Betting Sites Not On Gamstop UK 2025
NSS Group logo

NFR NID-200 V1.1

Brief product description
The NFR Network Intrusion Detection-200 (NID-200) system is a flexible, easy-to-use tool for intrusion detection, network management, and network monitoring.Information associated with activity that may be suspicious or malicious in nature is recorded and alerts raised as necessary.�

NFR NID-200 gathers information about some of the most common network traffic and watches for intrusions and attacks.

Architecture
The NFR NID-200 system including the following components:��

NID Sensor analyses the network for attacks.� This is delivered as a complete appliance with hardware, software and operating system included.

NFR Administration Interface (AI) is a Windows-based administration facility for configuring and managing NID Sensors and provides easy-to-use querying and reporting tools.� A UNIX command line interface is also available.

NFR Central Management Server (CMS) is used in large, distributed environments and allows an administrator to manage multiple, remote NID Sensors from a single location.

At what layer of the protocol stack is the product working?
Layers 2 (data link); 3 (network); 4 (transport); and 7 (application).

Documentation
Getting Started, User's Guide and N-Code programming Manual.

On-line; hard copy by request�

What are the minimum/recommended console OS and hardware requirements? Is a dedicated machine required/recommended?�
OS requirements are as follows:�

NFR NID-200 Sensor includes an embedded operating system.

NFR. Central Management Server (CMS) requires Solaris 2.6 or 7 (recommended); Linux Red Hat 6.0 or later is also supported.

The NFR Administration Interface requires one of the following operating systems:

Windows 95 (Release 2 or later)
Windows 98
Windows 2000
Windows NT Server 4.0
Windows NT Workstation 4.0

Hardware requirements are as follows:

NFR NID-200 Sensor:
NFR NID-200 Sensor is delivered as an appliance.
A keyboard and VGA monitor are required for installation, but can be removed during regular operation of the NFR NID-200 Sensor.
NFR Central Management Server (CMS):
Sparc Processor
128 MB RAM�
20 MB Disk Space for NFR Software
One network card
Sufficient Disk Space for data storage. The amount of disk space needed on the CMS depends on:

What components are installed on a detector
The NID-200 is a custom appliance. It cannot be deployed as an additional daemon or service running on a general-purpose operating system installation.

Which network types are supported
10/100 Ethernet

Any specific recommendations for monitoring Gigabit networks with your product?
Gigabit networks can be monitored by NFR NID-200, using third-party load balancing products.

Which OS platforms are actively monitored?
N/A

Can sensors/detectors be deployed and configured initially from a central console?
No - but a configuration floppy can be used during initial installation.

Once deployed and configured, can sensors/detectors be managed from a central console?
Yes

Authentication between console and engines - Is it available? What algorithm/key lengths?
Based on password and symmetric 56-bit DES key

Secure logon for policy management?
Yes

How are policies distributed to engines?
Configuration policies can be distributed via the NFR Central Management Server or directly, using the NFR Administration Interface.

How are policy changes handled? Will the central console detect which agents are using a changed policy and redeploy automatically, or does the administrator have to do this manually?
Manually

How many attack signatures?
Over a thousand attack signatures are included.We use a variety of standard signature techniques, such as string matching and lookup tables, for many of our signatures.� NID-200 also performs Stateful Protocol Analysis, allowing several traditional attack signatures to be replaced with a single anomaly check.� Stateful protocol analysis allows users to detect known and unknown attacks.

Can the administrator define custom attack signatures?
Yes, there are multiple ways for custom attack signatures to be defined.Many existing packages allow users to add strings or values to variables in order to create additional signatures.Complete custom attack signatures of nearly any type can be created using N-Code.

How are new attack signatures obtained and deployed?�
Updates to existing signature sets or new signature packages are announced through NFR mailing lists to customers.The new signatures are made available for download via the NFR Package Updater feature on the AI via a secure connection to NFR's Package Server.

Frequency of signature updates? Provide dates of all updates in the last year.
The standard signature sets are updated as needed to reflect changes in the protocols that they monitor, new vulnerabilities and exploits, and advances in intrusion detection signature techniques.When a new, high-risk vulnerability is discovered, the NFR Rapid Response Team may release a special signature specifically for that vulnerability.Such signatures are often released within hours of the public notice of the vulnerability's existence.

What infrastructure do you have behind the signature update process
The NFR Rapid Response Team (RRT) is a dedicated team of security professionals who are experts in intrusion signature development New signatures are made available immediately and are deployed to customers via a secure connection to NFR's Package Server.��

Can one signature update file be downloaded to the local network and used to update all IDS engines from a central location, or is it necessary to initiate a live connection to the Internet download server for each engine?
New signatures are retrieved from the NFR Package Server and downloaded to the NFR Central Management Server (CMS).Once updated signature packages are available on the CMS, they can be distributed to all NID Sensors.

associated with that CMS.� Also, those signatures can be distributed to each NID individually from the NFR AI.

Can signature updates be scheduled and fully automated?
The NFR AI can be programmed to look for new packages at the NFR Package Server on a periodic (daily, weekly or monthly) basis. The new signature packages can then be downloaded to the NFR CMS and programmed for automatic distribution to the NID Sensors.�

What network protocols are analysed?
IP and three IP protocols (TCP, UDP and ICMP) are analysed, as well as ARP.However, it's possible to analyse other IP protocols by using N-Code to parse packet payloads

What application-level protocols are analysed?
Currently, application-level protocols that are analysed in our signature sets include DNS, finger, FTP, HTTP, IMAP, IRC, NFS, POP2, POP3, SMTP, SNMP, and telnet.We are continually adding the analysis of more application-level protocols to our product.

