Home

Users Guide - Educational Service Unit #3

image

Contents

1. om SECURITY EDGE PLATFORM Users Guide Version 5 1 12 October 22 2008 Deepnines Security Edge Platform 2008 Deepnines Inc All rights reserved Deepnines Technologies Security Edge Platform Security Edge System Sleuth9 Security System Sleuth9 ForensiX Capture System Holistic Management Console and Zero Footprint Technology are trademarks and or registered trademarks of Deep Nines Inc All other brands and products are trademarks and or registered trademarks of their respective owners Protected by US Patents 6 930 978 and 7 058 976 Users Guide v5 1 12 Deepnines Security Edge Platform End User License Agreement Warranty Policy This End user License Agreement the Agreement is an agreement between you both the individual installing the Product and any legal entity on whose behalf such individual is acting hereinafter You or Your and Deep Nines Inc hereinafter Deepnines Taking any action to setup or install the product constitutes your acceptance of this end user license agreement Written approval is not a prerequisite to the validity of enforceability of this agreement and no solicitation of any such written approval by or on behalf of you shall be construed as an inference to the contrary If you have ordered this product and such order is considered an offer by you Deepnines acceptance of your offer is expressly conditional on your assent to the terms of this agreement to th
2. Mees Cua ehe Meri Ephem j 13 Figure 5 3 Configuring SMTP Protocol Handling Screen Users Guide v5 1 7 5 3 Deepnines Security Edge Platform To configure flow control for POP3 1 akon 10 11 12 13 14 15 Navigate to the Protection Policy highlight and click on Flow Control The Flow Control screen appears Figure 5 4 Create a new Flow Control configuration for POPS traffic by clicking lt NEW gt Enter data for Name and Group Click on Match Rules tab on top row of tabs Click and place check mark in small box next to Protocol Click on pull down menu to display options Protocol TCP 6 Click and place check mark in small box next to Inside Port Range Inside Port Range 110 110 Click and place check mark in small box next to Outside Port Range Outside Port Range 110 110 Click and place check mark in small box next to Direction Click on pull down to display options Direction Both Click on Control tab on top row of tabs Click and place check mark in small box in Conversation Figure 5 5 Select Conversations Limit 1000 by selecting up amp down arrows Select Control Only from pull down menu Click Protocol Handling tab on top row of tabs Select Mail POP3 button Figure 5 6 Click lt SAVE gt LL Match fetes Centra Protocel Haag Faget eran tal Shi T pto em Figure 5 4 Configuring POP3 Match Rules Screen Users Guide v5 1 7
3. 499 9 El Save B Print Figure 6 26 Summary View of Signature Violations Report Types To view one of the Summary reports described above Select the dates that the report should encompass Select GET REPORT gt button From the drop down menu in the middle of the results view pull down and select the desired report f additional reports are desired user can pull down the drop down bar to select a different report NOTE Once the date has been selected there is no need to click Get Report again unless the date has changed All of the reports can be viewed without having to select Get Report again To view Detail report information Select the Detail tab from the top of the results pane Figure 6 27 Select the dates that the report should encompass Select GET REPORT Report button Users Guide v5 1 7 6 52 Deepnines Security Edge Platform Detail report information can be sorted scrolled or drilled down by Source or Destination IP address Source or Destination Port Classification Contains SID Contains and Protocol A combination of drill down capabilities can also be used together There is also a Newer and Older feature that will allow the user to see the next set of detailed information if there are more than 500 records returned from the report From 8 22 2007 1 41 57 PM PDT w To 8 24 2007 1 41 57 PM PDT y Get Report Summary Detail Source A
4. Users Guide v5 1 7 6 11 Deepnines Security Edge Platform Query Tag Tales On zA y Sapoti y Sowce Post y Devisen ip y Delia Port y Pratocot fo iv tai STET Pafi oah Paste metron E tater Top Talent eb l ue e sis j uus gt gt ean fort humum Conn F Figure 6 7 Top Talkers Display Sorting top talker information can be done by selecting or pressing the information header of that particular column The listed information is displayed as follows Source Port Destination IP Destination Port Protocol Total Packets Total Bytes Dropped Packets Dropped Bytes Users Guide v5 1 7 6 12 Deepnines Security Edge Platform 6 2 5 Edge ForensiX The Edge ForensiX display Figure 6 8 allows you to see the EFX host that the SEP is connected to the number of offloads that have been captured from the SEP and sent to the EFX database the last offload rate average offload rate and the average capture rate Additionally there are real time graphs that show the actual offload rate and capture rate For additional information on the Edge ForensiX refer to the EFX Users Guide Figure 6 8 Edge ForensiX Display Users Guide v5 1 7 6 13 Deepnines Security Edge Platform 6 2 6 Users The User display Figure 6 9 shows users currently logged onto the SEP a Pe SEP Vayda dew dee priva cru Meet ior beer 7 aan dew deest urs com Prue p 20 Figure 6 9 Users Display 6 2 7 Alarm Viewer
5. 5 30pm 9pm 9pm 12am ALWAYS ON everyday DISABLED everyday SCHOOLDAY M F AFTERNOON M F EVENING M F FULL DAY M F DAY amp EVENING M F AFTER SCHOOL M F NIGHTS M F WEEKENDS Sat Sun NIGHTS amp WEEKENDS Monday Friday Saturday Sunday Users Guide v5 1 7 5 11 Deepnines Security Edge Platform 5 4 2 Putting It All Together For Custom URL Filtering There is only one default behavior and that is the DEFAULT POLICY Flow Spec Step One The first step is creating a spreadsheet with your objectives An example of a spreadsheet is illustrated in the following table AD Group 8 00 AM 3 00 PM 5 30 PM 9 00 PM Weekend K 5 URL Rule URL Rule Default Default Default Students Set 01 Set 01 Policy Policy Policy 6 8 URL Rule URL Rule URL Rule Default URL Rule Students Set 01 Set 02 Set 02 Policy Set 02 9 12 URL Rule URL Rule URL Rule URL Rule URL Rule Students Set 02 Set 03 Set 03 Set 03 Set 03 Teachers URL Rule URL Rule URL Rule URL Rule URL Rule Set 02 Set 04 Set 04 Set 04 Set 04 Admin URL Rule URL Rule URL Rule URL Rule URL Rule Set 04 Set 04 Set 04 Set 04 Set 04 Group URL Rule URL Rule URL Rule Default Default None Set 01 Set 01 Set 01 Policy Policy In the above table the Default Policy is set to
6. SEP allows you to configure each of the available virus scanning engines to provide a maximum attachment size and to specify Edge ForensiX capture of virus data 6 5 2 4 Capturing Virus and Emails To Capture Virus and Emails to the Edge ForensiX System 1 Activate the Capture When Repaired check box to capture data about viruses that were successfully removed from attachments 2 Activate the Capture When Unrecoverable check box to capture data about viruses that could not be removed from attachments 3 To capture data about all viruses found in attachments activate both check boxes 4 Click lt SAVE gt to immediately apply your changes to a running system and to maintain the settings until you change them again or click one of the following a Click lt APPLY gt to immediately apply your changes to a running system but discard those changes the next time the SEP host is rebooted b Click lt RESET gt to discard your changes without applying or saving them Users Guide v5 1 7 6 64 Deepnines Security Edge Platform 6 5 2 5 Setting Maximum Attachment Size To configure a virus scanning proxy for options 1 Verify that the unit on which to configure virus scanning is the active host 2 Select the Virus Scanning folder from the Setup folder Figure 6 35 then click either SMTP Capture for SMTP or POP3 Capture for POP3 Current engine configuration values are displayed CL 95 Edge Management Comole s SEP dock dev_dospr
7. To quickly display the health level of any SEP host 1 Log into the host to monitor 2 Locate the host name in the Command Explorer pane of the Edge Management Console and position the mouse cursor over the name The unit s health is displayed in a pop up that disappears when you move the mouse cursor off the name The SEP unit is operating normally The SEP unit is operating in a degraded condition but it is still capable of functioning SEP has detected an external fault such as a failed internal external link One or more of the SEP Virus Scanning daemons is not running Available memory RAM is below 5 of the total available memory The Security Edge Platform Traffic Manager is not running SEP has detected a possible intrusion the signature of a key system file has changed the permissions or ownership of a key system file has changed or suspicious files have been detected To view complete system health statistics 1 Login to the host whose health is to be monitored 2 Select System Resources from the Monitors folder Figure 6 44 Users Guide v5 1 7 6 79 Deepnines Security Edge Platform A des denpeirms comiWenttumA stem Resources Host dr rom SEP Versime D 6418 Neid BEEN wewsune Trafic Maragemost DU o NENNEN wms MN renew CE Des Pocket mapoctisn COT Uu Fite nate NT Tie itiusions TW Sussex Fee ST CPU Utilization sme lo qum interrupts Por Second Di
8. NOTE Required Permission You must have the May Perform User Management permission to perform the operations described in this section Users with this permission are SEP super users and can assign any permission to other users There must be at least one SEP super user for each SEP host 6 7 1 Creating Maintaining User Accounts When you create a user account you provide the SEP user with a user ID and password that is used to log in to the SEP host You must create a user account on each SEP host that a user will access User accounts may also include the user s email address and specify the alarm types of interest to the user When email and alarm types are configured for a SEP user SEP automatically notifies the user when alarms of interest are generated Additionally user accounts include permissions allowing you to limit user access to actions appropriate for that user You can create user accounts from either the Setup folder or the Users folder To create a user account 1 Verify that the unit on which to create the new user account is the active host Use the System Resources tab in the Command Explorer to view information pertaining to the status of the currently connected SEP 2 From the Setup folder select Users User configuration options appear in the Action pane 3 From the Users folder select Manage User configuration options appear in the action pane Users Guide v5 1 7 6 89 Deepnines Security Edge Plat
9. Post Office Protocol version 3 POPS is the de facto standard for email transmissions across the Internet using TCP IP connections Reverse Address Resolution Protocol RARP is a network layer protocol used to obtain an IP address for a given hardware address such as an Ethernet address The Security Edge Platform SEP is a unified threat management UTM appliance that is deployed in front of the router or at critical points in the network architecture and acts as the first line of defense for the network Simple Mail Transfer Protocol SMTP is the de facto standard for email transmissions across the Internet using TCP IP connections As part of Protection Policies Static Blocking provides built in blocking for known traffic anomalies The Top Talkers Report is a snapshot representing which conversations or flows are using most of the bandwidth The SEP Traffic Manager contains variables that are set by Deepnines Research and Development for optimal performance Unified Threat Protection Intrusion Prevention System UTP protects against multiples attack types IPS prevents attacks rather than detecting Virtual LAN commonly known as a vLAN or as a VLAN is a method of creating independent logical networks within a physical network VRT rules are the latest tested rules that can be obtained There is an annual fee associated with this service G 2
10. Run Clean up Script Everyday at Set to every hour by default Will instantly purge the database regardless of Purge Now Buttons configured days Will purge all of the report data for AV DPI and Network PUE Al Epa Anomalies Reports Will delete any of the previously queried reports that are still on the system Delete All Reports Li Save Anti Virus Report pta Save DS Sigma es Report ptc Foot Corfo Save Retmar Anomaly Report Ugi Save UR Fie Faport pti Fan Cleanup Scripts Everyday M HH Miir L gt Diva der doane cam Pranay 189 2 a FEY deeper nm Prat d Parge af Hepert Geta Figure 6 45 Reporting Condition Screen Users Guide v5 1 7 6 81 Deepnines Security Edge Platform NOTE The reporting system that resides on the SEP is very robust and contains detailed information It is recommended to leave the default settings in place and to save copies of the reports in HTML format for historical reporting purposes 6 5 13 Save Configuration The SEP User Interfaces allows you to export or import SEP configuration files To export a configuration file Log in to the SEP host Select Save Configuration from the Setup folder Select Export Navigate to the local system folder that you want to save the configuration file to Press lt Save gt The SEP will encrypt the configuration file when the export occurs so you will need to set a password 7 Confirm password and Select
11. There are numerous places in the Management Console to view alarms that are generated by the SEP The alarms can be viewed in both the Monitors section and the top Tree View of the EMC Each is explained below in detail NOTE You must have alarms enabled within the Alarm Delivery section of the Set up folder to view alarms within the EMC By default all alarms are enabled to be viewable in the EMC Users Guide v5 1 7 6 14 Deepnines Security Edge Platform In Monitors To view alarms in the Monitors section of the EMC navigate to the Alarm Viewer section of the Monitors folder as shown below 9 Monitors 9 System Resources Network Traffic Flow Statistics O Top Ta 9 EdgeForens e Users Alarm Viewer LogFile Viewer As alarms are generated they will be viewable in this window If clearing the alarms is desired select CLEAR from the bottom right This will clear the field and start inserting any new alarms In Top Tree View To view alarms in the Tree View section of the EMC navigate to the Alarms section of the Top Tree view that is labeled Alarms as shown below hydra dev deepnines com oahu dev deepnines com As alarms are generated they will be viewable in this window Figure 6 10 If clearing the alarms is desired click CLEAR from the bottom right This will clear the field and start inserting any new alarms NOTE If you are logged into more than one SEP then t
12. 6 5 2 2 Customizing Virus Scanning Messages SEP notifies a message s intended recipient when a virus was detected and cleaned from an attachment when a virus was detected and the attachment could not be repaired and when an attachment is too long to be scanned for viruses You can customize the messages that SEP transmits in these situations To customize virus scanning messages 1 Verify that the unit on which to customize virus scanning messages is the active host 2 Open the Virus Scanning folder from the Setup folder Figure 6 34 Current system messages appear in the Virus Alert Message folder 3 Customize the messages as desired Messages may be of any length and may contain any combination of alphanumeric characters symbol and punctuation characters and spaces 4 Click SAVE to immediately apply your changes to a running system and to maintain the settings until you change them again or click one of the following Users Guide v5 1 7 6 63 Deepnines Security Edge Platform a Click lt APPLY gt to immediately apply your changes to a running system but discard those changes the next time the Sleuth9 host is restarted b Click lt RESET gt to discard your changes without applying or saving them fj Ps L ge Management Corsole Ys SEP dock dev deepnines comietegi Virus Scansing Virus Alert Messages verat Virus Merle pe Figure 6 34 The Virus Alert Messages Display 6 5 2 3 Configuring Virus Scanning Options
13. Deepnines Security Edge Platform Command Explorer Pane J ca a dev doepames com fruar 2974 ETET DTI Mechas oms Pretec andi gr Action Pane Figure 3 5 EMC Console Main Window The Command Explorer pane is organized hierarchically Table 3 1 describes each of the folders functionality Monitors Provides graphical representations of SEP operations for your review Protection Policies Provides configuration options for Static Blocking Conversation Symmetry and Flow Control Reporting Allows for generation of reports from AV Network Anomalies and Deep Packet Inspection events Setup Provides configuration and setup options for the active SEP unit Update Allows for special configuration of Anti Virus update sites Surf Control updates and configuration query of updated DPI Signatures Users Provides configuration and management options for users Operations Users Guide v5 2 1 A single panel from which SEP operations can be managed Table 3 1 EMC Command Explorer 3 5 Deepnines Security Edge Platform 3 5 Navigating the Command Explorer Pane You can navigate the Command Explorer using the mouse or the keyboard To navigate the Command Explorer using the mouse To open a folder double click the folder name or click the handle or plus depending on which look and feel you have selected next to the folder icon To execute a command click the comma
14. Reporting data is only viewable for the last 15 days of detections The below sections will describe each report and the different methods to obtain information from them Anti Virus Report The anti virus report allows administrators to view what types of viruses have been detected and stopped by the SEP unit as well as detailed information about the email that was infected In Section 6 4 1 we talked about how to pull reports In this section we describe what types of reports are available and how to use them There are two tabs at the top left of the results pane Summary The types of summary reports are described in the below chart Figure 6 23 Detail Per detail of the violation detection Users Guide v5 1 7 6 45 Deepnines Security Edge Platform Table 6 10 lists each summary report type and their descriptions ype Will list Virus names and number of occurrences of each Will show the top sender of emails This shows emails sent not only viruses Will show the top receiver of emails this shows emails received not Receiver only viruses Cleaned Viruses Will show the virus name and count Cleaned viruses mean the SEP was able to correct the virus and keep the original email Will show the virus name and count Un cleaned viruses mean the Uncleaned Viruses SEP was not able to clean the virus and therefore took the infected attachment out of the email and replaced it with a text file explain such Table 6 10
15. b as long as you pay the applicable annual maintenance and support fee Users Guide v5 1 12 V Deepnines Security Edge Platform Renewal Rate You may renew annual maintenance and support at any time based on the value identified and declared by you in your purchase order and pursuant to the then current Deepnines annual maintenance and support terms and conditions which are available at www Deepnines com Deepnines reserves the right to cancel any subscription based service at the end of the agreed upon term Renewal Escalation Deepnines reserves the right to increase but in no event decrease the renewal rate for the annual maintenance and support at the end of the agreed upon term This price increase shall be by no more than a percentage equal to the percentage set by the United States Department of Labor Consumer Price Index CPI for the given time period or term of the agreement 4 Title and Intellectual Property All rights title and interest in and to the licensed product shall remain with Deepnines and its licensors The licensed product is protected under international copyright trademark and trade secret and patent laws The license granted herein does not constitute a sale of the licensed product or any portion or copy of it 5 Term and Termination The license granted under Section 2 of this agreement is a perpetual license and will terminate only if such termination results from your material breach of your obligation
16. or is unwanted on the network You can create flow specifiers to match any number of specific criteria including inside or outside port and or inside or outside IP address including net mask If traffic passing through SEP matches more than one flow specifier SEP selects the disposition that provides the most aggressive network protection To create modify or delete a Flow Specifier Figure 6 19 1 Select Flow Control from the Protection Policies folder 2 Select NEW to create a new Flow Specification NOTE For new Flow Specifier creation make sure to click lt NEW gt for a brand new flow specifier Clicking NEW RULE gt will add a rule inside an existing flow specifier If this occurs and is not wanted click lt RESET gt and start over with the lt NEW gt button 3 Enter the Name of the flow specifier The name can be anything however it is best to name it something that pertains to the flow specifier you are creating i e if you want to monitor control the outgoing SMTP email traffic then the name of the flow specifier could be SMTP outbound 4 Adjust the horizontal splitter on menu to view all of table and data view Continue reading the sections below to fill in the rest of the desired information Refer to Figure 6 19 Users Guide v5 1 7 6 30 Deepnines Security Edge Platform lege cu LL reper dga der deqrwres com f a Firw Core 4 gt teen Hatch Pates Control Pyotoco Handin
17. 1 7 6 72 Deepnines Security Edge Platform 6 5 6 Flow Tags A flowtag is a relatively short identifier 8 characters long that can be added to the flow status information for a conversation protocol session between a pair of hosts Flowtags associated with a flow can then be used as additional fields to match the flow to control functions that is a Match Rule can be defined to require one or two specific flowtag values in order to match a flow To create a New Rule 1 Log into the SEP host 2 Select Flow Tags from the Setup folder Figure 6 40 3 Click lt New Rule gt 4 Select from two options in Tag Source Type DPI Rule ID or by Directory Group 5 From the drop down box select Tag Name 6 Click Save to save the changes Tag Seance Type 4 gt 3 minor Directory Goer 5 Tuine Ohea Desc righe Figure 6 40 Flow Tags Screen Users Guide v5 1 7 6 73 Deepnines Security Edge Platform 6 5 7 Hosts List White and black hosts lists can be configured from this screen Any HTTP requests that match an IP Address in the white list will be allowed access while those HTTP requests that match an IP Address in the black list will be blocked To add a host address 1 Log into the SEP host Select Flow Tags from the Setup folder Figure 6 41 Select Trusted List or Untrusted List tab Click Add A pull down menu appears Click Save to save the changes S gt on ev Gee pa
18. 2 7 3 Support Numbers Personalized Support for Critical Operations ATC offers around the clock personalized proactive and skilled support from an assigned technical support engineer who is familiar with your Deepnines product deployment and support history Contact by Telephone at 1 866 DEEP9 12 866 333 7912 Contact by Email at tso Deepnines com Online Support Visit www deepnines com to download and or view documents and datasheets that can assist you with deployment scenarios offer troubleshooting tips and product management features Training Classes Deepnines offers training courses that cover various aspects and technical features typically not covered in the basic SEP training course This expert training covers advance troubleshooting techniques and granular tuning of the Security Edge Platform To take advantage of this expert training or to request more information contact Deepnines via Email at tso Deepnines com Users Guide v5 1 7 7 1 Deepnines Security Edge Platform Appendix A 0 DPI Rules A 1 Deep Packet Inspection provides another layer of inspection for a variety of intrusions Deep Packet Inspections is disabled on each flow specifier by default You have the option to enable it for each flow control Once enabled you can disable it again if needed DPI Rule Writing Before using the Deepnines Deep Packet Inspection engine a short tutorial on the rules and how they work along with a sho
19. 5 4 Deepnines Security Edge Platform teg AP TR RTO Or M rn bara T me rion Merc n etate Lama Praia basia cal A Convets Users Guide v5 1 7 Schons MRS ON Conrad 10 ir mr 9m 1000 Con t Ot Fee Times Wip Hamas eq dong o an LIE ILLI ar dn mde e eg cpm mtem Lind Lorna irm rd pl mtm deir n ht rest iter nnm md rd a hes ori iain m t cmt Pons endi amet tene Manes Prweocet ied dat oct 13 Match Fases Comins Figure 5 6 Configuring POP3 Protocol Handling Screen 5 5 Deepnines Security Edge Platform 5 3 How to Create a Flow Spec for IPS and IPS IDS This example illustrates how to create a normal flow spec for IPS protection on conversation rate of TCP port 80 If needed it can be changed to also control on bit packet rate This example can be modified for any other type of TCP traffic In this particular flow protection for inbound outbound traffic is described Perform the following steps to create flow specs for IPS and IPS IDS use 1 arf wh 8 9 10 11 12 13 14 Navigate to the Protection Policy highlight and click on Flow Control The Flow Control screen appears Figure 5 7 Create a new Flow Control configuration by clicking lt NEW gt Enter data for Name and Group Click on Match Rules tab on top row of tabs Click and place check mark in small box next to Protocol Click on pull down menu to display options Protocol TCP 6 Click and place a check mar
20. Block If the Default Policy were set to Forward there would not be any controls placed on the K 12 students during the evenings nights and weekends If an AD group is specified in a Flow Spec for one schedule period Flow Specs will need to be created for all the schedule periods Otherwise the control will go to the Default Policy Group None does not specify a default behavior for AD Groups that are managed in any other Flow Spec Group None is intended to cover users that do not belong to a group already managed in a Flow Spec Using the table above Group None might cover parents substitute teachers teacher s aids and kitchen staff Step Two You will need to create your URL rule sets a Create the Flow Tags containing the AD Groups We do not have the ability to assign users to a flow tag All controls are done at an AD Group level You can combine multiple AD Groups into a single Flow Tag Each Flow Tag is given a Priority where 1 is the highest If a user belongs to multiple AD Groups included in multiple Flow Tags the user will always be associated with the highest priority Flow Tag regardless of schedule An example of this would be Joe belongs to a group included in Flow Tag X which is set to priority 1 Joe also belongs to a group included in Flow Tag Y which is set to priority 2 Flow Tag X is included in Flow Spec X scheduled for the School Day Flow Tag Y is included in Flow Spec Y scheduled for Aft
