Cisco offers a compelling product line in the IDS and IPS space based on the availability of NIDS, HIPS, and strong software management capabilities. Cisco refers to its product line as the Cisco Intrusion Detection System (IDS), made up of the various NIDS and HIDS solutions offered. Given the wide acceptance of Cisco’s technology solutions, many real-world organizations (businesses, governments, universities, and others) have found effective solutions using the Cisco product line. Further, recent improvements to deployment options and the acquisition of the leading host-based, intrusion-prevention provider Okena show Cisco’s commitment to being a significant player in the IDS/IPS space.
Cisco focuses on four goals in its product line:
The “current” (at press time) Cisco product line includes appliance-based NIDS, modules compatible with many routers and switches, and software-based solutions for certain releases of the Cisco IOS. These combine to create a flexible offering that allows each organization to tailor the product offerings to meet their needs. The CiscoWorks VPN/Security Management Solution (VMS) version 2.2 manages all the different platforms. Prior to the release of the 2.2 version of VMS, Cisco had been working to consolidate the number and type of management solutions for the suite of products. In most cases, Cisco has acquired technology for its IDS/IPS line. Each acquired product has had its own management software, which Cisco has integrated under the CiscoWorks umbrella. Cisco Threat Response (CTR) is a new software solution released last year by Cisco. CTR enables investigation by quickly assessing victim hosts to determine if they’re vulnerable to attacks they’ve received. CTR adds an automated investigation component to the product mix.
The Cisco IDS Sensor 4200 series are appliance-based network equipment carefully constructed for fast and efficient networking monitoring to enable detection and response. The hardware is Intel-based PCs, with fast Pentium processors, and large amounts of RAM and disk space. The products support up to five monitored interfaces, while always using a separate interface for command and control. The 4250 and 4250 XL support fiber interfaces, while the rest of the product line supports standard Ethernet (copper).
Cisco produces the Cisco Catalyst 6500 Series Intrusion Detection System (IDSM-2) Services Module. This module is again a PC style appliance, but Cisco designed this option on a board that allows it to integrate into the 6500 series chassis in exactly the same way a module with fast Ethernet ports is integrated. This module runs the same codebase including the same Red Hat Linux based kernel and uses a Pentium 3 processor with a 232 MHz IXP 32-bit StrongARM policy processor on the built-in accelerator. Currently the IDSM-2 is rated for 600 Mbps of monitored traffic. From a pure software perspective, the IDSM-2 is identical to the 4200 sensors.
Cisco’s offering for its routers include hardware modules and an IDS feature set implemented in software. This software feature set allows the router to monitor for 59 unique attacks. Cisco chose which signatures based on factors such as severity and real-world likelihood. The IDS feature set allows the router to take real-time action once it discovers an attack. It can take three actions: alarm, drop packets, or reset a TCP connection. This creates the option for a proactive defense in situations where little protection was previously unavailable. The router modules are once again an Intel chip with Linux, and the same code as the appliance and switch module.
The recent addition of the Okena product line as Cisco’s Security Agent (CSA) is a significant step forward for the network equipment maker. The CSA enables the host-level implementation of a fundamental security strategy: “That which is not expressly allowed, is denied.” This means that product enforces a strict policy governing the actions of a particular piece of software, where the normal activities of the application are allowed, and everything else is denied. This is an example of an anomaly based approach to IPS. Cisco has integrated the CSA management software into the CiscoWorks VMS 2.2 allowing for even greater advantage of the common management platform.
The VMS platform version 2.2 represents the first time that Cisco allows control from a single product suite, including control of VPNs, routers, and network- and host-based IDS. CiscoWorks VMS 2.2 allows configuration management, monitoring, device inventory, and software release (version) management features. VMS 2.2 allows administrators to configure network, switch, and host IDS sensors, and can also capture, view, and report on events from these IDS sensors, as well as from Cisco PIX and Cisco IOS devices. More importantly, one can obtain notification of events and alarms. In the near future, the Threat Response module will allow automated investigation. Current CTR is a stand-alone product offered as a free beta.
The VMS 2.2 suite runs on both Solaris- and Windows-based infrastructures. IT managers typically view deciding between platforms as a challenge in some organizations. Selecting the platform that will be easiest to support is best, as the best-operated management center will also produce the best-operated infrastructure. For organizations already standard on Windows or Solaris, it’s best to continue with the platform of general choice. For large enterprise environments where excellent support for either platform exists, experience has shown that Solaris is better suited for large installations, and security administrators can more easily secure that platform. Please note, minor differences exist between some the reporting and minor features in the releases across the platforms. Cisco documented these differences in the release notes, and we discuss them in the section “Collecting Requirements.”
In every environment, several key factors contribute to the success of an IDS/IPS infrastructure. Many experts agree that the processes for infrastructure management and incident response are the most critical success factors. While these are clearly important, you can’t fully use these processes unless they’re applied based on a sound infrastructure. Given the wide adoption of the Cisco product lines in today’s enterprises, many organizations are making the choice to use a single vendor to product IDS/IPS infrastructure. Based on the mix of products and the strong support through the Technical Assistance Center (TAC), Cisco becomes a viable choice for a single vendor solution.
The best place to start the design process is with a clear plan. We generate this plan typically from stated goals or objectives and combined with requirements. Determining up front how you will use the IDS/IPS system is important. In some environments, they provide detailed, near real-time records of current network activity. Other environments want the infrastructure to provide proactive defense leveraging capabilities to block attackers and stop malicious activity as soon as possible. Often overlooked is how to divide operational responsibilities for the maintenance, use, and operation of IDS/IPS infrastructure.
Accurate requirements can be difficult to collect in many organizations. Table 9-1 contains example requirements that can be used to drive this process. This table discusses specific areas requiring careful consideration. Analysis of these requirements will allow the proper design and implementation.
