NSS Group logo

Cisco IDS-4235 V4.0

Cisco IDS (formerly known as NetRanger) is a network-based IDS, which means that it monitors all traffic on a subnet and compares individual packets, or groups of packets, against known attack signatures in an attempt to identify illegal activity.  

Cisco IDS was one of the first to be supplied as a dedicated network appliance, with all hardware and software necessary to get you up and running. 

Architecture

The Cisco IDS is a hybrid protocol decode and network grep (pattern-matching) IDS, and the latest software release sees a move from the �traditional� OS of choice - Solaris - to Linux. The sensor appliance comes in four flavours, each running a heavily modified version of Red Hat Linux, hardened and complete with a familiar Cisco Command Line Interface (CLI) and customised packet drivers written to cope with extreme traffic loads on network interfaces in promiscuous mode: 

  • Cisco IDS-4215 Sensor - optimised to monitor 80 Mbps environments and is ideally suited for monitoring multiple T1/E1, T3, and 10Mbps Ethernet environments. It comes in a 1U high chassis which contains an 850 MHz processor, 512 MB RAM, and two auto sensing 10/100Base T (RJ-45) Ethernet interfaces (for the base model) - one for monitoring and one for management. Four additional 10/100 monitoring interfaces are delivered through a simple field upgrade that results in a total of 5 monitoring interfaces for a single unit.
     
  • Cisco IDS-4235 Sensor - optimised to monitor 200Mbps environments, and is ideally suited for monitoring multiple Fast Ethernet segments or T3 connections. It is offered in a slim-line 1U chassis containing a single Pentium III 1.26GHz processor, 1GB of RAM and two auto sensing 10/100/1000BaseT (RJ-45) Ethernet interfaces for monitoring and management. Four additional 10/100 monitoring interfaces are delivered through a simple field upgrade that results in a total of 5 monitoring interfaces for a single unit.
     
  • Cisco IDS-4250 Sensor - this is Cisco�s offering in the Gigabit IDS market place, and in its basic form is optimised for 500Mbps of traffic, making it suitable for multiple 100Mbps or low-end Gigabit monitoring. This too is offered in a 1U chassis dual 1.26GHz Pentium III processors, 2GB of RAM and two auto sensing 10/100/1000BaseT (RJ-45) Ethernet interfaces for monitoring and management. Four additional 10/100 monitoring interfaces are delivered through a simple field upgrade that results in a total of 5 monitoring interfaces for a single unit.
     
  • Cisco IDS-4250-XL Sensor - This Cisco's high-end appliance that is optimised to support fully saturated gigabit links. It based on the 4250 platform but supports a customised accelerator card that offloads some of the processing normally performed on the primary CPU of the host processor. The card provides on-board processing and deep packet inspection capabilities enabling the 4250-XL to monitor at Gigabit rates. The accelerator card is also offered as a field upgrade that enables customers to upgrade 4250 units to 4250-XLs

For the purposes of this test, Cisco provided the IDS-4235. In something of a departure for Cisco, the hardware is manufactured by Dell � a PowerEdge 1650 server in a 1U chassis. This chassis houses three drive bays (a single IDE drive is installed), dual redundant power supplies (one is installed by default), and two on-board copper Gigabit network interfaces (auto-sensing 10/100/1000Mbps).

The general build quality of the sensor appliance appears to be excellent, and accessibility for maintenance or upgrades is extremely good, the top of the chassis hinging open in two sections at the press of a single button. 

Management is designed to be performed over a dedicated network using one of the two built-in network interfaces in the sensor. Management of IDS Sensors is available via two products: 

  • IDS Device Manager (IDM) � This is provided free with the sensor, and offers centralised  Web-based configuration. IDM is designed to manage only a single device at a time, however - it does not, for example, provide a means to distribute a single policy across multiple Sensors.
     
