Sign In
Upload
Manuals
Brands
Cisco Manuals
Controller
MARS 100
Cisco MARS 100 Manuals
Manuals and User Guides for Cisco MARS 100. We have
1
Cisco MARS 100 manual available for free PDF download: User Manual
Cisco MARS 100 User Manual (588 pages)
Security MARS Local Controller
Brand:
Cisco
| Category:
Controller
| Size: 7.27 MB
Table of Contents
Table of Contents
4
About this Manual
22
Documentation Feedback
24
Reporting IP
59
Interface Settings
60
Selecting the Access Type
60
Configure SNMP Access for Devices in MARS
61
Configure Telnet Access for Devices in MARS
61
Configure SSH Access for Devices in MARS
62
Configure FTP Access for Devices in MARS
62
Bootstrap Summary Table
62
Adding Reporting and Mitigation Devices
66
Add Reporting and Mitigation Devices Individually
67
Edit a Device
68
Upgrade the Device Type to a Newer Version
68
Delete a Device
69
Delete All Displayed Reporting Devices
70
Add Multiple Reporting and Mitigation Devices Using a Seed File
70
Devices that Require Custom Seed Files
71
Devices that Require Updates after the Seed File Import
71
Seed File Header Columns
71
Load Devices from the Seed File
74
Adding Reporting and Mitigation Devices Using Automatic Topology Discovery
75
Verify Connectivity with the Reporting and Mitigation Devices
76
Discover and Testing Connectivity Options
76
Run a Reporting Device Query
77
Activate the Reporting and Mitigation Devices
77
Data Enabling Features
78
Layer 2 Discovery and Mitigation
79
Networks for Dynamic Vulnerability Scanning
79
Select a Network for Scanning
80
Create a Network IP Address for Scanning
80
Create a Network IP Range for Scanning
80
Understanding Netflow Anomaly Detection
80
How MARS Uses Netflow Data
81
Guidelines for Configuring Netflow on Your Network
82
Enable Cisco IOS Routers and Switches to Send Netflow to MARS
82
Configuring Cisco Catios Switch
84
Enable Netflow Processing in MARS
84
Host and Device Identification and Detail Strategies
86
Configuring Layer 3 Topology Discovery
87
Add a Community String for a Network
87
Add a Community String for an IP Range
87
Add Valid Networks to Discovery List
88
Remove Networks from Discovery List
88
Discover Layer 3 Data on Demand
88
Scheduling Topology Updates
89
Schedule a Network Discovery
90
To Edit a Scheduled Topology Discovery
90
To Delete a Scheduled Topology Discovery
91
To Run a Topology Discovery on Demand
91
Configuring Resource Usage Data
91
Enabling the Required SNMP Oids for Resource Monitoring
92
Configuring Network Admission Control Features
102
Integrating MARS with 3 Rd -Party Applications
104
Rd -Party Syslog and SNMP Servers
104
MARS MIB Format
104
Relaying Syslog Messages from 3Rd-Party Syslog Servers
106
Configure Syslog-Ng Server to Forward Events to MARS
106
Configure Kiwi Syslog Server to Forward Events to MARS
107
Add Syslog Relay Server to MARS
107
Add Devices Monitored by Syslog Relay Server
108
CHAPTER 3 Configuring Router and Switch Devices
109
Cisco Router Devices
109
Enable SNMP Administrative Access
110
Enable Telnet Administrative Access
110
Enable SSH Administrative Access
110
C H a P T E R 3 Configuring Router and Switch Devices
110
Enable FTP-Based Administrative Access
110
Configure the Device Running Cisco IOS 12.2 to Generate Required Data
111
Enable Syslog Messages
111
Enable SNMP RO Strings
111
Enable NAC-Specific Messages
112
Enable SDEE for IOS IPS Software
114
Add and Configure a Cisco Router in MARS
114
Cisco Switch Devices
117
Enable Communications between Devices Running Catos and MARS
117
Enable SNMP Administrative Access
118
Enable Telnet Administrative Access
118
Enable SSH Administrative Access
118