21. IP address of detections the direction of where the detections came from as well as other detail information The Signature Violations reporting will give the administrator summary and detail information about what types of Deep Packet Inspection signatures have been detected Signature Identification numbers classifications signature message detail count and individual address information detail is also viewable The URL Filters reporting will give the administrator a summary and detailed trend analysis of URLs that are blocked allowed or redirected Users Guide v5 1 7 6 43 Deepnines Security Edge Platform 6 4 4 Generating Reports For each reporting type Anti Virus Network Anomalies Signature Violations URL Filters the administrator will be presented with the same type of initial configuration that will be necessary to pull report data To search report data a date from which the report should start needs to be defined Select the From date 1 From the top of the report pane select the drop down bar from the From panel to expose a selectable calendar Figure 6 21 2 Select the day that is desired to search from by clicking on that day 3 To select a time the user can click on the hour minute or second hand and while holding the left mouse button down drag the hand to the desired time Alternatively the user can enter the information into the date field by clicking on the date and then typing the information in
22. ImageStream The OpenSSL Project Xerces C XML parser Free Software Foundation Inc gnu libgetopt libregex Java Borland Genlogic SunMicrosystems Javadless Incors Jfree Hypercronix Subscription SEP Subscription Based Software Kaspersky KAV Engine 5 5 4 34 For EFX 2 0 and higher junit jfree apache commons beanutils lang logging net poi collections codec jfreereport monarch date trove4j jgoodies mindprod postgresql For EIQ 2 0 and higher Apache License apache tomcat http www apache org licenses perl http dev perl org licenses dom4j http www dom4j org license html hibernate http Awww hibernate org 356 html postgresql http www postgresql org about licence log4j http logging apache org and http www apache org foundation licence FAQ html c3p0 http www mchange com projects c3p0 index html LGPL nessus licensed pursuant to the Tenable Network Security Inc Registered Plugin Feed Subscription License Agreement net snmp tcl used by expect perl scripts http dev perl org licenses Net Nessus ScanLite Config IniFiles IO Socket SSL Net Telnet TermReadKey Net SSLeay nessus parse General Third Party Licenses to use the following software Apache License Version 2 0 January 2004 http www apache org licenses GNU General Public License v 2 June 1991 http www gnu org copyleft gp html Tenable Network Security Inc Registered Plugin Feed Subscription
23. Summary Report Types CS S L ga Nanagerrent Corot 9240007 13530 9M POT To 2042007 33826 PM POT des Esport lop Furasils Bye ben tots tata bees tetate es thy adon Category tutam Ferre iy ctim sarten UU fois eias Uf s iy ae se 4 o team Seve Orsen 95 See AR D pure Figure 6 23 Summary Report Types Users Guide BA Deepnines Security Edge Platform To view one of the Summary reports described above Select the dates that the report should encompass Click GET REPORT gt button From the drop down menu in the middle of the results view pull down and select the desired report If additional reports are desired user can pull down the drop down bar to select a different report NOTE Once the date has been selected there is no need to click Get Report again unless the date has changed All of the reports can be viewed without having to select Get Report again To view Detail report information Select the Detail tab from the top of the results pane Select the dates that the report should encompass Click GET REPORT gt button Detail report information can be sorted scrolled or drilled down by Sender Contains Receiver Contains Virus Name Contains and Cleaned Status 6 4 3 Network Anomalies Report In Section 6 4 1 we talked about how to pull reports In this section we describe what types of reports are available and how to use them The Network Anomaly Report allows
24. URL Filtering refer to Section 6 5 16 URL Filters ADDITIONAL HOW TOs Create New Custom DPI Rules Reconfigure a New Network Interface Card or Reconfigure Existing Ones Access the Reporting System Access the Hallpass System Users Guide v5 1 7 5 14 Deepnines Security Edge Platform SEP Resources 6 1 Overview This section provides an overview of the folder resources available to configure and control the SEP from the Command Explorer pane Available resources are Monitors Protection Policies Reporting Setup Update Users Operations Expanding on each of these folder resources allows you to select informational and configurable settings that are displayed NOTE Do not attempt to change any system configuration parameters for the Security Edge Platform at the operating system level Attempting to do so could break the SEP appliance All system configuration parameters such as the unit s IP address must be configured through the EMC 6 2 Monitors The Monitors section of the Command Explorer provides a graphical representation of the following displays c Monitors nning us Scanner Activity vit Alarm LogFil e Viewer Users Guide v5 1 7 6 1 Deepnines Security Edge Platform This display allows the current logged on user to view other users that are logged onto the system It will also display hostname and logon time information Each of the graphical dis
25. are in plain text format and may be pasted into any application Users Guide v5 1 7 6 16 Deepnines Security Edge Platform G dv Edge Menagermest Carnnle ds SEPIdock dev deegnives comiiterttersil eg File Viewer 23 11 227 xk CEF 17730 Deak her aepatemer c 395 mam op Got new somecio fom 127 2 0 on 4 30 op 28 112227 dx CEF 17736 Desa herdinpoirter c 1234 process si Aespned err 1647 ty 1 90 EMT Chri 98 2 112221 dock CEF 37730 udin disp helper c 17 wif vest s 127301 logged n Aug 79 11221 dock CHF 17726 Deepak herdbapatztie t t 205 rain Joop ol pew consecsos fom 127 0 0 1 on ie i 20 112271 dock CRT 7230 Demat her da palime t 1234 peocens aed Aegned art ted ha Me 171 ES Cent 79 14 1224 Ox CHT 17290 Dirk ter depatiner t NI read mig errar on sieut asco iem H1 itin ag 20 14 1224 dack CON 11798 Dugakcher padre t THN cheep MI anosa oreki p 91 EMO cest mapping om sie In Mug 33 141224 aoc CEF 11238 Dugatkterdipalinat t B0 rad reg err on AREA Socket qon fae 30 ssim ib ug 23 141224 OX CEF 57238 Dogak ter dspalinat p 15504 eaa fd Formae orc ide Fa 30 EMC cest mas ping m siit Ret ug 23 141224 aock CEF 1723609029099 1035 Pit pet cC4157 33 at a1 527 d 0 lagg d ast i 23 14 1 01 noc CEF 17236 Dispak herd costi r 395 nin Joop ot pes zosu noa fom 27 4 07 on 24 i 23 14 1 amp 0 dock CEF 17236 DGoak terd patihut 11734 process Sid Ace gn d at ide45 la ti 30 EZ Ciani i 28 14 1 01 mock CER 17236 Aree pa 405 gu tt Seat 30 3271 0 logge
26. bad frag toobig Reassembled packet would be bigger than 64K bytes frag badfirst First fragment must be at least 256 bytes or some other problem frag badlength Length of data must be multiple of 4 bytes except for last fragment frag inactive A previous fragment was dropped later fragments no longer accepted Table 6 12 Types of Anomalies 6 4 4 Signature Violations Report In Section 6 4 1 we talked about how to pull reports In this section we describe what types of reports are available and how to use them The Signature Violations Report allows administrators to view what types of signatures have been detected by the SEP unit as well as detailed information about the DPI detections There are two tabs at the top left of the results pane Summary The types of summary reports are described in the below chart Figure 6 26 Detail Per detail of the violation detection Figure 6 27 Table 6 13 lists each summary report type and their descriptions Report Type Description Will display the Signature ID number the classification it belongs to the Signature ID message of the actual signature and the number of times that signature ID was detected Will display only the classification from which the violation occurred and the number of times it has been detected Classification Will display the IP address of the senders that a violation has occurred These Sender can display both ou
27. copy of such certificate or document to Deepnines Payment Terms All fees prices and other monetary amounts stated in this agreement are in United States Dollars and are exclusive of taxes unless expressly specified otherwise Unless otherwise specified all amounts payable under this agreement will be due within thirty 30 days after the date of an invoice in respect thereof You will pay a fee equal to the lower of one and one half percent 1 5 per month or the highest legal rate allowed on all past due balances owed by you under this Agreement You also agree to pay Deepnines all reasonable costs and expenses of collection including attorneys fees If you fail to remit any amount payable to Deepnines within thirty 30 days after the date of due payment Deepnines may in addition to all other rights and remedies under this agreement and at law or equity terminate this agreement under the provisions of Section 5 1 of this agreement Amounts that are due and payable will survive the termination of this agreement Questions Should you have any questions concerning this Agreement contact the manufacturer at Deepnines Inc 14643 Dallas Parkway Ste 150 Dallas Texas 75254 or our website www Deepnines com Users Guide v5 1 12 viii Deepnines Security Edge Platform ADDENDUM Third Party Software For SEP 4 4 1 and higher Perpetual Postgresql Hunny XStream MIME toolkit Performance Technologies Inc HDLC Frame Transfer drivers
28. in Table 6 2 Users Guide v5 1 7 Deepnines Security Edge Platform 2 9s Lige Menagement Comale s SIP Mhawall der dcepnines com Mostters Virus Scamning SM IP Activity file ph owe a WO TEOHNHOLOGIES B us SEF anes Y CI homai dev oinqwurves cosy Primary 140 t E wore re SMTP Active Workers gt 7 hydra dev dere cate Pira y 160 L A ana Figure 6 2 SMTP Activity Display Email Processed Displays the total number of SMTP emails processed or scanned since the up time date time Displays the total number of virus infected SMTP emails since the up time Infected Emails data time Shows the number of emails that were repaired virus removed and sent original email Table 6 2 Label and Explanations Users Guide v5 1 7 6 4 Deepnines Security Edge Platform NOTE If an email is un repairable and contains an attachment the attachment is replaced with a text file This text file has the same file name as the virus but the file extension is txt If the user opens the file they will see a message that the original attachment was infected and has been deleted These messages can be customized and are discussed further under the configuration section The line graphs will allow the user to view how many active workers are being used by the SMTP Scanner as well as if there are any email conversations waiting in the queue There are 112 assigned to the SMTP Scanner Depending on the number of
29. in typing Remember that the root password is a critical part of system security Password Password confirm Fig 2 2 Root Password Screen 3 Enter password twice for Linux root account and click lt OK gt Users Guide v5 2 1 2 2 Deepnines Security Edge Platform The reformatting of the disk drive and package installation occurs and will take several minutes to complete Once installation is complete the system will reboot You will need to verify that system is complete and can accomplish this by performing the following 4 Atthe command prompt type the following gt Login root gt Password XXXXXXXX gt Ping xx x xxx xx IP address of primary DNS server A ping is a computer network tool to test whether your host is reachable across the IP network It will send echo requests to your host your primary DNS server and listen for an echo response replies If successful you will receive bytes of data back from the DNS server When complete a statistical summary is printed This process will ensure that your system is responding There are several components that can be utilized that perform various functions within SEP A key component is the Edge Management Console EMC and you will need to launch this application when the Security Edge Platform SEP Operating System OS is installed on your server Chapter 3 Edge Management Console EMC describes the procedures for launching the EMC Console NOTE
30. lt OK gt ONE QI To import a configuration file Log in to the SEP host Select Save Configuration from the Setup folder Select Import Navigate to the local system folder that you have saved the configuration file Press lt Open gt Qva Oa NOTE You will be prompted stating that the entire configuration will be imported and all components of the SEP will be shutdown and restarted This will momentarily stop traffic on the network while the import is made 7 Click lt Yes gt when prompted to modify the entire configuration file 8 The SEP will decrypt the configuration file when the import occurs so you will need to enter your password Confirm password and click lt OK gt 10 Click Yes or No if you want to replace configuration file on host hostname Users Guide v5 1 7 6 82 Deepnines Security Edge Platform 6 5 14 System Identification The SEP System Identification configuration options include setting the default gateway for email alarm notification specifying the IP address for the SEP administrative interface and assigning cluster and node IDs to SEP units To set SEP System Identification Configuration options 1 Login to the SEP host 2 Select System Identification from the Setup folder Figure 6 46 Q Steuth Holistic Management Console Steuth 9 10 B 200 117 Setup System Idiomit ation fm bm nep System Hama My SEP Systom 1236567591011 Dufaut Gateway 10 10 300 30
31. of the outside router the subnet mask to 32 and the port to 520 Set the inside IP address to address for the multicast message 224 0 0 9 the subnet mask to 32 and the port to 520 For the second match rule for the inside router s Set the outside IP address to the address for the multicast message 224 0 0 9 the subnet mask to 32 and the port to 520 Set the inside IP address to the IP address of the inside router the subnet mask to 32 and the port to 520 Edge ForensiX The Edge ForensiX tab of the Flow Specifier allows the capture of either protocol headers or the entire payload of the packets matching that flow This information is stored locally on the SEP in an EFX partition Once the files reach 32MB in size they will automatically be transferred to the EFX Database System To enable this option it is required that you have the Edge ForensiX Appliance as well as the SEP Refer to the EFX Users Guide for instructions on how to capture packet information Saving Flow Specifiers Once all criteria for the Flow Specifier are defined the administrator can save or apply the rule to put the Flow Specifier in motion To save or apply a Flow Specifier 1 Click SAVE to immediately apply your changes to a running system and to maintain the settings until you change them again or click one of the following 2 Click lt APPLY gt to immediately apply your changes to a running system but discard those changes
32. one can enter that protocol number into the field and then press Tab The SEP will automatically look it up and display the corresponding protocol name and number Defining IP Addresses To define a particular IP address Source or Destination check the box next to the Inside or Outside Address field This field will now become active and the desired IP address can be entered into the field The subnet mask will default to a 32 single IP address If a range is desired enter the IP address range and then change the corresponding subnet mask For example a Class C needs to be defined for 10 8 200 0 The subnet mask would need to change from 32 to a 24 Include If Include is selected the match rule is normal Exclude If Exclude is selected the match rule causes any matching flow to be excluded from control by the flow spec even if it would otherwise match Users Guide v5 1 7 6 32 Deepnines Security Edge Platform Defining Each The Each feature that is within the Flow Specifier is applied to the Outside and Inside IP addresses only primarily because it will pertain to each individual IP address For example The Administrator has created a rule for incoming HTTP traffic and has set the control to 5Mbps of bandwidth and DPI It is almost impossible to know what outside IP addresses will be visiting your website but the way the rule is set up one of those IP addresses can flood you with at least 5Mbps of traffic before action wo
33. same steps 6 If the user is to receive system alarms activate the check box associated with the alarm of interest Table 6 20 The Select All button offers the ability to activate all alarm check boxes The Clear All button offers the ability to clear all the alarm check boxes Alarm Type Contents Alarms generated when an attempt to log in to a SEP host Authentication Alarms fails Alarms generated when traffic levels reach the limits entered on any flow specifier that is configured to generate alarms Flow Specifier Alarms Alarms generated when the partitions for the Edge Edge ForensiX System Alarms ForensiX System are full Alarms generated when the health level of a SEP host High Availability Health Alarms changes Alarms generated when a SEP host changes from primary mode to alternate mode or from alternate to primary High Availability Status alarms Users Guide v5 1 7 6 91 Deepnines Security Edge Platform Virus Detect Alarms Alarms generated when a virus is detected Virus Signature Updated Alarms Alarms generated when a virus signature is updated Table 6 20 Alarm Types 7 Assign permissions to the user by activating the check box associated with the permission to be granted Table 6 21 The Select All button offers the ability to activate all permission check boxes The Clear All button offers the ability to clear all permission check boxes Permission Meani
34. should log out of the EMC and then login again with the new Admin IP of the SEP 6 5 15 Traffic Manager The SEP Traffic Manager contains variables that are set by Deepnines Research and Development for optimal performance Under certain conditions changes or adjustments may need to be made for the respective network NOTE Any changes to the Traffic Manager other than those mentioned below can severely impact performance To set SEP Traffic Manager Configuration options 1 Login to the SEP host 2 Select Traffic Manager from the Setup folder 3 Apply changes if applicable to fields Figure 6 47 Options and their descriptions are listed in Table 6 17 4 Click Apply to apply the changes Click Save to make the changes persistent to the SEP configuration file 6 Click Reset to cancel any changes made e Users Guide v5 1 7 6 84 Deepnines Security Edge Platform The SEP has two modes of operation Normal and Bypass The default state is in Normal operation in which all traffic pass Forwarding Mode through the Traffic Manager In Bypass mode no traffic is examined or can be blocked and will pass from one interface to the other Scan Threshold lt NEED DATA gt Scan Window in mins lt NEED DATA gt Scanner Block Timeout in mins lt NEED DATA gt Start of Morning lt NEED DATA gt Start of Afternoon lt NEED DATA gt Start of Evening lt NEED DATA gt Start of Ni
35. still be allowed to pass by default There are other checks that occur with fragments that can lead to blocking them such as order of arrival overlap size etc Malformed The Malformed flow specifier controls all packets with invalid data that cannot be matched to any other flow specifier for example a packet that is shorter than the minimum packet length The purpose of this flow specifier is to collect information on malformed packets for forensic capture and system monitors Malformed packet control is managed elsewhere in the system This flow specifier cannot be deleted The matching fields of this flow specifier cannot be modified The control fields of this flow specifier are ignored Edge ForensiX capture cannot include the protocol headers for Malformed Packets ICMP The ICMP flow specifier controls all ICMP packets that are not specifically blocked by the system s static blocking rules By default it set to forward The matching fields of this flow specifier can be modified The control fields of this flow specifier may be modified Users Guide v5 1 7 6 29 Deepnines Security Edge Platform 6 3 4 2 Creating and Maintaining Flow Specifiers You can create as many flow specifiers as necessary to control the traffic that enters and leaves your network You will need to create a flow specifier for each protocol to be allowed into the network The Default flow specifier controls all traffic that does not match any other flow specifier
36. the contents of the hard drive Remove the CD and reboot if you don t want this To install or upgrade D8BaseOS in SEP kickstart mode press lt ENTER gt To install or upgrade D8BaseOS in graphical mode type Linux and press lt ENTER gt To install or upgrade D8BaseOS in text mode type linux text and press lt ENTER gt Use the function keys listed below for more information F1 Main F2 Options F3 General F4 Kernel F5 Rescue Figure 2 1 SEP Warning Screen Users Guide v5 2 1 2 1 Deepnines Security Edge Platform 2 Select one of the following options For standard installation of the D9BaseOS in SEP kickstart mode press lt ENTER gt The installation process begins and will take approximately 2 4 minutes to complete The license agreement appears and you are prompted with the following Do you accept license term Y N Enter Hostname Enter your host name Enter Domain Name Enter your domain name Enter Admin NIC IP Address Enter the IP address of the admin port of the SEP Enter Admin NIC IP Netmask Enter the Gateway Routers IP Address Enter the DNS Server IP Address Enter the Secondary DNS IP Address Save Above Configuration Y N Once you verify and save the configuration the Root Password screen appears as shown in Figure 2 2 ROOT PASSWORD Pick a root password You must type it twice to ensure you know what itis and didn t make a mistake
37. 2 O Sin Configuration Aden IP 10 10 300 302 e System dertitcaton i Closter O Trafic Manager Users w y f o Figure 6 46 System Identification Screen Option Description System Name The unqualified name of the SEP host machine This number is automatically generated by the SEP and cannot be System ID changed Default Gateway The IP address of the default system gateway The IP address and optional subnet mask of the SEP unit s Admin IP ii dus administrative interface Cluster ID An integer used to identify a SEP cluster When one or ore SEP clusters are in place a cluster ID can be used to identify the source of Optional alarms and log messages Node ID An integer used to identify a SEP node When one or more SEP units Optional are in place for example in high availability configurations a node ID P can be used to identify the source of alarms and log messages Table 6 16 System Identification Options and Descriptions Users Guide v5 1 7 6 83 Deepnines Security Edge Platform 3 Enter data in the appropriate fields displayed NOTE Upon reboot or restart the configuration changes will be canceled 4 Click lt Save gt to make the changes persistent to the SEP configuration file 5 Click lt Reset gt to cancel any changes made NOTE If you change the Admin IP of the SEP you will immediately loose connectivity to the device After saving you
38. 44 53 dock CEF 17230 Disk hercdispatitiet t 1234 proceos i4 Aesgned si ded lo 1220 ENC Cnt ig DS 10 4499 X CEF 17296 Ag disp het per e 405 suet siesta 50127 0 0 1 logged n 9 28 16 45 10 och poygrest 71338 19 1 LOG SEL SYBCACL ena Cerectonresel 9p pont ig 28 16 4B 10 noch postgree t 7130 14 5 LOG bul not recen data hom chert Cennecten rel my pem g 28 16 4019 ek postgreett 7130 T T LOG unmqectet EOF on rw conneitn g 28 16 AE 10 dox CEF 1730 Dispak herdtepatiter c EFJ mad msg enron siegt vectet it J ects ag 20 16 AE 10 dock CEF 19790 Depa her idbepaiter r 17504 cep Ht emomed Or kitz d hes 30 EMC chert maarr from sert a g 23 16464 dx CEF 12206 Dupak ferdtpalha t 305 main Dop OU Hr coner fom 177 8 0 f on 1 g 230 16 44b ax CES 17229 Desa tar cbepaderie 1 1234 process ard Are sn bhdi ka 120 EMO Clan TA 16 MEAT dock CEF 17226 300g iuge hone CMOS ia Bt rauf ot 527 0 lagged n Figure 6 11 Log File Display 6 3 Protection Policies The Protection Policies section of the Command Explorer provides configuration options for Deep Packet Inspections Static Blocking Conversation Symmetry Flow Control and URL Filter Categories Actions Protection Policies o 5 Deep Packet Inspection Ed Static Blocking O ICMPv4 O CMPvB Error e CMPv 6 Info amp Miscellaneous e Conversation Symmetry amp Flow Control e URL Filter Rules Users Guide v5 1 7 6 17 Deepnines Security Edge Platform 6 3 1 Deep Packet Inspect
39. 9 26 38 98 118 227 18451 64 71 1 140 1 469 Attempted Information ICMP PING NMAP 2007 08 23 13 39 26 67 0 134 18451 64 71 1 140 14869 jAttempted Information CMP PING NMAP 2007 08 23 13 39 26 80 239 229 20 18451 64 71 1 140 1 469 jAttempted Information CMP PING NMAP 2007 08 23 13 39 26 195 12 231 20 18451 64 71 1 140 14859 JjAttempted Information CMP PING NMAP 2007 08 23 13 39 26 77 57 112 12 49408 64 71 1 140 14859 JjAttempted Information ICMP PING NMAP 2007 08 23 13 39 26 38 98 118 227 18451 64 71 1 140 1 469 Attempted Information ICMP PING NMAP 2007 08 23 13 39 25 64 152 34 35 18451 64 71 1 140 1 469 Attempted Information CMP PING NMAP 2007 08 23 13 38 25 212 23 57 22 49408 64 71 1 140 1 469 jAttempted Information CMP PING NMAP 2007 08 23 13 39 25 77 57 0 131 18451 64 71 1 140 1 469 jAttempted Information CMP PING NMAP 2007 08 23 13 39 25 80 239 229 205 18451 64 71 1 140 1469 Attempted Information CMP PING NMAP 2007 08 23 13 39 25 4n amp 42 224 2n amp 10461lg4 71 4 44n laca ABarantad Information ll MD DINA BIMAD 2nn no 29 49 90 96 Save B Print Figure 6 27 Detail View of Signature Violations Information 6 4 5 URL Filters The URL Filters Report allows administrators to view a summary and detailed trend analysis of URLs that are blocked allowed or redi
40. ATA gt Table 6 17 Traffic Manager Options and Descriptions ecsssececesceei e275 d 2 araa An tenpan cm emn pc t9 Users Guide v5 1 7 Figure 6 47 Traffic Manager Screen 6 86 Deepnines Security Edge Platform NOTE Upon reboot or restart the configuration changes will be canceled 6 5 16 URL Filters URL Filtering controls HTTP traffic by inspecting the URLs being requested It provides three layer filtering based on user created admin black and white lists Website categories and other third party blacklists URL Filtering provides the following actions for HTTP requests Allow Block and Redirect The URL Filter screen is displayed in Figure 6 48 eee eee A o Figure 6 48 URL Filter Screen Option Description White List User requested URLs that are matched against the white list are allowed Black List User requested URLs that are matched against the black list are blocked Error Page Allows the user to create a template for blocked pages returned to users Options Allows the user to configure URL filtering Use Log Only Mode URL filtering actions are logged only but not executed Table 6 18 URL Filters Tabs and Descriptions Users Guide v5 1 7 6 87 Deepnines Security Edge Platform 6 5 17 Users For complete information on users go to Section 6 7 Users 6 6 Update The Update section of the Command Explorer provides setup configuration options for
41. Click Apply to apply the changes Oy OV de cos NOTE Upon reboot or restart the configuration changes will be canceled 10 Click lt Save gt to make the changes persistent to the SEP configuration file 11 Click lt Reset gt to cancel any changes made NOTE If you have a bridge currently enabled it will need to be disabled to apply the new defined bridge There can only be one active bridge at a time on the SEP Users Guide v5 1 7 6 69 Deepnines Security Edge Platform 9s Hgo Managerent Canale 9s SEP dock dev deapsines comfSetupieldgses jt eu ov eR e be et e uU Ld yea dew despues cum Primary 100 cathe Cee dorema cmm nar ds Figure 6 37 Bridges Screen 6 5 5 EdgeForensiX EFX To enable forensic capture 1 2 3 Verify that the unit on which to enable capturing is the active host Select Edge ForensiX from the Setup folder Figure 6 38 The Edge ForensiX configuration screen is displayed Activate the Capture check box The Overwrite check box determines what happens when the partition used to store captured data is full Activate by placing a check mark in the Overwrite check box to allow SEP to overwrite previously captured data with new data This allows capturing forensic data to continue uninterrupted Clear by removing check mark in the Overwrite check box to instruct SEP to stop capturing forensic data when the partition is full This allow
