NSS Group logo

Westline Athena Aegis IPS 510L V2.1

Is the product supplied as software only or as a hardware appliance? If supplied as an appliance, please provide the hardware specification (CPU, memory, network cards, etc)
The Aegis IPS 510L is supplied as a Hardware Appliance with Dual Xeon CPU, 2GB memory, 2Gbps Fibre Interfaces, 2 tri-speed (10/100/1000) Copper Interfaces, One 10/100Mbps Ethernet port as management. 

Does sensor work in-line only, or can it support passive monitoring of switch SPAN port too? If passive monitoring is supported, what is the maximum number of ports that can be monitored by a single sensor?
In-line only with Bridging mode or Gateway mode selection.  It can monitor up to 2 ports in bridging mode and 4 ports in gateway mode with 2 ports as DMZ. 

What is the maximum number of in-line connections (port pairs) that can be monitored by a single sensor?
One port pair, either Fibre port pair or Copper port pair. 

What type (copper/fibre) and speed of network connection are supported by the sensor (include default configuration plus any options)?
The hardware specification include 2 tri-speed (10/100/1000) Copper ports, 2Gbps Fibre ports, and One 10/100 Ethernet port. 

What High Availability (HA) features are built in to the product by default?
None for this model.  Dual Power Supply is available on 710P and 510P model. 

What High Availability (HA) features are available as extra cost options?
The add-on hardware Gigabit bypass card which is bypass all traffic in power or software failure. 

What is the maximum speed/network load (Mbps) claimed with zero packet loss and without blocking legitimate traffic?
200Mbps with 256byte packet size and above. 

At the maximum load, what is the maximum TCP connection rate through the device (connections per second) claimed?
Tested to setup and teardown 4000 session/s. 

What is the average latency claimed through the device (and at what load)?
150 to 1000us depending on packet size at 200Mbps. 

Management architecture (2-tier/3-tier management? Brief description)
The Aegis product series supports both 2-tier and 3-tier management architecture at the same time (hybrid) or can be configured with a pure 3-tier architecture.   

The key feature is based on the Intrusion Management Server (IMC), which can be built-in or external.   Each sensor comes with a built-in management server (built-in IMC) and by default it is enabled and allows Console to connect directly to the Sensor.  Except scheduling feature, all functions and features are available.   In this configuration, the 2-tier configuration is in a hybrid mode and thus also allows multiple external management servers (IMC) to manage and control it.  

External management server (IMC) is software that runs on Red Hat Linux server.  Each sensor comes with this software on the CD and a free single sensor management license is provided.  The aims of external management server (IMC) is to provide a scalable environment to manage multiple sensors (at additional cost) and consolidate alerts for reporting.  In the standard default configuration of the sensor, both 2-tier and 3-tier management is supported at the same time.  Alerts are stored on the Sensor’s Hard disk, and also on all the external management servers (IMC). 

It is also possible to configure a pure 3-tier management.  In this case, the built-in management server (built-in IMC) will be disabled and alerts will be logged externally only.  Multiple external management servers (IMC) can be connected.  The Console must connect to the management server (IMC) in order to configure and manage the sensor. 

What are the minimum/recommended sensor OS and hardware requirements? Is a dedicated machine required/recommended?
The Aegis IPS 510L is a preconfigured appliance. 

What are the minimum/recommended console OS and hardware requirements? Is a dedicated machine required/recommended?
The console software runs on Windows XP/2000.  The hardware requirement is Pentium-4 2.4GHz or above, 256MB or above memory. 

What are the minimum/recommended management server OS and hardware requirements (if applicable)? Is a dedicated machine required/recommended?
The management server (IMC) runs on Red Hat Linux 9 or Fedora Core 1.  The hardware requirement is Pentium-4 2.4GHz or above, 512MB or above memory, 40GB Hard disk.  RAID disk and dedicated hardware is recommended. 

List required open ports on sensor and their use
TCP 22348 - For Console connecting to the built-in IMC server.  This port will be closed in pure 3-tier configuration.

TCP 22349 - For external management server (IMC) communicating to Sensor.

TCP 9132 - For out-of-band software and signature upgrade via Console. 

List required open ports on management server (if applicable) and their use
TCP 22348 - For Console connecting to the management server. 