  • CiscoWorks VPN/Security Management Solution (VMS) � This is the flagship product suite from Cisco that combines Web-based applications for configuring, monitoring, and troubleshooting Virtual Private Networks (VPNs), firewalls, and both Network and Host-based IDS. This solution provides centralised management, configuration, policy deployment, alert handling and reporting for all IDS appliances across a corporate network.  

Also available is Cisco Threat Response (CTR), which has been incorporated into Cisco's product line through the acquisition of Psionic Software. CTR uses a just-in-time investigation of the targeted host to determine if the attack was successful. A three-phase approach is used to accomplish this:  

  • Basic investigation of target vulnerability that involves a non-invasive real-time check of the targeted system's operating system (OS), and Web services as applicable, to determine if the attack could have succeeded.
     
  • Advanced investigation of target that delivers a detailed system level investigation including patch level investigation, capture and analysis of Web logs, system logs, and other relevant data to determine if an attack succeeded or failed.
     
  • Forensic data capture acquired by active collection of relevant forensic evidence and providing the administrator with intelligent information with which he may make informed decisions.  

Installation

Installation tasks are minimal thanks to the turnkey appliance approach. However, it is necessary to log in at the sensor console and work through a text-based installation routine in order to set up the initial communication parameters of the sensor so that it can communicate with the management console.  

Cisco has done a good job of implementing the Cisco CLI on the Linux platform so that the IDS sensor has a familiar look and feel to anyone with Cisco experience.  

Whichever management console is being used - Cisco IDS Device Manager (IDM) or CiscoWorks VMS - then all that is required is to define the communication parameters for each sensor to begin managing and monitoring.

All documentation is supplied on CD-ROM and is also available on-line. As usual, the quality of the documentation is more than adequate, though we still mourn the loss of the wonderfully detailed hard-copy manual that used to accompany the earliest versions of the IDS product (back when it was known as NetRanger).

Configuration

For remote management functions, Cisco bundles the IDS Device Manager (IDM) with the sensor, along with the IDS Event Viewer (IEV) for monitoring events and alerts. In addition, those Cisco diehards will be pleased to learn that there is a full-featured Cisco CLI environment available when logging into the sensor locally. Everything that can be configured via the GUI utilities can also be configured via the command line.

IDS Device Manager

The IDS Device Manager is a web-based Java application that resides on the sensor and is accessed via a secure, encrypted TLS link using standard Netscape and Internet Explorer web browsers to perform various management and monitoring tasks. 


Figure 1 - Cisco IDS: Defining sensor parameters

The IDM user interface is very intuitive and easy to use, the main focus of which is the tabbed tool bar along the top of the screen. This contains tabs for Device, Configuration, Monitoring, and Administration, each of which brings up a different hierarchical menu in a panel down the left hand side of the screen.  

The main window or Content Area is in the right-hand panel, and any changes made are not written to the sensor until the Apply Changes option is selected. It is possible to restrict access to the sensor to specified hosts, though all allowed hosts have equal access. It is not possible to provide granular access to discrete functions of the IDM on a per user or per group basis.

By default, the most critical signatures are enabled when the IDS Device Manager is first installed, representing a useful starting point for policy definition. Signatures are grouped according to their �microengine�, each microengine representing the implementation of a different type of detection technology. Some may be concerned with single packets, others with groups of packets (to detect floods and sweeps). Some may perform protocol decodes whilst others focus in pattern matching.  

This architecture makes the Cisco IDS very flexible and readily extensible - custom signatures can be created which make use of the capabilities of each engine. However, when searching for built-in signatures to tune it can make life difficult unless you know exactly what they do and in which engine they reside. Some form of search and filter capability would be useful in the signature editing section of IDM, especially since it is so slow to recall large numbers of signatures at a time. 


Figure 2 - Cisco IDS: Signature configuration in IDM

The Signature Configuration screen provides the means to enable or disable signatures, change the severity level or action associated with a signature, and add new signatures. Unfortunately, it is not possible to apply a parameter change across a number of signatures at once.