42. DPI Signature Updates and URL Server Updates Z lUupdate DPI Signature Updates 0 URL Server Updates 6 6 1 DPI Signature Updates DPI Signature updates can be obtained directly from the open source community By registering at snort org and obtaining an oink code one can get the latest rules from the community The DPI Signature Updates screen is displayed in Figure 6 49 Check Doc Updates a I ac eH ei 1 om hs 6T e DA Sigratune Updater ULL Garner Updy ope gt CI para dev doge cam rear y 108 lt 3 Mui eh Pi 1 on PY oe t Figure 6 49 DPI Signature Updates Screen 6 6 2 URL Server Updates Deepnines Technical Services researches and develops new rules that will stop a number of threats or unwanted behavior and will release those on its website Additionally Deepnines Technical Services will send out email alerts on the new available rules and how they can be obtain for current customers Users Guide v5 1 7 6 88 Deepnines Security Edge Platform 6 7 Users The Users section of the Command Explorer provides setup configuration options for Auditing Current Manage Users and Operations 9 GE Users 8 Auditing Current 9 Manage Operations SEP administrators are required to log in to a SEP host before they can access system information or make changes to the system configuration Users must have an account on each SEP host they are to have access to
43. FCSUI zip file will only be available from the SEP from the last BaseOS install Launching the EMC Dependent on your operating system perform the following procedures for launching EMC For Windows Operating System 1 Open Windows Explorer and navigate to the directory where EMC is installed 2 Double click on emc bat For Unix or Linux Operating System 1 Navigate to the directory in which the EMC is installed 2 Execute emc For MAC OS X Operating System 1 Double click on the jar file or run the EMC shell file by double clicking it in the Finder Users Guide v5 2 1 3 1 Deepnines Security Edge Platform If you were logged in to any SEP hosts when you last exited the EMC you are prompted to log in to those same hosts when the EMC launches If you have not been prompted to log in or this is your first time logging in the following screen Figure 3 1 appears once you execute EMC EJ 9s Edge Management Console File Edit Help Q DeepNines OM TECHNOLOGIES Figure 3 1 EMC Main Menu Screen 3 3 1 Logging in to EMC 1 Click File gt Login Figure 3 2 2 Enter Hostname or the IP address of the SEP administrative interface to access Figure 3 3 3 Enter your administrative TCP port of 9099 4 Enter your SEP administrator user ID The default User ID is Sleuth9 5 Enter your administrator password The default password is godeep9s 6 Click lt OK gt Users Guide v5 2 1 3 2 Deepnine
44. License Agreement Tenable Network Security Inc Registered Plugin Feed Subscription License Agreement v 3 2 11 05 CMU UCD Copyright Notice which contains license redistribution provisions Kaspersky Labs Copyright Notice which contains license redistribution provisions Cambridge Broadband Ltd Copyright Notice which contains license redistribution provisions Sun Microsystems Inc Copyright Notice which contains license redistribution provisions Sparta Inc Copyright Notice which contains license redistribution provisions Cisco BUPTNIC Copyright Notice which contains license redistribution provisions Fabasoft R amp D Software GmbH amp Co KG Copyright Notice which contains license redistribution provisions Users Guide v5 1 12 ix Deepnines Security Edge Platform Preface This manual provides installation administration and operation information for the Deepnines Security Edge Platform SEP This is a technical document intended for use by technical support technicians and operators responsible for the operation and maintenance of the SEP Note NOTE A note icon identifies information for the proper operation of SEP including helpful hints shortcuts or important reminders Caution CAUTION A caution icon indicates a hazardous situation that if not avoided may result in minor or moderate injury Caution may also be used to indicate other unsafe practices or risks of property damage Trademarks P
45. Start of Evening default 5 30pm Start of Night default 9pm Weekend default Saturday amp Sunday Users Guide v5 1 7 5 10 Deepnines Security Edge Platform NOTE Flow Specs do not have priorities We do not have the concept of a best matching Flow Spec If you define an FTP Flow Spec as ALWAYS ON and another FTP Flow Spec as MORNINGS they both are valid Because it is in the morning it does not mean that matching Flow Spec has priority Scheduling Options Include Always On This is the default and it is active 24x7 Disabled To turn off a flow spec you disable it School Day From the start of the morning until the start of the afternoon Afternoon From the start of the afternoon until the start of the evening Evening From the start of the evening until the start of the night Full Day From the start of the morning until the start of the evening Day and Evening From the start of the morning until the start of the night After School From the start of the afternoon until the start of the night Nights From the start of the night until the start of the morning Weekends From 12 00 AM Saturday morning until 11 59 PM Sunday night Nights and Weekends See previous entries Schedule View Schedule Name Night AM Mid T1 School Day T1 T2 Afternoon T2 T3 Evening T3 T4 Night PM T4 Mid 12am 8am 3pm 5 30pm
46. Traffic Manager to control the rate of malicious traffic coming into the SEP Address Resolution Protocol ARP is a protocol for mapping an Internet Protocol address IP address to a physical machine address that is recognized in the local network Anti Virus A Bridge connects two interfaces together so that traffic can pass through it Common Gateway Interface CGI is a standard for interfacing external applications with information servers such as HTTP or Web servers Conversation Symmetry allows the SEP to provide protection or state like measures on connectionless traffic It is designed to insure proper 2 way traffic by controlling the number of requests and responses assigned to a specific protocol Central Processing Unit Sometimes referred to simply as the processor or central processor the CPU is where most calculations take place In computer networking DMZ is a firewall configuration for securing local area networks LANs As part of Protection Policies Deep Packet Inspection provides another layer of inspection for a variety of intrusions The Edge device is a SEP device that is placed outside or in front of your router taking the connection from your ISP The EdgeForensiX EFX system can be used to store forensic information in the Postgresql database for historical analysis See EdgeForensiX A Flowtag is a relatively short identifier that can be added to the flow status information for a conversation p
47. Volume by Flow Specifier This pie chart is similar to the Offered Volume by Flow Specifier pie chart but is representative of the amount of traffic that is violating a certain policy within the SEP and is being blocked or curbed down Again it will display the top 10 20 Flow Specifiers that have been or are getting blocked Ifa mouse is hovered over the top of any of the sections it will display the name of the Flow Specifier show the count of bits being blocked and the percentage of overall bandwidth that is being blocked in that particular Flow Specifier NOTE If the Blocked Volume by Flow Specifier is entirely one shade or showing one flow specifier it does not mean that all of the traffic of that flow specifier is getting blocked It means that out of the blocking that is occurring that 100 happens to fall within that one Flow Specifier DEFCON This chart illustrates the defense condition of the network 1 5 1 being the most critical 5 being the least critical Depending on how much your network is under attack i e flow spec being violated the DEFCON chart will show condition Other Features within Network Traffic The total number of conversations is also represented in the Network Traffic monitor Towards the bottom left you will see the Total Conversations This is represented as the number of conversation that we have in our KGH tables There is also the ability to view the graphs and charts in 2D mode By desele
48. When upgrading your SEP ensure that you are not connected to or running the SEP Your system monitor may show incorrect version number when attempting to upgrade your SEP while connected Users Guide v5 2 1 2 3 Deepnines Security Edge Platform Edge Management Console EMC 3 1 3 2 3 3 Overview of the Edge Management Console EMC The EMC provides graphical views of the network traffic and the operating condition of he SEP and is used to configure and control Security Edge Platforms You can monitor and configure multiple Security Edge Platforms from a single EMC installation as long as the workstation on which the EMC is installed shares the SEP private network Up to 32 EMCs can log into and monitor a single SEP Installing the EMC The Enterprise Management Console EMC used to manage any single or multiple SEPs should be from the latest version of the SEP This is because the messaging system used to communicate between the SEP and EMC must be compatible All new versions of EMC should be compatible with older supported SEPs but not the other way around The new EMC will work on older versions of the SEP but older versions of the EMC will not work on newer versions of the SEP Perform the following steps to download and install the latest revision highest build number of SEP 1 scp root lt ip of sep gt opt s9 post install pkg HMC FCSUI v5 0 3 zi 2 unzip HMC_FCSUI_v5 0 3 zip 3 hmc amp Note The latest HMC
49. Ys Edge Management Camale 9s SIN dock der des primes com Usersihuditiog Auditing Flags um Primary 100 Figure 6 55 Audit Logging Options Screen Users Guide v5 1 7 6 97 Deepnines Security Edge Platform 6 7 6 Viewing SEP Users Audit Information SEP automatically maintains an audit trail that includes all user login information and all configuration change information as well as all failed login attempts Audit information is written to the SEP log For more information on SEP logging see Section 6 5 1 3 Viewing Log Files 6 7 7 Operations Use the commands in the Operation section Figure 6 56 of the EMC Command Explorer to start and stop SEP components NOTE You must have the May Perform System Operations permission to execute the operations described in this section Por Sun Qpetations TD by ra dev doses com Pranary APY Trafic Manager A Ust Character teestion URL Hito Update URL Database Lasi URL DE Update Ang 29 2067 20 12 PM Run Veto Figure 6 56 Operations Screen Users Guide v5 1 7 6 98 Deepnines Security Edge Platform 6 7 7 1 Rebooting SEP Before rebooting be advised that although the Security Edge Platform is designed to run continuously there may be times when you need to reboot the system The System Reboot command brings the system down gracefully NOTE Networks with High Availability configurations rebooting the primary SEP unit causes managed failov
50. administrators to view what types of network anomalies have been detected and stopped by the SEP unit as well as detailed information about the anomaly There are two tabs at the top left of the results pane Summary The types of summary reports are described in the below chart Figure 6 24 Detail Per detail of the violation detection Figure 6 25 Users Guide v5 1 7 6 47 Deepnines Security Edge Platform Table 6 11 lists each summary report type and their descriptions CN a CM CM ps Will display the number of anomalies detected from outside hosts and Packet Origin Re inside hosts Bandwidth Will display violation type violation detector Flow Specifier and the Consumed number of bytes that make up the anomalies detected Will display violation type violation detector Flow Specifier and the Packer Dropped number of packets dropped that make up the anomalies detected Violation Type Will display if the violation type was from a protocol or network anomaly Will display the Flow Specifier in which the anomaly was from A report of No Flow Specifier means that the packet was dropped before it was put into Flow Specifiers from either stateless or malformed Flow Specifier Table 6 11 Report Types From 18 22 2007 10 15 50 AM PDT To 24 2007 10 15 08 PM PDT X Get Report Note This query make take a few minutes to complete Summary Detail Anomalies 7 DD M uesumncaudco pu
51. anual NOTE The conversation rate is for new conversations per second It does not control or take into account the number of existing conversations To control the flow of traffic for the Flow Specifier by bit rate per second 1 Check the Bit box The bit field below will become active 4 Enter the bit volume amount for the Flow Specifier 5 f unsure of the correct number set the number to a high rate and refer to the Control Options as listed Reference 1 000 000 bits 1Mpbs 500 000 bits 500Kbps NOTE Bit rate directly correlates to the bandwidth If a bit rate is defined that is larger than the actual Internet connection bandwidth then protection could be negated To control the flow of traffic for the Flow Specifier by packet rate per second 1 Check the Packet box The packet field below will become active 2 Enter the packet volume per second for the Flow Specifier 3 If unsure of the correct number set the number to a high rate and then read the Control Options section below The Control fields Conversation Bit and Packet can be set if desired It is important to note that if only the Conversation field is used and the connection is under the limit no other rate control will apply to this Flow Specifier It is generally a good idea to use both Conversation Rate and Bit rate Users Guide v5 1 7 6 35 Deepnines Security Edge Platform Control Options There are numerous control options for C
52. ation and together with all enhancements upgrades and extensions thereto that may be provided by Deepnines to you from time to time Licensed Server means the server provided by you and defined by the host ID identified by you to Deepnines when obtaining the license key or the appliance provided by Deepnines to you and defined by the serial number which enables the licensed product to operate in accordance with the licensed configuration Users Guide v5 1 12 iii Deepnines Security Edge Platform Managed Service Provider if a you are in the regular business of providing firewall VPN IDS IPS IDS Anti Virus Anti Spam or Content Filtering addressing management for a fee to entities that are not your affiliates each a service customer and b you indicated in your purchase order or in requesting the license key that You intend to use the licensed products on behalf of service customers Standard User means that if you indicated in your purchase order or in requesting the license key that you intend to use the licensed products on Your own behalf or you obtained the licensed products from a managed service provider Third Party Software means any software programs provided by third parties contained in the licensed product as detailed in the third party software addendum attached to this agreement Third Party Software Provider means the third party that has the right to provide and grant licenses for t
53. ations to the rule in the Rule box 6 Click Saves to save the changes or click Reset to reverse the changes e jo 9s Edge Management Cossie 9y 5EP 10 8 200 701 Pretection Policies Moep Packet Inspecti n ser Defined Rules TECHNOLOGIES 95 5EF jAmwms Ty 10 200 291 Pranary 109 73 Monitors 23 Protector Pott Cen Type user drop wthHog Des Prony Use Debected ste drop sienth atn vw cg Use Detected ST mw drop bart ly vs Proa Foreword Detected user drop siecth use Gop sient sn drop ebesth drop darth user drop sienth met drap eth user drop ect user drop siecth ae drop uet hy mn drop siecth user drop sienth user drop sient ammo Operstons me drop siet user drop sienth ss da eth m drop sbenih user drop sienti ase drop dianth nn drop sienth Figure A 1 DPI User Defined Rules Screen Single Tab NOTE If minor modifications are desired or if additional rules are wanted with slightly different content highlight the entire rule in the Rule box right click with your mouse select copy Click NEW bottom left and then paste the rule into the Rule box Make modifications click Enable and then click Saves Users Guide v5 1 7 A 4 Deepnines Security Edge Platform For bulk or multiple rule import from a text file select the Bulk tab from the Explorer Pane Figure A 2 1 Select import button bottom left A window will pop up asking you t
54. ay NOTE If an attachment is un repairable the attachment is replaced with a text file This text file has the same file name as the virus but the extension is txt If the user opens the file they will see a message that the original attachment was infected and has been deleted These messages can be customized and are discussed further in this manual The line graphs allows the user to view how many active workers are being used by the POP3Scanner as well as if there are any email conversations waiting in the queue There are 112 assigned to the POP3 Scanner Depending on the number of emails in the queue it may be necessary to assign more workers to the POP3 scanner Please contact Deepnines Technical Support for assistance with this procedure Each of the graphical displays contain the following controls A3D check box which allows you to switch between three dimensional and two dimensional graphs and charts An Update Rate control which allows you to specify the refresh rate for the graphs and charts displayed in the window By default it is set to 5 changing to 1 will increase the frequency of updates to 1 second A zoom in zoom out and auto range by right clicking on your mouse and selecting the desired setting If you zoom in out and want to return to the original setting Select Auto Range Both Axes Users Guide v5 1 7 6 6 Deepnines Security Edge Platform 6 2 2 System Resources The System Resources d
55. ble Deep Packet Inspection for the Flow Specifier 1 Check the DPI box below the control fields to enable DPI 2 Uncheck the DPI box to disable DPI for the Flow Specifier NOTE There must be a control of conversation bit or packet rate set to enable DPI scanning on the traffic within the Flow Specifier Users Guide v5 1 7 6 36 Deepnines Security Edge Platform Connection Timeout Connection Timeout will take out any conversation that has been left open and has had no activity for 5 minutes 300 seconds The settings on the connection timeout are set to 300 seconds by default To change or disable connection timeout 1 Locate the connection timeout settings towards the bottom of the Control tab 2 Enter a new time in seconds for the Flow Specifier to change timeout settings 3 Uncheck the check box to completely disable connection timeout for the Flow Specifier NOTE This option is NOT recommended A long timeout is suggested i e 1 000 000 one million This is a little less than 12 days NOTE While there are certain instances that connection timeout should be disabled every effort should be made to increase the timeout value first If connection timeout is disabled connections that are made within the Flow Specifier will not be timed out If the number of connections reaches a significant amount it could impact system performance System Logging System Logging is an option that can enable logging on a p
56. ct to The SEP operates completely invisible to the network The outside and inside interface contains neither IP address nor a MAC address The SEP components can be one or two security edge appliances using the SEP to monitor and control the flow of traffic in and out of the network Optionally an Edge ForensiX EFX system can be used to store network traffic information in a database for historical analysis Y Web Server g FRONTLI INE MN it FRONTLINE Y y 2s Database L L Mail Server Figure 1 1 Edge and Frontline Security Edge Platforms Users Guide v5 2 1 1 1 Deepnines Security Edge Platform Installation Requirements 2 1 Installing the Security Edge Platform SEP Operating System Prior to installing the Security Edge Platform SEP Operating System OS ensure that the following minimum configuration on your computer system includes Dual Processor CPU 2 Dual Core CPUs recommended 2GB RAM minimum 4 GB RAM recommended over 4 GB not currently used 236 GB disk storage minimum 72 GB recommended Perform the following steps to install a new Security Edge Platform SEP Operating System OS 1 Insert the D9BaseOS CD in the CDROM drive and reboot your system The box will boot from the CD A boot prompt appears Figure 2 1 NOTE Ensure your computer system is configured to boot from CD mur amp om SECURITY EDGE PLATFORM WARNING Installation will replace
57. cting the 3D check box the visualization will become 2D The Update rate is described later in this document Users Guide v5 1 7 6 9 Deepnines Security Edge Platform 6 2 3 Flow Statistics For each of the flow specifiers that were defined the administrator can view the real time statistics for that particular flow For example if the HTTP Incoming TCP port 80 was defined then you can select the corresponding Flow Statistic to view the new connections per second the total bit rate of incoming HTTP traffic and the complete packet rate There are 4 different lines that are visible on each graph and are outlined in Table 6 5 Offered Yellow Line The amount of traffic that is matching the particular flow Allowed Green Line The amount of traffic that has passed all tests and is allowed in the network Blocked Red Line The amount of traffic that is blocked within that flow Historical Blue Line The historical amount of traffic that this flow has seen Table 6 5 Colored Graph Lines To view a Flow Statistic for a defined Flow Specifier perform the following 1 Login to the SEP host 2 Select Flow Statistics from the Monitors folder 3 Select from the drop down menu bottom left the particular Flow Specifier Name that you want to view statistics for NOTE If the historical limit is set to zero then no traffic has been seen on this flow in the last 10 minutes If the historical limit is very low then there has b
58. d you have no further rights to receive any revisions upgrades or updates without the purchase of annual maintenance and support for the licensed product pursuant to the terms and conditions of the Deepnines then current maintenance and support policies that are available at www Deepnines com support Product Updates and Product Upgrades means any modification or addition to the licensed product that fixes minor defects and does not change the overall utility functional capability or application of the licensed product and only to the extent that any such product updates are actually provided by Deepnines to you hereunder Product updates do not include and the licenses and Deepnines obligations hereunder do not extend to a product upgrades that are software or product releases that contain additional functionality or enhancements to the functionality or performance of the Licensed product or b any product that is marketed by Deepnines as a new or distinct product unless mutually agreed to by the parties and specifically noted in the purchase order or other contractual agreement Subscription Updates means that if you purchased a licensed configuration requiring subscription updates meaning periodic updates to signatures databases or lists pertaining to third party software Subscription updates shall be provided on a when and if commercially available basis and only to you a for the time period specified in your purchase order
59. ddress I 0H Source Port Destination Address O Destination Port l Classification Contains SID Contains Protocol Newer Older Source Addr Source Dest Addr DestPort Protocol SID Classification Message Date Time 202 67 211 244 49408 64 71 1 140 CMP 1 469 Attempted Information ICMP PING NMAP 2007 08 23 13 39 30 202 67 211 244 49408 64 71 1 140 CMP 1 469 Attempted Information ICMP PING NMAP 2007 08 23 13 39 28 202 67 211 244 49408 64 71 1 140 CMP 1 469 Attempted Information ICMP PING NMAP 2007 08 23 13 39 28 77 67 0 131 18451 64 71 1 140 CMP 1 469 Attempted Information ICMP PING NMAP 2007 08 23 13 39 27 80 239 229 20 18451 64 71 1 140 CMP 1 469 Attempted Information ICMP PING NMAP 2007 08 23 13 39 27 77 67 112 12 49408 64 71 1 140 ICMP 1 469 Attempted Information CMP PING NMAP 2007 08 23 13 39 27 202 67 211 24 49408 64 71 1 140 CMP 1 469 Attempted Information ICMP PING NMAP 2007 08 23 13 39 27 77 67 112 12 49408 64 71 1 140 CMP 1 469 Attempted Information ICMP PING NMAP 2007 08 23 13 39 27 80 239 229 20 18451 64 71 1 140 CMP 1 469 Attempted Information ICMP PING NMAP 2007 08 23 13 39 26 195 12 231 20 18451 64 71 1 140 14859 JjAttempted Information ICMP PING NMAP 2007 08 23 13 39 26 77 57 112 12 49408 64 71 1 140 1 469 JjAttempted Information ICMP PING NMAP 2007 08 23 13 3
60. e ree e 3100 0090 0390 i Results limited to top 100 rows Bandwidth Consumed Total Anomalies PROTOCOL I Saye D print Figure 6 24 Network Anomalies Report Types Summary Tab Users Guide v5 1 7 6 48 Deepnines Security Edge Platform To view one of the Summary reports described above Select the dates that the report should encompass Figure 6 24 Select GET REPORT gt button From the drop down menu in the middle of the results view pull down and select the desired report f additional reports are desired user can pull down the drop down bar to select a different report NOTE Once the date has been selected there is no need to click Get Report again unless the date has changed All of the reports can be viewed without having to select Get Report again To view Detail report information Select the Detail tab from the top of the results pane Select the dates that the report should encompass Figure 6 25 Select GET REPORT gt button Detail report information can be sorted scrolled or drilled down by Source or Destination IP address Source or Destination Port Protocol Direction Violation Type Bride ID or Flow Spec A combination of drill down capabilities can also be used together There is also a Newer and Older feature that will allow the user to see the next set of detailed information if there are more than 500 records returned from the
61. e SEP logs The remote log server must be on the SEP private subnet 4 Select log to remote syslog server by checking this box Users Guide v5 1 7 6 61 Deepnines Security Edge Platform 5 Click lt SAVE gt to immediately apply your changes to a running system and to maintain the settings until you change them again or click one of the following a Click lt APPLY gt to immediately apply your changes to a running system but discard those changes the next time the SEP host is rebooted b Click lt RESET gt to discard your changes without applying or saving them E 9s Ldge Management Console 9s SEI doch der dee primes cem Selupfl cogging opging Cenfiguratien 2 Logging Comiguewaer i Leg tp iocal systeg r Log te remate syslog server Pameto oggieg Host p 3 Figure 6 33 Logging Configuration Screen NOTE By default most syslog daemons do not accept log messages from remote systems You must configure the daemon on the remote system to accept logging messages from SEP On Solaris systems start syslogd using the t option On Linux systems start syslogd using the r option Users Guide v5 1 7 6 62 Deepnines Security Edge Platform 6 5 2 6 5 2 1 Virus Scanning SEP provides integrated virus scanning for SMTP and POP3 email traffic By default SMTP traffic is defined as TCP over port 25 and POP3 traffic is defined as TCP over port 110 To adapt itself to the unique demands of you
