Betting Sites Not On Gamstop UK 2025
NSS Group logo

CyberSafe Centrax 2.4

Brief product description
Centrax is a comprehensive hybrid intrusion detection system offering host and network-based intrusion detection and response for enterprise networks. Centrax gives you the power to monitor hundreds of Microsoft Windows 2000, Microsoft Windows NT, Sun SparcStation Solaris, IBM AIX, and Hewlett-Packard HP-UX targets in your network for security assessment, misuse detection, and response.�

Architecture � Host/network/network node-based and a brief description of the architectural elements (management/reporting servers, etc)
The Centrax product is comprised of a Command Console and one or more Target Agents. A Target Agent may be either a host-based Agent, which resides on each workstation or server you want to monitor, a network Agent, which sits anywhere on a network segment you want to monitor, or a network node agent which watches network packets destined to or from a mission critical host.

At what layer of the protocol stack is the product working
Centrax works at the application layer for Host Based agents and at the network layer for Network Based and Network Node agent

Documentation � �Getting Started�? Admin/Reference Guide? On-line or hard copy? Supplemental information available on-line?
The Centrax Users Guide, available on-line, is a comprehensive guide to the product which includes topics covering the areas mentioned above.�

What are the minimum/recommended console OS and hardware requirements? Is a dedicated machine required/recommended? Will it work on Windows 2000?
Software
Microsoft Windows NT Server or Workstation Version 4.0, Service Pack 6A or later; or Windows 2000�
Microsoft Data Access Components (MDAC) version 2.5 (Windows NT only, provided during Centrax installation process if not already installed)
Hardware
550 MHz Pentium processor computer�
800 x 600 (minimum) VGA display�
256 MB�
256 MB virtual memory�
20 MB available disk space plus additional space for collecting and storing alerts in the log database�
CD-ROM drive�
Optional: SCSI hard disk (to provide faster disk access)�
We recommend that you install Centrax command console on a standalone Windows NT/2000 server, not on a Primary Domain Controller (PDC) or Backup Domain Controller (BDC). For larger enterprise deployments, the Centrax console benefits from additional processing and memory power.�

What are the minimum/recommended agent OS and hardware requirements? Is a dedicated machine required/recommended? Will it work on Windows 2000?
OS requirements for Windows 2000 and Windows NT agents
Microsoft Windows NT Workstation or Server Version 4.0 Service Pack 3 or later; or Windows 2000�
Windows Packet Filter required for NID and NNID agents (included on the installation CD)�
We recommend a dedicated machine be used for Network ID although this is not required for Network Node ID
Hardware requirements for Windows 2000 or NT agents
200 MHz Pentium processor computer (minimum)�
800 x 600 (minimum) VGA display (required when installing the target service)�
64 MB RAM�
128 MB virtual memory�
32 MB available disk space (maximum Event Log size)�
CD-ROM drive (if the Target Service is to be installed via diskette)�
3�" disk drive (if the Target Service is to be installed via diskette
For desktop computers, PCI Ethernet or PCI Fast Ethernet card (NID and NNID)
For laptop computers, CardBus (32-bit) PCMCIA network interface card (NID and NNID)
OS requirements for Solaris agents
Solaris 2.51, 2.6, 7.0, or 8.0 with all current patches applied�
Hardware requirements for Solaris agents
Sun Microsystems SparcStation�
Display and memory suitable to run Solaris�
3 MB available disk space�
/var/audit set for 500 MB (estimated requirement based on collecting audit data four times per day)�
OS requirements for AIX agents
AIX 4.2.1 or 4.3.2 with all current patches applied�
Hardware requirements for AIX targets
IBM RS/6000, or equivalent�
Display and memory suitable to run AIX�
3 MB available disk space�
/var/audit set for 500 MB (estimated requirement based on collecting audit data four times per day)�
OS requirements for HP-UX targets
HP-UX 10.20 or 11.0 with all current patches applied�
Hardware requirements for HP-UX targets
Hewlett-Packard HP9000 workstation, or equivalent�
Display and memory suitable to run HP-UX�
3 MB available disk space�
/var/audit set for 500 MB (estimated requirement based on collecting audit data four times per day)�
Tripwire Requirements

What components are installed on a detector
Services running on the command console (Windows2000 or Windows NT):
Detection Service
Scheduler Service
Target Service
Real-time Service (optional)
Network or Network Node Service(optional)
The Network and Network Node Services also require the Windows Packet Filter protocol be installed as a prerequisite which is included on the product CD.
Services running on the agents (Windows 2000 or Windows NT):
Target Service
Real-time Service (optional)
Network or Network Node Service (optional, requires WPF protocol as above)
Daemons running on the agents (Sun Solaris, AIX, HP):
Target daemon
Real-time daemon (optional)

Which network types are supported
Centrax network based IDS agents support 10/100 Ethernet, network node agents support > 100 MB/s Ethernet networks

Any specific recommendations for monitoring Gigabit networks with your product?�
We recommend installing network node agents for networks > 100 MB/s

Which OS platforms are actively monitored?
Windows 2000, Windows NT, AIX, Sun Solaris and HP/UX.