For example, if it is required to change the Severity Level of all Finger signatures from Low to Medium, this would entail editing every signature individually. Even though IDM is designed for single device management only, this would be a useful feature to add (it is available within CiscoWorks, however).

From the Signature Group screen it is possible (although painfully slow) to display all the individual signatures at once by clicking on All Signatures, or the signature list within a group can be displayed by clicking on the appropriate group name.

At the group level, a clear circle indicates that no signatures in that signature group are currently enabled, a solid circle indicates that all signatures are enabled, and a partial circle indicates that at least one signature in that group is enabled. It is possible to enable or disable all signatures in a group with a single click.  


Figure 3 - Cisco IDS: Editing signatures

Selecting a signature group displays a list of signatures within that group. Once again, a clear circle indicates that the signature is currently disabled, whilst a solid circle indicates that the signature is enabled. The signature display within each group informs the administrator which are built in and which are custom signatures, the signature IDs and names, severity levels and actions (block, IP log or TCP Reset). The sensor can be configured to block an attack by generating ACL rules for publication to a Cisco IOS router.

Each individual signature can be edited from here, and even built-in signatures can have their parameters amended, allowing the administrator to adjust such settings as the threshold level, severity level, action, alarm interval and alarm throttle (fire every time, fire only the first time, or summarise). Naturally the parameters change from signature type to signature type.  

False positives can be reduced by defining filters for a sensor to enable and disable alarms that have specific hosts and networks as their source or destination. Cisco IDS includes both TCP session and IP fragment reassembly capabilities, and these are now switched on by default (unlike earlier versions).  

User-defined reassembly options allow fine tuning in an attempt to ensure that the sensor does not allocate all of its resources to datagrams that cannot be completely reassembled, either because the sensor missed some frame transmissions or because an attack has been launched that is based on generating random fragment datagrams.

As you would expect, the Cisco sensor is also stateful, and the number of open sessions that can be tracked has been increased by an order of magnitude from the previous release of the software (although there is currently a parameter that requires adjusting in order to achieve this).

It works well, reducing the incidence of false positives and flooding caused by attack scripts and replay tools such as Stick and Snot. When testing the Cisco sensor, we noted relatively low incidences of false positives during Stick and Snot floods. The IDS-4235 also proved itself to be resistant to almost all of the IDS evasion techniques we used against it.  


Figure 4 - Cisco IDS: Defining reassembly parameters in CiscoWorks

When an attack is detected, the sensor generates an alarm, which is sent to the event monitoring host, where the IDS Event Viewer (IEV) writes it to an ASCII event log and to a MySQL database. Once in the database, it can be viewed using the IEV.  

Event throttling is employed to ensure that a flood of identical events does not cause a Denial of Service situation, and all alerts are stored locally on the sensor�s hard drive in case of communications failure between sensor and console. This throttling mechanism worked well in our tests.

Various logging capabilities are built into the Cisco IDS software, including:

  • The ability to generate audit event logs based on network data streams, or syslog data streams, or both, depending on what the sensor has been configured to watch.
     
  • The ability to generate an IP session log when the sensor detects an attack. When IP logging is configured as a response action for a signature and the signature is triggered, all packets related to that particular event are logged for a specified period of time. The number of minutes for which events are logged is user configurable.
     
  • The ability to capture all traffic related to the specified hosts. The IP logging option logs all traffic or a list of IP addresses. 

It is possible to specify an FTP server to receive event logs at regular intervals. 

When an attack is noted, as well as logging to file and alerting to the IEV console, the sensor can instantly cut TCP sessions, and dynamically manage a Cisco router�s access control list to �shun� intruders, thus preventing further attacks from that source. This feature can be temporary, if desired, or maintained indefinitely. The rest of the network traffic will function normally - only the unauthorised traffic from internal users or external intruders will be removed.

