Betting Sites Not On Gamstop UK 2025
NSS Group logo

Cisco Secure IDS

Brief product description
The Cisco Secure IDS is a network-based IDS using a dedicated security appliance as the ‘sensor’. Sensors, which are high-speed security analysis devices, analyse packets traversing the network to determine if the traffic is authorised or malicious.If the data stream in a network exhibits unauthorised or suspicious activity, such as a SATAN attack, a ping sweep, or the transmission of a secret research project code word, sensors can detect the policy violation in real time, terminate the offending session(s), and send alarms back to a central management console.The management console is a scalable software-based management system that centrally monitors the activity of multiple sensors, provides a visual alarm display, and acts as a remote system configuration utility.

Architecture
The appliance has one interface to promiscuously monitor the traffic and a second interface for communication to the NT based ‘Director’ control software, CSPM. (‘Director’ software running on HP/OV on Solaris or HP/UX is also available)

At what layer of the protocol stack is the product working?
Up to layer 7

Documentation
A User Guide manual is supplied in hard copy. All Documents are supplied on CD-ROM and are also available on-line

What are the minimum/recommended console OS and hardware requirements? Is a dedicated machine required/recommended? Will it work on Windows 2000?
The basic requirements of the Director are Windows NT with Service Pack 6a, IE 5.0, 200MHz Pentium, 96M RAM. Full details are at http://www.cisco.com/univercd/cc/td/doc/product/ismg/policy/ver22/install/overview.htm

What are the minimum/recommended agent OS and hardware requirements? Is a dedicated machine required/recommended? Will it work on Windows 2000?
The IDS sensor is packaged as a turnkey, “plug-and-play” security appliance.The complete hardware and software package is manufactured, tested, and supported by a single vendor.

What components are installed on a detector?
The Sensor comes with both the Operating System and IDS application pre-loaded and configured. There is no need for the user to be aware of the OS.

Which network types are supported
10/100 Ethernet

Any specific recommendations for monitoring Gigabit networks with your product?
For very high speed IDS Cisco recommends the ‘blade’ version of the product that works within the Catalyst 6500 Switch. Multiple ‘blades’ can be added to achieve Gigabit speeds

Which OS platforms are actively monitored?
NT, Novell, Solaris

Can sensors/detectors be deployed and configured initially from a central console?
No. During installation, the operator is required to enter six parameters on the appliance (e.g., IP address, mask, locator Ids, etc.).For security reasons, physical access to the appliance is required for initial configuration.

Once deployed and configured, can sensors/detectors be managed from a central console?
Yes. They can be remotely configured and updated from the Cisco Secure Policy Manager console (or other management options).

Authentication between console and engines – Is it available? What algorithm/key lengths?
This can be achieved via external encryption routers/firewalls. All the data is UDP port 45000. Optional IPSec encryption is supported.

Secure logon for policy management?
Yes

How are policies distributed to engines?
Policy is distributed to the Sensor via a control agent.From the central policy database, configurations for each managed Sensor is held and maintained.When the operator changes any parameter in the Sensor configuration, a new file is transfer to the Sensor.Standard policy templates can be concurrently applied to multiple Sensors in the policy domain.

How are policy changes handled? Will the central console detect which agents are using a changed policy and redeploy automatically, or does the administrator have to do this manually?
If a change is made to an active policy on a Sensor(s), the central policy server will reapply the updated policy after confirming the action with the operator.There is a one-to-one or one-to-many mapping of policies to Sensors so operator intervention is required

How many attack signatures?
The Cisco Secure IDS ships with over 300 generic group signatures each covering one or more specific signatures

Can the administrator define custom attack signatures?�
Administrators can add custom string match signatures on any port.

How are new attack signatures obtained and deployed?
The updated signatures are obtained via our website. You can subscribe and receive an email when a new signature update is posted.

Frequency of signature updates? Provide dates of all updates in the last year.
Approximately every 60 days. 2.2.1.2 on Dec/99; 2.2.1.3 on Mar/00; 2.2.1.4 on Apr/00; 2.2.1.5 (including IP fragmentation reassembly support and “anti-IDS” whisker support) on Aug/00. This release 2.5.0.102 on Oct/00

What infrastructure do you have behind the signature update process
We have a dedicated team of engineers working on all aspects of IDS, scanning and Security Posture Assessment.

