© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.

Slides:



Advertisements
Similar presentations
Chapter 1: Introduction to Scaling Networks
Advertisements

Access Control List (ACL)
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Chapter 9: Access Control Lists
Operating and Configuring Cisco IOS Devices © 2004 Cisco Systems, Inc. All rights reserved. Operating Cisco IOS Software INTRO v2.0—8-1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing & Switching.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 19: Configuring Windows Firewall
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
1 Semester 2 Module 6 Routing and Routing Protocols YuDa college of business James Chen
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Implementing Secure Converged Wide Area Networks (ISCW)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 5 – Implementing Intrusion Prevention.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Enterprise Network Security Accessing the WAN – Chapter 4.
Hands-On Microsoft Windows Server 2008
Using Windows Firewall and Windows Defender
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
Operating Cisco IOS Software
1. 2 Device management refers to the IDS Sensor's ability to dynamically reconfigure the filters and access control lists (ACL) on a router, switch, and.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 3 Configuring a Router.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 5: Implementing Intrusion Prevention
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicBSCI Module 6 1 Basic Switch Concept Prepared by: Akhyari Nasir Resources form Internet.
Chapter 5: Implementing Intrusion Prevention
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 2 – 6 IP Access Lists 1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Enterprise Network Security Accessing the WAN – Chapter 4.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
© 2003, Cisco Systems, Inc. All rights reserved. CSIDS 4.0—15-1 Chapter 15 Blocking Configuration.
Enterprise Network Security Accessing the WAN – Chapter 4.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
Chapter 4: Implementing Firewall Technologies
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Router Initialization steps.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
© 2002, Cisco Systems, Inc. All rights reserved..
© 2001, Cisco Systems, Inc. CSPFA 2.0—16-1 Chapter 16 Cisco PIX Device Manager.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
Introduction to networking (Yarnfield) Configure a router.
© 2002, Cisco Systems, Inc. All rights reserved..
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Configuring Network Devices
Working at a Small-to-Medium Business or ISP – Chapter 8
Enterprise Network Security
NAT , Device Discovery Chapter 9 , chapter 10.
Chapter 8: Monitoring the Network
Enterprise Network Security
Chapter 10: Advanced Cisco Adaptive Security Appliance
Enterprise Network Security
Presentation transcript:

© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features

© 2006 Cisco Systems, Inc. All rights reserved. Module 6: Cisco IOS Threat Defense Features Lesson 6.5: Configuring Cisco IOS IPS

© 2006 Cisco Systems, Inc. All rights reserved. Objectives  Identify the features of the Cisco IOS Intrusion Protection System (IPS).  Explain the purpose of.SDF files.  Describe methods for installing and configuring IPS on Cisco routers.

© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS IPS SDFs  A Cisco IOS router acts as an in-line intrusion prevention sensor.  Signature databases: Built-in (100 signatures embedded in Cisco IOS software) SDF files (can be downloaded from Cisco.com): Static (attack-drop.sdf) Dynamic (128MB.sdf, 256MB.sdf)—based on installed RAM  Configuration flexibility: Load built-in signature database, SDF file, or even merge signatures to increase coverage Tune or disable individual signatures

© 2006 Cisco Systems, Inc. All rights reserved. Downloading Signatures from Cisco.com attack-drop.sdf SDF contains 82 high-fidelity signatures, providing customers with security threat detection. When loaded, those signatures fit into the 64-MB router memory.

© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS IPS Alarms: Configurable Actions  Send an alarm to a syslog server or a centralized management interface (syslog or SDEE).  Drop the packet.  Reset the connection.  Block traffic from the source IP address of the attacker for a specified amount of time.  Block traffic on the connection on which the signature was seen for a specified amount of time.

© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS IPS Alarm Considerations  Alarms can be combined with reactive actions.  SDEE is a communication protocol for IPS message exchange between IPS clients and IPS servers: More secure than syslog Reports events to the SDM  When blocking an IP address, beware of IP spoofing: May block a legitimate user Especially recommended where spoofing is unlikely  When blocking a connection: IP spoofing less likely Allows the attacker to use other attack methods

© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS IPS Configuration Steps  Configure basic IPS settings: Specify SDF location. Configure failure parameter. Create an IPS rule and, optionally, combine the rule with a filter. Apply the IPS rule to an interface.  Configure enhanced IPS settings: Merge SDFs. Disable, delete, and filter selected signatures. Reapply the IPS rule to the interface.  Verify the IPS configuration. Note The default command ip ips sdf builtin does not appear in this IPS configuration example because the configuration specifies the default built- in SDF.