Clearly this feature needs to be managed carefully, particularly where there is the chance of false positive alerts � you don�t want to accidentally cut off your entire accounts department from their network just because someone typed a password incorrectly.  

The IDM does not provide any means to push updates and signature packs to multiple sensors across a network. However, it is possible to configure sensors to perform their own automatic signature and service pack updates, so that when the updated files are loaded on a central FTP server, they will be automatically downloaded and applied to each sensor.

The sensor can be scheduled to check the FTP server at regular intervals, or can be forced to perform an immediate update via the IDM interface. SCP can also be used for secure transfer of update files.

CiscoWorks VMS

CiscoWorks VMS is the extra-cost �umbrella� management system for a range of Cisco devices such as firewalls, VPN and, of course, IDS. For those organisations who find the included IDM/IEV combination to be too limited, then CiscoWorks provides enterprise-level IDS management, monitoring and alerting capabilities.

Login to the CiscoWorks console is controlled by a user name and password combination. User accounts are created within CiscoWorks (or can be managed by ACS) and each account can have different levels of access to the system, providing granularity of administrative function.

Once logged on, a hierarchical menu down the left of the screen provides access to CiscoWorks� administrative functions (security settings, logging options, server configuration, user account maintenance, and so on), and the Management and Monitoring Centre. This contains modules for the IDS sensor that provide very similar functionality to IDM and IEV, but which offer more flexibility in some of the configuration functions together with the ability to manage multiple sensors across the corporate network.

Sensors can be logically grouped together - perhaps according to location or function - and an Object Selector window allows the administrator to select either an individual sensor or an entire group to which all subsequent administrative operations will be applied. Parameters such as port mappings, event logging and attack blocking can then be set globally, or at group level, and can be made mandatory at either of those levels, thus preventing them from being overridden on the individual sensors.

Clearly, not all admin functions are available at group level, since some are tied closely to the operation of the individual sensor. However, there are some - such as filters, signatures and reassembly options - that it would be preferable to be able to set on a global or group basis and then override (if allowed) at the sensor level.  


Figure 5 - Cisco IDS: Applying changes at group or individual sensor level

Unfortunately, that capability will have to wait for a future release. There is a workaround, however, since CiscoWorks includes a Copy Wizard function, that allows the administrator to copy certain key parameters from one sensor to another, or to a whole group. Whilst not quite as slick a means of deploying signature changes as setting them at group level, it is still a powerful feature.

Unlike with the basic IDM utility, signatures are arranged in six groups within CiscoWorks:  

  • Built in signatures � known attack signatures that are included in the sensor software. It is not possible to add to or delete from the list of built in attack signatures, nor can they be renamed. It is, however, possible to tune built in signatures by adjusting a number of signature engine parameters.
     
  • Custom signatures � user-defined signatures that can be defined from scratch, making use of the underlying capabilities of each microengine (i.e. protocol decode, floods, pattern matching, and so on).
     
  • TCP connection signatures � user-configurable attack signatures based on the protocol (TCP) and port number of the traffic being monitored.
     
  • UDP connection signatures � user-configurable attack signatures based on the protocol (UDP) and port number of the traffic being monitored
     
  • String-matching signatures � user-configurable attack signatures based on data carried by the packets in a particular session.

    These signatures use regular expressions to perform string matching on the packet data payload. String-matching signatures can also be configured to examine only incoming, outgoing, or bi-directional network traffic for the string
     
  • ACL signatures � user-configurable attack signatures based on access control violations recorded by network devices in the syslog stream. To configure the sensor to detect ACL signatures, it is first necessary to configure one or more Cisco IOS routers to log ACL policy violations. Then, the router is configured to communicate with the sensor, and the sensor configured to accept syslog traffic from the router. There are no default ACL signatures when the sensor is first configured.

Although all the built-in signatures are gathered together under a single menu option it is much easier to find and edit them here than it is in IDM because of the excellent search capability. Any one of a number of search fields can be selected - signature ID, engine name, enabled/disabled, tuneable, severity or action - and a value specified in order to bring up the signature, or group of signatures, required.  