List required open ports on GUI/management console and their use
None. 

Communication protocol between sensor and management server
Proprietary protocol using SSL and AES encryption. 

Communication protocol between management server and GUI/console
Proprietary protocol using SSL and AES encryption. 

Encryption between sensor and management server
AES-128bit encryption. 

Encryption between management server and GUI/console
AES-128bit encryption. 

Once deployed and configured, can sensors be managed from a central console?
Yes.  The Console can connect to multiple sensors at the same time without the use of external management server (IMC).  However, in this case, alert monitoring, reports and managements are still in separate tabbed views.

Capacity of the system? How many endpoints can be monitored? Ratio of endpoints to management servers/consoles, etc.
For better performance on the management server (IMC), it is recommended that not more than 5 Consoles connect to a management server or Sensor.  One management server is recommended to monitor no more than 5 to 10 IPS sensor at the same time. 

How many management consoles can be actively logged in to the management server at the same time?
Virtually unlimited multiple read-only access.  One read-write access only at a time by acquiring the administrative token.  For performance reasons, it is recommended no more than 5 consoles actively log into the management server at the same time. 

What anti-flooding methods are employed (sensor to management server, and management server to console)?
Console can be configured to display a maximum amount of alerts on screen. No aggregation or other anti-flooding techniques are employed. 

Maximum insertion rate into alerts database
Roughly 600 alerts per second inserting into database.  This value will be higher with better hardware configuration on the external management server (IMC). 

Maximum size of database
To the maximum size of disk space available. 

Maximum number of alerts stored
To the maximum size of disk space available. 

What happens to alerts in main alert database once capacity limits exceeded (deleted/archived/etc)
New alerts will be dropped.  User is required to manually backup and purge old alerts in the database in the sensor and/or external management server (IMC). 

What is maximum recommended size of alerts database to maintain acceptable query performance?
Less than 5 million alerts is within acceptable query performance. 

When alerts are removed from main alert database, are they still available for reporting directly (i.e. can reporting tools merge current and archived alerts)
No.  Before removing alerts from alert database, user can back up and archive the database to another location.  To merge current and archived alerts, user needs to restore the archived alert back to the alert database. 

This also means customer is allowed to build a pure analyzing management server (IMC) without connecting to any sensors.  All archived alerts can be restored to it for off-line analysis purpose.   

Which database product is used for alert storage? Is schema open?
On management server (IMC), it runs with MySQL 4.1.8.  The schema is open. 

What happens when communications between sensor and management server/console are interrupted? Local logging on sensor? Maximum capacity? What happens when local sensor logs are full? Is the local repository secure?
In default 2-tier mode, alerts are stored locally and additionally to any external management server connected.  Therefore local logging will not be affected with sensor and the management server/console are interrupted.  

In the pure 3-tier mode, alerts will be lost when the communication between the management server and sensor is broken.  However, the sensor will be continuing to block malicious traffic as normal. 

When local sensor logs are full, no more new alerts will be logged.  Since the Aegis IPS 510L is an appliance, the local repository is securely logged without any SSH or Telnet access. 

Secure logon for policy management?
The Console requires the correct username/password pair in order to manage the Sensor. 

Granular access (i.e. read only/read-write/etc) granted on a per-user basis? What levels of granularity are supported (i.e. is it possible to restrict user access to specific parts of the management console, to specific appliances, etc.)?
Currently we take a single read-write user approach.  Any connected user without taking the administrative token will be in read-only mode.  Read-only user will be allowed to generate reports and perform log analysis only.  Configuration options will be greyed out for read-only users.  The user with the administrative token will prevent other users taking it, and only he can perform configuration changes. There is no role-based administration capability. 

Is it possible to define multiple policies for the sole purpose of distributing to multiple sensors with different functions?
Yes.  The sensor comes with some built-in detection policies.  User can create and copy from those built-in policies and apply to different sensors. 

How are policies distributed to sensors?
The policies are ‘installed’ to the sensor.  In the Console, user selects the appropriate detection policies and then applies it to the desired sensors via external management server (IMC).  With 2-tier mode, user can only apply the detection policies to the local sensor. 

Can policies be deployed on a per-port, per-sensor or per-group basis, or globally only?
Policies are deployed per-sensor basis.  Each policy consists of detection rules, and firewall rules. 

