54). This gives you the basic information necessary for troubleshooting. The following information should appear on the screen:
-
Sensor Version
-
Host Name
-
Host ID
-
Organization Name
-
Organization ID
-
PostOffice Port
-
Web Server Port
-
IP Address
-
Netmask
-
Default Route
-
CSIDS Daemon Status—Displays running daemons
-
CSIDS Connection Status—Displays the PostOffice connection status
-
CSIDS Version—Displays daemon versions
-
Administrative Tasks
-
Hardware
-
Operating System
-
CPU usage
-
Memory usage (in MB)
-
CSID Logging Disk Space Usage (in MB)
-
TAC
To configure automatic updates, follow these steps (see Figure 4.55):
-
In the Administration tab, select Update from the menu bar.
-
Enter the IP address of the FTP server in the FTP Server Field.
-
Enter the user account that will be used to connect to the FTP server in the Username field.
-
Enter the password of the user account in the Password field.
-
Enter the path (location) of the update files. Use a "/" at the beginning of the path.
-
Select the Disabled check box.
-
Select the Performed at check box and enter the times to check for updates.
There is also a Diagnostics option in the Administration tab. This is mainly used by the Cisco TAC personnel for troubleshooting. To run the diagnostics from the Administration tab, click Diagnostics, then click Run Diagnostics (see Figure 4.56). A diagnostics report will be displayed on the screen. Once you have run at least one diagnostics report, you will have the option of viewing the last diagnostics report by clicking View Last Report.
Lastly, remember that after you make any changes in IDM, you must always apply the changes. To apply the changes you have made to the sensor, click the Apply Changes button in the upper right-hand corner of the IDM screen. It may take some time, but when the changes are complete you will get a success message. Once you have made all of your configuration changes to IDM and your sensors, click Logout located next to the Apply Changes button