Figure 6 - Cisco IDS: Editing signatures in CiscoWorks

Thus it is possible to search for all signatures whose description contains the phrase �Back Orifice�, or all signatures that have a severity setting of �High�. Each signature can then be tuned or edited individually, or as a group. This is a very powerful feature that allows the administrator to alter a setting for an entire group of signatures on one operation.

For example, it would be possible to search for all signatures in the SERVICE.FTP engine and set the severity to �High�. You can only search on one parameter at a time, however, which is a shame - it would be nice to be able to search of all signatures with a severity of �Medium� in the SERVICE.FTP engine, for instance. It would also be nice if the keyword being searched for appeared in a drop-down menu where applicable, since some parameters - such as the list of engine names - are not easy to remember.

In addition to changing the severity and alert actions (Log, Reset Connection or Block), it is also possible to tune the microengine that underpins the signature. Here there is a huge number of parameters to choose from allowing very fine-grained control over the operation of the signature. New signature packs can be obtained from a central location and applied via the CiscoWorks GUI. 


Figure 7 - Cisco IDS: Deploying configuration changes

As with IDM, the CiscoWorks interface allows the creation of filters to include or exclude specific alerts based on signature ID, source or destination IP address.

Whenever changes are made to a particular sensor configuration directly, a �Pending� flag is set awaiting confirmation by the administrator that the changes can be applied to the sensor. Changes can be deleted from the Pending screen if they are no longer required, and a full change history is recorded, with every configuration file that has ever been applied saved as an audit trail. It is also possible to roll back a change to a previous configuration if required.

When changes are applied at the global or group level, there is a two-stage process to deploying the updated configuration files - these operations are accessed via the Workflow tab. Firstly, the configuration file is generated to reflect the changes made. Then the configuration file is deployed to one or more sensors. Both of these operations are �one click�, allowing updates to be deployed to multiple sensors around the organisation quickly and easily. 

Alert Handling

As with configuration, two utilities were provided for this test: CiscoWorks 2000 and the IDS Event Viewer (IEV).  

IDS Event Viewer (IEV)

The IDS Event Viewer (IEV) is a Java-based application that enables the administrator to view and manage alarms for up to three sensors. It utilises the following applications (all of which are installed by default):

  • Java 2 Runtime Environment
     
  • CSIDS DataFeed Software Development Kit
     
  • MySQL server

With the IDS Event Viewer it is possible to view alarms in real time or via imported log files, and customised filters and views can be created to help manage the data.

Event data can be exported for further analysis, if required, and the IEV also provides access to the Network Security Database (NSDB) for detailed signature descriptions. 


Figure 8 - Cisco IDS: Viewing events in IEV

Unless the administrator specifies otherwise, the sensor will publish its audit event stream to the host on which the IDS Device Manager has been installed. It is also possible to identify additional hosts to which the sensor can publish its audit event stream.

The IDS Event Viewer user interface consists of a main menu, toolbar, left-hand configuration pane, and a right-hand view pane. Filters enable the administrator to customise and refine the view of event data by specifying alarms to be excluded. Any number of custom filters can be stored in the Filters folder and applied to any default or user-defined view.

Events can be viewed in �real time�, with a user-configurable refresh interval, or retrieved from the local database for later analysis. It is also possible to view alarm data stored in log files that are imported into the IDS Event Viewer, as well as to export data from the IDS Event Viewer tables to an ASCII file for analysis via third party applications.

Views enable the administrator to analyse filtered event data from a specified source. The IDS Event Viewer ships with five default views (by source address, destination address, sensor ID, signature name, or severity), and the IEV provides the View Wizard allowing the administrator to create and store user-defined views in the Views folder.

Multiple views can be opened at the same time, the IDS Event Viewer placing one view behind the other and displaying a tab for each. Once a view is active, it is possible to expand an event to view all the details, such as signature name and severity level, associated with that event.