Can one signature update file be downloaded to the local network and used to update all IDS engines from a central location, or is it necessary to initiate a live connection to the Internet download server for each engine?
Once the ‘Director’ management station has the new signature set it downloads it to all the ‘Sensors’

Can signature updates be scheduled and fully automated?�
It is important that the network operators know that a new signature set is deployed, updates are invoked manually from the central ‘Director’

What network protocols are analysed?�
The Cisco Secure Intrusion Detection System can monitor all of the major TCP/IP protocols, including IP, Internet Control Message Protocol (ICMP), TCP, and User Datagram Protocol (UDP).It can also statefully decode application-layer protocols such as FTP, Simple Mail Transfer Protocol (SMTP), HTTP, Domain Name System (DNS), remote procedure call (RPC), NetBIOS, NNTP and Telnet

What application-level protocols are analysed?�
n/a

Can the product perform protocol decodes?�
No

Can the product perform session recording on suspect sessions?�
Yes

Block/tear down session?�
Both TCP reset (sent to attacker and attacked host) and/or reconfiguration of an Access Control List on a router are optional and can be configured on a per signature basis.

Ability to monitor user-defined connections (i.e. report on an FTP connection to a specific server?)�
No, but you can look for a specific string (e.g. the banner) from an FTP server

Monitor changes in critical system files?
No

Monitor changes in user-defined files?
No

Monitor changes in Registry?
No

Monitor unauthorised access to files?
No

Monitor administrator activity (creation of new users, etc)?
Yes

Monitor excessive failed logins?
No

List any other resources/locations that are monitored.�
n/a

Track successful logins, monitoring subsequent file activity, etc?�
No

Detect network-level packet based attacks?�
Yes

Detect all types of port scans (full connect, SYN stealth, FIN stealth, UDP)?
Yes

Detect and report on nmap OS fingerprinting?�
Yes

Perform packet reassembly? Resistance to known IDS evasion techniques?
Yes

Reconfigure firewall? If so, which firewall(s) and how?
No, but in the current release ACLs can be added to Cisco IOS Firewall, just as they can to Cisco routers. In a future release ACLs can be added to the Cisco Secure PIX Firewall.

Option to record everything for “forensic” investigation? Where is this data stored? How is it secured from tampering?�
Optionally on both the hard drive in the ‘Sensor’ and in the ‘Director’, physical security is assumed

Reporting from engine to console - range of action/alert options (detail these)�
Alert and/or log and/or TCP reset and/or reconfigure router ACL

What provision is made for temporary communications interruption between detector and console? Where are alerts stored? Is the repository secure?
Data is stored on the hard drive on the ‘Sensor’

Can alerts be reported to the central console in real time without the use of third party software? How easy is it to filter and extract individual events?�
All events go to the screen in real-time. Filters can be applied on each signature and also be based on source IP address.

Does the software offer advice on preventative action to ensure the attack does not happen again?
There is a configurable on-line HTML database. Apart from full details about each signature there is a section which can be customised so that a user knows exactly what to do with any particular signature

Integration with other scanning/IDS products?�
Cisco has integrated host-based data using a third party management console.Integration of our scanning product is planne

Log file maintenance – automatic rotation, archiving, reporting from archived logs, etc.
Archival and purging can be scheduled via the browser.

Management reporting – range of reports/custom reports/how easy is it to filter and extract detail? Different reports for technicians and management/end users?
Reporting for the Cisco IDS is provided through third-party applications like netForensics and TeleMate.Net

Report management – can they be scheduled for automatic production? Can they be e-mailed to administrators or published straight to a Web site?�
See above

What are the limitations and restrictions on enterprise-wide alerting and reporting? Can reports consolidate output from every 1) server, 2) detect
See above

How is it licensed? How is the license enforced?�
There are no licensing restrictions on the ‘Sensor’. The ‘Director’ has no restrictions – except the Lite version which is restricted to managing three devices (‘Sensors’, Cisco IOS Firewall routers or Cisco Secure PIX Firewalls)

End user pricing information�
Sensor 4210 $8000

Sensor 4230 $19000

List price of CSPM lite (3 devices) $2000, [full CSPM $14995].

End user price of netForensics Workgroup software from $14,995 for 5 devices

Ongoing cost of maintenance/updates
Annual List Price of SMARTnet for 4210 from $1656. Annual List Price of CSPM Software Application Support $400, [full CSPM $3000]. Annual end user price of netForensics software subscription from $1,500.

Click here to return to the Cisco Secure IDS Review
Click here to return to the Cisco Secure IDS results
Click here to return to the IDS Index Section

Send mail to webmaster with questions or�
comments about this web site.

Copyright � 1991-2002 The NSS Group.
All rights reserved.