Enable FTP-Based Administrative Access
118
Configure the Device Running Catos to Generate Required Data
119
Enable SNMP RO Strings on Catos
119
Enable Syslog Messages on Catos
119
Enable L2 Discovery Messages
120
Add and Configure a Cisco Switch in MARS
121
Adding Modules to a Cisco Switch
122
Add Available Modules
122
Add Cisco IOS 12.2 Modules Manually
123
Extreme Extremeware 6.X
125
Configure Extremeware to Generate the Required Data
125
Add and Configure an Extremeware Switch in MARS
126
Generic Router Device
126
Add and Configure a Generic Router in MARS
127
Chapter 4 Configuring Firewall Devices
129
Cisco Firewall Devices (PIX, ASA, and FWSM)
129
Bootstrap the Cisco Firewall Device
130
Enable Telnet Access on a Cisco Firewall Device
132
Enable SSH Access on a Cisco Firewall Device
132
Send Syslog Files from Cisco Firewall Device to MARS
132
Device-Side Tuning for Cisco Firewall Device Syslogs
134
Logging Message Command
134
List of Cisco Firewall Message Events Processed by MARS
135
Add and Configure a Cisco Firewall Device in MARS
136
Add Security Contexts Manually
139
Add Discovered Contexts
140
Edit Discovered Security Contexts
141
Netscreen Screenos Devices
142
Bootstrap the Netscreen Device
143
Add the Netscreen Device to MARS
148
Check Point Devices
150
Determine Devices to Monitor and Restrictions
152
Bootstrap the Check Point Devices
153
Add the MARS Appliance as a Host in Check Point
154
Define an OPSEC Application that Represents MARS
154
Obtain the Server Entity SIC Name
154
Select the Access Type for LEA and CPMI Traffic
154
Create and Install Policies
162
Verify Communication Path between MARS Appliance and Check Point Devices
164
Reset the OPSEC Application Certificate of the MARS Appliance
164
Add and Configure Check Point Devices in MARS
167
Add a Check Point Primary Management Station to MARS
168
Station
172
Add a Check Point Certificate Server
175
Edit Discovered Log Servers on a Check Point Primary Management Station
176
Edit Discovered Firewall on a Check Point Primary Management Station
178
Define Route Information for Check Point Firewall Modules
178
Specify Log Info Settings for a Child Enforcement Module or Log Server
180
Verify Connectivity between MARS and Check Point Devices
183
Remove a Firewall or Log Server from a Check Point Primary Management Station
183
Troubleshooting MARS and Check Point
184
Chapter 5 Configuring VPN Devices
187
Cisco VPN 3000 Concentrator
187
Bootstrap the VPN 3000 Concentrator
187
Add the VPN 3000 Concentrator to MARS
188
CHAPTER 6 Configuring Network-Based IDS and IPS Devices
191
Cisco IDS 3.1 Sensors
191
Configure Sensors Running IDS 3.1
191
C H a P T E R 6 Configuring Network-Based IDS and IPS Devices
192
Add and Configure a Cisco IDS 3.1 Device in MARS
194
Cisco IDS 4.0 and IPS 5.X Sensors
195
Bootstrap the Sensor
195
Enable the Access Protocol on the Sensor
196
Enable the Correct Signatures and Actions
196
Add and Configure a Cisco IDS or IPS Device in MARS
196
Specify the Monitored Networks for Cisco IPS or IDS Device Imported from a Seed File
198
View Detailed Event Data for Cisco IPS Devices
199
Verify that MARS Pulls Events from a Cisco IPS Device
200
Cisco IPS Modules
200
Enable DTM Support
200
Enable SDEE on the Cisco IOS Device with an IPS Module
201
Add an IPS Module to a Cisco Switch or Cisco ASA
201
ISS Site Protector
203
ISS Realsecure 6.5 and 7.0
207
Configure ISS Realsecure to Send SNMP Traps to MARS
208
Add an ISS Realsecure Device as a NIDS
209
Add an ISS Realsecure Device as a HIDS
210
Intruvert Intrushield
212
Extracting Intruvert Sensor Information from the Intrushield Manager
212