How are policy changes handled? Will the central console detect which sensors are using a changed policy and redeploy automatically, or does the administrator have to do this manually?
For the managing management server (IMC), the Console retrieves the policies in uses on each sensor.  When there are multiple management servers, it will be the user’s responsibility to control the policies and manually update the sensor’s policy to avoid discrepancy on the current policies status. 

When a policy is applied, it will be locked and changes are not allowed.  To modify it, user needs create a new copy of the policy in use and modify it, and then apply this new modified policy. 

Can policy deployment be scheduled?
No. 

Does the sensor remain able to detect alerts at all times during policy/signature updates? If so, explain how this is achieved. If not, for how long is it inactive, and does the sensor block all or pass all traffic whilst inactive?
When a new policy is applied to the sensor, the engine will be stopped and entered idle time for about 2 seconds.  When the sensor’s engine is in idle, all traffic is passed without inspection.  Then the new policy will be applied and the engine becomes active again and inspects all traffic. 

Can the administrator define custom attack signatures?
Yes.  User can define signature based on Source IP, Source Port, Destination IP, Destination Port, Protocol header information and a simple pattern matching string to detect in the payload.

Regex supported when creating custom signatures?
No. 

How are new vendor attack signatures obtained and deployed?
Either the sensor obtained it via our signature server via HTTP port 80 or obtained in via management server (IMC).  The management server (IMC) will download signature via HTTP port 80. 

Our management server (IMC) can also retrieve signature updates from another management server (IMC). 

It is possible to use the Console to update the sensor’s signature via signature pack (dat file).  The dat file is obtained via the normal support channel. 

Frequency of signature updates?
Roughly one week to two weeks. 

What infrastructure does the vendor have behind the signature update process (i.e. dedicated team of engineers? How many? Does it have a name?)
A dedicated Westline Security Research Team is researching and update signatures collected from Internet and customer’s requested. 

Can one signature update file be downloaded to the local network and used to update all sensors from a central location, or is it necessary to initiate a live connection to the Internet download server for each sensor/management server?
Yes.  In using external management server (IMC), the signature update actually takes place on the management server and it will deploy to all managed sensors. 

Can signature updates be scheduled and fully automated? Is automated download AND deployment to sensors supported, or just download (or neither)?
Scheduling can be done via external management server, which is free for one sensor. 

What network protocols are analysed?
IP, TCP, UDP and ICMP. 

What application-level protocols are analysed?
HTTP, FTP, SMTP, FTP, POP2, POP3, IMAP, NETBIOS, MSRPC, SUNRPC, MYSQL, Oracle, MSSQL, NNTP, FINGER, DNS, SNMP, TELNET, Instant Messaging such as MSN, Yahoo, ICQ, P2P such as Bittorrent, eXeem, Kaaza, Gnutella, Napster, Backdoor, DDOS.  

Can the product perform protocol decodes?
Yes. HTTP, Telnet and RPC and Backdoor (Currently Back Orifice only).  

Can the product perform protocol anomaly detection?
IP, TCP, UDP and ICMP protocol violation will be detected.  Reserved IP protocol, TCP and UDP packet with port 0 will be dropped silently by the built-in stateful firewall.  This option cannot be changed. 

Can sensor support both normal and asymmetric network configurations?
The sensor currently supports normal network configuration only.   Asymmetric network configuration is planned in coming release. 

Is the detection engine “stateful”? If so, please explain how this works.
The detection engine is stateful for TCP connection.  Established connections are put into state table.  SYN_SENT and HALF_OPEN connection will be tracked as well.  All established connections are kept for their life, but sessions without any traffic over 3600 seconds will be treated as IDLE sessions.  IDLE sessions will be reclaimed when the state table is full and there are no bad sessions for reclaim. 

If stateful - how many open connections can be tracked? Is this value configurable?
Max 250,000 session connections can be tracked.  When this limited is reached, no new connection can be made. 

This option is not configurable for this model. 

If stateful - for how long are partially opened connections tracked? Is this configurable?
Partially opened connections include SYN_SENT and HALF_OPEN connections are time-out for 10 seconds.  Without receiving a valid final ACK packet from the initiator, the connection will be marked as bad and repeated SYN_SENT from the client will be dropped. 