© 2006 Cisco Systems, Inc. All rights reserved. Basic IPS Settings Configuration Router# show running-config | begin ips ! Drop all packets until IPS is ready for scanning ip ips fail closed ! IPS rule definition ip ips name SECURIPS list 100 !... interface Serial0/0 ip address ! Apply the IPS rule to interface in inbound direction ip ips SECURIPS in...

© 2006 Cisco Systems, Inc. All rights reserved. Enhanced IPS Settings Configuration ! Merge built-in SDF with attack-drop.sdf, and copy to flash Router# copy flash:attack-drop.sdf ips-sdf Router# copy ips-sdf flash:my-signatures.sdf Router# show runnning-config | begin ips ! Specify the IPS SDF location ip ips sdf location flash:my-signatures.sdf ip ips fail-closed ! Disable sig 1107, delete sig 5037, filter sig 6190 with ACL 101 ip ips signature disable ip ips signature delete ip ips signature list 101 ip ips name SECURIPS list interface Serial0/0 ip address ! Reapply the IPS rule to take effect ip ips SECURIPS in...

© 2006 Cisco Systems, Inc. All rights reserved. Verifying Cisco IOS IPS Configuration Router# show ip ips configuration Configured SDF Locations: flash:my-signatures.sdf Builtin signatures are enabled but not loaded Last successful SDF load time: 13:45:38 UTC Jan IPS fail closed is enabled... Total Active Signatures: 183 Total Inactive Signatures: 0 Signature 6190:0 list 101 Signature 1107:0 disable IPS Rule Configuration IPS name SECURIPS acl list 100 Interface Configuration Interface Serial0/0 Inbound IPS rule is SECURIPS Outgoing IPS rule is not set

© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS IPS SDM Configuration Tasks  Tasks included in the IPS Policies wizard: Quick interface selection for rule deployment Identification of the flow direction Dynamic signature update Quick deployment of default signatures Validation of router resources before signature deployment  Signature customization available in the SDM IPS Edit menu: Disable Delete Modify parameters

© 2006 Cisco Systems, Inc. All rights reserved. Launching the IPS Policies Wizard Launch the wizard with the default signature parameters. Customization options Select IPS.

© 2006 Cisco Systems, Inc. All rights reserved. IPS Policies Wizard Overview

© 2006 Cisco Systems, Inc. All rights reserved. Adding an SDF Location Add SDF location. Optionally, use built-in signatures as backup.

© 2006 Cisco Systems, Inc. All rights reserved. Selecting an SDF Location Select location from flash. Select location from network.

© 2006 Cisco Systems, Inc. All rights reserved. Current SDF Location

© 2006 Cisco Systems, Inc. All rights reserved. Viewing the IPS Policies Wizard Summary

© 2006 Cisco Systems, Inc. All rights reserved. Verifying IPS Deployment

© 2006 Cisco Systems, Inc. All rights reserved. IPS Policies

© 2006 Cisco Systems, Inc. All rights reserved. Global Settings

© 2006 Cisco Systems, Inc. All rights reserved. Viewing All SDEE Messages Select message type for viewing.

© 2006 Cisco Systems, Inc. All rights reserved. Viewing SDEE Status Messages Status messages report the engine states.

© 2006 Cisco Systems, Inc. All rights reserved. Viewing SDEE Alerts Signatures fire SDEE alerts.

© 2006 Cisco Systems, Inc. All rights reserved. Selecting a Signature Edit signature.

© 2006 Cisco Systems, Inc. All rights reserved. Editing a Signature Click to edit. Select severity.

© 2006 Cisco Systems, Inc. All rights reserved. Disabling a Signature Group Select category. 1 Select All. 2 Disable. 3 4

© 2006 Cisco Systems, Inc. All rights reserved. Verifying the Tuned Signatures

© 2006 Cisco Systems, Inc. All rights reserved. Summary  The Cisco IOS IPS acts as an in-line intrusion detection sensor, watching packets and sessions as they flow through the router and scanning each packet to match any of the Cisco IOS IPS signatures.  IPS can be configured via IOS command line or using the SDM.  The SDM provides a wide range of configuration capabilities for Cisco IOS IPS.  SDM offers the IPS Policies wizard to expedite deploying the default IPS settings. The wizard provides configuration steps for interface and traffic flow selection, SDF location, and signature deployment.

© 2006 Cisco Systems, Inc. All rights reserved. Q and A

© 2006 Cisco Systems, Inc. All rights reserved. Resources  Configuring Cisco IOS IPS Using Cisco SDM and CLI 900aecd8043bc32.shtml

© 2006 Cisco Systems, Inc. All rights reserved.