62. e exclusion of all other terms If these terms are considered an offer by Deepnines your acceptance is expressly limited to the terms of this agreement If you do not agree with all the terms of this agreement you must return this licensed product with the original package and the proof of payment to the place you obtained it for a full refund 1 Definitions Annual Maintenance and Support means the maintenance and support services provided by Deepnines to you that are further defined in Section 3 below Bandwidth means the inline network connection rate or throughput rate Documentation means the user manuals provided to you along with the licensed product Licensed Configuration means to the extent applicable as indicated on the license key the choice of features and bandwidth as declared by you in your purchase order or request for License key and upon which the licensing fee was based The licensed configuration may technically limit the functionality performance or throughput of the licensed product as defined by the applicable license key License key means the code provided to you by Deepnines that enables the licensed product to operate on the Licensed Server for the specified licensed configuration Licensed product means the object code copy of the software program provided to you in association with this agreement together with the associated original electronic media and all accompanying manuals and other document
63. ee Chapter 7 Technical Support Additional Resources Users Guide v5 1 12 xi Deepnines Security Edge Platform Table of Contents luris DeC HR X Chapter 1 RIO GU CON pan 1 1 1 1 Overview of the Security Edge Platform SEP 1 1 Chapter 2 Installation Requirements eeeeeeeeeeeeeeeeeeeen 2 1 2 4 Installing the Security Edge Platform SEP Operating System ssss 2 1 Chapter 3 Edge Management Console EMC 3 1 3 1 Overview of the Edge Management Console EMO sse 3 1 23 2 Installingthie EMG i cte P tb nre i Lena Pe ee et Rete e ade ines 3 1 3 3 Launchingthe EMG nee Ine dae RR eed o t eH edens 3 1 3 3 1 Logging into EMG et ete Et t ee ettet 3 2 3 4 EMC Console Main WIDdOW cisco D bead d teca Medea Dr bet e redd 3 4 3 5 Navigating the Command Explorer Pane ssssssssssssssseenenneee eene nennen 3 6 3 6 EMG Version Number ideae caa eee exert dae ei ee ae E ep GS 3 7 Chapter 4 License Setup cccccccesssseseeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeseeseeneneeeeeeeees 4 1 ATA OV UI a ICE 4 1 4 2 Obtaining Your License ssssssssssssssseeseee eren enn nnne treten rennes nnn innen 4 1 Chapter 5 Configuring SEP iun conia diode ai 5 1 Bal OVNI ea ia 5 1 5 2 Howto Setup Email Anti Virus Scanning se
64. ee Re nae nni Ga 6 87 6 5 17 Us Sit meg ite tine ee a 6 88 n Elec EE 6 88 6 6 1 DPI Signature Updates intime eei tte Hebe 6 88 6 6 2 URL Server Updates ettet e ree primera div Pre e i put 6 88 A A E AE A ai 6 89 6 7 1 Creating Maintaining User Accounts ssssssssseseeeeeeenen nnns 6 89 6 7 1 Modifying User Accounts akian sapin a e EErEE nano nn nennen eene nenne 6 93 6 7 2 Deleting User Accounts eese eene 6 93 6 7 3 Viewing Current Users sssssssssseeneneneeenen nnne nennen nnne nennen 6 94 6 7 4 Exporting amp Importing User Accounts sseeenen 6 95 6 7 5 Configuring User Audit Information ssssssssseeeeeeeen nens 6 97 6 7 6 Viewing SEP Users Audit Information 6 98 6 7 7 GUI 6 98 Chapter 7 Technical Support Additional Resources 7 1 TA SUPPORT NUMDEES ici A A A E A Ad 7 1 AS SS O 7 1 1 9 Training Classes zucca hu sees tinte 7 1 Appendix Ai nC in A 1 AO DPI Rules atada t eh et s A 1 ATU DPLRulo WIU uti I arie Et Ere Ee e re ocu e EB PEU erat A 1 A 1 1 Rule Headers ete ecce ect s eg Gates te iue cas ts A 1 A 1 1 2 Matching Simple Strings oooonoconncnnnnncnnnccnnonannnocnnanoccnnrnna nana nn cnn nc ran enne A 2 A 2 Update Methods 2 ndun e dica fla calce a A 2 A 2 1 Oink IG OCS naaa A 2 A 2 2 MEUSE ice kr ere S t Ec een De Eds A 2 A 2 3 Deepnines Webs
65. een traffic but it has now discontinued 4 Select the desired group from the Group drop down menu The Connection Bit and Packet charts will start to fill in with the corresponding real time information as shown in Figure 6 6 Users Guide v5 1 7 6 10 Deepnines Security Edge Platform 6 2 4 New Conversation Volume y Dies freto cen Prever y 106 Corn vns sig 9 dr Pouarto Hoteor Tata LLL 0 Top Tiam 9 Ciel ena Figure 6 6 Flow Statistics Display Viewing Current and Pending Conversations At the bottom of the Flow Statistics graph the Current and Pending Conversations are displayed as taken from the KGH table and pending table Current conversations have met all criteria for entering or leaving the network while pending conversations are partial connections Top Talkers The Top Talkers Report is a snapshot Figure 6 7 representing which conversations or flows are using most of the bandwidth The refresh rate is set to 60 seconds by default but can be shortened by any user Additionally you can instantly get a snapshot of the top talkers by selecting Get Report User selectable information that is displayed in the report is based on the 5 tuple information that the SEP Traffic Manager has in its KGH tables To limit the information that is returned by the IP address port or protocol the user simply unchecks the unwanted tuple The user can then select Get Report or wait until the next refresh
66. eettior amp 3 State Br ochng Corwerzatson Symmetry Fk pa SID Chass Type 1000000 user dop wih log Os TSO Proxy Use Detecte 100000 uter drop slenthy Dhs TSO aran vaen co Use Detected 1000002 uer rop sterth s TSO Pera Keyword Detected uer rop sectih DAs TIO Prory Keyuord Detected user drop stenth 09s TSO proof y Use D user 2iop sientiy D9s T O Myspace L uter drop siertdy Ls TSO TOR use detected 1000007 yer drop entfy Cds TSO ret 13 Proxy Use Oatected 1000008 wer Arop slenth Dos 190 rebrerdo Use Detected 1000009 uner crop sienthy OAs TH peony pi t 1000010 user drop sientiy 09s TSO Proxy DnnerPsece 100001 1 ucer orop sienthy 09s TSO index php qe proxy 1000012 uter dop sient Dts TIO beset pros 1000013 user op seri Orbe TSO hidden index php peeoy 1000014 uer Qop aterthy DOs 150 nar bare nde php prosy 1000015 uer op dert DO TH nob cgi Use Detected 1000014 user drop stentty Ds 190 1000017 uses Quop slentiy 5 1000018 use Ap dente 1000019 uter drop simrnidy EULESS EIRLLIN LETERI CSES 100002 uter aop stenthy 1000021 user cron siertty Fig 6 15 The DPI User Defined Rules Single 6 NOTE If minor modifications are desired or if additional rules are wanted with slightly different content highlight the entire rule in the Rule box right click with your mouse select copy Select lt NEW gt and then paste the rule into the Rule box Make modifications click ENABLE and then SAVE For bulk or
67. efer to the EFX Users Guide Users Guide v5 1 7 6 71 Deepnines Security Edge Platform 6 5 5 1 Turning On Off Capturing The Edge ForensiX tab of the Flow Specifier will allow the capture of either protocol headers or the entire payload of the packets matching that flow This information is stored locally on the SEP in an EFX partition and once the files reach 32MB in size they will automatically be transferred to the EFX Database System To enable this option it is required that you have the Edge ForensiX Appliance as well as the SEP Refer to the EFX Users Guide on how to capture packet information 6 5 5 2 Monitoring Offloads to the EFX The amount of files that have been offloaded from the SEP appliance to the EFX appliance is visible in the Edge ForensiX pane To view up to date information 1 Navigate to the Edge ForensiX pane from the Monitors section of the EMC Figure 6 39 2 The page will list the EFX host IP or hostname at the top of the pane 3 The number of offloads is displayed below the host IP information 4 More information can be obtained in the EFX Users Guide 2 9 Edge Management Comale Ps SEPIdack dev feepries comd Ele Em eto a S TRGHNOLOGIES LI Aver age Offioa Rate os Average Capture Rata Average Offload Rate Top Tater EXA AS 8 User e pra gt 73 Opa dew denarios coni Peine y 1907 y gt Cd tandem fm 6 Figure 6 39 Edge ForensiX Screen Users Guide v5
68. election contains general groups of rules associated by type If expanded individual rules will be visible and can be selected deselected as desired Additionally if the entire group is unwanted merely unselecting the check box associated with that group of rules will disable all rules in that group To view active inactive rules or to select deselect rule groups 1 Select Deep Packet Inspection Rules Selection from the Protection Policies folder Signature groups are listed in the main panel Click on to expand that particular group of rules Check or uncheck the desired rule Click Saves to save the results or click Reset to cancel the changes S gt on A 4 DPI Custom Rules User Defined Rules Deepnines has built the user interface in such a way to allow administrators to build custom rules or import groups of new rules that are desired DPI custom rules can be built and added from existing rules as well Below will explain this section further Users Guide v5 1 7 A 3 Deepnines Security Edge Platform To view modify or add new custom rules 1 Select Deep Packet Inspection User Defined Rules from the Protection Policies folder Figure A 1 For single rule addition or modification 2 Single Tab is selected in the Explorer Pane Click New to add a new rule 4 To modify an existing User Defined Rule highlight that rules by clicking on it in the Explorer Pane top of the page 5 Make modific
69. emails in the queue it may be necessary to assign more workers to the SMTP scanner Please contact Deepnines Technical Support for assistance with this procedure 6 2 3 POP3 Activity POP3 Activity will display different characteristics that are involved with the POP3 virus scanner The POPS scanner will take the POP3 emails coming into or out of the network and then scan it against the signature database The top of the menu Figure 6 3 displays numerous statistics about the Virus Scanner Activity These labels and explanations are described in Table 6 3 Ez 9s dge Management Console Ps SEP hawaii dev deeprises comManitors irus Scanning P3 Activity o EMalsfrocessot 7 AIO dev donans com Prem y 109 infected EMail O y pra Processed O E Up Since hug 21 2007 2 36 55 PM e POP Amet O GUT cfi POP3 Active Workers we wo 1 100 mc POP3 Connection Queue Length 4 Ay a dew donum can Primary 100 Y C eke dew doapninas came Primary 280 Figure 6 3 POP3 Activity Display Users Guide v5 1 7 6 5 Deepnines Security Edge Platform Email Preeessad Displays the total number of POP3 emails processed or scanned since the up time date time Infected Emails Displays the total number of virus infected POP3 emails since the up time data time Shows the number of emails that were repaired virus removed and sent original email Shows the number of emails that were removed see below note Table 6 3 POP3 Activity Displ
70. en To configure Conversation Symmetry Select Conversation Symmetry from the Protection Policies folder Figure 6 18 Click lt NEW gt from menu bottom left of screen Select Protocol from pull down menu Select desired Conversation Requests 0 65 535 OE e coc zm Select desired Conversation Responses 0 65 535 Users Guide v5 1 7 6 26 Deepnines Security Edge Platform Apply one of the following options Click SAVE to immediately apply your changes to a running system and to maintain the settings until you change them again Click APPLY to immediately apply your changes to a running system but discard those changes the next time the SEP host is rebooted Click lt RESET gt to discard your changes without applying or saving them a Gate a rp t uos fuv Anas con Pamay PON y CI at desser com fremary NP Joa Fig 6 18 Conversion Symmetry Menu The Action category classifications are listed as follows Protocol This pull down menu gives a list of the IP Protocols Conversation Request This is for incoming requests and can be set from 0 to 65 535 Conversation Response This is for outgoing response and can be set from 0 65 535 Users Guide v5 1 7 6 27 BO Deepnines Security Edge Platform 6 3 4 Flow Control Flow specifiers control the flow of traffic through the SEP unit Using flow specifiers you can control the type and amount of traffic that enters or leaves your netw
71. en in the reporting database Drop With Log Signature classification is enabled and signature logging is enabled Alert will be seen in the reporting database Log Only Signature blocking is disabled but event is still written to the logs Alert will be seen in the reporting database Ignore Ignores the classification completely with no logging of signature events Alert will not be visible in the reporting database Table 6 6 Category Classifications NOTE If the administrator is going to be looking for a specific attack within the log files the Action setting will need to be set to Drop With Log otherwise Deepnines recommends that DPI Actions be set to Drop Silently when blocking is desired This will allow the administrator to still view the alert in the reports and assist in conserving processing capabilities 6 3 1 2 Rules Selection DPI Rules selection contains general groups of rules associated by type If expanded these individual rules will be visible and can be selected deselected as desired Additionally if the entire group is not wanted de selecting the check box associated with that group of rules will disable all rules in that group There are two tabs on the Rules Selection Display Rules Selection and Rule Details To view active inactive rules or to select deselect rule groups in the Rules Selection tab perform the following 1 Select by clicking gt Deep Packet Inspection gt Rules Se
72. eneral Miscellaneous You may not assign your rights or obligations under this Agreement without the prior written consent of Deepnines If any provision of this Agreement is held to be invalid or unenforceable by a court of competent jurisdiction that provision of the Agreement will be enforced to the maximum extent permissible so as to affect the intent of the Agreement and the remainder of the provisions of this Agreement shall remain in full force and effect This Agreement is governed by the laws of the United States and the State of Texas without reference to conflict of laws principles Users Guide v5 1 12 vii Deepnines Security Edge Platform The United Nations Convention on Contracts will not govern this Agreement for the International Sales of Goods the application of which is expressly excluded This Agreement sets forth the entire understanding and agreement between you and Deepnines and may be amended only in writing signed by both parties Third Party Software The provisions of this Agreement shall apply to all Third Party Software Providers and to Third Party Software as if they were the Licensed product and Deepnines respectively Government Restricted Rights This provision applies to licensed product acquired directly or indirectly by or on behalf of any Government The licensed product is a commercial product licensed on the open market at market prices and was developed entirely at private expense and without the use
73. entical because the dropping happens before a flow table entry is created Additionally only hosts with an Unknown state are blocked These are hosts that have not successfully opened a TCP conversation which is also typical of an attack This means that internal users should not be blocked once they have been able to access any external site If a flow table is too full packets are dropped without creating new flow table entries This usually only occurs during an attack Fragments Packets transmitted over the Internet are rarely fragmented In general packet fragmentation only occurs when a packet is too large to be sent over a particular network segment or link in its entirety i e when a packet that originated on a T1 connection must be transmitted over a dial up connection Modern businesses with T1 connections or better will rarely if ever receive fragmented packets So if a fragmented packet arrives it is immediately a suspect The Fragments flow specifier controls all packet fragments regardless of protocol and maintains statistics on fragmented packets The purpose of this flow specifier is to collect information on fragmented packets for forensic capture and system monitors Fragmentation control is managed elsewhere in the system This flow specifier cannot be deleted The matching fields of this flow specifier cannot be modified The control fields of this flow specifier are ignored A packet may be fragmented into 3 packets and
74. er Flow Specifier basis The debug logging will give an administrator an inside view as to the decision to drop a packet or allow it This logging can be very resource intensive and should only be turned on after a Certified Deepnines Engineer has instructed to do so CAUTION The SEP System Logging settings will impact system performance Local logging should only be enabled during critical troubleshooting periods and only for very short durations Separate reporting functionality is available and active within the SEP to show statistics of what is getting blocked Users Guide v5 1 7 6 37 Deepnines Security Edge Platform Protocol Handling After completion of the Control Tab if any protocol handling is desired for the Flow Specifier then the Protocol Handling Tab will need to be set This will allow an administrator to define further the control methods used by the SEP It is important to note that the Protocol Handling Tab should only be accessed if you are defining Flow Specifiers for the following rules Descriptions and functions are also discussed Table 6 9 Since passive FTP will select a randomly generated Data Channel port after the initial Command Channel is set up TCP port 21 this setting allows the SEP to monitor the data channel for port numbers and allow the data channel connections to be accepted when it would otherwise be blocked This will enable SMTP Virus Scanning for the Flow Specifier being defined At lea
75. er School Joe will never be associated with Flow Spec Y When After School arrives the Default Policy Flow Spec will control it Users Guide v5 1 7 FlowTag 1 FlowTag 2 FlowTag 3 FlowTag 4 FlowTag 5 AD Group K 5 Students priority 1 AD Group 6 8 Students priority 2 AD Group 9 12 Students priority 3 AD Group Teachers priority 4 AD Group Admin priority 5 5 12 Deepnines Security Edge Platform Group None is created by default b Create ALL the Flow Specs HTTP FS 1 Flow Tag 1 URL Rule Set 01 Schedule Full Day HTTP FS 2 Flow Tag 2 URL Rule Set 01 Schedule School Day HTTP FS 3 Flow Tag 2 URL Rule Set 02 Schedule After School HTTP FS 4 Flow Tag 2 URL Rule Set 01 Schedule Weekends HTTP FS 5 Flow Tag 3 URL Rule Set 02 Schedule School Day HTTP FS 6 Flow Tag 3 URL Rule Set 03 Schedule After School HTTP FS 7 Flow Tag 3 URL Rule Set 03 Schedule Nights and Weekends HTTP FS 8 Flow Tag 4 URL Rule Set 02 Schedule School Day HTTP FS 9 Flow Tag 4 URL Rule Set 04 Schedule After School HTTP FS 10 Flow Tag 4 URL Rule Set 04 Schedule Nights and Weekends HTTP FS 11 Flow Tag 5 URL Rule Set 04 Users Guide v5 1 7 5 13 Deepnines Security Edge Platform Schedule Always On HTTP FS 12 Group None GRP_NONE URL Rule Set 01 Schedule Day and Evening For additional information on
76. er and the alternate unit assumes responsibility for managing traffic As long as the primary unit remains in good health rebooting the alternate unit has no effect on traffic flow NOTE To maintain accurately mirrored configurations both primary and alternate SEP units must be running when configuration changes are made If only a single SEP unit is installed traffic flow is halted while the system reboots To reboot the SEP system 1 Verify that you are logged in to the platform to be rebooted and that it is the active host Use the System Resources tab in the Command Explorer to view information pertaining to the status of the currently connected SEP 2 Select System Reboot from the Operation panel Figure 6 57 3 Click Yes to confirm your action NOTE If a Fail to Wire card exists rebooting the system will also not stop traffic Users Guide v5 1 7 6 99 Deepnines Security Edge Platform S vy ta dew ener Por Muy toe wee Sop fun 7T m A a e e oaa TS P nest rrtient votas ch ternera com Upctate UH Dortateann Last URL DB Update Asy 7 2007 900044 PM Figure 6 57 Reboot The SEP System 6 7 7 2 Shutting Down SEP Although the Security Edge Platform is designed to run continuously there may be times when you need to shutdown the system perhaps to relocate it The System Shutdown command brings the system down gracefully NOTE Networks with High Availability con
77. er may view SEP log files May view monitors The user may access and view the action screens in the Monitors section of the SEP EMC Table 6 21 Permissions Types Users Guide v5 1 7 6 92 Deepnines Security Edge Platform NOTE Advanced logging options or changes may result in a negative impact to system performance or may fill the system logs exceptionally quickly Deepnines strongly recommends that you assign this permission judiciously 8 When you are finished configuring the user account click lt Save gt 6 7 1 Modifying User Accounts You can modify any existing user account to change any information except the user name If the username must be changed delete the user account and create a new one NOTE To change your own alarm types you must have the May choose which alarms to receive permission assigned to yourself To change another user s permissions you must have the May Perform User Management permission 6 7 2 Deleting User Accounts 1 Verify that the unit that contains the user account to be deleted is the active host 2 Log into the SEP Host 3 Select Users from the Users Manage folder Figure 6 51 Alternatively select Manage from the Users folder 4 Inthe user list at the top of the Action pane select one or more user accounts to be deleted and then click lt Delete gt 5 Click Yes to confirm your action NOTE Any user who is assigned the May Perform User Mana
78. eset to discard your changes without applying or saving them 6 5 3 5 Configuring Alarm Receipt Users If alarm delivery via SMTP is activated use the Alarm Type check boxes on the Configuration Users Action panel to assign delivery of email alarms to interested users and enter the destination email address for the user Users Guide v5 1 7 6 68 Deepnines Security Edge Platform NOTE Required Permission You must have the May Choose Which Alarms to Receive permission to configure alarm receipt for yourself You must have super user privilege to configure alarm receipt for other users 6 5 4 Bridges Once the interfaces are defined then you will need to place them into a bridge so that the SEP will understand what pairs of interfaces go together You can have multiple bridges defined but only one can be active at a time Additionally you will need to remember what the settings were on the interfaces that you defined To create a new bridge Log in to the SEP host Select Bridges from the Setup folder Figure 6 37 Click lt New gt Enter the bridge name i e VLAN Bridge From the drop down box select the correct encapsulation type From the drop down box labeled Inside Interface select the correct inside interface that was defined 7 From the drop down box labeled Outside Interface select the correct outside interface that was defined 8 Check the Enable box to set the bridge in active mode 9
79. ess it declines to defend or settle in which case you are free to pursue any alternative you may have 7T Limited Warranty Warranty Disclaimers and Limitation of Liability Limited Warranty Deepnines warrants to you that the encoding of the software program on the media on that the licensed product is furnished will be free from defects in material and workmanship and that the licensed product shall substantially conform to its user manual as it exists at the date of delivery for a period of ninety 90 days from the date You receive the original license key Deepnines entire liability and your exclusive remedy shall be at Deepnines option either i return of the price paid to Deepnines for the licensed product resulting in the termination of this agreement or ii repair or replacement of the licensed product or media that does not meet this limited warranty or iii any hardware provided by Deepnines to you has a one year limited warranty for repair or replacement Users Guide v5 1 12 vi Deepnines Security Edge Platform Except for the limited warranties set forth in this section the licensed product and any services are provided as is without warranty of any kind either expressed or implied Deepnines does not warrant that the licensed product will meet your requirements or that its operation will be uninterrupted or error free Deepnines disclaims any warranties of merchantability fitness for a particular purpose and non
80. figurations shutting down the primary SEP unit causes managed fail over and the alternate unit assumes responsibility for managing traffic As long as the primary unit remains in good health shutting down the alternate unit has no effect on traffic flow NOTE To maintain accurately mirrored configurations both primary and alternate SEP units must be running when configuration changes are made Users Guide v5 1 7 6 100 Deepnines Security Edge Platform If only a single SEP unit is installed traffic flow is halted when the system shuts down To shut down the SEP unit 1 Verify that you are logged in to the platform to be shut down and that it is the active host Use the System Resources tab in the Command Explorer to view information pertaining to the status of the currently connected SEP 2 Select System Shutdown from the Operation panel Figure 6 58 3 Click Yes to confirm your actions Deck der sme prunen cum fPrmary Fi Mp dev doepemnns cam Perey TOP S ee i Rrvaby sirat durs nost aau deseemos com zd e Operatore M wes m Biati Maret eR Ow wcter tration UE Perm Uptate LEE Dstahere Lasi OR OS Update Aug 7 2007 139049 PN Vines Scanner Figure 6 58 Shut Down the SEP System NOTE If a Fail to Wire card exists rebooting the system will also not stop traffic Users Guide v5 1 7 6 101 Deepnines Security Edge Platform Technical Support Additional Resources 7 1 7
81. form NOTE There are two locations to manage users The Setup folder and the Users folder in the Command Explorer window both have action pane windows to manage and configure users 4 Click New The Manage Users configuration screen is displayed Figure 6 50 com Fermar 190 a hi hen ema en mar d D weet Figure 6 50 Manage Users Screen 5 Enter user information following the guidelines in Table 6 19 Users Guide v5 1 7 6 90 Deepnines Security Edge Platform Fea mmm 0000 ID Minimum length 3 characters Maximum length 32 characters Not case User sensitive Minimum length 8 characters Maximum length 32 characters Must contain Password at least 2 alphabetic characters and 1 numeric or special character Cannot contain the user ID or any permutations of the user ID Verify Password Re enter the password Full Name Optional no minimum length Maximum length 256 characters Optional used to deliver system alarms by email No minimum length Maximum length 256 characters Must be one or more valid email Email Address addresses including any scheme required for email server addressing or wireless message device access Multiple email addresses can be separated by a space or a comma and must not exceed the maximum field length of 256 characters Table 6 19 Manage Users Fields amp Requirements NOTE All users can change their own password full name and SMTP address with these