Configure Intrushield Version 1.5 to Send SNMP Traps to MARS
213
Configure Intrushield Version 1.8 to Send SNMP Traps to MARS
213
Add and Configure an Intrushield Manager and Its Sensors in MARS
215
Add the Intrushield Manager Host to MARS
216
Add Intrushield Sensors Manually
216
Add Intrushield Sensors Using a Seed File
217
Snort 2.0
218
MARS Expectations of the Snort Syslog Format
218
Configure Snort to Send Syslogs to MARS
218
Add the Snort Device to MARS
218
Symantec Manhunt
219
Symantec Manhunt Side Configuration
219
MARS Side Configuration
221
Add Configuration Information for Symantec Manhunt 3.X
221
Netscreen IDP 2.1
221
IDP-Side Configuration
221
MARS-Side Configuration
222
Add Configuration Information for the IDP
222
Add Netscreen IDP 2.1 Sensors Manually
222
Enterasys Dragon 6.X
223
DPM/EFP Configuration
223
Configure the DPM or EFP
223
Host-Side Configuration
224
Configure the Syslog on the UNIX Host
224
MARS-Side Configuration
224
Add Configuration Information for the Enterasys Dragon
224
Add a Dragon NIDS Device
225
Chapter 7 Configuring Host-Based IDS and IPS Devices
227
Entercept Entercept 2.5 and 4.0
227
Extracting Entercept Agent Information into a CSV File (for Entercept Version 2.5)
227
Create a CSV File for Entercept Agents in Version 2.5
228
Define the MARS Appliance as an SNMP Trap Target
228
Specific the Events to Generate SNMP Traps for MARS
228
Add and Configure an Entercept Console and Its Agents in MARS
229
Add the Entercept Console Host to MARS
229
Add Entercept Agents Manually
230
Add Entercept Agents Using a Seed File
230
Cisco Security Agent 4.X Device
231
Configure CSA Management Center to Generate Required Data
231
Configure CSA MC to Forward SNMP Notifications to MARS
232
Export CSA Agent Information to File
232
Add and Configure a CSA MC Device in MARS
233
Add a CSA Agent Manually
234
Add CSA Agents from File
235
Troubleshooting CSA Agent Installs
236
Chapter 8 Configuring Antivirus Devices
237
Symantec Antivirus Configuration
237
Configure the AV Server to Publish Events to MARS Appliance
237
Export the Antivirus Agent List
243
Add the Device to MARS
243
Add Agent Manually
243
Add Agents from a CSV File
244
Mcafee Epolicy Orchestrator Devices
244
Configure Epolicy Orchestrator to Generate Required Data
244
Add and Configure Epolicy Orchestrator Server in MARS
248
Cisco Incident Control Server
249
Configure Cisco ICS to Send Syslogs to MARS
250
Add the Cisco ICS Device to MARS
251
Define Rules and Reports for Cisco ICS Events
251
Chapter 9 Configuring Vulnerability Assessment Devices
253
Foundstone Foundscan 3.0
253
Configure Foundscan to Generate Required Data
254
Add and Configure a Foundscan Device in MARS
254
Eeye REM 1.0
255
Configure Eeye REM to Generate Required Data
256
Add and Configure the Eeye REM Device in MARS
256
Qualys Qualysguard Devices
257
Configure Qualysguard to Scan the Network
258
Add and Configure a Qualysguard Device in MARS
258
Schedule the Interval at Which Data Is Pulled
260
Troubleshooting Qualysguard Integration
261
Chapter 10 Configuring Generic, Solaris, Linux, and Windows Application Hosts
263
Adding Generic Devices
263
Sun Solaris and Linux Hosts
264
Configure the Solaris or Linux Host to Generate Events
264
Configure Syslogd to Publish to the MARS Appliance
264
Configure MARS to Receive the Solaris or Linux Host Logs
265
Microsoft Windows Hosts
266
Push Method: Configure Generic Microsoft Windows Hosts
267
Install the SNARE Agent on the Microsoft Windows Host
267
Enable SNARE on the Microsoft Windows Host
268
Pull Method: Configure the Microsoft Windows Host
268
Enable Windows Pulling Using a Domain User
269
