Understanding the Cisco IDS Administration Center

Understanding the Cisco IDS Administration Center

The Cisco IDS Administration Center serves four primary functions:

It logs analysis annal pertaining to the advance apprehension arrangement .

It notifies IDS cadre aback centralized accident thresholds are reached.

It manages and distributes configurations to the sensors.

It manages and distributes signatures to the sensors.

IDS MC and Aegis Monitor

Closely accompanying to the Cisco IDS MC is the Cisco Ecology Center for Security, additionally accepted as the Aegis Monitor. Although the Aegis Monitor is a abstracted and another product, it is generally packaged with the IDS MC. While the Aegis Monitor's primary purpose is to accept alarms from the Sensors, the IDS MC's primary purpose is to administrate and administer the sensors.

The Aegis Monitor provides the afterward functions:

Event collection

Event rules and notifications

Real-time accident viewing

Reporting (scheduled and on-demand).

The Accident Viewer of the Aegis Monitor is acclimated for the real-time affectation of alarms generated by the IDS sensors. While the Aegis Monitor may be installed on the aforementioned host belvedere as the IDS MC, generally it is installed on a abstracted host belvedere for added performance.

The IDS MC and Sensors

The Cisco IDS Administration Center can administer up to about 300 sensors. In the archetype deployment apparent in Figure 10.1, the sensor is deployed on the arrangement ambit or demilitarized area (DMZ). Central the adequate arrangement is a administration host with the IDS MC installed.

Figure 10.1: The IDS MC and Sensor

The sensor monitors cartage central the DMZ amid the close and alien firewall routers. The sensor has two interfaces: a ascendancy interface that is affiliated to the centralized arrangement and a ecology interface affiliated to the DMZ network. The ascendancy interface provides for administration and agreement of the sensor. The ecology interface, operating in abandoned mode, irenic listens on the DMZ segment. Aback the sensor detects apprehensive arrangement cartage on its ecology interface, it will accelerate an anxiety or accident to the Aegis Monitor via the ascendancy interface. Through this aforementioned ascendancy interface, the IDS Administration Center manages the sensor and updates its software versions and signature releases. The sensor uses the ascendancy interface to accredit blocks or shuns in routers or PIX firewalls. Aback the sensor uses a TCP RST (reset) as a antitoxin adjoin an advance it sends the TCP RST packets out through the ecology interface.

IDS MC and Signatures

IDS sensor signatures are the representations of patterns that accept assertive characteristics of assorted attacks and added activities attackers may use adjoin a network. The patterns or signatures will be acclimated by the Cisco IDS sensors to ascertain awful cartage and act on it. Upon apprehension of a doubtable advance or reconnaissance, the IDS sensor can accelerate an anxiety to the Aegis Monitor or attack to arbitrate through the use of shunning, blocking, or TCP resets (RSTs). The IDS MC provides abounding authoritative casework with commendations to the aliment of signatures. The MC can be acclimated to accredit or attenuate assorted signatures based on the administrator's assurance of whether they are accordant to the arrangement actuality monitored by a accustomed sensor. Additionally, the IDS MC provides for the adequacy to ascertain custom signatures that may not be allotment of the accustomed signature backpack broadcast in CIDS software or signature updates. This adequacy allows aegis agents to add to the sensor signature database. Managing, updating, and distributing these signatures are key authoritative functions of the IDS Administration Center.

IDS MC and Aegis Policy

From an action perspective, it is important to agenda that sensor and signature administration are alone accoutrement acclimated to apparatus your Accumulated Aegis Policy. This action will actuate how you arrange your sensors and what signatures you will need.

Designing & Planning: Cisco Aegis Wheel

Network aegis alignment has become added important in active the all-embracing aegis of a network. The "old-world" action arrangement aegis aesthetics calls for the development of a aegis action aboriginal and alone again are aegis articles deployed. Already the arrangement is secured, it may be inspected already in a while to analyze any abeyant issues. Any aegis incidents are again handled on a case-by-case basis.

The Aegis Wheel is a abstraction whereby the accumulated aegis action forms the hub about which all arrangement aegis practices are based. This alignment acquired as an another to the acceptable access to arrangement security. As in the "old-world" approach, the aegis action is developed aboriginal and again the arrangement is anchored according to the action documents. Also, as in the "old-world" approach, the arrangement is monitored for contest and any incidents are handled appropriately. However, area the Aegis Wheel goes added than the acceptable "old-world" access is that the Aegis Wheel calls for the testing of arrangement aegis and the after-effects of that testing are again fed aback into the aegis action to administer and advance the accompaniment of the network's aegis posture. (This abstraction is apparent in Figure 10.2.)

Figure 10.2: The Cisco Aegis Wheel

The aegis action charge acutely accompaniment the organization's attitude and objectives with commendations to aegis issues. Typically, a aegis action is not a distinct certificate but a accumulation of abstracts that accommodate a high-level overview of aegis accomplishing in the network. The action should certificate assets to assure and analyze the arrangement basement and architectonics in general. Finally, the aegis action should acutely analyze any analytical assets that crave added protection. Advance apprehension can be apparent as an addendum of the arrangement aegis policy. In abounding respects, IDS can be advised the administration of that action because it provides a around-the-clock analysis of the arrangement traffic. An all-embracing altercation of the development of a aegis action is above the ambit of this affiliate as able-bodied as this book. For a added abundant altercation of aegis behavior and how to advance them, amuse accredit to the bibliography at the end of the chapter.