82. g ErigeFerensiX Fig 6 19 Flow Control Menu Match Rules Match rules is a general term for the rule or rules that will select traffic to which a flow specifier will apply For example you make a flow specifier called SMTP outbound and there are two email servers in the DMZ that email should always go to Then you would create one match rule using the IP address of one of the email servers and then add a second match rule for the second email server s IP address NOTE It is very important that you make certain as to not save a flow specifier with a match rule that is completely empty If so it will match all traffic which is usually not intended Users Guide v5 1 7 6 31 Deepnines Security Edge Platform Group Naming If you desire to assign this Flow Specifier to a group name then enter the desired group name into the Group field This will allow you to view all of the Flow Specifier that pertain to that group by selecting the Filter Group drop down menu top center of pane and selecting the desired group Grouping is primarily used when large numbers of Flow Specifier volumes are created so that one can find the desired rule more quickly Defining Protocols To define a particular protocol for the Flow Specifier that is being created check the box next to protocol The drop down menu will now be active and can be scrolled through to find the desired protocol It will default to TCP 6 If the protocol number is known
83. g system and to maintain the settings until you change them again or click one of the following 9 Click lt APPLY gt to immediately apply your changes to a running system but discard those changes the next time the Sleuth9 host is restarted 10 Click lt RESET gt to discard your changes without applying or saving them Users Guide v5 1 7 6 59 Deepnines Security Edge Platform E Edge Management Canale 9s SEPAGoCK dev deepnimm caes pe EG Hee e MD TECHNOLOGIES Operation gt 7 trpdra devdan comm Primary 10974 gt C omi dn trm cmm P many t G en gt ere en itt L ou om ers aT B sus rf Managa rent CQ rur Sarre viscitanacut Logping Contigua r rra Eripe EdgsFotafr Figure 6 31 Advanced Logging Options Screen 6 5 1 3 Viewing Log Files SEP provides the ability to view SEP logs from within the EMC Log display is limited to 1 MB To view the current SEP log file 1 2 3 Verify that the unit to view log entries is the active host Select Log File Viewer from the Monitors folder Figure 6 32 Log viewing options appear in the Action pane Select a date time range for the log entries to be displayed and click OK SEP displays log entries for the time interval you specified If the specified time interval has more entries than fit in the 1 MB limit the output begins with the most recent entry within the time interval and truncates later entries If output is tru
84. ge Platform 6 4 6 Saving and Printing Reports Both Summary and Detail reports can be saved to the administrators computer This will allow the administrator to email archive or print out the report information To save reports Select the lt SAVE gt button from the desired report Select the location or folder on the user s computer where the report is to be saved Name the file to signify the date that the report was generated Example Detail report 08 05 2007 htm By default the file extension is html make sure to name the file htm extension Click SAVE to save the report To print reports Select the PRINT button from the desired report When the printer select window appears select the desired printer Select any other desired printing options Select lt OK gt to print NOTE The print options could vary depending on operating system or printer type NOTE Ensure in the printer pop up menu that the amount of data to print is not too large Printing the detail report could be in the hundreds of pages if not drilled down Users Guide v5 1 7 6 56 Deepnines Security Edge Platform 6 5 Setup The Setup section of the Command Explorer provides setup configuration options for the following operations gt 7 Setup o 3 Logging o c Virus Scanning Alarm Delivery 9 Bridges O EdgeForensix O Flow Tags Host Lists Interfaces 0 Licer Mirror Control Mirror Hos
85. gement permission is a SEP super user There must be at least one super user account on each SEP host You cannot delete the only super user account on any SEP host Users Guide v5 1 7 6 93 Deepnines Security Edge Platform U5 Mn Lige Management Comme da S3 flc shew diem prom come rs Manage f Ee Hep a MS TECKHHOLOGTES SEP gt CoAems L2 deck dev deagntves com Primary 108 3 n gt C3 votes S Protection Policies Kesotng gt gt C hydra dev decenmes cam Pranary 10 CZ naf drm nnm cam Pra dm Ful Mame CoafirmPassmorf e errecreserseseees Fi Wame F Mal Address Stauth Dafault coart Acum Type DA snas update Hy Pempriin e May contgurs auttrg Ms pariin genera May parte May Aon Ed36F orons May parom advanced comtguraton tinar isar manapa rnont mp amp tapon ZW Autres Figure 6 51 Manage Users Screen Delete User Accounts 6 7 3 Viewing Current Users You can view a list of all users who are currently logged in to the active SEP host Up to 32 users can log in to a SEP host at one time To view a list of logged in users 1 Verify that the unit on which to view logged in users is the active host 2 Select Users from the Monitors folder Figure 6 52 A list of users who are logged in appears in the Action pane Alternatively select Current from the Users folder Elm pM tep e TTEGHNOLOBIER t 2 doch ter does com Prima
86. ght lt NEED DATA gt Flowspec Schedules lt NEED DATA gt Set to 3x historical limit by default This controls the rate at Adaplye Winday Spey which the adaptive rate control window opens Set to 5x historical limit by default This controls the rate at Apo lee which the adaptive rate control window will close Note If there are frequent spikes in traffic on your network changing the open to 10 and the close to 50 may aid in the amount of blocking that is occurring from instant packet rate controls Metrics Delta T lt NEED DATA gt Instantaneous Tau lt NEED DATA gt History Tau lt NEED DATA gt Pending Setup Timeout in secs lt NEED DATA gt Current Activity Timeout in secs lt NEED DATA gt IPv4 Flowtable Slots NEED DATA gt IPv6 Flowtable Slots Users Guide v5 1 7 NEED DATA gt 6 85 Deepnines Security Edge Platform IPv4 KGH Slots lt NEED DATA gt IPv6 KGH SLots lt NEED DATA gt Maximum Fragments Set to 3 fragments per packet by default If fragments are usually seen on your network this may need to increase to 5 It is not recommended to increase the fragments to over 5 as this is usually a sign of another networking problem Inactive Removal Timeout in secs lt NEED DATA gt Timed Metrics Report Passes lt NEED DATA gt Do ARP lt NEED DATA gt Enable Host State lt NEED D
87. hat appear on the original licensed product copy on any copy and in any media therefore The licensed product is licensed to You solely for your internal use by You and for you and the licensed product or any portion thereof may not be used or accessed by sub licensed to re sold to rented to or distributed to any other party You agree not to allow others to use the licensed product and you will not use the licensed product for the benefit of third parties You acknowledge that the source code of the licensed product and the underlying ideas or concepts are valuable intellectual property of Deepnines and You agree not to except as expressly authorized and only to the extent established by applicable statutory law attempt to or permit others to decipher reverse translate de compile disassemble or otherwise reverse engineer or attempt to reconstruct or discover any source code or underlying ideas or algorithms or file formats or programming or interoperability interfaces of the Licensed products by any means whatsoever You will not develop methods to enable unauthorized parties to use the licensed product or to develop any other product containing any of the concepts and ideas contained in the licensed product You will not and will not allow any third party to modify licensed product or incorporate any portion of licensed product into any other software or create a derivative work of any portion of the licensed product You will not and will no
88. he above alarms explanation will apply to and both SEP s will be viewable from the Top Tree View Alarms folder SEP s will be viewable from the Top Tree View Alarms folder Users Guide v5 1 7 6 15 Deepnines Security Edge Platform Q he Edgn Management Coralie Pe SEP feck dire dew prim cim tiseitura Alarrs Viewer I doch few domes com omar f I Arta ter deines com fma y PE Tp iem Penne y tn Figure 6 10 Alarm Viewer Display 6 2 8 LogFile Viewer The SEP provides the ability to view SEP logs from within the EMC Log display is limited to 1 MB To view the current SEP log file perform the following 1 2 3 Verify that the unit to view log entries is the active host Select Log File Viewer from the Monitors folder The Log Viewing options appear in the Action pane Figure 6 11 Select a date time range for the log entries to be displayed and click lt OK gt SEP displays log entries for the time interval you specified If the specified time interval has more entries than fit in the 1 MB limit the output begins with the most recent entry within the time interval and truncates later entries If output is truncated select a smaller time interval Optional Activate the Word Wrap checkbox to display the log entries within the bounds of the current window Clear the checkbox to display log entries on a single line Optional Click lt COPY gt to Clipboard to copy all displayed log entries Copied entries
89. he use of third party software 2 License and Restrictions License Subject to the terms and conditions of this Agreement Deepnines hereby grants only to you a non exclusive non transferable license to use the copy of the licensed product in accordance with the relevant end user documentation provided by Deepnines only on the licensed server and only for the licensed configuration You have no right to receive use or examine any source code or design documentation relating to the licensed product Standard User Restrictions If you are a standard user you license the licensed products solely for use by you to provide security management for your own operations No licensed product nor any portion thereof may be used by or on behalf of accessed by re sold to rented to or distributed to any other party Managed Service Provider Restrictions If you are a managed service provider you license the licensed products for use by yourself to provide security management for only the operations of your service customers No licensed product or any portion thereof except for the management of your service customers may be used by or on behalf of accessed by re sold to rented to or distributed to any other party General Restrictions Except for one copy solely for back up purposes and as required by statute you may not copy the licensed product in whole or in part You must reproduce and include the copyright notice and any other notices t
90. hecasdodusaraegaacdvtgcceviaees 6 28 6 3 5 URL EllteriRules senate ee hit sie Me ehh ei eh 6 41 6 4 REPOMING sect siete eee ege rect they eoe ae tee eid ete eate tede Se ede ised 6 43 6 4 1 Generating Reports e t edet re ee ete cater te ebd ads 6 44 6 4 2 Anti Virus REDON siot rte et ete aet epe ee uet o Eie S eda ee ARS 6 45 6 4 3 Network Anomalies Report cooocccconoccccnonoccccnononcncnanoncnn nano nnncnnnonnnr ran nene eren 6 47 6 4 4 Signature Violations Report ssssssssssseeseeeeeeen enne 6 51 6 4 5 URL Filters iia erae ipe dude 6 53 6 4 6 Saving and Printing Reports sse enne 6 56 5 5 E EE e 6 57 6 5 1 LOGGING pts ipeo baee ie eet iie i eA 6 57 6 5 2 Vir s SCalining idilio 6 63 6 5 3 Alarim Dellvety itt e cott eed tnde ce ner eode 6 66 6 5 4 isis m 6 69 6 5 5 EdgeForensiX EFX ici irae depen ee IE 6 70 6 5 6 Flow Tags roii oaia ID 6 73 6 5 7 ipo ICH E 6 74 6 5 8 o he ee E tM En e E RH PR de e EE HR ERR 6 75 6 5 9 A ob eeiam bes D beet das bee Cet 6 77 6 5 10 Mirror GOntEOL iia cba 6 77 6 5 11 Mirror lOS 5 2 ti adidas 6 78 6 5 12 Reporting Configuration sssssssssseeen ennemis 6 81 6 5 13 Save Configuration 6 82 6 5 14 System Identification eee e ette ette contes 6 83 6 5 15 Traffic Manager rccte erepta ai eee edi ete 6 84 Users Guide v5 1 12 xiii Deepnines Security Edge Platform 6 5 16 UBLSFIlters setae
91. his rule will apply to Defining Directionality Defining Direction for the Flow Specifier provides another layer of protection from hackers and attackers by defining where the flow is going to be originating from For example If the Flow Specifier is created for HTTP outbound traffic Protocol would be TCP 6 Outside port number would be 80 direction would be set to FROM INSIDE The session will start on the inside of the network and go out to the Internet Applying a Match Rules If putting two flow tags in a single rule both must match If matching multiple flow tags separately is desired then a separate match rule must be created for each flow tag Once all of the criteria for the Match Rule have been defined the administrator can apply it to the Flow Specifier by pressing the Update button Refer to Figure 6 20 Users Guide v5 1 7 6 33 Deepnines Security Edge Platform Multiple Match Rule If additional rules are desired within the Flow Specifier 1 After the Update button has been pressed click NEW RULE gt 2 Define the Protocol IP addresses and ports 3 Click UPDATE to apply to the Flow Specifier If no additional rules are desired for the Flow Specifier Click on the Control tab middle of the pane and read below for applying control Control The control portion of the Flow Specifier defines how the matched traffic is going to be treated if it is seen on the network traversing the SEP Numerous contro
92. how they can be obtain for current customers DPI Actions DPI categories can be globally enabled or disabled along with altering the logging of enabled categories To ignore enable enable with logging or logging only on signature categories 1 Select Deep Packet Inspection Actions from the Protection Policies folder Signature category classifications are listed and described in Table A 1 Users Guide v5 1 7 A 2 Deepnines Security Edge Platform Signature is enabled but no logging of the triggered Drop Silently signature is written to disk Alert will be seen in the reporting database Signature classification is enabled and signature logging is AOS enabled Alert will be seen in the reporting database oo Oni Signature blocking is disabled but event is still written to 9 y the logs Alert will be seen in the reporting database Ignores the classification completely with no logging of Ignore signature events Alert will not be visible in the reporting database Table A 1 Signature Category Classifications NOTE If the administrator is going to be looking for a specific attack within the log files the Action setting will need to be set to Drop With Log otherwise Deepnines recommends that DPI Actions be set to Drop Silently when blocking is desired This will allow the administrator to still view the alert in the reports and assist in conserving processing capabilities A 3 DPIRules Selection DPI Rules s
93. ines cem Setup Viras Scantiag SM I Cootere deck dev d eegamies com Promary 100 1 000 009 gt 3 j _ e a 9 pea Tyra ae doses com Frewary 100 tas re ml iu Pommes 6 Figure 6 35 SMTP Capture Screen 3 Specify a Maximum Attachment Size in number of bytes The default is 8 000 000 bytes NOTE The maximum attachment size must be configured to include MIME encoding which increases the original attachment size by approximately one third The default of 8 000 000 bytes therefore allows an original attachment size of approximately 6 000 000 bytes 4 Click lt SAVE gt 5 Click lt APPLY gt Users Guide v5 1 7 6 65 Deepnines Security Edge Platform 6 5 2 6 6 5 2 7 6 5 3 Stopping Starting Virus Scanning Activating virus scanning is a two part process First start the appropriate engine POP3 or SMTP for the email to be scanned if it is not already running then start the virus scanner component The engine intercepts email traffic and routes it to the Virus Scanner component The Virus Scanner component returns the email traffic to the engine after processing and the engine transmits the message appropriately Starting Virus Scanning To start virus scanning 1 Verify that the unit to start virus scanning is the active host 2 Select the appropriate engine folder POP3 or SMTP from the Operations panel 3 Click START 4 Click YES to confirm your action Sto
94. infringement Some jurisdictions do not allow the exclusion of implied warranties or limitations on how long an implied warranty may last so the above limitations may not apply to you This warranty gives you specific legal rights You may have other rights that vary from state to state Limitation on Liability Exception for bodily injury of a person in no event will Deepnines be liable to you or any third party for any damages arising out of the subject matter of this agreement the licensed product or any services under any contract negligence strict liability or other theory for any indirect special incidental or consequential damages including lost profits or for loss of or corruption of data or for cost of procurement of substitute goods or technology irrespective of whether Deepnines has been advised of the possibility of such damages Deepnines maximum liability for damages shall be limited to the license fees received by Deepnines under this license for the particular licensed product s that caused the damages Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages so the above limitation or exclusion may not apply to you 8 Government Regulation and Export Control Government Regulations You agree that the licensed product will not be shipped transferred or exported into any country or used in any manner prohibited by law Export The Licensed product is subject to U S expo
95. ion Deep Packet Inspection provides another layer of inspection for a variety of intrusions Deep Packet Inspections is disabled on each flow specifier by default You have the option to enable it for each flow control Once enabled you can disable it again if needed Before using the Deepnines Deep Packet Inspection engine refer to Appendix A DPI Rules for a short tutorial on the rules and structure of the rules 6 3 1 1 Actions DPI categories can be globally enabled or disabled along with altering the logging of enabled categories To ignore enable enable with logging or logging only on signature categories perform the following 1 Select by clicking Deep Packet Inspection Actions from the Protection Policies folder The Actions Display is displayed Figure 6 12 2 Highlight desired classification if you wish to change action 3 Select type of action from the Action pull down menu 4 Click SAVE to save the results or click RESET to cancel the changes T Menon snis 7 rear evo emnes com Dry Yer Bares da 7 ated fer Pins Coan Primary M rer Cuneta c A nas nep seatt erty y gem un 11553 Figure 6 12 Deep Packet Inspections Actions Display Users Guide v5 1 7 6 18 Deepnines Security Edge Platform The Action category classifications are listed in Table 6 6 Drop Silently Signature is enabled but no logging of the triggered signature is written to disk Alert will be se
96. isplay Figure 6 4 allows the administrator to view complete system health information This includes link status engine status fail over state suspicious or bad file modes CPU disk and memory utilization as well as packet per second interrupts per second last update and system uptime 1 foci ie comp urs cot SEP Versi 0 4 3 gt j 7 dich dev deryames cam Prey te Miror Satine ma woei EE Oase Lk O I wen saat SMTP Ere e s wu Fee Lege MO Ur Chas acero tes MG Sens Foen CB for Cs CPU Utilization Memory Utilization sr LET D E rer tres Be tus x x NLIS qwe Cope Deep P aaoi repeat ie Won oem Sree hee interrupts Per PIE ii Disk Utilization iens 5 Packets Per Second TM Up Since Sop 11 2007 1225 53 6 Figure 6 4 System Resource Display 6 2 2 Network Traffic To view the Network Traffic navigate to the Monitors section and select Network Traffic Within this page Figure 6 5 you can view the aggregate traffic traversing the SEP both inbound and outbound Users Guide v5 1 7 6 7 Deepnines Security Edge Platform There are 3 different lines that are visible on each graph and are outlined in Table 6 4 Offered Yellow Line The amount of traffic that is matching the particular flow The amount of traffic that has passed all tests and is allowed in Allowed Green Line ihe network Blocked Red Line The amount of traffic that is blocked within that flow Table 6 4 Colored G
97. ite ooooooccconnocccononoconononccnnnnnnccnnnnnncn rn A 2 A 2 4 P PISA ool E sit TEE EE EEEE A T T E E I E EE S A 2 A DPI Rules Selection ie Tete Le ate bene ee dhe ele A 3 A 4 DPI Custom Rules User Defined Rules ssssssssseeeeeeeeeen nene A 3 c M G 1 Users Guide v5 1 12 xiv Deepnines Security Edge Platform Introduction 1 1 Overview of the Security Edge Platform SEP The Security Edge Platform SEP is a unified threat management UTM and policy enforcement appliance that is deployed at the edge or at critical points in the network architecture and acts as the first line of defense for the network The SEP evaluates all network traffic at the packet level both ingress and egress to determine what is valid and what is malicious The SEPs patent pending technology is behavior and signature based in order to mitigate both known and unknown attacks There are two different types of SEP devices Frontline and Edge Figure 1 1 The functionality is identical on both but there is one major difference between the two devices The Edge device is placed outside or in front of your router taking the connection from your ISP The Frontline device is for LAN deployments on Ethernet or Gigabit Fiber connections Both devices contain 3 interfaces an interface for outside traffic an interface for inside traffic and an interface for the management console to conne
98. k in the small box next to either Inside Port Range or Outside Port The Port Range should be 80 80 Click and place check mark in small box next to Direction Click on pull down to display options Direction Both Click on Control tab on top row of tabs Figure 5 8 Click and place check mark in small box in Conversation Select Conversations Limit 50 by selecting up amp down arrows Select Control Only from pull down menu Click Protocol Handling tab on top row of tabs Figure 5 9 Select lt NONE gt Click lt SAVE gt To change the configuration for IDS protection 1 2 3 Click on Control tab on top row of tabs Figure 5 10 Click and place a check mark in small box next to Deep Packet Inspection to enable it Click lt SAVE gt Users Guide v5 1 7 5 6 Deepnines Security Edge Platform Wene Meh me Cr Prstocet Pentin Dpr reni M asino mse Mame c Meet M s Conte protocol Parle Copt Em tu ott d Det Parketi seat Pest Deep Pochet trepertion Camur seat ones Theme nt r babe Tremonti REP Ngaben i upne ence Oem lou Pecses Fon bee I D Figure 5 8 Creating a Flow Spec For IPS and IPS IDS Control Screen Users Guide v5 1 7 5 7 Deepnines Security Edge Platform Contred Pyetorn Mantiieg Cito are 12 tp t fetch Mites Cem roca Pdl Chet orent ALIS On 1 Cumt matur Tremas Comenta Timor SEP Speman og il acai diede tow fn bow LL te
99. l methods are listed as follows Table 6 7 Action Block All of the traffic matching the Flow Specifier will be blocked All of the traffic matching the Flow Specifier will be forwarded and Geom s coward not controlled This should not be used if at all possible The defined number will control new conversations E The defined number will control the total bit rate per second CS The defined number will control total packets per second Table 6 7 Flow Specifier Control Methods To block the traffic for the Flow Specifier 1 Check the action box The drop down menu will become active 2 Pull down the menu and select block To forward the traffic for the Flow Specifier 1 Check the action box The drop down menu will become active 2 Pull down the menu and select lt Forward gt NOTE When in forwarding mode there is minimal checking that is occurring and attacks or other unwanted traffic could pass into or out of the network Additionally DPI will not be active on the Flow Specifier when forward is selected Users Guide v5 1 7 6 34 Deepnines Security Edge Platform To control the flow of traffic for the Flow Specifier by Conversation rate 1 Check the Conversation box The conversation field below will become active 2 Enter an amount of new conversations per second for the Flow Specifier 3 If unsure of the correct number set the number to a high rate and then read the Control Options section of this m
100. lay options Protocol TCP 6 6 Click and place check mark in small box next to Inside Port Range Inside Port akon Range 25 25 7 Click and place check mark in small box next to Outside Port Range Outside Port Range 25 25 8 Click and place check mark in small box next to Direction Click on pull down to display options Direction Both Users Guide v5 1 7 5 1 Deepnines Security Edge Platform 9 Click on Control tab on top row of tabs 10 Click and place check mark in small box in Conversation Figure 5 2 11 Select Conversations Limit 1000 by selecting up amp down arrows 12 Select Control only from pull down menu 13 Click Protocol Handling tab on top row of tabs 14 Select Mail SMTP button Figure 5 3 15 Click lt SAVE gt G 9e Eden Management E ws com Protection Policias dle f pu nmm Lari Handing Strode FCS IPAG Dep Pi Nore DN ACE C APTS OF ALISTE ON IAE ON AL HATE ON ACYMTE OF ACNE ON MiichRadem Corral ProtecolHaeding EdgeForengi jamia a Pasi rahe ud nadeFot Dunia Ad Ougan Edge G Dus Filme Tage j TE 251011 162974 Figure 5 1 Configuring SMTP Match Rules Screen Users Guide v5 1 7 5 2 Deepnines Security Edge Platform rtr Match m s Cnt Protecol a Edgar erro ee doge Hos od LIEU Mie ht Pardo aemen Pee eames o certum pS ena ori ba mri eet mon nme ehm rg parieti em e m short hers Sane the EINE Panem n aot CQ Oe Ldgn Management Conecte
101. lder In the SMTP Server field enter the name of the mail server that SEP will use to send alarms In the From Address field enter an email address that will signify that the alert came from the SEP i e SEP domain com Enter a Timeout value in seconds for the SEP mail server connection For each of the seven available alarm types select the desired alarm delivery and storage methods under the SMTP column Click SAVE to immediately apply your changes to a running system and to maintain the settings until you change them again or click one of the following a Click APPLY to immediately apply your changes to a running system but discard those changes the next time the SEP host is restarted b Click lt RESET gt to discard your changes without applying or saving them Users Guide v5 1 7 6 67 Deepnines Security Edge Platform 6 5 3 2 Alarm Delivery via EMC To configure SEP alarms for delivery to the Management Console 1 Verify that the unit to configure alarms is the active host 2 Select Alarm Delivery from the Setup folder 3 For each of the seven available alarm types select the desired alarm delivery and storage methods under the EMC column 4 Click Save to immediately apply your changes to a running system and to maintain the settings until you change them again or click one of the following a Click Apply to immediately apply your changes to a running system but discard those changes the next time the SEP ho
102. lection from the Protection Policies folder Figure 6 13 2 Select the Rules Selection tab at the top of the menu Signature groups are listed under the Rule Selection tab 3 Click on o to expand that particular group of rules Check or uncheck the desired rule 5 Click lt SAVE gt to save the results or click lt RESET gt to cancel the changes gt Users Guide v5 1 7 6 19 Deepnines Security Edge Platform pr aes fn CI vta dev meene cam immor HH Con mte V Canin daspuiuna com viman MN w CT attack rro des Hals L7 bactteet sites C bond rame ne o aene e CI niss 1 tt s e E ether ree J panes ES petam e ppn on pop nes J panies CS penses ow Cl eee lt O s 7 shosse rates E psn C onire O wy qut oem Figure 6 13 Deep Packet Inspections Rules Selection Display To view select and edit rules files in the Rules Details tab perform the following 1 Select by clicking gt Deep Packet Inspection gt Rules Selection from the Protection Policies folder Figure 6 14 2 Select the Rules Details tab at the top of the menu 3 Select a rules file from the drop down menu to view 4 Highlight desired alert field in the main body of menu if you wish to change action The selected edited field is shown in the Edit Selected Rule field 5 Select type of action from the Action pull down menu 6 Click the Add to User Rules button Users Guide v5 1 7 6 20 Deepni