Repeated SYN_SENT packets will be blocked after receiving 9 packets. 

This option is not configurable at this moment.  Configuration will be allowed in a future release. 

If stateful - for how long are fully opened connections tracked if not used? Is this configurable?
Established connections (fully opened connections) will be marked as IDLE without receiving any valid ACK packets from either client or server in 3600 seconds.  IDLE sessions will be reclaimed when the system runs out of resources. 

This option is not configurable at this moment.  It will be configurable in a future release. 

What is the default action when system resources run low or state tables are filled - block or permit all new connections? Is this default action configurable?
When the state table is full and no bad sessions or IDLE sessions can be reclaimed, no new connections will be allowed.  Existing connections will be still allowed and inspected. 

What is the default action when power fails or the system is powered down - block or permit all traffic? Is this default action configurable?
The IPS is in fail-safe mode and all traffic is blocked during power down.  This can be changed by purchasing optional hardware add-on bypass card to become fail-open. 

What is the default action when the sensor is unavailable for any length of time (i.e. during policy download or software update - block or permit all traffic? Is this default action configurable?
During policies update, the sensor will be temporarily run into ‘idle’ whilst passing all traffic uninspected for about 2 seconds, after which the detection engine is re-enabled. 

Will the detection engine block/alert on ALL suspicious activity, or only when an attack is made against a vulnerable server? If so, please explain in detail how this works. Can this behaviour be modified (i.e. to alert on ALL attacks if required)?
Yes, the engine can be configured to alert and block all suspicious activity.  By default, IP packet anomaly and invalid TCP segmentation are turned off on alerting.  This is configurable via the Sensor properties.  Some invalid IP, TCP and UDP packets will be always silently dropped by the IPS to avoid flooding of such packets.

Are server responses monitored and alerted/blocked? Does this have an impact on performance?
Yes.  Server response is also monitored.  The IPS inspects packets both to and from the server.  The signature detection is optimized to detect traffic specifically either to and/or from server such that particular response from server could be matched more accurately.  To avoid huge performance impact on the server side for heavy downstream protocol, TCP session reassembly is disabled for server-side stream.  

Ability to monitor user-defined connections (i.e. report on an FTP connection to a specific server?)
Yes.  Our detection policies are rule-based, allowing a more precise detection based on source and destination group preferred by the customers.  By custom rules in a policy it is possible to look for particular source and/or destination host with the proper signatures. 

Detect/block network-level packet based attacks?
Yes.  Some invalid IP fragmentation attacks and invalid datagrams (mostly generated by ISIC tools) will be silently dropped by the stateful firewall as well.  This behaviour cannot be changed. 

Detect/block all types of port scans (full connect, SYN stealth, FIN stealth, UDP)?
Yes.  At TCP level the TCP stream parser will decode and check if it matches the stealth activity properties.  This is not done by signature. 

Detect/block SYN floods? Manual or automatic thresholds? Configurable? How is SYN flood protection implemented?
Yes.  The IPS uses mainly HALF-OPEN session re-use methodology in defining SYN attack to avoid the flooding of the state table on the IPS.  Any SYN_SENT only and HALF-OPEN session has a timeout of 10 seconds and it will be reclaimed once it is expired. 

For repeated SYN_SENT attacks, further repeated SYN_SENT packets will be dropped once it reaches a counter of 9.   

This option is not configurable at this moment. 

Perform packet/stream reassembly?
Yes, a TCP reassembler is available, working on all TCP flows from client to server including FTP, HTTP and even RPC.  The reassembler also detects and blocks invalid timestamp, sequence number protections and other malformed packets such as null control flags during TCP segmentations.  Once the segments are considered bad, further packets will be dropped but it will be still reassembled to see if an attack can be matched. 

Perform deobfuscation?
Yes.  De-obfuscation takes place for all URLs on HTTP sessions.  HTTP ports are preset at port 80, 8180, 8080 and 8888 only - additional ports cannot be enabled for HTTP inspection at this moment. 

Is all traffic scrubbed/normalised/reordered as it passes through the sensor?
Yes. IP fragments are reordered.  For TCP segmentations, the IPS will not reorder the packet sequence, a copy of the packets are built in the TCP reassembler.  Once a packet that rebuilt the stream matches an attack, this packet will not be delivered to the destination, rendering the attacks incomplete.  Further packets from the same session will be blocked. 