When viewing individual alarms associated with an event the administrator can review detailed alarm and signature information, add notes, or set a status for the alarm indicating what action should be taken by the IDS Event Viewer or by someone else in the organisation. Notes can be up to 255 characters in length, and are stored as part of the alarm entry in the database. 


Figure 9 - Cisco IDS: Defining custom views in IEV

Certain alarms may have context data associated with them. Context data provides a snapshot of the incoming and outgoing binary TCP traffic (up to a maximum of 256-bytes in both directions) that preceded the triggering of the signature. This provides the means to view the URL or the entire FTP session that may have triggered an event, for example.

The IDS Event Viewer includes a database archival feature that ensures available disk space for incoming events. Two thresholds control the archival process � the first is a time interval and the second is a maximum number of records. Crossing either threshold triggers the archival processes. 

CiscoWorks VMS

CiscoWorks does not provide a real-time dashboard facility, but the Security Monitor Event Viewer is very similar in appearance and operation to IEV, except that it can handle events from more than just IDS devices. 

Once the devices to be monitored have been defined to the Security Monitor in the Device tab, the Monitor tab can be used to monitor both the status of each device, and the events that are raised.

Unlike IEV, there is no facility to define custom views, but the default view is extremely comprehensive, including the signature name, ID, severity, source and destination, and brief details of what triggered the alert. If more detail is required, it is possible to select a single alert or a group, and view complete context data, host names, NSDB entries (for detailed alert information) and statistics (such as how many times a particular alert has been seen). 

Although custom views cannot be defined as such, it is possible to drag and drop columns of data to re-order and resort the entries. For example, dragging Source IP to the left of the screen sorts and groups (and counts) by source IP. Dragging Severity to the left of the screen creates a new view sorted and grouped by the severity code. The entire contents of the database can be expanded or collapsed using menu options to the left of the screen, providing a quick way to switch between detail and summary views. As with IEV, it is possible to view the full context buffer for an alert - unlike IEV, the CiscoWorks Event viewer is capable of showing context data for an entire group of alerts in the same window. 

On selecting any of the alerts, menu options provide the capability to block the host that perpetrated the exploit, or the entire network from which it came. Although it may appear simple at first glance, and although it is not the most intuitive interface when it comes to resorting, expanding and collapsing the entries, the Event Viewer is actually a very flexible and powerful tool. 


Figure 10 - Cisco IDS: Viewing event details in CiscoWorks

One final option worth mentioning is the Event Rule capability. Event Rules allow the administrator to specify related criteria, thresholds and actions in order to provide some very basic - if completely manual - correlation. For example, a rule could be created to watch for a particular type of port scan from three sensors. If the scan is detected on all three sensors within a given time frame then an alert is generated, an e-mail is sent to the administrator and a script is run to reconfigure the firewall.

Reporting and Analysis

Although detailed reporting out of the box is limited to the capabilities of the IEV, CiscoWorks provides both the Event Viewer and a reporting tool - a huge improvement over previous releases. 


Figure 11 - Cisco IDS: Running reports in CiscoWorks

Reporting is fairly basic, with no means to customise the built in reports or create your own. Six audit reports are included (mainly concerned with audit logs and sensor configuration changes) alongside 15 IDS alert summaries, including: 

  • Security Alarm Source
     
  • Security Alarm Detailed
     
  • IDS Top Sources
     
  • IDS Top Source/Destination pairs
     
  • IDS Top Destination
     
  • IDS Top Alarms
     
  • IDS Summary
     
  • IDS Alarms by Sensor/Hour/Day
     
  • IDS Alarms by Source/Destination Pair
     
  • IDS Alarm Source
     
  • IDS Alarm
     
  • IDS Alarm Destination
     
  • 24 Hour Metrics

On choosing a report, the administrator is presented with an extensive set of filtering options including severity, date, source, destination, signature and category. The report can then be scheduled to run immediately or at a later time. If scheduled for a later time it can also be made to repeat at regular intervals, and the finished report can be e-mailed to one or more recipients.