103. located in the miscellaneous group IPv6 does not work correctly when these message types are blocked NOTE That the Information Request and Information Reply messages were originally created to allow devices to determine an IP address and possibly other configuration information This function was later implemented using protocols such as RARP BOOTP and DHCP and these message types obsolete and can be blocked 6 3 3 Conversation Symmetry Conversation Symmetry allows the SEP to provide protection or state like measures on connectionless traffic Connectionless protocols have no real beginning and end Most security appliances will not monitor connectionless protocols As a result it is easy for DoS or other types of attacks to be directed at devices that are listening for connectionless protocols i e DNS Server Conversation Symmetry is designed to insure proper 2 way traffic by controlling the number of requests and responses assigned to a specific protocol Consequently TCP and ICMP are not controlled by this function but provided with their own functions TCP is always checked for proper behavior to the protocol including sequence numbers and most types of ICMP are blocked by default configurable except for echo requests replies and certain destination unreachable messages that are needed for MTU discovery The controls of the Conversation Symmetry allow you to define how many outgoing packets there can be before a response is Se
104. multiple rule import from a text file 1 Select the Bulk tab on top of menu for bulk rule addition or modification Figure 6 16 2 Select IMPORT button bottom left A window will pop up asking you to find the location of the text file you wish to import 3 Input the desired text file in File Name field 4 Select Open from the pop up window once the desired file is located The file contents are displayed in the Bulk explorer pane 5 Click SAVE Users Guide v5 1 7 6 22 Deepnines Security Edge Platform The newly imported Bulk rules will now be visible in the Single tab as individual User Defined Rules and can be Selected or Deselected as wanted Newly imported Bulk rules will automatically be enabled for DPI scanning Single or individual defined rules will have to be enabled at the time of creation or after they have been saved l Lage Mazagereerti Lamai Pn bil natus Aee ibemprrresa cored ites tun Petite llar lastet imperiales Defined Mater He Em lew e WO cwotooit C urere LT omma dew arepas comm Primary NF O Ries Fanta nel Der Mises Louk pt My Documents L7 Deeptane hex LT My Pet Fite Mane yrecete d Fes el Type eitis Hrs ama Fig 6 16 The DPI User Defined Rules Bulk Users Guide v5 1 7 6 23 Deepnines Security Edge Platform 6 3 2 Static Blocking Some packet types should always be blocked from entering or leaving your network SEP automatically and unconditio
105. n in e Co Pinmecten Poes i 28 14 1 02 rx CEF 17236 Dispak her depara r 395 man Joop Gol pew sovuenmon fom 127 4 0 on 31 Renny E 28 14 1602 dx CEF 17236 Doa terdepatiner r 1234 proceso sd Aosgned srt bidt la 88231 EMO Caer seu Mug 23 15 26 54 dock CET 17236 Deoak terna epatrmer r 693 mad msg eri oo siegf socket x 1229 ssh imt uoti 9g 29 15 0 54 WX CET 17236 Dispute her ds pane c13504 xem PEE Removed sck6z42 6 70 EWC chert magnm tom srit_ RSI Pune 2g 23 15 9064 Vx CEP IMA dep helper c 8057 goed tea p 0 127001 ge eet ug 23 15074 doc CES 17736 Dear her dbepatrmer r 295 nein 007 Got neve somserton fom 127 20 1 on 721 9 ostii jag 28 1064 doch CET 120 Dearricherddiepptrter t1231 peces eid Aengned erc kl ty 1779 EMC Cheri i 20 I TESA doc CEP 13220 Abi disp hiper 4017 sati eit of 127 20 1 ped ig 20 15 18 24 A Derek her denpu stue c DOI read meg enter on NA eum im g 28 15 38 24 ac CLE 17720 Deoa herd palin t 12534 chewed HE Rwmovee Doce fa 79 DUC charh magn Yom seit AM g 20 1536 24 dock CON 19290 Alora dep niger c 415 aat iva d 127 10 1 logged eut ig 28 15 3624 dock CEF 137730 Dispalc tas a padel e 3605 man Dop Oel fe comectos hom 27 10 on 24 i 20 153824 dx CEF 17236 Dawah ter d patihar c 1234 process 364 Aegre dic 1041 la 1029 EXC Chart ig 28 151624 Ax CEF IT dap hil per c4057 da EE showed of 127 3 0 logged i 20 16 44 53 cock CEF 17238 Dispakc herd spatihar 395 main Joop Get bev conmeesos fom 127 0 0 t on 030 28 16
106. nally blocks the following packet types Packets with identical source and destination addresses Packets with invalid header formats Packets with broadcast source MAC addresses Some packet types are useful in special circumstances but for most networks it is unnecessary traffic Attackers often use these obscure packets to prepare for or as the basis of an attack By default SEP automatically blocks most of these message types You can however unblock any of these message types if your network requires them For example SEP automatically blocks multicast message types However these message types are used by applications that support video conferencing If your network supports video conferencing you must turn off static blocking for these message types Configurable static blocking is available for the following message types ICMPv4 Messages ICMPv6 Error messages ICMPv6 Info messages Miscellaneous messages To configure Static Blocking 1 Verify that the unit on which to configure static blocking is the active host 2 Select Static Blocking from the Protection Policies folder 3 Click the message type to be configured A list of messages of that type that can be blocked using SEP static blocking appears in the Action pane Figure 6 17 Users Guide v5 1 7 6 24 Deepnines Security Edge Platform Fig 6 17 Example of Blocking Flags listing for ICMPv4 4 Activate the check box associated with a specific message
107. ncated select a smaller time interval Optional Activate the Word Wrap checkbox to display the log entries within the bounds of the current window clear the checkbox to display log entries on a single line Optional Click COPY TO CLIPBOARD gt to copy all displayed log entries Copied entries are in plain text format and may be pasted into any application Users Guide v5 1 7 6 60 Deepnines Security Edge Platform R Edge Management Censsle 9s SEP dack dev derpuines car MartarsA og File Viewer 7 dock ffov depen com Pramar y 100 From 2232007 11837 PM POT wi fu3242007 t 1137 PM POT lc D Copy te Opbeard on 3 Figure 6 32 Log File Viewer Screen 6 5 1 4 Setting Remote Log Host You may optionally configure SEP to save logs on a remote log server When you do the log server assumes management of the log file so SEP s 5 file 20MB limit does not apply NOTE By default most syslog daemons do not accept log messages from remote systems You must configure the daemon on the remote system to accept logging messages from SEP On Solaris systems start syslogd using the t option On Linux systems start syslogd using the r option To configure a remote logging server 1 Verify that the unit on which to configure remote logging is the active host 2 Select the Logging folder from the Setup folder and then click Logging Configuration Figure 6 33 3 Enter the IP address of the server on which to write th
108. nd name Toview the health condition of a SEP host hover the mouse pointer over the host name To navigate the Command Explorer using the keyboard To move the focus up or down the list press the Up or Down arrow keys To open a folder press the Right arrow key to close a folder press the Left arrow key To execute a command press Enter or Return Executing a command in the Command Explorer pane displays information or provides input fields related to the current selection in the Action pane Table 3 2 describes each of the options available within the EMC Console menu opion Beseipion Edit Preferences Clear Host History Clears the host history list from the File menu Save Last Location Remembers the last panel you accessed and returns to it when you log back in to the GUI Set Look and Feel Provides options for changing the appearance of the SEP EMC Show Tree Lines Toggles display of guidelines in the Command Explorer pane on and off Help About Displays version and copyright information for SEP Status Line The status line at the bottom of the EMC screen displays system messages Alarms Allows you to view a list of recent alarms generated by all the SEP hosts to which the EMC is connected Table 3 2 EMC Console Options Users Guide v5 2 1 3 6 Deepnines Security Edge Platform 3 6 EMC Version Number The EMC version number is used to verify consistency between
109. nes Security Edge Platform Ree Sebection Fle Dette CI rita des rwquanan cons Frons y 108 C eatery apr com Prem M DPI Rates Fes but tet rue ray Seient a fin n ty ICI mt yp AETERNA Bacher ssis yg EST EPTAAL ome ru O Wises Batata 9 Liner Deters r We we T LI e le LI we ve gp LE we E wu x ve ve ve we T LI E we a E eo e wa ve Figure 6 14 Deep Packet Inspections Rules Details Display 6 3 1 3 User Defined Rules You can build custom rules or import groups of new rules that are desired DPI custom rules can be built and added from existing rules as well To view modify or add new custom rules 1 Select by clicking gt Deep Packet Inspection gt User Defined Rules from the Protection Policies folder Figure 6 15 Select the Single tab on top of menu for single rule addition or modification Click New to add a new rule Highlight by clicking on rule to modify an existing User Defined Rule Make modifications to the rule in the Rule box Press Save to save the changes or press Reset to reverse the changes PAR WN Users Guide v5 1 7 6 21 Deepnines Security Edge Platform C 9 Edge Management Consele 9s 6 10 8 200 201 Protection Poticies Deep Packet inspection User Defined Rules De Uk tb MW TECHNOLOGIES SEP D Aarme 23 0 200 207 fPrmmary 1003 3WMuntors 73 Protection Policies gt 53 Deep Packet Ispacbon 4 Actone Rues S
110. new Figure 4 1 License Detail Screen Users Guide v5 2 1 4 1 Deepnines Security Edge Platform R 9s Edge Management Console 9s P oahu dev deepnines com Setup _icenses license xmi does not exist Details Request Renew SMTP Server Information 10 10 320 200 State Country United States Tw Mat Phone Primary Name Primary Phone e Boquest Renew License Figure 4 2 Request Renew Menu Screen Request Renew Menu Fields SMTP Server Timeout IP address of mail server Indicates amount of seconds before server times out Leave at default From Address Your email address that identifies the SEP Server System ID Populated system ID field Company Name Address 1 Address 2 City Your company name Your address Your address Your city Your state Country Select country from pull down menu Your zip code Your email address Your telephone Primary Name Your name Primary Email Your primary email address Primary Phone Your primary telephone number Email License To Client email address identifies admin who will maintain the SEP Deepnines Contact Mail Populated with Deepnines contact email Table 4 1 Request Renew Menu Fields Users Guide v5 2 1 4 2 Deepnines Security Edge Platform 2 Input data in all fields of the Request Renew screen System ID is already populated with your System ID 3 Click SAVE CHANGESs gt 4 Click lt REQUEST RENEW LICENSE gt Dee
111. ng May choose which alarms to receive The user may edit the Alarms section of the user account Users must have this permission to assign or modify alarms for themselves May configure Edge ForensiX System The user may access and make changes to the Configuration EFX section of the Sleuth9 EMC May configure advanced logging The user may access and make changes to the Configuration Logging section of the SEP EMC May configure auditing The user may access and make changes to the Users Auditing Folder May configure flow specifiers The user may access and make changes to the Protection Policies Flow Control section of the SEP EMC May perform advanced configuration The user may access and make changes to the Configuration Advanced section of the SEP EMC May perform general configuration The user may access and make changes to the general Configuration section of the SEP EMC May perform system operations The user may access and execute commands in the Operations section of the SEP EMC May perform user management The user may create and edit user accounts Users must have this permission to assign or modify permissions for themselves and other users Users with this permission are SEP super users there must be at least one super user account for each SEP host May view ForensiX database The user may only view the Edge ForensiX database May view log files The us
112. nto a high availability configuration is a two step process To set the Mirror Host on SEP unit 1 Figure 6 43 1 2 3 4 Log in to the SEP host to be the Primary Unit Select Mirror Host from the Setup folder Enter the IP address of the SEP unit 2 or alternate SEP Click Save to immediately apply your changes to a running system and to maintain the settings until you change them again or click one of the following a Click Apply to immediately apply your changes to a running system but discard those changes the next time the SEP host is rebooted b Click Reset to discard your changes without applying or saving them To set the Mirror Host on SEP unit 2 Figure 6 41 1 2 3 4 Users Guide v5 1 7 Log in to the SEP host to be the Alternate Unit Select Mirror Host from the Setup folder Enter the IP address of the SEP unit 1 or primary SEP Click Save to immediately apply your changes to a running system and to maintain the settings until you change them again or click one of the following a Click Apply to immediately apply your changes to a running system but discard those changes the next time the SEP host is rebooted b Click Reset to discard your changes without applying or saving them Figure 6 43 Mirror Control 6 78 Deepnines Security Edge Platform 6 5 11 1 Viewing Systems Health Each SEP unit continuously monitors its own health and can report on its condition
113. o find the location of the text file you wish to import 2 Find the desired text file 3 Click Opens from the pop up window once the desired file is located The file contents will then be displayed in the Bulk explorer pane 4 Review the contents or that the new rules to be imported are correct and then click Save The newly imported Bulk rules will now be visible in the Single tab as individual User Defined Rules and can be Selected or Deselected as wanted x o Y Loge Management Censele 9s SEP 10 B 200 201 P retection Pelictes Deeg Packet Inspection User Defines Rules B Dx om a WES TECHNOLOGIES 45 SEP amp 3 Alam 29 9044 200 207 Prem 9095 E Dj Moreters A Protection Pomes s Y Deep Parket nspertor 9 Actors Rules Selector C Btalx Bloceng Conversation Symmatey Flow Control Fapertng DJ Setus E TJ Up Figure A 2 DPI User Defined Rules Screen Bulk Tab Newly imported Bulk rules will automatically be enabled for DPI scanning Single or individual defined rules will have to be enabled at the time of creation or after they have been saved Users Guide v5 1 7 A 5 Deepnines Security Edge Platform Glossary ADAPTIVE RATE CONTROL ARP AV BRIDGE CGI CONVERSION SYMMETRY CPU DMZ DPI Deep Packet Inspection EDGE EDGEFORENSIX EFX FLOW TAGS FLOWSPECS FRONTLINE HTTP ICMP Users Guide v 5 1 7 You can configure this setting in
114. of a password file in a default location the attacker can crack the file if present and try to use the same password elsewhere on your network potentially gaining authentication credentials that attacker should not possess How do we detect this type of attack Viewing the source and destination ports isn t going to help us much Most Web Traffic is going to flow over a number of defined HTTP ports usually 80 8080 and 443 The source port is most often a high randomly selected port therefore viewing the content of the packet is the best method With the string matching content you can select only traffic that matches the simple string Iwwwboard passwd txt This will be in the HTTP request of almost anyone attempting this type of attack Update Methods Oink Code Signature updates can be obtained directly from the open source community By registering at snort org and obtaining an oink code one can get the latest rules from the community VRT VRT rules are the latest tested rules that can be obtained There is an annual fee associated with this service More information can be obtained through Deepnines Technical Support on this service and associated fees Deepnines Website Deepnines Technical Services researches and develops new rules that will stop a number of threats or unwanted behavior and will release those on the website Additionally Deepnines Technical Services will send out email alerts on the new available rules and
115. of any government funds Any use modification reproduction release performance display or disclosure of the licensed product by any government shall be governed solely by the terms of this agreement and shall be prohibited except to the extent expressly permitted by the terms of this agreement and no license to the licensed product is granted to any government requiring different terms High Risk Activities The software is not fault tolerant and is not designed or intended for use in hazardous environments requiring fail safe performance including without limitation in the operation of nuclear facilities aircraft navigation or communication systems air traffic control weapons systems direct life support machines or any other application in which the failure of the Software could lead directly to death personal injury or severe physical or property damage collectively High Risk Activities Deepnines expressly disclaims any express or implied warranty of fitness for high risk activities Taxes You will pay all sales property excise use value added and other similar taxes and charges that become due and payable by reason of your actions under this agreement the license of the licensed product or the use or possession of the Licensed product by you excluding taxes directly imposed on Deepnines income If a certificate of exemption or similar document is to be used in order to exempt you from such liability you will furnish a
116. ons of this agreement In the event that you determine not to enter into a licensing transaction with Deepnines at the end of such thirty day evaluation period or in the event that Deepnines advises you that discussions with respect to a licensing transaction have terminated then your rights under this agreement shall terminate and you shall promptly return to Deepnines or destroy all copies of the licensed product and so certify to Deepnines Disabled License Server The license key you obtain from Deepnines enables the licensed server that enables you to use the licensed configuration of the licensed product If your licensed server is disabled for any reason Deepnines may at its sole discretion issue you another license key that will enable you to operate this licensed product on a substitute licensed server In this event you agree not to use the licensed product on the original licensed server nor its license key 3 Maintenance and Support Annual Maintenance and Support For the time period specified in purchase order applicable price list or product packaging for the licensed product and if not specified then for a period of thirty 30 days from the date of original purchase of the licensed product you are entitled to download revisions upgrades or updates to the licensed product when and if Deepnines publishes them via its electronic bulletin board system website or through other online services After the specified time perio
117. onversation Bit and Packet rate settings The control options allow a rate limit to be set to only monitor the rate rate events alert only Control or Control and Rate events alert Table 6 8 The control options are listed as follows The monitors of the Flow Specifier will be viewable in the Monitors gt Flow Statistics section The flow will not be controlled Rate Events There will be an alert message generated when the set limit is met and the Flow Only Statistics will be viewable Control Only The traffic will be controlled if limits are met without alerting contol The traffic will be controlled if limits are met and an alert will be issued Rate Events e controlle s are met and an ale e issued Table 6 8 Control Options NOTE When either the Monitor or Rate Events Only is selected there is no control on the flow If the traffic matches another Flow Specifier the matching Flow Specifier will control it Upon applying or saving these control options a pop up window will be shown reiterating this message To change the control options for a Flow Specifier Ensure that the Control Tab of the Flow Control section is viewable Ensure that at least one Conversation Bit or Packet rate check box is enabled Assign a value to the corresponding field ex 1 000 000 bits for Bit Rate control To the right of the input field pull down the drop down menu Select the desired Control Option Oi GODS Ex Enabling DPI To ena
118. ork Additionally you can create flow specifiers to control a specific protocol inside or outside IP address and or inside or outside port specifying an unconditional action forward or block or controlling the flow based on connections packets or bits per second SEP combines the limits you set in a flow specifier combined with the historical analysis of your network traffic to control the flow of traffic through the SEP This will maximize the flow of good traffic while minimizing the flow of harmful traffic thus preventing network flooding Flow specifiers are created to examine and meter any IPv4 or IPv6 packet attempting to cross your network boundaries To completely protect your network create a flow specifier to match each packet type that crosses your network boundary You may require more than one specifier for a specific packet type i e creating one flow specifier to handle all TCP packets crossing your network boundaries and another to handle all TCP traffic entering or leaving via port 25 SMTP traffic An SMTP packet would match both flow specifiers When a packet matches one or more flow specifiers SEP applies all the actions from the matching flow specifiers to the packet You can create a flow specifier to apply to a single host or a group of hosts NOTE Once you create a flow specifier the name field cannot be changed However the rule contents can be modified saved and applied in real time 6 3 4 1 Pre Configu
119. plays is discussed in detail Under Virus Scanning there are three activity displays Virus Scanner Activity POP3 Activity and SMTP Activity 6 2 1 Virus Scanner Activity Virus Scanner Activity Figure 6 1 displays different characteristics that are involved with the overall virus scanner The virus scanner will take the email that is coming into or out of the network and give it to the appropriate protocol scanner SMTP or POP3 The top of the menu Figure 6 1 displays numerous statistics about the Virus Scanner Activity These labels and explanations are described in Table 6 a MO Ec MOL das QUE uma o CI eo d dear com remar os anfected Meets 0 Commen x x Bytes soanet B t C3 er turg us Sarra ah Pare Sap 14 2007 C600 AM Last Ngape Updata Sap 70 2067 VIL TECO AM 8hab nnectio Figure 6 1 Virus Scanner Activity Display Users Guide v5 1 7 1 n Queue Length 6 2 Deepnines Security Edge Platform 6 2 2 Label Explanation Attachments Scanned Displays the total number of email attachments scanned since the up time date time Infected Attachments Displays the total number of virus infected attachments taken out of emails since the up time data time Bytes Scanned The total number of bytes scanned of attachments Up Since Displays when the Virus Scanner engine was last started Last Signature Update Displays when the last signature update
120. pnines support will receive your request via email and review all information Deepnines support processes information and emails you with an attached file that contains relevant license information Open this file attachment and save it on your computer 5 Click the Import tab A window appears requesting file to be imported 6 Enter the file name of the file attachment you saved on your computer and click OK Your license has been activated and you can monitor and configure the Security Edge Platform from your EMC Refer to Chapter 6 SEP Resources that describe the license setup for the SEP platform Users Guide v5 2 4 0 SAB Deepnines Security Edge Platform Configuring SEP 5 1 5 2 Overview You can view complete system health information of the SEP by viewing the System Resources and Network Traffic displays These are contained in the Monitors section of the Command Explorer and provide a graphical representation of the health of your system The System Resource monitor displays link status engine status fail over state suspicious or bad file modes CPU disk and memory utilization as well as packet per second interrupts per second last update and system uptime The Network Traffic monitor displays the aggregate traffic traversing the SEP both inbound and outbound For more detailed information on these displays refer to Section 6 2 Monitors in this manual Although the SEP Traffic manager contains va
121. pping virus scanning To stop virus scanning 1 Verify that the unit to stop virus scanning is the active host 2 Select the appropriate engine folder POP3 or SMTP from the Operation folder 3 Click lt STOP gt 4 Click YES to confirm your action Updating Virus Signatures Automatic Virus signature dat files define viruses for the virus scanning module New virus signature files are released almost daily and may also be released as new virus threats are discovered The SEP automatically downloads and installs virus signature files on a schedule of your choosing from Deepnines website Each SEP will download the signature files Alarm Delivery Configuring SEP alarms allows you to specify which alarms are delivered by the SEP system and where alarm data is stored Figure 6 36 Users Guide v5 1 7 6 66 Deepnines Security Edge Platform C 9s Edge Management Comale 3s SEP dock dev dergrines comfSetup Alarm Delivery Aare Ou har A Maro CI Apta der drepes cam Frome fit aa 150i den ope omm Poemas y di 109 te local edo Log to remote sysieg server Figure 6 36 Alarm Delivery Screen 6 5 3 1 Alarm Delivery via SMTP To configure SEP alarms for SMTP delivery 1 2 3 Verify that the unit to configure alarms is the active host Verify that a default gateway host has been entered for the system in the System Identification folder within the Setup Select Alarm Delivery from the Setup fo
122. ptions include several options for the SEP Executive the Traffic Manager and virus scanning as well as some miscellaneous options NOTE Required Permissions Users who are assigned the May Configure Advanced Logging privilege are able to set alarm delivery and audit logging options NOTE Because these logging options quickly consume available disk space and may negatively impact system performance Deepnines recommends that you reserve advanced logging options for Deepnines service personnel only To set advanced logging options 1 Verify that the unit to set advanced logging options is the active host 2 Select the Logging folder from the Setup folder Figure 6 31 The Logging folder contains three other folders and the miscellaneous command option 3 Open the folder associated with the SEP component for which to set logging options and if necessary select a command option Logging options for that category appear in the Action pane 4 Activate the checkbox associated with the message to be logged or clear the checkbox to omit the message from the log or perform one of the following 5 Click SET ALL gt to activate all the checkboxes 6 Click CLEAR ALL to clear all the checkboxes 7 Select a message severity level from the list The default is Warning When you select a severity level all messages of that severity or above are logged 8 Click lt SAVE gt to immediately apply your changes to a runnin