Area |
Component |
Intrusion Detection Requirements IDS System Characteristics |
Where Cisco's Product Line Stands |
---|---|---|---|
IDS system characteristics |
Comprehensive set of intrusion signatures |
Signature-based IDS systems suffer from a fundamental flaw. They only identify events that can be described (in detail) before they take place. However, the majority of intrusion detection systems operate by recognizing signatures of network attacks. These signatures can describe the details of violations of network protocols, packets destined for suspicious ports, the presence of particular byte sequences in the data payload of a packet, suspicious packet sequences, and so forth. The number and type of signatures available is a key requirement of an IDS system. |
Cisco has a comprehensive set of signatures developed by its Cisco Countermeasures Research Team (C-CRT). The C-CRT is made up of engineers from the WheelGroup acquisition. They develop signatures based on years of experience in both commercial and government roles. |
IDS system characteristics |
High performance on sensors |
The IDS sensors must be able to process packets at a rate fast enough to keep up with network load. If the sensor becomes overloaded, it might begin to drop packets, and those dropped packets could lead to |
Cisco offers a comprehensive product line with solutions to fit most needs. This includes stand-alone appliances, router and switch modules, host-based intrusion prevention, and integration into existing Cisco infrastructure. |
Capability to create custom filters |
One might want to identify specific events of interest for which monitoring is required, but public-domain activity signatures don't exist. The capability to create custom filters gives us the capability to record and analyze these events. |
Cisco provides the capability to create highly detailed custom signatures through a comprehensive wizard. |
|
IDS system characteristics |
Acceptable false-positive and false-negative rates |
While this rate (ratio of false positives to false negatives) is entirely dependent on the type of network traffic |
Cisco's TAME is a leading engine based on years of development. In addition, Cisco offers customization of all signatures to increase accuracy. |
Architecture |
Network-based IDS component |
Network-based IDS places a crucial role in appropriately covering an environment. Network IDS is best at covering aggregated network segments, places where different portions of a network architecture meet. |
Cisco offers several options for network-based deployment with flexible options for integration into |
Architecture |
Host-based IDS component |
Host-based IDS provide protection of critical assets. Host-based IDS (HIDS) takes advantage of the existing processing on each host process, packet, and data stream, adding a small overhead for inspection. Typically, these operate at the kernel layer of a host, and are given an excellent vantage point into attempted operations on a host. Because network-based IDS must account for the multiple ways that hosts reconstruct network traffic, HIDS holds a distinct advantage in terms of accuracy. |
Cisco's acquisition of the Okena product line provides best in class host-based intrusion prevention for Windows, Solaris and (soon) Linux. |
Architecture |
Distributed architecture |
The most common (and most effective) design for an IDS is that of a distributed system, with remote sensors deployed throughout the network, a central data collection facility, and one or more analyst consoles on the analyst's desktop. |
Cisco offers a highly scalable distributed system for event processing from detection to alerting and response. |
Architecture |
Communication architecture |
In a “push” communication architecture, the sensors feed their data into the analysts console as events of interest are identified. This gives us a near real-time intrusion-detection capability. This is in contrast to a “pull” communication architecture, in which the analyst console polls the sensors periodically for newly identified events of interest. |
Cisco has recently switched from a push-based to a pull-based architecture. |
Analysis support |
Intrusion reporting, response, and recovery policies and procedures |
The IDS is a tool that will provide a skilled analyst with the information needed to identify network intrusion attempts.The analyst is ultimately responsible for decisions regarding response and recovery. The use of software to automate these steps, however, is attractive in some scenarios. To ensure these actions are carried out in a manner both consistent and acceptable, specific policy elements should be implemented to govern response |
Cisco offers a comprehensive set of reporting and response options. These are the free Event Viewer and CiscoWorks VMS. Also, Cisco is automating investigation with the release of the Threat Response software. |
Analysis support |
Integrated console and database for host- and network-based components |
An integrated console and database provides several advantages to the intrusion analyst. The integrated database gives the analyst the capability to do thorough event correlation through database queries, reducing the need for manual correlation. The integrated console allows the analyst to identify and respond to alerts from a single interface, improving the efficiency of their work. |
CiscoWorks VMS 2.2 offers the capability to manage events from all Cisco IDS products, including the Cisco Security Agent and the Network IDS. |
Analysis support |
Significant drill-down capability to provide detailed information on demand |
A well-designed IDS console will provide basic information at first glance, and allow the analyst to “drill down” to important details. On request, the IDS should give the analyst significant and complete data for analysis and classification of the event. |
Cisco provides drill-down capability all the way to captured packets from attacks. Views are customizable and filterable to ensure the right data is presented. |
Analysis support |
Relational database |
An RDB back end can be queried, giving the analyst the capability to mine the IDS data for trends, patterns, and detailed information about events of interest. A database back end can also be used for building reports and archiving data. |
Cisco uses a MySQL backend for the Event Viewer with export capability.VMS uses an MS SQL run time (a.k.a. MSDE) back end. |
Analysis support |
Report generation capability |
IDS should give the capability to create reports. This capability, directly from the system itself, removes the requirement to add additional software to the solution. The system would ideally provide some canned reports and should offer the capability to create customized reports. |
Cisco provides comprehensive reporting in both the Event Viewer and VMS products. These features are maximized on the Windows version of the CiscoWorks Monitoring Module. Some areas aren't supported on Solaris yet. There's no support for events from the Management Center for Cisco Security Agents, version 4.0. Also, the Cisco IDS Network Module for routers IDS version 4.1 isn't supported, but IDS 4.0 is supported. No additional reports are available for firewall and Cisco Security Agents. Also, there's no support for saving the preferences of column ordering in the Event Viewer on the |
Analysis support |
Well-built analyst console |
A well-built analyst console is important. A console that isn't reliable and robust can render the work done by the sensors. Advanced features for distributing administration responsibilities and required access are also important factors in the construction of the console. |
The VMS console is a mature product with a world-class software-engineering group developing it. CiscoWorks VMS offersCentralized Role-Based Access Control (RBAC). |
Analysis support |
False-positive management |
False positives can be a time-consuming failure mode for the intrusion analyst. To combat this problem, the IDS should offer a mechanism for false-positive management. Common techniques include adjustable alarm thresholds and console enhancements to facilitate information management. |
Cisco offers fully tunable signatures and alarm thresholds. |
Analysis support |
Event correlation capability |
Network activity that triggers IDS alerts could be more than a traffic anomaly or a single attack. Some of the events of interest identified by the IDS might, in fact, be part of a coordinated (possibly distributed) attack. The IDS should offer tools to identify any correlation in these events of interest. If the back end is a relational database, then this correlation can be done through database queries. If the back end isn't a relational database, it might be possible to achieve this correlation through custom scripts or other techniques. |