The completed report is viewed on-screen in a browser window and can be printed out using the standard browser print function. No other print or export options are offered.

The summary reporting is adequate, and more detailed forensics reporting is offered via the Security Monitor Event Viewer we mentioned earlier. This provides the ability to enter a date and time range in order to filter a particular set of alerts from the database - the drag and drop columns coupled with the capability to expand and collapse groups of entries provides a useful means to �slice and dice� data in different ways in order to drill down to events that are of interest. It is not possible to annotate events or tag them as resolved or under investigation, however - strange, given that this feature is available from within IEV. 


Figure 12 - Cisco IDS: Viewing context data for an alert

The biggest worry with regard to forensic investigation is the automatic database pruning operation, which is set to remove old alerts from the database once it reaches 2 million records in size. Cisco has determined this as the optimum size to provide the best performance in terms of insertion rate. Unfortunately, old records are not archived, and are thus lost forever. Clearly if more extensive forensics reporting is required, then third party products are the way to go.

Verdict

Cisco has struggled in the past to produce enough functionality out of the box to make the product attractive in its own right without the use of third party management and reporting tools. That may be about to change with the release of 4.0. 

IDM and IEV have improved tremendously since the last release, and whilst they do not (and are not designed to) offer enterprise-class centralised management and monitoring capabilities for multiple sensors, they do provide the means to manage a limited number of sensors (three at the time of writing, shortly to be increased) on a one-to-one basis, and do an excellent job of it. IDM can be slow when making changes to signatures, but the new IEV is a real triumph, providing a nice real-time monitoring and historical analysis tool. 

CiscoWorks is where it steps up a gear into true centralised management, monitoring and reporting, and although there are still one or two enhancements we would like to see, the product shows real promise. As it stands, there is centralised policy management and deployment (still with some rough edges), real time monitoring, forensic analysis and summary reporting all from the same console.

Signature editing, tuning and creation are well catered for, and the interface makes it simple to search for and make changes to large groups of signatures in one hit.

A two stage config generation and deployment feature makes it as safe as possible to work on policies without accidentally wiping out production sensors, and yet if something was to go wrong, there is the ability to roll back to a previous configuration.

We would like to see some further slight improvements in terms of signature search in the editor, modification of signatures at a global or group level as well as at sensor level, and the ability to annotate alerts from within CiscoWorks. Some means of accessing older alerts that have been pruned from the database for complete forensic analysis would also be extremely useful, as would more extensive cross-sensor correlation capabilities. 

Performance was very good across the board. The recognition rate was excellent both in terms of absolute coverage and accuracy, with very few misidentified events or false positives.  

Tracking of open connections has been improved significantly for this release, although there is still some work to do on memory management to prevent failure of the sensor when pushed significantly beyond the supported connection limits of 500,000 (this should have been resolved by the time you read this). Detection rates are also very high, as you would epxect from a 200Mbps device.  

Although only validated to 100Mbps in our tests, all of the performance tests were handled with headroom to spare.  

Contact Details

Company name: Cisco Systems, Inc.
Internet: www.cisco.com
Address:
San Jose World Headquarters
170 West Tasman Drive
San Jose, CA 95134-1619
USA
Tel: +1 408 526 4000

Cisco Systems
9-11 New Square
Bedfont Lakes
Feltham
Middlesex TW14 8HA
England
Tel: +44 (0)20 8824 1000

Click here to return to the Cisco questionnaire
Click here to return to the Cisco Results 
Click here to return to the IDS Index Section

Top         Home

Security Testing

NSS Awards

Group Test Reports

Articles/White Papers

Contact

Home

Send mail to webmaster with questions or 
comments about this web site.

Copyright � 1991-2006 The NSS Group Ltd.
All rights reserved.