Enable Windows Pulling from Windows NT
269
Enable Windows Pulling from a Windows 2000 Server
269
Windows Pulling from a Windows Server 2003 or Windows XP Host
269
Configure the MARS to Pull or Receive Windows Host Logs
271
Windows Event Log Pulling Time Interval
273
Define Vulnerability Assessment Information
274
Identify Network Services Running on the Host
276
Chapter 11 Configuring Database Applications
277
Oracle Database Server Generic
277
Configure the Oracle Database Server to Generate Audit Logs
277
Add the Oracle Database Server to MARS
278
Configure Interval for Pulling Oracle Event Logs
279
Chapter 12 Configuring Web Server Devices
281
Microsoft Internet Information Sever
281
Install and Configure the Snare Agent for IIS
281
To Configure IIS for Web Logging
282
MARS-Side Configuration
285
To Add Configuration Information for the Host
285
Apache Web Server on Solaris or Redhat Linux
287
Sun Java System Web Server on Solaris
287
Generic Web Server Generic
287
Solaris or Linux-Side Configuration
287
Install and Configure the Web Agent on UNIX or Linux
287
Web Server Configuration
288
To Configure the Apache Web Server for the Agent
288
To Configure the Iplanet Web Server for the Agent
288
MARS-Side Configuration
289
To Add Configuration Information for the Host
289
Chapter 13 Configuring Web Proxy Devices
291
Network Appliance Netcache Generic
291
Configure Netcache to Send Syslog to MARS
291
Add and Configure Netcache in MARS
292
Chapter 14 Configuring AAA Devices
295
Supporting Cisco Secure ACS Server
296
Supporting Cisco Secure ACS Solution Engine
296
Bootstrap Cisco Secure ACS
297
Configure Cisco Secure ACS to Generate Logs
297
Define AAA Clients
299
Configure TACACS+ Command Authorization for Cisco Routers and Switches
301
Install and Configure the PN Log Agent
301
Upgrade PN Log Agent to a Newer Version
304
Application Log Messages for the PN Log Agent
304
Add and Configure the Cisco ACS Device in MARS
306
Chapter 15 Configuring Custom Devices
309
Adding User Defined Log Parser Templates
309
Define a Custom Device/Application Type
310
Add Parser Log Templates for the Custom Device/Application
311
Add Custom Device or Application as Reporting Device
321
Chapter 16 Policy Table Lookup on Cisco Security Manager
323
Overview of Cisco Security Manager Policy Table Lookup
323
More about Cisco Security Manager Device Lookup
325
More about Cisco Security Manager Policy Table Lookup
326
Prerequisites for Policy Table Lookup
326
Restrictions for Policy Table Lookup
327
Checklist for Security Manager-To-MARS Integration
328
Bootstrapping Cisco Security Manager Server to Communicate with MARS
334
Add a Cisco Security Manager Server to MARS
335
Procedure for Invoking Cisco Security Manager Policy Table Lookup from Cisco Security MARS
336
Chapter 17 Network Summary
341
Navigation Within the MARS Appliance
341
Logging in
341
Basic Navigation
342
Help Page
344
Your Suggestions Welcomed
344
Summary Page
346
Dashboard
346
Recent Incidents
348
Sessions and Events
348
Data Reduction
349
Page Refresh
349
Diagrams
349
Manipulating the Diagrams
351
Display Devices in Topology
352
Network Status
352
Reading Charts
353
My Reports
355
To Set up Reports for Viewing
355
Case Management Overview
357
Chapter 18 Case Management
359
Case Management Considerations for the Global Controller
359
Hide and Display the Case Bar
359
Create a New Case
360
Edit and Change the Current Case
361
Add Data to a Case
362
Generate and Email a Case Report
363
Chapter 19 Incident Investigation and Mitigation
365
Incidents Overview
365
The Incidents Page
366
Time Ranges for Incidents
368
Incident Details Page
368