Cisco's Security Monitor (part of VMS's Monitoring Center) supports basic event correlation. It does this by allowing the analyst to leverage the Event Viewer, the Event Rule, and Reporting subsystems. |
Analysis support |
Database stores raw data |
The database should store be able to store completed packets. because complete packets providee a much more powerful trend analysis/correlation capability particularly as new features are added. |
Cisco's network IDS products have the capability to perform packet capture when a signature fires. This means that the entire packet or stream of packets can be analyzed at a later time when required. |
Internal (IDS) security |
Encrypted traffic between sensor and console |
Because IDS management traffic is the “key to the kingdom,” the capability to protect this data is crucial. |
Cisco's RDEP uses SSL/TLS to protect network communications. |
Internal (IDS) security |
Hardened agent and console hosts |
The IDS is a key component in the defense of the network. If the IDS is easily compromised, not only do we lose this critical piece of our security solution, we run the risk of the IDS giving up valuable information about the network environment. To mitigate this risk, we must protect ourselves from attacks against the IDS itself. An essential component of this protection is hardening of the OSs on machines hosting IDS sensor and console components. These hosts should be completely dedicated to their IDS functions, running nothing other than that required by the IDS software. |
Cisco provides the capability to use the CSA to protect the VMS station. The network IDS line is difficult to attack on the network because it doesn't have an IP address. |
Response and recovery capabilities |
Intrusion response capability |
An attractive approach to intrusion response would be for the IDS to generate a real-time “recommended response” to a detected intrusion. This assists the analyst in quickly responding to intrusions, but provides the opportunity to sanity-check the response to avoid disaster. |
Cisco is adding the threat response software to automate investigations and speed response. With the highly accurate data this produces, response options are clear. |
Designing the solution is the combination of applying the technology to the existing infrastructure, while considering the requirements generated. Cisco has defined its SAFE Blueprint for designing, implementing, and tuning a Cisco-based IDS/IPS solution. The reference architecture presents an excellent guideline and you should consider that starting point for a sound design. The SAFE Blueprint breaks down the components of a corporate network into modules. Each module is a self-contained set of infrastructure (routers, switches, firewalls, IDSs, and so forth) working together to perform a specific network function. Modules are mixed together to build an enterprise network.
The SAFE blueprint recommends placing network IDS sensors at
In choosing where to start first, you should consider factors such as criticality of assets, robustness of design, and accessibility of assets. While Assets deemed to be critical infrastructure because of their business value clearly will benefit from IDS deployment, systems not processing millions of dollars of transactions aren’t likely to be first in line for protection. You’ll want to consider the robustness of design, meaning the protections already in place when deciding between assets. Systems already built to withstand attacks might not be in urgent need when compared to systems without protections, such as network firewalls and application proxies. Accessibility of assets is a key measure of the level of risk. Systems not exposed to large portions of internal networks could present a lower risk profile. Clearly the converse is true: highly critical systems, systems you haven’t built to withstand attacks, and systems connected to large numbers of networks or the Internet need IDS protection.
Packet Capture Options
The Cisco Network IDS product line is no different from any other NIDS product, in that it can only detect attacks in traffic that it can “see.” This means capture must be given to monitoring interface using techniques like adding a hub, using port mirroring, or using a tap.
In general, three options exist for managing a Cisco IDS infrastructure: local interfaces (web and command-line access), CiscoWorks VMS, and third-party tools. Most organizations will find that overall management is best accomplished using a clearly defined suite of tools and not relying on any single tool to be the best fit in all situations. While the Cisco Security Agent requires the use of CiscoWorks VMS, the NIDS products (4000 series, router modules, and switch modules) can be managed either locally or remotely.
For local management, this means two options: the command line interface (CLI), which Cisco revamped as of version 4.0, and a local web interface called the IDS Device Manager (IDM). For Cisco IOS-based solutions, Cisco provides management via both CLI and VMS. In all but the smallest deployments, CiscoWorks VMS will be required to achieve the best possible results. In particular, this will decrease the amount of time spent tuning individual sensors or sensor groups by allowing changes to be applied to groups of sensors. third-party software tools mostly concentrate on pulling events and alarms from the sensors.
Cisco also provides the Event Viewer application for small installations. The Event Viewer is capable of remotely pulling data from Cisco NIDS products, such as the 4200 series and IDSM-2 running 4.0 or later. The Event Viewer allows quick and powerful analysis of the status of events analyzed by the IDS infrastructure. The Event Viewer is a powerful tool that contains drill-down capability down to view captured packets from real attacks.
The Event Viewer presents both real-time reports of activity and historical viewing of data. The primary mechanism for helping sort through this data is the use of filters. You can create filters to match particular sets of events based on characteristics such as Severity, Source or Destination Address, Signature or Sensor Name, or Time and Status. When you create filters, it’s important to document what filters you created and what purpose they serve. This assists in the response process because incident handlers can reliably understand the context of events from the IDS system. Typically, organizations develop a set of filters over time that meet their needs, so it’s equally important to ensure that documentation is kept current.
Some typical filters that we’ve found to be useful in separating data are as follows:
The Event Viewer enables the use of customized Views to control what data is displayed related to a specific event. Because the Event Viewer can display over 40 data elements for a single event, it’s important to customize what information is displayed to allow accurate analysis. The Event Viewer ships with the following five default views:
The centerpiece of the Cisco lineup is the IDS built around the Threat Analysis Micro Engine (TAME) and its accompanying policy language. Cisco has unified the underling code base in version 4.0 across all the NIDS deployment options. This means you can expect similar features and performance from all the product line. This solution is widely considered simply as “signature based,” but Cisco has identified that it uses a hybrid approach to combine different detection techniques to achieve maximum results. Primarily protocol decodes are used because of the number of Cisco's signatures that have been written this way.
Heuristic-based signatures are the second most-often used. Cisco uses pattern matches almost as much as heuristic-based signatures. Cisco doesn’t currently use classic anomaly detection (in its NIDS product line) outside of protocol anomaly detection but, let’s remember, this is only protocol decoding. Cisco doesn’t use anomaly detection primarily because it hasn’t found a solution it views appropriate for its customers. Clearly, Cisco’s R&D team will continue to look for better ways to detect malicious activity and examine all avenues.
Cisco NIDS offer the capability to capture packets, log, and alert events, and to take proactive action to stop attacks. The Cisco NIDS can capture packets for historical records, troubleshooting, and forensic analysis. The primary function for IDS in the eyes of many people is to log an alert on events, so the incident response process can initiate quickly. Clearly the capability to take proactive action by resetting connections (session sniping) and blocking attacking devices (shunting) is a powerful tool in the protection of critical infrastructure.