123. ptions is the active host 2 Select Alarm Delivery from the Setup folder Figure 6 30 Es Ya Lege Managenest Console 5 SCPhimall fev dee primes cem Setup Alarm Delivery o 7 arar dev dempto cor Prawy 10 Fam Dede ty O Opes 7 Oya dey deeper com fry fh y 2 afi don demnm mary Figure 6 30 General Logging Options Screen Enter the IP address of the SMTP Server to be used for email alarm delivery Enter a Timeout value in seconds for SEP connection to the mail server In the From Address field enter the email address that SEP will use to mail alarm data Activate the checkboxes in the Log File column for each alarm type to be written to the log 7 Activate the Log to local syslog checkbox to writ e the alarm entries to the local system log and or activate the Log to remote syslog server checkbox if a remote system log has been configured to write the alarm entries to the remote system log DARA Users Guide v5 1 7 6 58 Deepnines Security Edge Platform 8 Click lt SAVE gt to immediately apply your changes to a running system and to maintain the settings until you change them again or click one of the following 9 Click lt APPLY gt to immediately apply your changes to a running system but discard those changes the next time the SEP host is restarted 10 Click lt RESET gt to discard your changes without applying or saving them 6 5 1 2 Setting Advanced Logging Options Advanced logging o
124. pull down menu lt ALLOW gt lt BLOCK gt lt REDIRECT gt to change 3 Place check mark in Log Enabled box to allow logging of all activity 4 Click SAVE Users Guide v5 1 7 6 42 Deepnines Security Edge Platform 6 4 Reporting The Reporting section of the EMC allows the administrator to obtain summary and detail information about what types of anti viruses network anomalies signature violations and URL Filters have been detected from within the SEP The reporting data can be search by date and can be viewed in many different ways To view a report navigate to the Reporting folder of the EMC A 4s SEP gt cJ Alarms o 3 hydra dev deepnines com Primary 100 C oahu dev deepnines com Primary 20 o 7 Monitors gt C Protection Policies lReparting Anti Virus amp Network Anomalies Signature Violations e URL Filters o 7 Setup o 3 Update ee Users 9 Operations There are four different reporting categories Network Anomalies Signature Violations URL Filters The Anti Virus reporting will give the administrator summary and detailed information about the different types of viruses detected by the SEP whether it was cleaned or un cleaned deleted top email senders and receivers as well as the detail about each The Network Anomalies reporting will give the administrator summary and detail information about what types of anomalies have been seen the source or destination
125. r Highlight the desired Flow Specifiers to export by selecting the first one holding down the SHIFT key and then click on the last one to be exported Additionally the SHIFT and up down arrows can be used At the bottom middle of the pane select lt EXPORT gt Navigate to the local system folder that you want to save the configuration file to Name the file as necessary Press lt SAVE gt To import a Flow Specifier gg e coc Log in to the SEP host Select Flow Control from the Protection Policies folder At the bottom middle of the pane select Import Navigate to the local system folder that you want to import the configuration file from Press OPEN Confirm your options to Import the Flow Specifiers The SEP will confirm your actions for each Flow Specifier in that group Selecting Yes to All gt will import without questions Users Guide v5 1 7 6 40 Deepnines Security Edge Platform 6 3 5 URL Filter Rules URL Filtering controls HTTP traffic by inspecting the URLs being requested It provides the following Three layer filtering based on user created admin black and white lists website categories and other third party blacklists Regular expression matching for admin black and white lists Allow block and redirect actions for HTTP requests Customizable error messages for blocked access Automatic updates for content database Filtering out of search engine caches Gathering for statistics URL Filter Rule
126. r network however SEP provides the capability to assign virus scanning to any flow specifier no matter what match rules are defined although it is not recommended This flexibility introduces the possibility for error Take care not to specify virus scanning for any protocol other than SMTP and POP3 or unpredictable results including completely blocking all traffic that matches the flow specifier can occur When you create a flow specifier for TCP packet traffic that specifies virus scanning the SEP system assembles the individual packets into a complete message and routes the message to the appropriate proxy The proxy delivers the message to the virus scanning module for processing Messages that are virus free or cleaned and repaired are returned to the proxy which then forwards the message to its destination Messages that cannot be repaired are blocked and the system forwards a notification message to the intended recipient Activating Virus Scanning To activate virus scanning 1 Verify that the unit on which to activate virus scanning is the active host 2 Create or edit a flow specifier that governs TCP packet traffic over the port on which the type of traffic to be scanned is transmitted typically port 25 for SMTP traffic and port 110 for POPS traffic NOTE Attempting to activate virus scanning for a flow type that does not have a corresponding SEP engine produces unpredictable results 3 Apply or save your changes
127. raph Lines This directly correlates to the selection at the bottom of the page You can view the Network Traffic by Bit Rate Byte Rate Packet Rate or Conversation Data i e you might see the offered yellow line hovering around 4 000 000 If the Bit Rate is selected at the bottom of the page then this is representative of 4Mbps of aggregate bandwidth 1 000 000 bits 1Mpbs 600 000 bits 600Kbps mL ay t CT yr fme femi Con Per PAD Comoe 2 066 000 2206000 ere 17 eaten don deerne cam dmn TEU Offered Volume by Flowspec Blocked Volume by Flowspec Cram the lynas Peete Carr ata Fig 6 5 Network Traffic Display Users Guide v5 1 7 6 8 Deepnines Security Edge Platform Also contained on the Network Traffic display are two pie charts labeled Offered Volume by Flow Specifier and Blocked Volume by Flow Specifier Each of these are explained as follows Offered Volume by Flow Specifier This pie chart displays the dissection of the incoming and outgoing traffic while applying it to each Flow Specifier that has been set up The top 10 20 Flow Specifiers will be represented For example if you took the Internet connection and sliced it in half peered into it this would be the traffic that is making up that connection If a mouse is hovered over the top of any of the sections it will display the name of the Flow Specifier show the count of bits and display a percentage of bandwidth used Blocked
128. re can only be one Administration Interface on the SEP 6 Select the drop down box to select the encapsulation type Table 6 15 AAL5 Used for Frontline Series on connections that are ATM CHDLC Used for Frontline Series on Internet connections that is communicating from one Cisco router to another Cisco Router Ethernet Default Edge Series Encapsulation Type Ethernet 1Q For Edge Series that need to reside on a VLAN trunk connection It allows for packet processing while looking at the VLAN tag ID HDLC Used for Frontline Series on Internet connections that is linked together with non Cisco routers Raw IP For Frontline Series using clear channel Internet connections Table 6 15 Encapsulation Types 7 Select on which side of the SEP the interface will reside Outside WAN or Inside LAN 8 Insert the logical device from the system Example Eth1 HDLC1 etc 9 Click lt Apply gt to apply the changes Users Guide v5 1 7 6 75 Deepnines Security Edge Platform NOTE Upon reboot or restart the configuration changes will be canceled 10 Click Save to make the changes persistent to the SEP configuration file 11 Click Reset to cancel any changes made NOTE You cannot have duplicating interfaces defined Thus you only need to define a new interface s O 9s Edge Menegement Comole 9s SEPIdock dev derprines comMSetup inierfaces fy dt few depa cats dr
129. received for an unknown flow Usually the result of handling a packet for a flow that has been timed out or closed for some other reason FSTATUS PENDING FIN retry error Retransmitted FIN has invalid sequence number FSTATUS PENDING flag error Invalid TCP packet during connection setup FSTATUS CURRENT FIN retry error Retransmitted FIN has invalid sequence number FSTATUS CURRENT flag error Invalid TCP packet for established flow FSTATUS GRACE flag error Invalid TCP packet for flow being picked up in grace period When the SEP starts up after a failover it attempts to learn the state of any in progress flows for a period of time known as grace period without blocking them outright FSTATUS GRACE grace period expired Need packets in both directions before grace period expires M amp N error Conversation symmetry problem For most protocols must see traffic in both directions configurable FSTATUS PENDING FLAG ERROR This is an indication of asymmetrical routing where the SEP is only seeing traffic in one direction Users Guide v5 1 7 6 50 Deepnines Security Edge Platform Fragments various problems with fragmented packets frag nomatch Does not match previous fragment frag toomany More than configured maximum number of fragments default is 3 frag badoffset Offset does not match previous fragment or is otherwise
130. rected In Section 6 4 1 we talked about how to pull reports In this section we describe what types of reports are available and how to use them There are two tabs at the top left of the results pane Summary The types of summary reports are described in the below chart Figure 6 28 Detail Per detail of the violation detection Figure 6 29 Users Guide v5 1 7 6 53 Deepnines Security Edge Platform Table 6 14 lists each report type and their descriptions Report Type Description User totals Lists total number of filtering actions taken per user Users by action Lists users by actions Category total Lists total number of filtering actions per category Categories by action Lists categories by action Destination URL totals Destination URLs by Lists filtering actions per destination URL by action action Lists total number of filtering actions per destination URL Source IP totals Lists total number of filtering actions per source IP Table 6 14 Report Types From 8 22 2007 10 15 52 AM PDT NA 8 24 2007 10 15 52 AM PDT Get Report Summary Top Results By User totals MAUIDOMAIN DJUsers by action MAUIDOMAIN D Category totals MAUIDOMAINMIAlCategories by action WORKGROUPVpDestination URL totals Save amp Print Figure 6 28 Summary View of URL Fil
131. red Flow Specifiers The SEP system provides the following pre configured flow specifiers Default Policy The Default Policy flow specifier controls all packets that match no other flow specifier This flow specifier cannot be deleted The matching fields of this flow specifier cannot be modified but the control fields can be modified The Default Policy is set to forward by default ARP RARP The ARP RARP flow specifier controls all Address Resolution Protocol and Reverse Address Resolution Protocol packets This flow specifier cannot be deleted The matching fields of this flow specifier cannot be modified The control fields of this flow specifier are user configurable The ARP RARP policy is set to forward by default ForensiX Capture cannot include the packet body for ARP RARP Selecting both MAC Header and Protocol Headers captures the entire packet Users Guide v5 1 7 6 28 Deepnines Security Edge Platform OVERLOAD The OVERLOAD flow specifier is only used for counting It has no controls and does not do any blocking It is used to count packets that are dropped because the flow table has many entries Since there are more than 1 5 million flow table entries the possibility of some kind of attack is certain But not all packets are dropped in this case The number of drops increases as the number of flow table entries increases toward 3 million It should be the case that the number of dropped flows and the number of dropped packets is id
132. report Figure 6 25 Network Anomalies Report Types Details Tab Users Guide v5 1 7 6 49 Deepnines Security Edge Platform 6 4 3 1 Type of Anomalies There are two basic types of anomalies e Protocol Anomalies These are dropped for any reason other than rate control e Traffic Anomalies These are dropped due to some form of rate control The protocol anomalies have a number of sub categories although the category is not explicitly logged The strings in quotes are what are expected in the anomalies report See table 6 12 Bad Packet noProtoHdr Usually the packet is too short Malformed Other problem that renders the header invalid Stateless LAND attack A packet type that crashed old PCs Multicast violation IP multicast blocked configurable Broadcast violation IP broadcast blocked configurable IP header options violation IPv4 header options blocked configurable ECN violation Explicit Congestion Notification blocked RFC 3136 configurable Unsupported IPv6 header violation Problem with IPv6 protocol header Unsupported IPv6 header option violation IPv6 header options blocked configurable ICMP violation Blocked ICMP type configurable Stateful Invalid TCP sequence number TCP sequence number does not match current window for flow FSTATUS NEW flag error A TCP packet other than a SYN was
133. ri nes upd ost Lists De pe nep a WO TLECHHOLOGICS d Trusted List Unrented Last q MIE RE GE Hastaares 2 P CE e DGE A wall the ode d on mem o n qood nisi nl be Apat e a aat Corda Mala Lt 5 E Kerl in P rro Hot a renim Yo Da bud and wl heyra by Votis fra confhgueed Common Sa Uer E Ahoa pues an viter of there Voti ade nct De nejedia bording fhe lan Mart opi on o headed ov Mapai tor v wing tanpa Cimon Wn Lid apod ont p de Pa medion id omm vor el on aims m imn amd iy pend ment be bat deem df LIS Eso P a Figure 6 41 Hosts Lists Screen Users Guide v5 1 7 6 74 Deepnines Security Edge Platform 6 5 8 Interfaces The SEP has two main types of configurations Frontline and Edge The Edge series is designed to reside outside of the router and the encapsulation type will need to be configured on the outside and inside interfaces The Frontline series is designed for the Ethernet environment and will need to be configured if the SEP is to reside on a VLAN trunk By default the SEP is configured for Ethernet for both the inside and outside interface If the SEP is to be placed into a different location perform the following steps to define a new interface type NPON Log in to the SEP host Select Interfaces from the Setup folder Figure 6 41 Click lt New gt Enter the name of the interface i e VLAN outside The ZFT button is checked and cannot be changed NOTE The
134. riables that are set by Deepnines for optimal performance there may be certain conditions where changes or adjustments need to be made by you for the respective network This section covers how to instructions for setting up and configuring SEP functions How to Setup Email Anti Virus Scanning The most common way to receive a virus is through an infected email There area anti virus software programs that attempt to identify thwart and eliminate computer viruses and other malicious software malware Simple Mail Transfer Protocol SMTP and Post Office Protocol version 3 POP3 are the de facto standards for email transmissions across the Internet using TCP IP connections Many subscribers to individual Internet service provider email accounts access their email with client software that uses SMTP or POPS You can easily setup anti virus scanning by configuring the flow control for SMTP and POP3 email Perform the following procedures below For additional information on Flow Control refer to Section 6 3 4 Flow Control in this manual To configure flow control for SMTP 1 Navigate to the Protection Policy highlight and click on Flow Control The Flow Control screen appears Figure 5 1 Click on Match Rules tab on top row of tabs Create a new Flow Control configuration for SMTP traffic by clicking lt NEW gt Enter data for Name and Group Click and place check mark in small box next to Protocol Click on pull down menu to disp
135. roduct names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged Copyright 2008 Deepnines Inc This manual is proprietary to Deepnines Inc and is intended for the exclusive use of Deepnines Inc s customers No part of this document may in whole or in part be copied reproduced distributed translated or reduced to any electronic or magnetic storage medium without the express written consent of a duly authorized officer of Deepnines Inc Users Guide v5 1 12 X Deepnines Security Edge Platform Disclaimer This manual has been thoroughly reviewed for accuracy All statements technical information and recommendations contained herein and in any guides or related documents are believed reliable but the accuracy and completeness thereof are not guaranteed or warranted and they are not intended to be nor should they be understood to be representations of warranties concerning the products described Record of Revisions Revision Date Reason for Change Level 5 1 11 17 07 Preliminary Release 5 1 0 b469 1 25 08 Revision 1 5 1 2 505 4 10 08 Revision 1 Comments or Suggestions Concerning this Manual Comments or suggestions regarding the content and design of this manual are appreciated To submit comments please contact the Deepnines Inc Technical Publications or Technical Support Department via email at support deepnines com S
136. rotocol session between a pair of hosts A flow specification or flow spec is a data structure used by internetwork hosts to request special services of the internetwork often guarantees about how the internetwork will handle some of the hosts traffic The Frontline device is a SEP device used for LAN deployments on Ethernet or Gigabit Fiber connections Hypertext Transfer Protocol HTTP is a communications protocol used to transfer or convey information on the World Wide Web Internet Control Message Protocol an extension to the Internet Protocol IP defined by RFC 792 ICMP supports packets containing error control and informational messages The PING command for example uses ICMP to test an Internet connection Deepnines Security Edge Platform KGH MIRROR CONTROL MIRROR HOST P2P POP3 RARP SEP SMTP STATIC BLOCKING TOP TALKERS TRAFFIC MANAGER UTP IPS VLAN VRT RULES Users Guide v 5 1 7 Good Known Hosts A table containing all the good known hosts that are available on the system Control function settings for the High Availability Control function settings for the High Availability A peer to peer or P2P computer network exploits diverse connectivity between participants in a network and the cumulative bandwidth of network participants rather than conventional centralized resources where a relatively low number of servers provide the core value to a service or application
137. rs file To Import the User Database 1 Connect to the correct active system intended to import the user database Open the Manage Users folder Figure 6 54 Click the lt Import gt button to start the export procedure Enter the password key used to encrypt the file Click lt Open gt c RON SN Crosul 93 SEDA Mueh trr Serpamas samiera Aunap Ful Name Gwistd Defaut Accoun Loeki CIM Dromers o Morag O p n Oeushine gt C fide dev dennas com Primary 190 eura Oe My Music aw Mey regem com finm d My Pictis es Fis Mame firs al Type Drephines Mies 5 B ren En Figure 6 54 Import User Screen Users Guide v5 1 7 6 96 Deepnines Security Edge Platform NOTE The same password used to encrypt the original export file must be used during the import procedure 6 7 5 Configuring User Audit Information User Audit Information is used to log the activity of users to the local system log This provides accountability of all user activity NOTE It is strongly suggested to give each administrator a individual account to control and monitor individual activities Single or group logins do not provide accurate accountability of user activities 1 To set audit logging options 2 Verify that the unit on which to set general logging options is the active host 3 Open the Users folder and then click Auditing Figure 6 55 The Audit Logging options screen is displayed Es
138. rt brief on the structure of the rules will help you use the DPI solution to its highest potential A 1 1 Rule Headers Rule headers can be divided into four main categories Rule Action The action to take upon matching the signature rule Protocol The type of protocol e TCP UDP etc Source Information Where the packets are coming from Destination Information Where the packets are going to Table A 1 Rule Headers A 1 1 1 Matching Ports The Deep Packet inspection rules can be matched to specific ports The rule can include a source port destination port or both alert udp any 19 lt gt any 7 msg DOS Msg reference cve CAN 1999 classtype When the engine sees UDP packets going from any IP address to any other IP address from port 19 to port 7 Users Guide v5 1 7 A 1 Deepnines Security Edge Platform A 1 1 2 Matching Simple Strings A 2 A 2 1 A 2 2 A 2 3 A 2 4 Below is a simple example of string matching Below the signature is looking for wwwboard password rule Alert tcp SEXTER AL NET any gt SHTTP SERVERS SHTTP PORTS msg WEB CGI wwwboard passwd txt access flow to_server established uricontent wwwboard passwd txt nocase reference arachnids 463 reference cve CVE 1999 0953 reference nessus 10321 reference bugtraq 649 classtype attempted recon sid 807 rev 7 This is a network reconnaissance attack By checking for the presence
139. rt control laws including the U S Export Administration Act and its associated regulations and may be subject to export or import regulations in other countries Customer agrees to comply strictly with all such laws and regulations and acknowledges that it has the responsibility to obtain licenses to export re export or import the licensed system or any portion thereof Any and all of your obligations with respect to the licensed product shall be subject in all respects to such United States laws and regulations as shall from time to time govern the license and delivery of technology and products abroad by persons subject to the jurisdiction of the United States including the Export Administration Act of 1979 as amended any successor legislation and the Export Administration Regulations EAR issued by the Department of Commerce International Trade Administration and Bureau of Export Administration You warrant that you will comply in all respects with the export and re export restrictions applicable to the Licensed product and will otherwise comply with the EAR or other United States laws and regulations in effect from time to time You warrant and agree that you are not i located in under the control of or a national or resident of Cuba Iraq Libya North Korea Iran Syria Sudan or Yugoslavia or ii on the U S Treasury Department list of Specially Designated Nationals or the U S Commerce Department s Table of Deny Orders 9 G
140. ry 190 gt 73 Menitors gt CI Protection Policies Users Guide v5 1 7 Figure 6 52 Viewing Current Users Scr een 6 94 Deepnines Security Edge Platform 6 7 4 Exporting amp Importing User Accounts The Users management allows for exporting and importing of user account information for easy portability between systems and for backup purposes The user information is stored in an encrypted file and can be saved to the local administrator s personal computer NOTE You must be a super user to export and import users Super users are all users assigned the May Perform User Management permission in the permissions section of user management To Export the User Database 1 Select the users from the top user table that should be exported Figure 6 53 CTRL A selects all users SHIFT allows for multiple selects Only users that have been selected and highlighted will be exported 2 Click the Export button to start the export procedure 3 Enter the password key used to encrypt the file 4 Click Saves ie pm np WD TECHNOLOGIES Sleuth Defaull ecoant 9 Nini e t TD Py dra dor d oepneies com fPrmary ty 2 Ny Pictives Fite Marne Uset idi fies ef hpa Desglitnes Mos 141 amp ingon Exper Figure 6 53 Export User Screen Users Guide v5 1 7 6 95 Deepnines Security Edge Platform NOTE This password must be used to unencrypt the file for any future system imports of the use
141. s Security Edge Platform EJ 9s Edge Management Console file Edit Help Figure 3 2 EMC Main Menu Screen Once you log in the Connect Host dialog opens as shown in Figure 3 3 Enter your Host Port Username and Password and click lt OK gt The password should be at least 8 characters long and contain at least 2 alphanumeric and 1 numeric characters EJ 9s Edge Management Console a 110 x File Edit Help a TEGHMOLOGIES Connect to Host Host loahu Port anas Username sieuth9 Password sesceses Demo os Cancel Figure 3 3 EMC Main Menu Logon Screen Users Guide v5 2 1 3 3 Deepnines Security Edge Platform The first time you log in to EMC the following screen appears Figure 3 4 You will need to obtain a license before you can access or configure any of the available options for the SEP Refer to Chapter 4 License Setup that describes the license setup for the SEP platform Hearse cmv does net extet imam Regent terea Figure 3 4 License Details Screen 3 4 EMC Console Main Window The EMC Console Main window contains 2 panes The Command Explorer pane tree window on the left allows you to expand folder icons to select informational and configurable settings that are displayed on the Action Pane on the right You can expand the folder icons to reveal other folders and commands by clicking the o symbol next to the connected platform Figure 3 5 Users Guide e 94
142. s make rules on URL categories per rule set To Create a New Ruleset E CE N Log in to the SEP host Select URL Filter Rules from the Protection Policies folder Click NEW RULESET gt Figure 6 20 A New Ruleset screen appears Select desired option from the Copy From pull down menu Enter the desired name and description for the ruleset in the fields provided and click OK The ruleset name will appear in field of pull down menu at top middle of Screen To Create New Category Based Rules 3 4 Users Guide BA Select and highlight one of pre set categories listed to edit Figure 6 21 Select action desired from pull down menu lt ALLOW gt lt BLOCK gt lt REDIRECT gt ALLOW Selecting this action allows a request BLOCK Selecting this action allows a block REDIRECT Selecting this action allows for redirect Make certain that you specify the complete URL i e http www deepnines com If you want to redirect www xyz com to www deepnines com by entering www deepnines com you will get http Awww xyz com www deepnines com and not http www deepnines com Place check mark in Log Enabled box to allow logging of all activity Click lt SAVE gt Deepnines Security Edge Platform A Canaria O O A R4 E gt AR i Figure 6 20 URL Filter Categories Actions To edit an existing Rule Set 1 Select and highlight one of pre set categories listed to edit 2 Select action desired from