Can the product perform protocol decodes?
Yes, our product performs full protocol decodes of certain network and application-level protocols, such as DNS, FTP, HTTP and SMTP.

Can the product perform session recording on suspect sessions?
Yes.

Block/tear down session?
Yes - TCP� reset.

Ability to monitor user-defined connections (i.e. report on an FTP connection to a specific server?)
A standard Network Policy Monitoring package is included with NFR-NID that allows an operator to configure a user-defined network security rule set including specifically allowed and specifically denied network activity and connections.

In addition, many packages also provide a user-configurable variable that lists IP addresses of hosts that are subject to a higher degree of activity logging.��

Monitor changes in critical system files?
N/A - not in this product (network-based)

Monitor changes in user-defined files?
N/A - not in this product (network-based)

Monitor changes in Registry?
N/A - not in this product (network-based)

Monitor unauthorised access to files?
N/A - not in this product (network-based)

Monitor administrator activity (creation of new users, etc)?
N/A - not in this product

Monitor excessive failed logins?
Yes, for many application-level protocols such as POP3, FTP, IMAP and Telnet, we generate an alert if too many failed logins occur.This threshold value is user-configurable so that it can be tailored for each environment and application.

List any other resources/locations that are monitored.
N/A

Track successful logins, monitoring subsequent file activity, etc?
Yes - network-based logins

Detect network-level packet based attacks?
Yes

Detect all types of port scans (full connect, SYN stealth, FIN stealth, UDP)?
Yes

Detect and report on nmap OS fingerprinting?
Yes

Perform packet reassembly? Resistance to known IDS evasion techniques?
Yes. The NFR NID correctly re-assembles fragmented packets; it examines all individual fragments as well as the re-assembled packet. This enables attacks hidden across separated fragments to be detected in the re-assembled packet. NFR NID can also keep track of TCP stream re-assembly.

Reconfigure firewall? If so, which firewall(s) and how?
No

Option to record everything for "forensic" investigation? Where is this data stored? How is it secured from tampering?
Certain packages have the ability to record extensive amounts of data regarding a particular protocol.This information is stored in binary format time-stamped files on a highly secured NFR NID or CMS.It is nearly impossible for someone to tamper with this data.

Reporting from engine to console - range of action/alert options
NID-200 generates alerts at four possible severity levels: Informational, Warning, Error and Attack. Alerts are displayed by default in the NFR Administration Interface (AI). With minimal additional configuration, alerts can also be delivered via e-mail and SNMP traps or to IBM Tivoli SecureWay Risk Manage and HOP OpenView Operation consoles.

What provision is made for temporary communications interruption between detector and console? Where are alerts stored? Is the repository secure?
The internal disk of the NFR NID-200 is used to spool or buffer information in the event of a temporary communication interruption with the NFR Administration Interface (NFR AI) or Central Management Server (CMS). Both alerts and recorded data are stored on the internal disk. NFR Security offers the most secure IDS on the market today; there is no shell access and the operating system is embedded on a CD-ROM.

Can alerts be reported to the central console in real time without the use of third party software? How easy is it to filter and extract individual events?
Yes. The NFR AI provides inherent querying and filtering capabilities that facilitate the filtering and extraction of individual events.

Does the software offer advice on preventative action to ensure the attack does not happen again?
Yes, NFR offers extensive help and description files associated with backends, packages and alerts that give background on the attack and preventive measures. Many attack alert help files contain information about the nature of the exploit attempt and the underlying vulnerability, so that users know what is the likely cause of the alert.The help files also contain references to the CVE entry for the vulnerability.�

Integration with other scanning/IDS products?
NFR Secure Log Repository (SLR)

Log file maintenance - automatic rotation, archiving, reporting from archived logs, etc.
Yes

Management reporting - range of reports/custom reports/how easy is it to filter and extract detail? Different reports for technicians and management/end users?
Querying and filtering functions allow for simple graphs and detailed tables, with one-click inclusion of additional information, as required by users. Technicians can get precise data and management information; end-users can get a quick overview of the situation.

Report management - can they be scheduled for automatic production? Can they be e-mailed to administrators or published straight to a Web site?
Administrators can place reports directly into an e-mail attachment.

What are the limitations and restrictions on enterprise-wide alerting and reporting? Can reports consolidate output from every 1) server, 2) detector
Reports can be generated at the NFR CMS, from as many NIDs as are configured, to get a complete picture of alert activity across the enterprise.

Define custom reports?
Reporting is flexible, across an y fields recorded by the backends.

How is it licensed? How is the license enforced?
A unique license key is generated for each NFR product purchased. The key is required for installation.

Any other unique selling points?

Full end user pricing information in USD and GBP

NFR NID-200:$ 12,500 list (includes hardware)

NFR NID-100:$�� 4,500 list

NFR CMS:������ $�� 5,000 list

Ongoing cost of maintenance/updates

Annual maintenance is 20% of current initial license fee

Click here to return to the NFR NID-200 V1.1 Review
Click here to return to NFR NID-200 V1.1 Results
Click here to return to the IDS Index Section

Send mail to webmaster with questions or�
comments about this web site.

Copyright � 1991-2002 The NSS Group.
All rights reserved.