The NIDS can capture packets either when firing signatures or when manually configured to find packets associated with a particular IP address. For either scenario of starting a packet capture (a.k.a. IP Log), a specific number of bytes, length of time, or a specific number of packets binds it.
All signatures can result in IP Logging. This includes Cisco provided signatures or custom-developed signatures. To configure the Cisco NIDS to start an IP Log for a specific event, the signature parameter “EventAction” must to set to “Log”. Because data is exchanged via XML-based RDEP, this is accomplished by a specific name/value pair. In this case, “EventAction=log”. Using the IDM, you can configure from the screen Configuration |Sensing Engine | Virtual Sensor Configuration | Signature Configuration mode. From this screen, you must drill down to the specific signature in question.
Let’s assume you want to add an IP Log for all the times there are fail logins to a critical HTTP server.
First, start by selecting Service HTTP from the Signature Configure Mode screen. Next, drill down and click the check box next to the line number for signature ID #6256 HTTP Authorization Failure. Then, select Edit across the bottom. Now, you’re presented with the screen for Signature Configuration. From here, change the EventAction to Log by selecting that menu item.
Instructing the IDS to take proactive action is sometimes considered a controversial topic. IT managers cite concerns on the impact of false positives. In many cases, this is a valid concern and certainly must be addressed. You learn about reducing false positives in the section “Tuning.” Assuming these concerns have been appropriately addressed, let’s discuss how these features work.
Session Sniping is a method of stopping attacks by closing the TCP session associated with that attack. The Cisco NIDS accomplishes this by sending a TCP RST (reset) packet from the command and control interface to the identified attacking host and to the victim or target host. For this to work properly, it’s important to ensure that the IDS command and control interface (typically interface 0) have IP connectivity (be able to route packets) to the attacker and victim hosts. In particular, if network firewalls are in the path, it could be difficult to implement this without changes to the policy applied to the firewall.
Shunning is the process of applying access control lists (ACLs) to nearby routers or switches to block individual connections or hosts to stop attacks. Cisco supports shunning on all IOS devices, the Catalyst 6500 line, and the PIX firewall. This is enabled by configuring the IDS Sensor with a user name and a password to specific devices where ACLs will be applied (see Figure 9-1). This must be carefully configured and managed in concert with other tools, such as configuration management and troubleshooting.
Figure 9-1: Cisco’s architecture diagram
Cisco’s architecture for the Network IDS products is based on the TAME microengine. The TAME microengine processes individual engines for different traffic types. These engines are a comprehensive set of network protocols used today, and they encompass network, transport and application levels, as shown in Table 9-2.
Engine |
Description |
---|---|
ATOMIC.ARP |
Analyzes ARP packets both individual packets and groups. |
ATOMIC.ICMP |
Analyzes ICMP packets for the following parameters Type, Code, Sequence, and ID. |
ATOMIC.IPOPTIONS |
Analyzes IP packets for IP options in the layer 3 header. |
ATOMIC.L3.IP |
Analyzes layer 3 IP headers. |
ATOMIC.TCP |
Analyzes TCP headers for these parameters: Port, Destination, Flags, and single packet Regex. |
ATOMIC.UDP |
Analyzes UDP headers for these parameters: Port, Direction, and DataLength. |
FLOOD.HOST.ICMP |
Detects ICMP floods for a single victim. |
FLOOD.HOST.UDP |
Detects UDP floods for a single victim. |
FLOOD.NET |
Detects multiprotocol floods for a single victim subnet. |
OTHER |
Available for changing common parameters to groups of signatures. |
SERVICE.DNS |
Protocol breakdown for DNS service. |
SERVICE.FTP |
Protocol breakdown of FTP service. |
SERVICE.GENERIC |
Cisco recommends for expert use only. |
SERVICE.HTTP |
HTTP protocol breakdown based on a string engine. Includes capability to normalize URLs. |
SERVICE.IDENT |
Analyzes the IDENT service. |
ERVICE.MSSQL |
Analyzes Microsoft SQL. |
SERVICE.NTP |
Protocol decode of Network Time Protocol. |
SERVICE.RPC |
Analyzes the RPC service. |
SERVICE.SMB |
Cisco's SMB SuperInspector signatures. Cannot be used in custom signatures. |
SERVICE.SMTP |
SMTP protocol decode. |
SERVICE.SNMP |
Analyzes SNMP packets. |
SERVICE.SSH |
SSH header decode signatures. Cannot be used in custom signatures. |
SERVICE.SYSLOG |
Analyzes syslog messages. |
STATE.STRING.CISCOLOGIN |
Analyzes Cisco Login's ( via telnet). |
STATE.STRING.LPRFORMATSTRING |
LPR protocol decode. |
STRING.ICMP |
ICMP-based string search engine. |
STRING.TCP |
TCP-based string search engine. |
STRING.UDP |
UDP-based string search engine. |
SWEEP.HOST.ICMP |
Detects a single host performing discovery ICMP. |
SWEEP.HOST.TCP |
Detects TCP port scans. |
SWEEP.MULTI |
Detects cross-protocol sweeps. |
SWEEP.OTHER.TCP |
Detects fingerprint scans. |
SWEEP.PORT.TCP |
Detects port sweeps for a pair of hosts. |
SWEEP.PORT.UDP |
Detects UDP port sweeps between two hosts. |
Signatures
Cisco’s IDS sensors work by examining network traffic against its knowledge of malicious traffic types. Each time the sensor finds a match, the sensor takes an action, such as logging the event or sending an alarm to IDS Event Viewer. Sensors enable you to modify existing signatures and define new ones. Cisco ships a comprehensive database of signatures. While you can’t delete or change the names of built-in signatures, you can disable them. Cisco enables most signatures by default.
A signature can be made up of several variants known as a subsignature, which allows parameters for the subsignatures to be modified without affecting each other. Changes to event action such as log vs. shun will affect only the specific signature (or subsignature) being modified.
Cisco provides a comprehensive capability to create your own signatures. The sensor will be assign them to a specific ID range (2000) and are flexible to model nearly any known traffic type. Custom signatures use the same engines as the built-in signatures. This enables you to create signatures that work as well as the Cisco shipped database.