Can sensors/detectors be deployed and configured initially from a central console?
Target installation images are built at the console for all agents.

Windows 2000 and Windows NT agents are usually deployed by connecting to a network share at the console and running the setup program.For Unix agents, the installation directory needs to be copied to the host where the setup program is then executed.Agents can also be deployed using SMS in Microsoft networks.

Once deployed and configured, can sensors/detectors be managed from a central console?
Yes.��

Authentication between console and engines � Is it available? What algorithm/key lengths?
All transmissions of audit policies, collection policies, and counter-measure responses between the Management Console and Target Agents are encrypted.The authentication mechanism between the console and the agents occurs through a shared key authentication encrypted with triple-DES at 128 bits by default, though the quality of protection may be specified for lesser encryption algorithms.��

Secure logon for policy management?
This capability is provided by a separate CyberSafe Secure Single Sign-on solution called ActiveTRUST.��

How are policies distributed to engines?
Policies are distributed either by selecting one or more agents at the command console GUI and right clicking on the apply policy button, or in a �hands-free� automated fashion using the in-built scheduler for audit policy deployment.

How are policy changes handled? Will the central console detect which agents are using a changed policy and redeploy automatically, or does the administrator have to do this manually?
All target machines affected by the change are detected automatically by the central command console where the option to deploy the new policy is given on a per agent basis or for all affected agents.

How many attack signatures?
Centrax comes with a library of over 770 host-based signatures for Windows NT/2000, Solaris, AIX, and HP-UX, and over 116 network-based signatures for TCP/IP networks.� Each of these signatures is highly customisable based on files, users, and individual computers to create a virtual library of infinite size.

Can the administrator define custom attack signatures?
Centrax provides the capability to define and customize detectable patterns of misuse for detection.In addition, CyberSafe is always willing to design those attack signatures to the specifications of a customer for their use.

How are new attack signatures obtained and deployed?
Centrax Network Signature Update is available for updating network attack signatures from the CyberSafe web site.

Frequency of signature updates? Provide dates of all updates in the last year.
(Not supplied)

What infrastructure do you have behind the signature update process
Centrax signatures are developed by CyberSafe�s Security Research Group (SRG).��

Can one signature update file be downloaded to the local network and used to update all IDS engines from a central location, or is it necessary to initiate a live connection to the Internet download server for each engine?
Centrax Network Signature Updates can be downloaded to the local network once and deployed using the Centrax policy management capabilities.

Can signature updates be scheduled and fully automated?
This is in the Product Roadmap for future release.

What network protocols are analysed?
The TCP/IP protocol is analysed by Centrax.

What application-level protocols are analysed?
Centrax monitors application services such as HTTP, Telnet, FTP, SMTP, POP3, IMAP, Rlogin, Shell, Portmapper, NIS, PCNFS, AdminD, Selection Service, Statd, YPUpdateD, Rwho, Talkd, TFTP, Finger, DNS and dfstab files on Solaris.

Can the product perform protocol decodes?
Centrax is currently incapable of performing this function.

Can the product perform session recording on suspect sessions?�
No.

Block/tear down session?�
Yes.��

Ability to monitor user-defined connections (i.e. report on an FTP connection to a specific server?)
Yes.��

Monitor changes in critical system files?
Yes.�

Monitor changes in user-defined files?
Yes.�

Monitor changes in Registry?
Yes.�

Monitor unauthorised access to files?
Yes.

Monitor administrator activity (creation of new users, etc)?
Yes.

Monitor excessive failed logins?
Yes.��

List any other resources/locations that are monitored.
Centrax strictly monitors operating systems audit logs with respect to host based intrusion detection.In addition, TCP/IP traffic is monitored as a means of performing network based intrusion detection.

Track successful logins, monitoring subsequent file activity, etc?
Yes.Centrax hosts can monitor the authentication activities of all users.All user logon and logoff activity on a Centrax host can be recorded on a per user basis.�

Detect network-level packet based attacks?
Yes.��

Detect all types of port scans (full connect, SYN stealth, FIN stealth, UDP)?
Yes.��

Detect and report on nmap OS fingerprinting?
Yes.��

Perform packet reassembly? Resistance to known IDS evasion techniques?
This is part of the product roadmap for release in 2001.

Reconfigure firewall? If so, which firewall(s) and how?
Through the use of the custom response mechanism in Centrax, firewalls can be configured using user-defined scripts which invoke responses particular to the predetermined scenario.