To Search for a Session ID or Incident ID
368
Incident Details Table
369
False Positive Confirmation
370
The False Positive Page
372
To Tune a False Positive
373
To Tune an Unconfirmed False Positive to False Positive
373
To Tune an Unconfirmed False Positive to True Positive
373
To Activate False Positive Drop Rules
374
Mitigation
374
802.1X Mitigation Example
375
Prerequisites for Mitigation with 802.1X Network Mapping
375
Procedure for Mitigation with 802.1X Network Mapping
375
Display Dynamic Device Information
379
Virtual Private Network Considerations
381
Layer 2 Path and Mitigation Configuration Example
381
Prerequisites for Layer 2 Path and Mitigation
381
Components Used
381
Network Diagram
382
Procedures for Layer 2 Path and Mitigation
383
Add the Cisco Catalyst 5000 with SNMP as the Access Type
383
Add the Cisco Catalyst 6500 with SNMP as Access Type (Layer 2 Only)
384
Add the Cisco 7500 Router with TELNET as the Access Type
385
Verify the Connectivity Paths for Layer 3 and Layer 2
386
Perform Mitigation
390
Chapter 20 Queries and Reports
393
Queries
393
Chapter 20 Querie and Report
394
To Run a Free-Form Query
394
To Run a Quick Query
394
To Run a Batch Query
395
To Resubmit a Batch Query
396
To Stop a Batch Query
396
Result Format
397
Order/Rank by
399
Filter by Time
400
Use Only Firing Events
400
Maximum Number of Rows Returned
400
Selecting the Query Type
397
To Delete a Batch Query
397
Selecting Query Criteria
401
To Select a Criterion
401
Query Criteria
402
Source IP
402
Destination IP
403
Service
403
Event Types
403
Device
403
Severity/Zone
404
Operation
404
Rule
404
Action
404
Saving the Query
405
Viewing Events in Real-Time
405
Restrictions for Real-Time Event Viewer
405
Procedure for Invoking the Real-Time Event Viewer
406
Perform a Long-Duration Query Using a Report
409
View a Query Result in the Report Tab
411
Perform a Batch Query
412
Reports
415
Report Type Views: Total Vs. Peak Vs. Recent
416
Creating a Report
417
Working with Existing Reports
417
Chapter 21 Rules
421
Rules Overview
421
Prioritizing and Identifying
422
Think Like a Black hat
422
Planning an Attack
422
Back to Being the Admin
423
Types of Rules
424
Inspection Rules
424
Global User Inspection Rules
424
Drop Rules
424
Constructing a Rule
425
Working Examples
436
Example A: Excessive Denies to a Particular Port on the same Host
436
Example B: same Source Causing Excessive Denies on a Particular Port
436
Example C: same Host, same Destination, same Port Denied
436
Working with System and User Inspection Rules
437
Change Rule Status-Active and Inactive
437
Duplicate a Rule
437
Edit a Rule
438
Add an Inspection Rule
439
Working with Drop Rules
441
Change Drop Rule Status- Active and Inactive
441
Duplicate a Drop Rule
441
Edit a Drop Rule
442
Add a Drop Rule
442
Setting Alerts
443
Configure an Alert for an Existing Rule
444
Rule and Report Groups
444
Rule and Report Group Overview
445
Global Controller and Local Controller Restrictions for Rule and Report Groups
446
Add, Modify, and Delete a Rule Group
447
Add, Modify, and Delete a Report Group
450
Display Incidents Related to a Rule Group
452
Create Query Criteria with Report Groups
453
Using Rule Groups in Query Criteria
454
Chapter 22 Sending Alerts and Incident Notifications
455
Configure the E-Mail Server Settings
458
Configure a Rule to Send an Alert Action
459
Create a New User-Role, Identity, Password, and Notification Information
464
Create a Custom User Group
466
Add a User to a Custom User Group
467
Add a User to a Custom User Group
468
Chapter 23 Management Tab Overview
469
Activating
469
To Activate a Set of Management Additions or Changes