Sensor Models
The current lineup of IOS sensors includes the 4200 series of appliances, as well as IDS modules for routers and switches. The 4200 series are stand-alone appliances built as effective IDS sensors. Currently, Cisco offers four models: 4215, 4235, 4250, and 4250-XL. Sharing similar PC-based platforms, they offer increasing amounts of performance and support for gigabit interfaces, although only the 4250-XL supports 1000 Mbps performance. All come standard with a single command and control interface, and one monitoring interface.
Table 9-3 provides a brief comparison between models.
Feature |
4215 |
4235 |
4250 |
4250-XL |
---|---|---|---|---|
Performance rating |
80 Mbps |
250 Mbps |
500 Mbps |
1000 Mbps |
Max Ethernet monitoring interfaces |
5 |
5 (with support for gigabit) |
5 (with support |
1 (with support for gigabit) |
Max Fiber |
0 |
0 |
1 |
1 |
The performance ratings for each assume packet sizes of 445 bytes for TCP-based connections, but the ratings for the 4250-XL assumes 595 byte packets. These assumptive packet sizes might not be realistic for many network environments, however, this doesn’t mean they’re inaccurate. One clearly prudent planning step would be to analyze packet sizes and network use before deploying the IDS sensors. Also, Cisco provides a dropped-packet signature that alarms when the IDS drops packets. This signature can be used to monitor for overloaded sensors. As with all signatures, it can be applied to any model, including the router and switch modules.
The IDSM-2 is the module for the Catalyst 6500 line. You can use it in any of the entire 6500 line of switches. It takes up one slot and you can use multiple modules in a single chassis. B The IDSM-2 can be expected to operate identically to the 4200 series. The main difference is this: the IDSM-2 is able to acquire packets directly from the switch backplane using VACLs. One common misconception is that the IDSM-2 monitors all packets going through the switch. Instead, you must tailor your VACLs to monitor the traffic that required IDS detection. Because the ISDM-2 offers 600 Mbps of performance, careful consideration to what traffic it monitors is required to prevent overloading. The IDSM-2 can push ACLs for blocking to the switch that hosts.
When the IDS is oversubscribed, it will drop (not process) individual packets. These packets will, most likely, be part of TCP streams and affect context for most signatures, as well as the capability to normalize data. Because you cannot control what traffic can be dropped first with the sensor, avoiding oversubscription altogether is important. Because oversubscription is a significant concern in many environments, you can take several steps to avoid it. First, you can enable Cisco’s SigID993. This signature fires when dropped packets reaches a high-enough rate. The default for this signature is to fire on any percentage higher than zero. Typically, you want to monitor for anything over the zero level, and take action as it approaches 5 percent or higher. Because the IDS sensor family uses the same code throughout, oversubscription is handled identically across the product family.
Router Modules
One of the newer additions to the Cisco product line is the Cisco IDS Network Module for the Cisco 2600, 3600, and 3700 series routers. These modules provide “IDS on a card,” which can be deployed in existing Cisco routers. Given the wide deployment of these routers, this presents an attractive option in many cases. Because Cisco has unified the code base, once again, exactly the same features are available from the router modules as from the 4200 sensors and IDSM-2. The router modules support significantly less performance (as low as 10 Mbps in the 2600XM and 45 Mbps in the 3600), so this isn’t an issue because these routers aren’t typically passing more traffic than these ratings. These cards include a 20GB hard drive.
Router and Firewall Sensors
Cisco rounds out the product line with software-based solutions for its IOS routers and Firewall IOS. This software supports a subset of signatures (total of 59), however, it uses the same TAME-based architecture. Cisco selects signatures from its database, enabling you to customize which of the available signatures to apply.
Alerting
In versions below 4.0, Cisco used the PostOffice Protocol (POP) to exchange messages between the IDS sensors and management platforms. Cisco replaced POP with Remote Data Exchange Protocol (RDEP). RDEP is an XML-based protocol that uses a subset of HTTP/1.1 for network communications. RDEP is a major shift from POP because it changes from a push to a pull method of data exchange. This means management stations “subscribe” to feeds from the sensors, and “pull” or request updates. This places the responsibility to ensure alerts are received on to the management platform. Cisco does support backward compatibility, so version 4.x managers (such as VMS) can pull events from 3.x sensors. Cisco requires that older managers be upgraded to support 4.x sensors.
Tuning
Tuning your IDS infrastructure is a critical step to ensure it operates effectively. Tuning consists of taking steps to adjust the configuration to ensure the right data is analyzed and, when it is analyzed, that it’s analyzed correctly. Issues like false positives, false negatives (missed attacks), dropped packets, and data overload must be considered together to devise an effective tuning strategy. Tuning can be a time-consuming process, however, the author found in several scenarios that it’s significant enough to warrant concern. The author’s experience shows 80 percent of most tuning efforts happen during pilot or test phases of a new IDS system and ongoing tuning activities can either be a small portion of a daily administration process or bunched into weekly, or even monthly, analysis sessions.
The following process shows the typical lifecycle for tuning your IDS:
Signature Selection
Depending on the type of network and network traffic expected, not all of the 3000+ signatures in Cisco’s Network Security Database (NSDB) make sense to apply. Signatures that detect vulnerabilities that cannot exist in the environment are the first candidates. For instance, attacks specific to Solaris infrastructure might not be of interest. Although the first reaction of many is to consider that any attack is meaningful, when tuning the IDS to provide clear data, some compromises must be made.
Cisco enables the selection and deselection of groups or individual signatures. Because some signatures have subsignatures (IE variants on a specific attack), reviewing the subsignatures also makes sense. Some environments might not expect certain protocol types, such as ICMP traffic or HTTP traffic. This allows quick elimination of these protocol types. (I know you’re still worried you’ll miss attacks, but don’t worry. You’re managing risk!)
Adjust Signature Properties
One of the greatest strengths in the Cisco NIDS product family is the capability to tune signature properties easily. With roughly 30 editable properties for each signature, the capability to customize signatures creates a powerful tool to increase accuracy. Each signature can be customized to change its behavior, such as changing the AlarmDelayTimer to a longer value to increase the sensor’s capability to consider events with a long delay between them. That capability is crucial to look for events such as slow port scans.
Signature Properties Detail
Table 9-4 is a review of the properties in a typical signature from Cisco. Some of these properties go all the way back to the NetRanger product aquired from the WheelGroup. Cisco appears to have taken a solid foundation from the WheelGroup and expanded it over time.