Option to record everything for �forensic� investigation? Where is this data stored? How is it secured from tampering?
Yes.Centrax stores the information locally on the target until it is transmitted to the Command Console.As previously mentioned, this transmission is secure.While the information is stored on the targets, it is secured by NT�s inherent functionality as the event logs cannot be modified.Additionally, on UNIX machines the logs are all C2 logs, so they too cannot be subverted.Additionally, Centrax monitors all of its agents to alert if they are being compromised or if the audit data is under attack.

Reporting from engine to console - range of action/alert options (detail these)
When an activity signature is detected, notifications can be triggered automatically.��

Alerts - MAPI/SMTP mail, Pager (via TAPI), SNMP

Responses � logoff user, disable user account, shutdown machine, terminate connection, initiate Tripwire scan, custom responses

What provision is made for temporary communications interruption between detector and console? Where are alerts stored? Is the repository secure?
Communication loss between detector and console is highlighted at the console. In the event of a communications interruption, alerts are queued at the detector until communications are re-established.It is also possible to establish a fail-over console should a primary console fail.

Can alerts be reported to the central console in real time without the use of third party software? How easy is it to filter and extract individual events?
Centrax offers both batch and real-time alerting as part of the core components.

The alert filter built in to the product can be used to easily extract and filter alerts by agent/detector, user, priority, time period and by number of alerts�

Does the software offer advice on preventative action to ensure the attack does not happen again?
Yes, each alert displayed at the console offers advice and actions for preventative measures Centrax provides a natural language description and suggested corrective actions for each security configuration element and signature that it detects.�

Integration with other scanning/IDS products?
Yes � Tripwire 2.2.1.��

Log file maintenance � automatic rotation, archiving, reporting from archived logs, etc.
Centrax�s Audit Policy Management provides the ability to define, deploy, and maintain global enterprise-wide heterogeneous security through the use of native operating system auditing.The management of audit policies, which includes the definition, deployment, and subsequent maintenance of these policies, is governed from a central location, the Centrax Command Console. All audit logs are collected and deposited to a central point. Housekeeping utilities for automatic rotation and archiving of raw audit trails are also provided on the product CD.Centrax also provides database utilities for database archival, compaction and archive reporting tools.

Management reporting � range of reports/custom reports/how easy is it to filter and extract detail? Different reports for technicians and management/end users?
Centrax 2.4 includes an extensive reporting capability that allows the user to perform forensic analysis of evidentiary audit trails.Centrax software contains a built-in report generator for accessing intrusion detection data and generating customized reports.These reports can be automatically edited through the use of our report generator.�

Report management � can they be scheduled for automatic production? Can they be e-mailed to administrators or published straight to a Web site?
Reporting can be fully automated using the Centrax scheduler.Reports can be published straight to a Web site, sent to a printer/file or formatted into many different formats including MS Word, Excel, CSV amongst many others.

What are the limitations and restrictions on enterprise-wide alerting and reporting? Can reports consolidate output from every 1) server, 2) detector
The reporting mechanism consolidates information from every server and detector, regardless of operating system and configuration.��

Define custom reports?
Centrax publishes the database schema so that users can build their own custom reports and queries.Using the GUI at the console , users can build their own customised reports by user(s), host(s), activity(s) and event(s)which can then be saved as templates for either manual use or in an automated fashion using the in-built scheduler.

How is it licensed? How is the license enforced?
Centrax is licensed at the console only.It is based on both time and the number of agents with which it communicates.Time is only enforced during demo periods.It is not necessary to reinstall any license keys on distributed target agents.

End user pricing information
Centrax 2.4 Command Console 1 License���� �2,500.00
Centrax 2.4 Command Console 2-4 License
���� �1,495.00
Centrax 2.4 Command Console 5+ License
���� �995.00
Centrax 2.4 Server Target 1-25
���� �800.00
Centrax 2.4 Server Target 26-50
���� �750.00
Centrax 2.4 Server Target 51-100
������� �700.00
Centrax 2.4 Server Target 101-250
������� �650.00
Centrax 2.4 Server Target 251-500
������� �600.00
Centrax 2.4 Server Target 501-1000
���� �550.00
Centrax 2.4 Server Target 1000+
������� �500.00
Centrax Network Target
����
Centrax 2.4 Class B Network License���� �7,500.00
Centrax 2.4 Class C Network License
���� �2,500.00

Ongoing cost of maintenance/updates
Maintenance is 20% / year and includes phone support and updates.

Click here to return to the CyberSafe Centrax Review
Click here to return to the CyberSafe Centrax results
Click here to return to the IDS Index Section

Send mail to webmaster with questions or�
comments about this web site.

Copyright � 1991-2002 The NSS Group.
All rights reserved.