How is fragmented traffic handled by the sensor?
Yes.  The Aegis IPS 510L takes an approach that IP fragmentation will be done by the Sensor before sending out from the sensor if possible.  

List all prevention features available (alert only, drop packets, block TCP session)
The IPS allows Drop packets and silent Drop packets. 

List any other security features available (bandwidth shaping, rate limiting, etc.)
This IPS contains a stateful firewall.  By default the stateful firewall allows all packets when there is no firewall rule.  There is also a NAT feature which allows standard one-to-one mapping, TCP and UDP port forwarding in Gateway mode only. 

Packet capture capabilities? Only the trigger packet, or before and after? How are packet captures stored/viewed?
Yes. The IPS can allow packet logging based on packet or session based.  Logged packets will not appear in the alert monitor windows.  They can be retrieved via the alert analysis windows for viewing the packet details such as packet header and payload. 

During evasion attacks, any TCP segments which are part of the attack will be logged this way to prevent flooding of the alerts in the Console.  For example, an attack is detected after reassembling 8 TCP segments, only one alert (the first TCP segment) will be in the alert monitoring console.  The rest are logged as additional logged packets in the database.  This preserves all the packet details as much as possible.  Those packets can be viewed through the alert analysis windows of the Console. 

Do you track and display context data as part of each alert (i.e. for an FTP overflow, do you show which user name/password combination was used to login to the FTP server, etc?). If so, how much context data is available?
This feature is not supported yet.  

Option to record entire sessions for “forensic” investigation? Where is this data stored? How is it secured from tampering?
Yes.  Logging session traffic will be the same as packet capture capability.  Each packet logged within the session will be marked as additional logged packet and can be viewed through the alert analysis windows of the Console. 

Reporting from sensor to console - range of alert response options (detail these, i.e. log, alert, e-mail, pager, packet capture, etc)
Alert Response Option are Alert (on Console), SYSLOG and SNMP trap. 

Can alert response options be set only at a global policy level, only at individual signature level, or to groups of signatures (or a mixture of all three)?
The notification can be configured based on rules, which is a group of signatures within a policy.  Each sensor can be set up to send to different SYSLOG and/or SNMP server via the Sensor properties. 

Can alerts be reported to the central console in real time without the use of third party software? How easy is it to filter and extract individual events?
Yes.  In alert analysis of the Console, user can define filters based on date, time, source IP, source port, destination IP, destination port, severity and even signatures to extract the particular events.  The particular events include full packet headers and payload information.  The payload is also ASCII-decoded and supports copy-and-paste function. 

Can alerts from all sensors be viewed at a single console at the same time (i.e. without having to connect to separate sensors from the console)?
Yes.  The Console can connect to multiple sensors and multiple management servers at the same time.  Connecting to multiple sensors from a Single Console directly will not consolidate the alerts in one window.  Alerts from each sensor will be in separate alert monitoring consoles. 

If using the management server (IMC) to manage multiple sensors, then alerts will be consolidated for all sensors managed under the same management server (IMC).

Can the central console correlate alerts from multiple sensors (i.e. not just display alerts from multiple sensors, but attempt to infer a connection between different alerts on different sensors)? IS this offered as standard or extra-cost option?
No.  Third party software is required for ‘correlation’ based function. 

Can alerts be correlated manually by the administrator - grouped together in the database as a single event for further investigation?
No. 

Can alerts/events be annotated and tracked for investigation by multiple administrators/investigators?
No. 

Does the software offer advice on preventative action to ensure the attack does not happen again?
In the Console, a knowledge-base which is in Microsoft CHM format allows the user to view the alert’s recommendation.  Each alert generated also contains a reference tab that links to this knowledge-base as well as any external information.  A browser can be opened to connect to the web site by double clicking over it. 

What industry standards are supported - Intrusion Detection Exchange Format working group (IDWG), Intrusion Alert Protocol (IAP), Intrusion Detection Message Exchange Format (IDMEF), IDXP - and in what way?
None. 