Property |
Information |
---|---|
AlarmDelayTimer |
Time in seconds to wait to continue inspection after an alarm is generated. Used either to make sure a single event isn't lumped in with multiple events or used to lump multiple events together. Think two failed logins vs. ten: sometimes two matter, but, sometimes, only ten matter. |
AlarmInterval |
Amount of time to consider firing a signature-related events, such as, – “Fire this signature for five hits in AlarmInterval ten seconds.” |
AlarmSeverity |
The preassigned severity of the signature. |
AlarmThrottle |
This parameter is for limiting alarm firings. You can select “FireAll” to send all alarms; “FireOnce” to send one alarm, and then start the inspecting again; “Summarize” to send alarms at the rate prescribed in “IntervalSummary”; or “GlobalSummarize” to send |
AlarmTraits |
Signature-specific value for extra information about the alarm. |
ChokeThreshold |
Value used to determine when the AlarmThrottle action should be taken. |
Enabled |
Used to tell the sensor to apply the signature. |
EventAction |
Determines which action (Log, Reset, ShunHost, or ShunConnection) the sensor should take. A Log event is stored for events Reset, ShunHost, and ShunConnection. |
FlipAddr |
Use this when the traffic that fired the alarm is response traffic from the host being attacked. The IDS would normally show the source address as the attacker, however, this signature allows this to be reversed when needed. One example is looking for a directory listing on a DMZ that should support a custom web application. If the web application never needs to send a directory listing, seeing one could mean a compromise occurred. A custom signature looking for a directory list, when fired, would show the attacker as the web server unless you use the FlipAddr property. |
MaxInspectLength |
Here you can control the number of bytes that need to be inspected. |
MaxTTL |
This can be used to configure signatures that look for patterns over time. This can enforce a global limit when inspecting a series of events. |
MinHits |
This sets the low-water mark for hits to cause a signature to fire. Many times MinHitswill be set to one but, for instance, when looking for port scans, setting MinHits higher can be useful to decrease false positives. |
Protocol |
What type of traffic does the signature inspect? |
ResetAfterIdle |
Length of time (in seconds) for a signature to reset counters after watching traffic go idle. |
ServicePorts |
Used to specify ports (or lists of ports) to inspect for a signature. Comma-separated for lists. |
SigComment |
Comment/Info. |
SIGID |
Number used to identify signatures. 993–19999 is used for Cisco shipped signatures. 20000–50000 used for custom signatures. |
SigName |
Name used for signature. |
SigStringInfo |
Text information sent with alarm. |
StorageKey |
Used to determine how to store persistent data. |
SubSig |
Subsignature ID number. |
SummaryKey |
Defines the type of storage used for the signature. |
ThrottleInterval |
Used to control the throttling of alarms. Defines the duration of an AlarmThrottle event. |
WantFrag |
Seldom used parameter to determine if a fragment is needed. Can be set to True, False, or ANY. |
The first step in tuning your IDS is to manage the amount of traffic “seen” by the sensor. This is important to perform first because the IDS cannot send an alert on traffic it doesn’t see. Next, you need to address normalization. Normalization is the process used by the IDS to ensure it reconstructs packets the same way the target systems do. Finally, individual parameters are changed or “tuned” to improve accuracy and reduce false positives.
The most basic decision to make in choosing which traffic the sensor monitors is placing the sensor. It’s important not to oversubscribe the sensor by attaching it to networks carrying more traffic than the sensor is rated to handle. This is particularly important when using the module for the 6500 family of switches. These switches can handle significantly more traffic than the module itself.
Cisco provides the capability to reconstruct or normalize traffic by host type. Cisco’s 4.1 sensors support Windows NT, Solaris, Linux, and BSD. This can be applied using the Device Manager and selecting Configuration | Sensing Engine | Virtual Sensor Configuration | IP Fragment Reassembly. On this screen, you can select the reassembly mode.
The last step in this process is changing signature parameters. Because this will vary widely for signature types and different networks, following a consistent generalized process is best. First, examine an alarm to determine why the sensor issued it. Many times, alarms are considered false positives without fully understanding the signature that matched the traffic type. Read Cisco NSDB and analyze the traffic. Next, consider the need for the traffic itself. Many times. traffic that is the result of a misconfigured system matches a signature and causes an alarm. The last step is to identify the specific pattern that matched the signature and decide to change the signature itself. Sometimes it’s best to change severity, but not to change the underlying signature.
Cisco Security Agent
Cisco has added the Cisco Security Agent (CSA) as Cisco’s in-house entry in the host-based intrusion prevention space. This product comes from the acquisition of the Okena System. CSA is widely considered to be extremely effective protection. In the wake of the Blaster worm, many companies have turned to CSA to protect critical hosts. With the capability to lessen the impact of these worms, many companies have found CSA to be well worth the investment.
In the past few years, it’s been apparent that signature-based products on the endpoints are no longer sufficient in protecting against the increasing amount of malicious code circulating in the wild, including viruses, worms, and malicious mobile code. These types of technologies also forced you to use numerous different agent-based technology, such as personal firewalls, host intrusion detection (HIDS), file integrity products, and malicious mobile code products. Also, the OS had to go through a rigorous hardening process.
The CSA is a behavior-based approach to security. This single agent is proactive compared to the reactive nature of signature end-point security, for example, Virus Scanner and Host IDS. CSA protects your endpoints, that is, laptops, desktops, and servers from known, new, and unknown attacks. The technology looks like all the products previously mentioned because it has this functionality built in already.
The CSA currently supports NT, Windows 2000, and Solaris 8 (64 bit) on servers and NT, Windows 2000, as well as XP Corporate Desktop (Professional). The CSA MC is part of Cisco Works VMS 2.2 management solution and supports up to 5000 agents.
All agents are created and maintained on the management console (CSA MC). All the rules and policies are enforced locally on the agents. The agents contact the MC at their appropriate polling interval, which you can set, anywhere from ten seconds to once a day. They also send the logs back to the MC in case they’re experiencing an attack.
Kernel Mode
The CSA agent gets installed in kernel mode, which is similar to your standard antivirus products and VPN drivers. The kernel itself has no modifications, it only has a module loaded. When an application or process wants to do something, such as open a file or establish a network connection from A to B, it must go to the kernel and ask for resources. The application that’s running in user mode is making a call to the kernel that’s in kernel mode. This call is funneled through the CSA shims, which are similar to print drivers or VPN drivers. These shims then forward the calls to the CSA rules engine, which makes allow or deny decisions based on your rules and policies.
System Shims
The CSA agent has numerous shims placed to make sure it can look at all these calls.