143. s previously captured data not to be lost Activate by placing a check mark in the Auto Offload checkbox to instruct SEP to automatically offload captured data to the EFX appliance periodically Clear by removing the check mark in the Auto Offload checkbox to halt data offloading Enter a Timeout value for SEP s connection to the forensic database This should stay at default setting unless otherwise instructed by Deepnines Engineers Type the name of the EFX appliance or the IP address IPv4 only in the Database Host Address field 10 Click Save to immediately apply your changes to a running system and to maintain the settings until you change them again or perform one of the following Users Guide v5 1 7 6 70 Deepnines Security Edge Platform a Click lt Apply gt to immediately apply your changes to a running system but discard those changes the next time the SEP host is restarted b Click lt Reset gt to discard your changes without applying or saving them a 9s Edge Management Console 9 SEP 10 8 700 201 Setug t daa orensiX O 45 SEF 73 Alam 74 108 200 201 Primary 1907 Sy Monitors E 3 Protection Potces amp _jRoportng 3 35atup Figure 6 38 Edge ForensiX Configuration Display NOTE The displayed port number is the port on which the EFX appliance listens for packet offloads Do not change this number For additional explanation on the Edge ForensiX Capturing System EFX r
144. s under this agreement The subscription based third party licenses identified in the third party software addendum granted under Section 2 of this agreement will terminate contemporaneously with the termination a specified in your purchase order b your failure to pay the applicable annual maintenance and support fees or if such termination results from Your material breach of your obligations under this agreement Deepnines may terminate this agreement at any time upon your breach of any of the provisions hereof Upon termination of this agreement you agree to cease all use of the licensed product and to return to Deepnines or destroy the licensed product and all documentation and related materials in your possession and so certify to Deepnines Except for the license granted herein and as expressly provided herein the terms of this agreement shall survive termination 6 Indemnification Deepnines shall have the right but not the obligation to defend or settle at its option any action at law against you arising from a claim that your permitted use of the licensed product under this agreement infringes any patent copyright or other ownership rights of a third party You agree to provide Deepnines with written notice of any such claim within ten 10 days of your notice thereof and provide reasonable assistance in its defense Deepnines has sole discretion and control over such defense and all negotiations for a settlement or compromise unl
145. se 5 1 5 3 How to Create a Flow Spec for IPS and IPS IDS ssssssssseeene 5 6 5 4 How to Setup URL Filtering enne nnne nennen nnne nennen 5 9 5 4 1 Flow Spec Schedules sssessssssseseeeennene enne 5 10 5 4 2 Putting It All Together For Custom URL Filtering eeess 5 12 Users Guide v5 1 12 xii Deepnines Security Edge Platform Chapter 6 SEP RESOUICES inicia anni ene nnana ntanna 6 1 Gal OVOIVIOW 2s cie et Ge a t te iii atv eoo aded 6 1 Ee noc 6 1 6 2 1 Virus Scanner Activity iia ada HERO sel UE a e epica 6 2 6 2 2 SMTP AGIVILy fuscia eat e ene ae RU ie 6 3 6 2 3 POPS Activity 1 Ei qud an o p e ulia be eee 6 5 6 2 2 System Resources ssssssssesssssssesee eene entere E snnt a nennen restes nnne 6 7 6 2 2 NetWork Traffic 35 5 ote a an dae pe itt al tees 6 7 6 2 3 Flow ESI MS 6 10 6 2 4 Top T alKers in euin 6 11 6 2 5 Edge ForenstX uus Eee DII e Ree ESL 6 13 6 2 6 BEI dives 6 14 6 2 7 Alarm Vi WO ecce ote tet een ate abet eid tdem ce t tet egit 6 14 6 2 8 Log File VIewer iieeeed eerte tene dd 6 16 6 3 Protection Policies noire iaa 6 17 6 3 1 Deep Packet Inspection sariaren eerie en aei nennen 6 18 6 3 2 Static BOCINA a etn etre en cnm S feres 6 24 6 3 3 Conversation Symmetry enne nennen nnns 6 26 6 3 4 FIOWS COMO REC HPR divans ea dazeautcaduugvassanedusdcdbiea nn da
146. sk Utilization cum Prenda y 108 X Dye cum femi y 6s Mika o 20 an a Packets Per Second Heonmn TM bip Siite Aug 22 2007 31343 PM Lent Update Tue 443 23 17 421 POT 2007 Figure 6 44 System Resources Screen 6 5 11 2 Automatic Mirroring Configuration Changes When both high availability SEP units are running configuration changes made to one are automatically mirrored to the other Changes may be made to either the primary or alternate unit If one of the SEP units is not running configuration changes are not mirrored and must be made to the other unit after it boots SEP mirrors the following configuration changes Changes and additions to static blocking rules Changes to virus scanning messages Changes to virus scanning engines Virus scanning signature updates Users Guide v5 1 7 6 80 Deepnines Security Edge Platform 6 5 12 Reporting Configuration The Reporting Configuration option Figure 6 45 allows administrators to clean or purge reporting databases for data that is older in nature By default the three different reports will purge automatically every 15 days This is user configurable to allow more or less reporting time in the database The available configurable options are Save Anti Virus Report up to Set to 15 days by default Save DPI Signatures Report up to Set to 15 days by default Save Network Anomaly Report up to Set to 15 days by default
147. st is restarted b Click Reset to discard your changes without applying or saving them 6 5 3 3 Alarm Delivery via Log File To configure SEP alarms for delivery to the Log File 1 Verify that the unit to configure alarms is the active host 2 Select Alarm Delivery from the Setup folder 3 For each of the seven available alarm types select the desired alarm delivery and storage methods under the Log File column 4 Click Save to immediately apply your changes to a running system and to maintain the settings until you change them again or click one of the following a Click Apply to immediately apply your changes to a running system but discard those changes the next time the SEP host is restarted b Click Reset to discard your changes without applying or saving them 6 5 3 4 Alarm Delivery via Database To configure SEP alarms for delivery to the Edge ForensiX Database 1 Verify that the unit to configure alarms is the active host 2 Select Alarm Delivery from the Setup folder 3 For each of the seven available alarm types select the desired alarm delivery and storage methods under the Log Database column 4 Click Save to immediately apply your changes to a running system and to maintain the settings until you change them again or click one of the following a Click Apply to immediately apply your changes to a running system but discard those changes the next time the SEP host is restarted b Click R
148. st one of the source or destination ports on the Match Rules tab must be set to port 25 for SMTP Virus Scanning to work This will enable POP3 Virus Scanning for the Flow Specifier being defined At least one of the source or destination ports on the Match Rules tab must be set to port 110 for POP3 Virus Scanning to work In general cases some installations such as HSRP Hot Stand by Routing Protocol will be used by routers firewalls or switches that the SEP is connected to This will allow HSRP hello packets to pass properly Information for setting the correct Flow Specifiers for HSRP can be found below In general cases RIPv1 and RIPv2 are used by routers that are placed in front of or behind the SEP Selecting RIP will allow this protocol to work properly Information for setting the correct Flow Specifiers for RIPv1 and RIPv2 can be found below When selected this will enable URL Filter rules and the ability to control URL access based on user groups if you have Deepnines Active Directory User Services installed EIQ The EIQ Redirect option redirects traffic to the EIQ server for the purpose of Redirect remediation It is automatically configured by EIQ Users do not need to select or deselect this button Table 6 9 Descriptions and Functions The Flow Specifier for HSRP requires one match rule for each participating router For routers outside Sleuth9 Set the outside IP address to the real IP address of the outside ro
149. t Reporting Configuration 0 Save Configuration System Identification O Traffic Manager e URL Filters Users 6 5 1 Logging SEP provides a number of configurable logging options within two categories General logging options include logging system alarms and logging audit entries Users assigned the May configure general logging privilege are allowed to set these options Advanced logging options include various SEP Executive Traffic Manager Virus Scanning and miscellaneous log entries NOTE Required Permission To configure a remote logging server you must have the May Configure Advanced Logging permission When logs are kept locally the maximum size for each log file is 20MB When a log file reaches the 20MB limit SEP automatically creates a new log file SEP can maintain 5 log files storing 100MB of data at any one time Once the limit of five 20MB files is reached SEP deletes the oldest log file before creating a new one maintaining the 5 file limit while continuing data logging Users Guide v5 1 7 6 57 Deepnines Security Edge Platform 6 5 1 1 Setting General Logging Options General logging options include alarm delivery and audit entries only NOTE Required Permissions Users who are assigned the May Configure General Logging privilege are able to set alarm delivery and audit logging options To set alarm logging options 1 Verify that the unit to set general logging o
150. t Lan Tros tees ot eget epee paterne sot Logg wend mrt ta rmt hana nie MAIS perioge wd anra Vr nort dures MON ME SING Sunem onset eoe hatte Figure 5 10 Creating a Flow Spec For IDS Control Screen Users Guide v5 1 7 5 8 Deepnines Security Edge Platform 5 4 How to Setup URL Filtering To properly set up URL Filtering you need to create your URL rule sets create the flow tags contained in the active directory groups and create all the flow specs E NOTE The new black and white lists will behave the same as admin black and white lists The only distinction is that instead of applying globally they will be applicable per ruleset and therefore per user URL Filter Rules make rules on URL categories per rule set To Create a New Ruleset Log in to the SEP host Select URL Filter Rules from the Protection Policies folder Click on NEW RULESET gt Figure 6 20 A New Ruleset screen appears Select desired option from the Copy From pull down menu Enter the desired name and description for the ruleset in the fields provided and click lt OK gt The ruleset name will appear in field of pull down menu at top middle of screen aPon gt To Create New Category Based Rules 1 Select and highlight one of pre set categories listed to edit Figure 6 21 2 Select action desired from pull down menu lt ALLOW gt lt BLOCK gt lt REDIRECT gt ALLOW Selecting this action allows a request BLOCK Selecting this ac
151. t allow any third party to remove any copyright or other proprietary notices from the licensed product Users Guide v5 1 12 iv Deepnines Security Edge Platform Specific Restrictions The licensed product is licensed to you based on the applicable licensed configuration purchased The licensed product is licensed as a single product it may not be used on more than one licensed server at a time except as set forth in this Section 2 The licensed product is in use on a computer when it is loaded into the temporary memory i e random access memory or RAM or installed into the permanent memory e g hard disk CD ROM or other storage device of that licensed server This license authorizes you to make one copy of the Software solely for backup or archival purposes provided that the copy you make contains all of the Software s proprietary notices Evaluation License This section shall only apply if you are evaluating the licensed product for an initial thirty 30 day evaluation period The license is valid only for a period of thirty 30 days from the delivery of the licensed product and is designed to allow you to evaluate the licensed product during such period In the event that you wish to enter into a longer term license agreement with Deepnines you may request a license key from Deepnines that if provided to you will allow you to use the licensed product after such evaluation period but only subject to all of the terms and conditi
152. ters Report Types Users Guide v5 1 7 6 54 Deepnines Security Edge Platform To view one of the Summary reports described above Select the dates that the report should encompass Figure 6 28 Select lt GET REPORT gt button From the drop down menu in the middle of the results view pull down and select the desired report If additional reports are desired user can pull down the drop down bar to select a different report NOTE Once the date has been selected there is no need to click Get Report again unless the date has changed All of the reports can be viewed without having to select Get Report again To view Detail report information Select the Detail tab from the top of the results pane Figure 6 29 Select the dates that the report should encompass Select GET REPORT gt Report button Detail report information can be sorted scrolled or drilled down by Source or Destination IP address Source or Destination Port Classification Contains SID Contains and Protocol A combination of drill down capabilities can also be used together There is also a Newer and Older feature that will allow the user to see the next set of detailed information if there are more than 500 records returned from the report Bt Lye Partien L ntil Sa BEP Saw e duces comwepnrtiii UML Titers P ve mage Mascegerromf ornato Figure 6 29 Summary View of URL Filters Report Types Users Guide v5 1 7 6 55 Deepnines Security Ed
153. the management console and the SEP platforms in the network Each SEP platform and corresponding EMC must use the exact same system version This is required for proper connectivity and will be necessary to avoid any connectivity issues To View EMC Version 1 Select Help gt About The About Information panel is displayed showing the current EMC version number The version must match the SEP platform Matching the build number is also recommended om 9s SEP 9s Edge Management Console DeepNines products are covered by U S Patent 7058976 Version 5 1 0 Build 453 Built on 11 20 07 08 05 Deep Nines Inc Copyright 2000 2007 ox Users Guide v5 2 1 3 7 Deepnines Security Edge Platform License Setup 4 1 Overview SEP licensing configuration options allow you to modify licensing information You can renew or extend your SEP license or request a new SEP license by completing the fields supplied in the menu and you will receive new information from Deepnines support If you are logging in to the SEP EMC console for the first time you will receive a message on the top left corner of the screen showing license xml does not exist 4 2 Obtaining Your License 1 Click on the Request Renew tab as shown on the Details screen in Figure 4 1 to bring up the SMTP Server Information screen as shown on Figure 4 2 Refer to Table 4 1 for Request Renew menu fields license xmi does not exis Detats Request Re
154. the next time the SEP host is restarted 3 Click lt RESET gt to discard your changes without applying or saving them Users Guide v5 1 7 6 39 Deepnines Security Edge Platform 6 3 4 3 Exporting and Importing Flow Specifiers You may be required to import or export Flow Specifiers This may include exporting Flow Specifiers for back up purposes exporting a single Flow Specifier to import it into another SEP or importing Flow Specifiers after performing an upgrade or rebuilding of the system The options apply as listed Individual Flow Specifiers To export a Flow Specifier BLO OTS O O Log in to the SEP host Select Flow Control from the Protection Policies folder Highlight the desired Flow Specifier to export At the bottom middle of the pane select Export Navigate to the local system folder that you want to save the configuration file to Name the file as to remember which Flow Specifier it is Press lt SAVE gt To import a Flow Specifier OV o O Log in to the SEP host Select Flow Control from the Protection Policies folder At the bottom middle of the pane select Import Navigate to the local system folder that you want to import the configuration file from Press lt OPEN gt Confirm your options to Import the Flow Specifier Multiple Flow Specifiers To export a Group or Multiple Flow Specifiers 1 2 3 ICO Ol Log in to the SEP host Select Flow Control from the Protection Policies folde
155. tion allows a block REDIRECT Selecting this action allows for redirect Make certain that you specify the complete URL i e http www deepnines com If you want to redirect www xyz com to www deepnines com by entering www deepnines com you will get http Awww xyz com www deepnines com and not http www deepnines com 3 Place check mark in Log Enabled box to allow logging of all activity 4 Click SAVE Users Guide v5 1 7 5 9 Deepnines Security Edge Platform 2 te Lee Maragptpatf Caraato Be Siue in chee dua petras camera thats Pda ir AR Hoe Cartan eX be Get tup c o0 098 0 amp 8 a Aisa oina mein ANER com t Category Fates Use elm User Back Lise gt har Tyr i Apr Vesrajr E Breas Prisietity LE Pware vat y A O Pew Corbet nace 2 in t 1 003 ef 3 ARA TAPA TA Osor Dina Figure 6 20 URL Filter Categories Actions To edit an existing Rule Set 1 Select and highlight one of pre set categories listed to edit 2 Select action desired from pull down menu lt ALLOW gt lt BLOCK gt lt REDIRECT gt to change 3 Place check mark in Log Enabled box to allow logging of all activity 4 Click lt SAVE gt 5 4 1 Flow Spec Schedules You can turn Flow Specs on and off based on a 5 part schedule The 5 parts of the schedule consists of Start of Morning default 8am Start of Afternoon default 3pm
156. to the window 1 2 3 Summary Detail Figure 6 21 Reporting Pane Displaying From Date Calendar To search report data a date from which the report should end needs to be defined Select the To date 1 From the top of the report pane select the drop down bar under the To panel to expose a selectable calendar Figure 6 22 2 Select the day that is desired to search from by clicking on that day 3 To select a time the user can click on the hour minute or second hand and while holding the left mouse button down drag the hand to the desired time 4 Alternatively the user can enter the information into the date field by clicking on the date and then typing the information into the window Users Guide v5 1 7 6 44 Deepnines Security Edge Platform 6 4 2 1 2 3 From 8 22 2007 9 45 49 AM PDT Iv To mon 4 August 2007 gt Summary Detail Sun Mon Tue WedThu Fri Sat 1 2 Good Emails Bad Emails 5 6 T 8 9 10 12 13 14 15 16 1 19 20 21 22 23 _ 10 et ROE EEANN E S E A a O 26 27 28 29 30 34 7 4 3 E A IE a IUe N a D antee gt al NA OS o Figure 6 22 Reporting Pane Displaying To Date Calendar To generate the report ensure the desired dates are selected and then click the GET REPORT gt button The data will start to fill in the report It could take up to a minute for the report generation to be completed depending on the time selected and number of alerts NOTE
157. to unconditionally block the message from entering or leaving the network Clear the check box to allow the message to pass To Set or Clear All 1 Click SET ALL to activate all check boxes 2 Click CLEAR ALL gt to clear all check boxes Apply one of the following options Click SAVE to immediately apply your changes to a running system and to maintain the settings until you change them again Click APPLY to immediately apply your changes to a running system but discard those changes the next time the SEP host is rebooted Click lt RESET gt to discard your changes without applying or saving them 6 3 2 1 ICMPv4 General Messages For a listing of additional ICMPv4 message types and explanations go to http Awww iana org assignments icmp parameters 6 3 2 2 ICMPv6 Error and Info Messages For a listing of additional ICMPv6 error and info message types and explanations go to http tools ietf org html draft ietf ipngwg icmp v3 05 Users Guide v5 1 7 6 25 Deepnines Security Edge Platform 6 3 2 3 Miscellaneous Messages Miscellaneous Messages include IPv4 broadcast IPv4 multicast and IPv4 packets with IP header options IPv6 multicast and IPv6 packets with IP header options and Packets using Explicit Congestion Notification ECN NOTE If your network supports IPv6 do not block neighbor solicitation and neighbor advertisement messages located in the ICMPv6 Info group and IPv6 multicast messages
158. tside and inside IP addresses as well as the count associated with the IP address Will display the IP address of the destined receiver that a violation has occurred Receiver This report can display both outside and inside IP addresses as well as the count associated with the IP address Will display the Signature ID number Classification it belongs to the full message of the violations and the byte count associated with each rule Depending on the action set on each of the classifications this can be representative of the amount of bandwidth that could be saved by blocking this type of violation Bandwidth Consumed Table 6 13 Report Types Users Guide v5 1 7 6 51 Deepnines Security Edge Platform 8 22 2007 1 41 57 PM PDT 8 24 2007 1 41 57 PM PDT Get Report Summary Detail Violations Top Signature Violations By Bandwidth Consumed w Results limited to top 100 rows Signature ID pore pification Message Byte Count 1 489 Classification tion Leak ICMP PING NMAP 1 483 ICMP PING Cyberkit 2 2 Windows 1 3070 i IMAP fetch overflow attempt 1 1201 hti ATTACK RESPONSES 403 Forbidden 1 997 Web Application Attack WEB IIS asp dot attempt 1 1419 Attempted Information Leak SNMP trap udp 1 895 Attempted Information Lea WEB CGI redirect access 1312 EXPLOIT ntpdx overflow attempt a TON Natana
159. uld be taken unless it is an attack picked up by DPI However if the administrator wanted to protect the web server from such traffic one could enable the each feature and then bring down the bandwidth control that is desired from each host The administrator now sets the bandwidth from 5Mbps to 500Kbps Each host coming into the network would be allowed 500Kbps of bandwidth The each feature ensures that not one individual user on the network will consume all of the available bandwidth whether it be good or bad traffic Defining Ports Defining ports for the Flow Specifier can be accomplished by check the box next to the desired port The port can be entered by itself or in a range form If only a single port is desired enter the port number in the first field and then click the mouse on the second field It will automatically populate with the same port number If a port range is desired enter the starting port number in the first field and then the end of the port range in the last field E NOTE It is important that you make certain to set the direction for the match rule Defining Bridge ID Bridge ID can be defined only if the SEP is residing on a VLAN trunk and per VLAN group policy is desired Checking the box next to Bridge ID can enable Bridge ID The pull down menu will now be active Pulling the down the menu will show all of the VLAN IDs that the SEP has seen The administrator can select the appropriate Bridge ID that t
160. uter the subnet mask to 32 and the port to 1985 Set the inside IP address to the IP for the multicast message 224 0 0 2 the subnet mask to 32 and the port to 1985 For routers inside Sleuth9 Set the outside IP address to the IP for the multicast message 224 0 0 2 the subnet mask to 32 and the port to 1985 Set the inside IP address to the real IP address of the inside router the subnet mask to 32 and the port to 1985 Users Guide v5 1 7 6 38 Deepnines Security Edge Platform The Flow Specifier for RIPv1 requires one match rule per router For the outside router s Set the outside IP address to the IP address of the outside router the subnet mask to 32 and leave the port blank Set the inside IP address to the IP subnet for the broadcast message e g x x x 0 the subnet mask to 24 and the port to 520 For the inside router s Set the outside IP address to the IP subnet for the broadcast message e g x x x 0 the subnet mask to 24 and the port to 520 Set the inside IP address to the IP address of the inside router the subnet mask to 32 and leave the port blank Configuring a Sleuth9 Perimeter Platform positioned between two RIPv2 routers requires two match rules per router The first match rule should be configured exactly as the match rule for RIPv1 is configured see the previous section For the second match rule for the outside router s Set the outside IP address to the IP address
161. was performed Repaired Attachments Shows the number of attachments that were repaired virus removed and sent original attachment Un repairable Attachments Shows the number of attachments that were removed see note Signature Version Displays the current anti virus signature version being used by the Virus Scanner Table 6 1 Label and Explanations NOTE If an attachment is unrepairable the attachment is replaced with a text file This text file has the same file name as the virus but the extension is txt If the user opens the file they will see a message that the original attachment was infected and has been deleted These messages can be customized and are discussed further in this manual The line graphs allow the user to view how many active emails are being scanned by the Virus Scanner You can also view if there are any email conversations waiting in the queue and the overall scan rate of the Virus Scanner There are 224 workers assigned to the Virus Scanner that are distributed out to the SMTP and POP3 scanners 112 each SMTP Activity SMTP Activity displays different characteristics that are involved with the SMTP virus scanner The SMTP scanner will take the SMTP emails coming into or out of the network and then scan it against the signature database The top of the menu Figure 6 2 displays numerous statistics about the Virus Scanner Activity These labels and explanations are described
162. y 100 Figure 6 41 Interfaces Screen Users Guide v5 1 7 6 76 Deepnines Security Edge Platform 6 5 9 Licenses For complete information on licenses go to Chapter 4 License Setup 6 5 10 Mirror Control Mirror Control is a duplicate SEP that acts as a secondary or backup applicable only to High Availability HA environments ES fs Edge Management Comecte F SEP dock dev des polares combietupllMlrror Costra Be DM Heb TECHNOLOGIES nek Ls t t t tl Opera O yf der dime com Primary 100 vales shore omes iom rm y P 2 Y Red Figure 6 42 Mirror Control Option Description Connection This is how long a SEP waits until giving up each time it tries to Timeout establish a new connection to the configured mirror SEP Connection The connection retry interval is how long the SEP waits between Frequency attempts to establish a connection to a configured mirror SEP Failover This is how long before a SEP will become primary again after Dampening changing to secondary The grace period timeout is the length of time after the SEP first becomes primary that it will accept as valid in progress TCP connections for which it did not see the connection setup Failover Grace Period Table 6 16 Mirror Control Options and Descriptions Users Guide v5 1 7 6 77 Deepnines Security Edge Platform 6 5 11 Mirror Host Setting the Mirror Hosts for the SEP s to be placed i

Download Pdf Manuals

image

Related Search

Related Contents

BK4 Advance user manual  editorial - Techboard  User manual version 1.2.0.4  Guide d`utilisation  FE25-1 - コマツリフト  Divertissement audio d`un autre genre: Sony présente le nouveau  Posizionatore digitale per valvole FIELDVUE DVC2000 Fisher  Mode d`emploi du fichier CanaView_v92_03.mxd  Melissa Curling Iron with Temperature Control 635-090 User's Manual  dossier de presse 2014 - Festival Lyrique de Montperreux  

Copyright © All rights reserved.
Failed to retrieve file