Which third party event correlation systems are supported and in what way?
Cell CMC is a third party software which is an event correlation system that supports Athena IPS together with Check Point, Watchguard, NetScreen and Cisco PIX.  Aegis IPS is supported via SYSLOG notification. 

Integration with other scanning/IDS/prevention products?
The Aegis IPS can work with Check Point 2000 Firewall, Cisco PIX, and NetScreen Firewall for blocking by the third party firewall. 

Log file maintenance - automatic rotation, archiving, reporting from archived logs, etc.
In standard 2-tier configuration, user can simply use the Console to backup, purge and restore database to the sensor.  In the management server (IMC), the user can do whatever he wants according to the schema provided to extract the desired information and perform other database operations. 

Management reporting - range of reports/custom reports/how easy is it to filter and extract detail? Different reports for technicians and management/end users?
Management reports are provided via the Console.  Most of the reports are graphical, presenting the top 5, 10, 20, 50 100 and even ALL.  There are over 16 management reports - Top Scan source, Top Scan target, Attack by severities, Attack over time and Top signatures.  There are also CPU utilization reports plus a custom report which is for technicians. 

Technical analysis is done via the alert analysis windows of the console.  Data could be exported to TSV format for the summary information. 

Are trend/comparison reports available?
Not available yet.   

Does reporting allow customised filtering down to the level of reporting all activity on a specific network resource/object by a specific user/machine on a specific date?
Yes. Customer can filter data according to Date, Time, Sensor, Source IP, Source Port, Destination IP, Destination Port, Signature, Action and Severity. 

Report management - can they be scheduled for automatic production? Can they be e-mailed to administrators or published straight to a Web site?
Scheduled Reporting can be done via external management server (IMC) only.  Scheduled report will be in PDF format and stored in a default location, which is configurable. 

List the output formats supported for reports (HTML, text, PDF, etc)
Using Console, the report can be exported to PDF, HTML, CSV, Excel and Text for management report.  For alert analysis, report can be exported as TSV format.   Any scheduled report via management server (IMC) is exported as PDF only. 

What are the limitations and restrictions on enterprise-wide alerting and reporting? Can reports consolidate output from every 1) server, 2) detector
In standalone 2-tier configuration, Console can generate reports and alerts based only on the Sensor to which it is connected.  When using the management server there is no limitation.  Report consolidation can be done via management server (IMC). 

Ability to define custom reports?
Yes.  User can select the interesting summary information and export it into TSV format.  The summary information can include:

Time, Severity, Sensor, Interface, Signature, Src IP, Src MAC, Src Port, Dst IP, Dst MAC, Dst Port, Protocol, Event Type, Rule ID, Action and Notification. 

Provide brief description of any management software included in the base price of the product. 
The Management Software (IMC) is free for managing one sensor.  Customers who purchase one IPS will receive the software together on the product CD.  This provides all functions for one Sensor including scheduled reporting and signature download. 

Provide brief description of any additional management products available as extra cost options. 
The Management Software (IMC) is free for managing one single sensor.  To monitor multiple sensors for consolidating alerts and reports together, customers need to buy additional licenses to enable the IMC to monitor multiple sensors (from USD 4900 for 5 licenses, to USD 8600 for 20). 

Documentation provided (Hard copies available? Extra cost?)
Documentation is available on the CD (soft copy) only. 

How is the product licensed? How is the license enforced?
On Sensor, the user will obtain a new license file to renew the license for software and signature update.

On Management Server (IMC), license will control the number of sensors allowed for control. 

All licenses are controlled via Expiry date, Maintenance date and MAC address of the management interface. 

End user pricing information for product provided for test (include all sensor, management server and console costs for both hardware AND software). Include options/configurations other than those tested - ALL PRICES AS LIST PRICE ONLY!
The list price of Aegis IPS 510L is USD 31,980, which includes first year software and hardware maintenance.  It also covers the first year signature update and one sensor monitoring by external management server (IMC). 

Ongoing cost of maintenance/updates
Software maintenance (includes signature updates) - USD 4692

Hardware maintenance - USD 4797

Click here to return to vendor questionnaire index
Click here to return to the Westline Review
Click here to return to the IPS Index Section

Send mail to webmaster with questions or 
comments about this web site.

Copyright � 1991-2006 The NSS Group Ltd.
All rights reserved.