The CSA ships with predefined datasets that you can use out of the box or change to your environment. New ones can also be added.
Proactive Security on the Endpoint
New and unknown attacks need to be stopped cold, as do new variants of old, known attacks. This introduces an interesting problem on your endpoint. Can you keep up with all the patches and updates mandated by the OS and application vendors? And are you ready for the next zero day exploit or virus? This dependence on reactive technology is causing considerable grief and has cost many companies millions of dollars.
The CSA introduces a security paradigm shift from reactive signature-based technology to proactive intrusion-prevention technology. The agent uses policies and rules to ensure good behavior is allowed and bad/malicious behavior will be stopped. It also can enforce your corporate security policy. You can make sure the employees can do their work, but you can prevent them from downloading or installing software, as well as prevent them from listening to music or watching videos at work. You can also enforce application control: instant messenger applications are allowed, but only Yahoo! and, within that instant messenger application, you can only use the chat functionality, but not the file transfer, e-mail, or audio/video features.
Security functionalities include the following:
Implementation—A Safe Approach
The CSA infrastructure is already part of Cisco’s SAFE architecture. Make sure the MC is deployed in a physically safe environment because it’s the key to the kingdom. As with any other security product it is important to have a deployment strategy, this deployment strategy includes getting familiar with the product by evaluating it first, deploying it in test mode, and then, when you’re satisfied, putting it in production.
Installation
Insert the Cisco Works VMS 2.2 CD into the drive. If autorun is enabled, the installation will begin automatically. If not, go to My Computer and double-click the CD. VMS 2.2 provides you with the management capabilities for IDS, PIX, and VPN Routers, as well as the CSA agents. We suggest you install the CSA MC on a separate machine. You must install both the Common Services and the Managing Cisco Security Agents. After you install the Common Services, the Managing Cisco Security Agents installation prompt you for the typical information, such as what directories to use. It will also install and configure the Microsoft SQL Server run-time engine (MSDE) for you.
In case you already have Microsoft SQL Server installed with Service Pack 3, the CSA will use that. At the end of the installation, the VMS/CSA MC agent will be installed to ensure utmost security. Because SQL has been the center of attention lately with the SQL Slammer exploit, the suggestion is that you fully patch the SQL server with the latest security patches and hotfixes. Remember, the agent service will protect the SQL Server from being exploited, so it’s good security practice to be fully patched.
System Requirements for the VMS 2.2 Installation
These are the system requirements for the Windows version of the VMS platform.
Getting Started
The CSA MC will open a new window in your browser. Let’s examine the interface and the options available. Table 9-5 gives an overview of each option and how it can be used.
Monitor |
Status Summary |
Quick Network overview. This view shows you the alerts, the active agents, and the agents that need to be updated or haven't polled. |
Event Log |
The Event Log displays a snapshot of the current events. |
|
Event Log Management |
This option lets you manage your event log by setting up jobs to delete old events you no longer want. |
|
Event Monitor |
This is the same as Event Log, but it cycles every 15 seconds to give you the latest event information. |
|
Alerts |
You can have alerts sent to you via pager, e-mail, or SNMP. |
|
Event Sets |
Event Sets are information you want to be alerted about, such as Trojan events or mission critical events. |
|
System |
Groups |
Groups are setup by functionality, such as HR or |
Hosts |
When a host registers with the MC, it appears in this view. You can click on it and get detailed information about the host as to what OS, which groups it belongs to, and so forth. |
|
Configuration |
Policies |
The CSA ships with over 30 policies for applications that are commonly used. You can use these or add new ones. The default policies are a great start. |
Variables |
These are variables. The CSA uses variables like $email-clients to make administration of policies easier. Instead of writing executables over and over, you use a File Set. File Sets include Applications, Registry, COM and Network addresses, and Services. |
|
Application Classes |
Application classes are groupings of application executable files that you combine under one name, generally as part of a File Set Variable. |
|
Application Class Management |
You can manage all your Application classes here. |
|
Global Event Correlation |
The CSA has built-in event correlation for network scans, potential worms, Event Log messages, as well as antivirus events. |
|
Maintenance |
Audit Trail |
The audit trail keeps track of all changes that were made and who made them. |
Export/Import |
The Export/Import feature lets you move data from one MC to another by exporting the data and importing it on the other MC. |
|
Registration Control |
The MC can set restrictions on who can register with the MC. This is done by IP addresses. |
|
Agent Kits |
The CSA ships with pre-built agent kits that can be deployed. You can also create new ones from groups you created. |
|
Software Updates |
You have two options: Available Software Updates and Scheduled Software Updates. After the management console is upgraded or updated, this new version will display under Available Software Updates. You then schedule updates for the agents under Scheduled Software Updates to execute when this is convenient for you. |
|
License Information |
You can see your licensing information here, as well as apply a new license if you made additions. |
|
Backup Configuration |
Backing up your database is important because all your information is saved in the SQL database. |
|
Profiler |
Analysis Job |
Create a new profiling job to analyze an application to create a new policy. |
Analysis Report |
This provides you with a report of what the profiler has seen, for example, what files were accessed, which network ports were used, and so forth. |
|
Reports |
Events by Severity |
This report shows you all the events sorted by severity. |
Events by Group |
This report shows you all the events sorted by group. |
|
Host Detail |
This report gives you the host detail, name, OS, and which groups and policies it uses. |
|
Policy Detail |
This report gives you a detailed list of all the policies. |
|
Group Detail |
This report gives you a detailed overview of all the groups. |
|
Search |
Hosts |
You can search for specific hosts here. |
Groups |
You can search for groups here. |
|
Policies |
You can search for policies here. |
|
Rules |
You can search for rules within policies here. |
|
Variables |
You can search for Variables, such as File Sets, and so forth. |
|
Application Classes |
You can search for Application Classes. |
|
All |
This lets you search for everything. |
|
Help |
Online Help |
Online Help will bring you to the help of where you're located right now. If you're in Policy creation, it displays step-by-step instructions on how to do that. |
Technical Support |
This gives you the contact information for technical support. |
|
About… |
Information about the agent for example, version is displayed. |
Agent Kits
Agent kits are the actual binary that will get installed on the laptops, desktops, and servers. These agent kits contain groups. The CSA ships with predefined kits for you to use for both Windows and Unix systems.
To create new agent kits, go to maintenance, and then click on agent kits. Choose new and, when prompted, choose the OS for which you want this kit. Add a description and choose the groups you want to be part of this agent kit. Agent kits can be part of more then one group, that is, web and database server.
The agents are created on the MC, and then are deployed via your software distribution method of choice, such as logon script, ftp, Tivoli, SMS, CA, link to pull it from the MC or ghost images. Ensuring that the agent can talk to the MC over SSL is also important. Otherwise, it can’t register.
Groups
This is the streamlined process to assign policies to numerous hosts at once. These groups are collections of policy modules with specific behavior enforcement for the functionality of the host.
Make sure your group hosts according to the following criteria:
Policies
Every corporate enterprise should have security policies in place. The policies you create on the CSA MC should enforce these guidelines. CSA ships with over 30 preconfigured policies you can use. Additional policies can be created manually, as well as via the profiler.
Table 9-6 shows a list of a few policies already included.
Unix |
Windows |
---|---|
Apache |
Apache |
IPlanet |
IIS |
IDS Systems |
IDS Systems |
Default Server |
Default Server |
Mission Critical System |
Default Desktop |
Sendmail |
Restrictive DNS/DHCP |
Rules
Rules give you control over all the different shims. They make sure good behavior is allowed and bad behavior is stopped. Table 9-7 lists the types of rules you can create.
Agent service control |
Controls who can suspend security, as well as turn off or uninstall the agent. Options are Administrators, everyone, or a certain application. |
Unix and Windows |
Application control |
Enforces which application can start another application. |
Unix and Windows |
COM component access control |
Controls which application can access COM objects. |
Windows |
Buffer overflow |
Controls specific buffer overflow. Windows has built-in control. |
Unix |
Connection |
Creates a rule that enables you to limit how many concurrent connections from a single host or from all the hosts it can receive. This also works for outbound traffic. |
Unix and Windows |
Data access control |
Lets you filter out behavior before it hits the web server. |
Unix and Windows |
File access control |
Creates rules that controls read and write access to files. You can control the download or installation of any file. |
Unix and Windows |
File monitor |
Monitors for file changes. |
Unix and Windows |
File version control |
Enforces which versions are allowed to run on the endpoint. IE version 6.2 is allowed, but not the next beta release. |
Unix and Windows |
Network access control |
Controls which application can act as a client or server talking to what IP addresses over what service. |
Windows |
Network interface control |
Controls whether an interface can be put in promiscuous mode. |
Unix |
Network worm protection |
Protects against worm damage and propagation. |
Windows |
Network shield |
Protects against network-based exploit, such as malformed IP packets, and so forth. This is a built-in rule under Windows. |
Unix |
NT Event log |
Enables you to control which event log information you want to collect. |
Windows |
Resource access control |
Controls access to system resources. |
Unix |
Registry access control |
Governs which application can read or write which registry keys. |
Windows |
Rootkit/Kernel protection |
Protects against root kits and kernel modification. |
Unix |
Service restart |
Lets you have services, such as IIS, to restart automatically, in case it doesn't respond to the user or the system. |
Windows |
Syslog control |
Enables you to control which syslog information you want to collect. |
Unix |
Trojan detection |
Controls which applications can trap keystrokes, execute code from memory, and so forth. |
Windows |
Rules are enforced by six different action levels, as shown in Table 9-8.
Add Process to Application Class |
Priority 1 |
High-Priority Deny |
Priority 2 |
Allow |
Priority 3 |
User Query (Default Allow) |
Priority 4 |
User Query (Default Deny) |
Priority 5 |
Deny |
Priority 6 |
Rules are created as follows:
Figure 9-2: The process of creating a rule
These rules are automatically sent out to the groups they’re associated with.
Cisco provides you with an evaluator’s guide that shows you how to test this type of technology. This guide is available at http://www.cisco.com/en/US/partner/products/sw/secursw/ps5057/index.html. This will prompt you to log in with your CCO account. It’s important for you to test this technology completely. Make sure you use at least two desktops and servers, so you’re comfortable deploying these agents. You’ll quickly discover the difference between a personal firewall, an IDS, file integrity, and malicious mobile code product and the CSA technology. Understanding the defense in-depth that the CSA uses is important. Reactive products usually only use a single line of defense.
CSA offers you the capability to create custom policies for any applications. This could make such a system fairly complex. Because the default policies cover any application—store-bought or homegrown—you should start by using the default server and default desktop groups, make copies of them, and then create the agent kits you want to deploy. These default policies are what Cisco believes should be your basic security measures. Agents always should be deployed in test mode, which is a nonintrusive way of observing how the agent is going to impact your system. Instead of preventing the action, test mode lets you know what it would have done if it had been in prevent mode. You should run in test mode until you’ve adapted to your environment. After a few weeks of running in test mode, you can change to prevent mode.
Note |
Always deploy in test mode first |
The CSA also has an add-on product called the profiler, which lets you take any executable and run an analyzer against it. The profiler is a snap-in to the CSA MC that turns on functionality in the agent itself. It uses the same technology used to prevent the malicious behavior by using the shims (network, file, configuration, execution space) to collect all the behavior of the application, such as what network connections the application is performing, what files and directories it’s touching, which registry keys are read or written, and what COM objects were used during the run. That information is then analyzed and a policy is created that can be imported into the MC and deployed to the agents.
The agent has two different versions of maintenance: one is a new version upgrade and one is patches. These upgrades are all made to the Management Server.
New Versions
Cisco releases upgrades periodically where it introduces new functionality, as well as new OS support. This happens about once a year. Version 4.0 introduced the following new functionality:
Patches
Patches are released as needed. Remember, no pattern or signature updates are necessary at any time. The CSA doesn’t use them.
Application Forensics
The CSA offers security for store-purchased applications, as well as homegrown applications. By using the profiler functionality, the CSA enables you to create specific policies for that critical application you were worried about.
Patching
Patching has become an increasing nightmare. It’s a constant race to stay on top of the latest updates mandated by the OS vendors. Rolling out patches requires a strict change management control system to be in place.
Integration with Other Cisco Products
This chapter focused on the Cisco product line of IDS products uncluding appliance-based NIDS, compatible modules for routers and switches, and software-based solutions for certain releases of the Cisco IOS. The chapter also covered the Cisco safe architecture and how it has evolved. We also examined implementation issues and how the products should be maintained.
Part I - Intrusion Detection: Primer
Part II - Architecture
Part III - Implementation and Deployment
Part IV - Security and IDS Management