469
Event Management
469
Search for an Event Description or CVE Names
470
To View a List of All Currently Supported Cves
470
Event Groups
470
To Filter by Event Groups or Severity
470
Edit a Group of Events
470
Add a Group
471
IP Management
471
Search for an Address, Network, Variable, or Host
471
Filter by Groups
471
Edit a Group
472
Add a Group
472
Add a Network, IP Range, or Variable
472
Add a Host
473
Edit Host Information
474
Service Management
475
Search for a Service
475
Add a Group of Services
475
Edit a Group of Services
475
Add a Service
476
Edit a Service
476
Delete a Service
476
User Management
476
Add a New User
477
Add a Service Provider (Cell Phone/Pager)
479
Search for a User
479
Edit or Remove a User
480
Create a User Group
480
Add or Remove a User from a User Group
480
Filter by Groups
481
Setting Runtime Logging Levels
483
Chapter 24 System Maintenance
484
Viewing the MARS Backend Log Files
484
View the Backend Log
484
Viewing the Audit Trail
485
View an Audit Trail
485
Retrieving Raw Messages
485
Retrieve Raw Messages from Archive Server
486
Retrieve Raw Messages from a Local Controller
487
Change the Default Password of the Administrator Account
489
Understanding Certificate and Fingerprint Validation and Management
489
Setting the Global Certificate and Fingerprint Response
491
Upgrading from an Expired Certificate or Fingerprint
491
Upgrade a Certificate or Fingerprint Interactively
492
Upgrade a Certificate Manually
492
Upgrade a Fingerprint Manually
492
Monitoring Certificate Status and Changes
492
Hardware Maintenance Tasks-MARS 100, 100E, 200, GCM, and GC
493
Replacing the Lithium Cell CMOS Battery
493
Hard Drive Troubleshooting and Replacement
494
Status Lights
494
Partition Checking
494
Hotswapping Hard Drives
494
Overview of MARS RAID 10 Subsystem
494
RAID Procedures for MARS Appliances 100, 100E, 200, GCM, and GC
495
Correlating Hard Drive Slots to RAIDSTATUS Command Physical Port Numbers
498
Hotswap Procedure to Remove and Add a Hard Drive
500
Hotswap CLI Example
501
Procedures for the MARS RAID Utility
502
Appendix
509
Cisco Security MARS XML API Reference
509
XML Schema Overview
509
XML Incident Notification Data File and Schema
509
Appendix A Cisco Security MAR XML API Reference
510
XML Incident Notification Data File Sample Output
510
XML Incident Notification Schema
514
Usage Guidelines and Conventions for XML Incident Notification
514
Appendix
515
Appendix B Regular Expression Reference
516
Backslash
516
Non-Printing Characters
517
Generic Character Types
518
Unicode Character Properties
519
Simple Assertions
520
Circumflex and Dollar
521
Full Stop (Period, Dot
522
Matching a Single Byte
522
Square Brackets and Character Classes
522
Posix Character Classes
523
Vertical Bar
524
Internal Option Setting
524
Subpatterns
525
Named Subpatterns
526
Repetition
526
Atomic Grouping and Possessive Quantifiers
528
Back References
529
Assertions
530
Lookahead Assertions
531
Lookbehind Assertions
531
Using Multiple Assertions
532
Conditional Subpatterns
533
Comments
534
Recursive Patterns
534
Subpatterns as Subroutines
535
Callouts
536
Appendix
537
Date/Time Format Specfication
537
Appendix
541
System Rules and Reports
541
List of System Rules
541
Advertisement
Advertisement
Related Products
Cisco MARS 20
Cisco MARS 50
Cisco MARS 200
Cisco MARS
Cisco 7000 and 7507 Chassis MAS-7507
Cisco 7000 and 7507 LED Board MAS-7KLED
Cisco MAS-7576 Series
Cisco MAS-7KFAN
Cisco MAS-7513-FAN
Cisco MAS-7500CI Series
Cisco Categories
Switch
IP Phone
Network Router
Wireless Access Point
Network Hardware
More Cisco Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL