Betting Sites Not On Gamstop UK 2025
NSS Group logo

Intrusion Inc SecureNet Pro 4.0

Brief product description
Intrusion SecureNet Pro is a network intrusion detection system.

Architecture
Host/network/network node-based and a brief description of the architectural elements (management/reporting servers, etc): Network intrusion detection system starting with a sensor, which is usually sold as a bundled appliance on Intrusion Inc. security appliances. The user may use the SecureNet Pro Linux console which is included in the price of the sensor. For larger deployments, Intrusion SecureNet Provider is a true three-tier, industry leading NIDS data mining, monitoring, and reporting interface. The SecureNet Provider middle tier manager runs on Windows 2000 server and uses Microsoft SQL2000 as the database. The SecureNet Provider client runs on Windows 2000 professional.

At what layer of the protocol stack is the product working?
The product implements a end-node-centric protocol stack from Layer 2 - Layer 7. The protocol stack can be configured to emulate the behaviour of any given host on the network. In addition, the protocol stack also allows for different types of hosts to be emulated simultaneously.

Documentation
Documentation includes a printed getting started guide with the CDs. Additionally, there is a robust, indexed users guide included with the software. The Intrusion Inc. web site also offers tech notes and white papers to support the deployment and decision-making regarding the NIDS.

What are the minimum/recommended console OS and hardware requirements?�
The software for Intrusion SecureNet Pro sensor and console has the following system requirements.
Minimum 566 Celeron II
128MB RAM
10GB hard drive
Red Hat Linux 6.2
CD-ROM, keyboard, video and mouse for local management

Is a dedicated machine required/recommended?�
Sensor and console may be placed on the same PC. For maximum performance, sensor and console should be placed on separate PCs.

Will it work on Windows 2000?�
Monitoring and reporting from Windows 2000 is a feature of the Intrusion SecureNet Provider add-on to SecureNet Pro.

What are the minimum/recommended agent OS and hardware requirements?�
The agent in this case in the network sensor for Intrusion SecureNet Pro. The software for Intrusion SecureNet Pro sensor and console has the following system requirements.
Minimum 566 Celeron II
128MB RAM
10GB hard drive
Red Hat Linux 6.2
CD-ROM, keyboard, video and mouse for local management

Is a dedicated machine required/recommended?�
Sensor and console may be placed on the same PC. For maximum performance, sensor and console should be placed on separate PCs.

Will it work on Windows 2000?�
Monitoring and reporting from Windows 2000 is a feature of the Intrusion SecureNet Provider add-on to SecureNet Pro.

What components are installed on a detector�
The Intrusion SecureNet Pro sensor is a Linux daemon installed on the Red Hat Linux 6.2 PC with the Turbo Packet kernel modification compiled into the kernel proper.

Which network types are supported
Intrusion SecureNet Pro is available as software for 10/100Mb/s Ethernet. Intrusion SecureNet Pro is also available on a range of 100Mb/s bundled appliances from Intrusion Inc. Intrusion Inc. also sells a Gigabit network intrusion detection bundled solution, Intrusion SecureNet Gig.

Any specific recommendations for monitoring Gigabit networks with your product?�
Intrusion SecureNet Gig is a single, 1U high, dual processor appliance capable of monitoring Gigabit networks with all signatures enabled and no global filtering required. For certain types of networks, tuning is required to maintain optimal performance.�

Which OS platforms are actively monitored?�
Both Windows and UNIX platforms are monitored simultaneously.

Can sensors/detectors be deployed and configured initially from a central console?�
No

Once deployed and configured, can sensors/detectors be managed from a central console?�
Yes, Intrusion SecureNet Pro sensors may be centrally managed on a many-to-many basis from the SecureNet Pro Linux console.

Authentication between console and engines? What algorithm/key lengths?�
Authentication between console and sensor uses shared secret user authentication and allows DES, 3DES and Blowfish encryption with MD5 message authentication. SecureNet Provider uses x.509 certificate based authentication and Blowfish encryption.

Secure logon for policy management?�
Yes, via SSH.

How are policies distributed to engines?�
When software is used, policy updates are manually FTP'd to the PC and installed using Linux standard RPMs or manually installed. Intrusion SecureNet bundled appliances have a live update feature via APT-RPM architecture which allows security professionals to set a cron-job to automatically check, compare, install and reboot if necessary when new policy RPM files are available.

How are policy changes handled?�
With version 4.0 of SecureNet Pro, the signature pack version is available in the Provider client to flag the security professional of mismatches.�

How many attack signatures?�
Intrusion SecureNet Pro currently includes 469 context analysis signatures. An additional 900+ string matching signatures are available at the Intrusion Inc. SecureNet OpenSource Signature Centre on the Intrusion Inc. web site.

Can the administrator define custom attack signatures?�
Yes, Intrusion SecureNet Pro allows the security professional to create both string matching (network grep) as well as more accurate context analysis, scripted signatures.

How are new attack signatures obtained and deployed?�
Using Intrusion SecureNet Pro software, attack signatures are downloaded from Intrusion Inc. as Linux RPM files. When Intrusion SecureNet bundles appliances are used, the Intrusion Pilot management software provides live update functions to automatically compare installed RPM files with those in an enterprise local or the Intrusion Inc. APT directory, and if a newer RPM is found it will automatically be installed.

Frequency of signature updates?�
Intrusion Inc. provides context analysis signature RPM files on a monthly basis,�

Provide dates of all updates in the last year.�
A signature pack has been released on the last Friday of the month for the last five-months. Signatures for emergent needs are posted to the Intrusion Inc. signature centre at www.intrusion.com. Additionally, the OpenSource signature centre accepts postings from the Intrusion Inc. development, product management and security engineering teams, partners, customers and enthusiasts.�

What infrastructure do you have behind the signature update process
Intrusion Inc. has a dedicated signature team which is currently ten people. The team does not have a unique brand.

Can one signature update file be downloaded to the local network and used to update all IDS engines from a central location, or is it necessary to initiate a live connection to the Internet download server for each engine?�
Using the software version of Intrusion SecureNet Pro, signatures may be downloaded individually to the sensors on a manual, one-to-one basis. Intrusion SecureNet bundled solutions make it possible to create an internal, central APT-RPM HTTP or FTP site which sensors may be set to check via a cron-job. When new packages are added to the APT-RPM directory the sensors will automatically install it if the package is newer than what is installed on the appliance.

Can signature updates be scheduled and fully automated?
Only on appliances (not SecureNet Pro 4.0 software-only)

What network protocols are analysed?�
Ethernet, IP, TCP, UDP, ICMP.

What application-level protocols are analysed?
HTTP 0.9/1.0/1.1, DNS TCP/UDP, Finger, FTP, IDENT, IRC, MSTREAM, NetBIOS, NNTP, POP3, Portmapper TCP & UDP Client & Server, Rlogin, SMTP, SSH 1 & 2, Telnet, BackOrifice, TFTP.

Can the product perform protocol decodes?
Yes, Intrusion SecureNet Pro has extensive decodes for 26 modules which include user-mode protocols, categorical protocols and attack types.

Can the product perform session recording on suspect sessions?
Yes, Intrusion SecureNet Pro can automatically binary-record sessions, providing VCR-playback including the element of time.

Block/tear down session?�
Yes, Intrusion SecureNet Pro allows TCP-resets as an action for signatures - sending resets to both attacker and victim, spoofing the other so that SecureNet Pro stays invisible to the network.

Ability to monitor user-defined connections (i.e. report on an FTP connection to a specific server?)
Yes, Intrusion SecureNet Pro's extensive use of protocol decodes makes it an especially powerful tool for monitoring network events and can track connections under any protocol with a decode.

Monitor changes in critical system files?
NA

Monitor changes in user-defined files?�
NA

Monitor changes in Registry?�
NA

Monitor unauthorised access to files?�
NA

Monitor administrator activity (creation of new users, etc)?�
Though this is typically a function on HIDS, Intrusion SecureNet Pro allows the creation of signatures that could monitor the network traffic that would indicate administrator activity that is suspicious.

Monitor excessive failed logins?�
Yes, Intrusion SecureNet Pro has signatures which will flag excessive failed logins as suspicious activity.

List any other resources/locations that are monitored.
NA

Track successful logins, monitoring subsequent file activity, etc?�
Though not recommended as an automated process, Intrusion SecureNet Pro is capable of being configured to track all network traffic from a specific IP pair after a network event, like a successful logins, triggers the action.

Detect network-level packet based attacks?�
Yes. Since these types of signatures must inspect every packet, system performance degrades when using these types of signatures.

Detect all types of port scans (full connect, SYN stealth, FIN stealth, UDP)?�
Yes, Intrusion SecureNet Pro includes signatures for all of these port scans and many more.

Detect and report on nmap OS fingerprinting?�
Not currently supported.

Perform packet reassembly? Resistance to known IDS evasion techniques?�
Yes, Intrusion SecureNet Pro does IP packet reassembly as well as TCP session reconstruction. In addition, Intrusion SecureNet Pro goes further to do multi-path reassembly: handling both Windows and UNIX simultaneously.�

Reconfigure firewall? If so, which firewall(s) and how?�
No, Intrusion SecureNet Pro is currently being evaluated under the Check Point OPSEC program for log-file compatibility.

Option to record everything for "forensic" investigation? Where is this data stored? How is it secured from tampering?�
Yes. Individual signatures can be configured to log entire packets after the signature has been triggered. In addition, a generic "TCP Session" signature can be used to record all sessions or sessions between particular hosts.

Reporting from engine to console - range of action/alert options
Intrusion SecureNet Pro allows alerts to be sent as customisable SMTP, or SNMP. SMTP alerts use a template that can send any user defined or event information to any email address for pager, telephone or email alert. SNMP v1 alerts are sent to any SNMP management system. Actions include logging, recording or TCP reset when the event is triggered.

What provision is made for temporary communications interruption between detector and console?�
Where are alerts stored?
Is the repository secure?�
When connectivity between the sensor and console is lost, the sensor stores the data locally until the connection is re-established At which time the data is then resynchronised.

Can alerts be reported to the central console in real time without the use of third party software?�
How easy is it to filter and extract individual events?�
Yes, Intrusion SecureNet Pro allows the real-time reporting of events using the native console application. Filtering can store data in the database but not display it in the console, and the console allows additional filtering to show data by severity, or by sensor. Additional capabilities are available in the Intrusion SecureNet Provider client that allows viewing of data via configurable tree view - allowing the almost instantaneous drill down on individual events from any event parameters. SecureNet Provider also allows data to be sorted with the event view, with Microsoft Outlook like tools for data presentation and ascending or descending sorting with just a click.

Does the software offer advice on preventative action to ensure the attack does not happen again?�
Yes, Intrusion SecureNet Pro signatures provide editable resolution information along with bugtraq and CVE numbers, an event description, specific trigger information, and potential causes for false positives.

Integration with other scanning/IDS products?�
No

Log file maintenance - automatic rotation, archiving, reporting from archived logs, etc.�
Yes. Local archiving on the sensor is aged out as new events are found.

Management reporting - range of reports/custom reports/how easy is it to filter and extract detail?�
Different reports for technicians and management/end users?�
Yes, Intrusion SecureNet Pro provides a range of reports for different levels of detail. Additional reporting capabilities are available with Intrusion SecureNet Provider which uses Microsoft Access as the completely extensible reporting engine, where there are templates for executive reports, IT reports and security reports.

Report management - can they be scheduled for automatic production? Can they be e-mailed to administrators or published straight to a Web site?�
Yes, Intrusion SecureNet Pro can publish directly to RTF and HTML format for scheduled emailing or web publishing.

What are the limitations and restrictions on enterprise-wide alerting and reporting? Can reports consolidate output from every 1) server, 2) detector�
Reports are filterable by sensor.

Define custom reports?�
Yes. Custom reports written in MS Access integrate directly into the Console.

How is it licensed? How is the license enforced?�
License enforcement is by sensor. A License key file is obtained from Intrusion Inc. and is placed on the sensor. The Linux Console and the Windows based Provider Manager enforce sensor licensing.

End user pricing information�
Intrusion SecureNet Pro software $6,995USD
Intrusion SecureNet 2345 $8,495USD
Intrusion SecureNet 5145 $8,495USD
Intrusion SecureNet 5345 $9,995USD
Intrusion SecureNet 5545 $11,995USD
Intrusion SecureNet Gig $39,995USD
Intrusion SecureNet Provider starting at $9,995USD

Ongoing cost of maintenance/updates
Bronze maintenance 20% SRP
Silver maintenance 25% SRP
Gold maintenance 39% SRP

Click here to return to the Intrusion Inc Review
Click here to return to the Intrusion Inc Results
Click here to return to the IDS Index Section

Send mail to webmaster with questions or�
comments about this web site.

Copyright � 1991-2002 The NSS Group.
All rights reserved.