Cisco Anomaly Guard Module Configuration Guide (Software Version 6.1 and 6.1-XG)
Index

Table Of Contents

Symbols - Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - R - S - T - U - V - W - X - Z

Index

Symbols

# (number sign) 12-9

* (wildcard) 3-6, 6-5, 12-9

Numerics

1 Gbps and 3 Gbps bandwidth options

configuration differences 1-8

displaying software license key 13-2

displaying software version 13-2

understanding 1-7

upgrading to 3 Gbps 14-16

3 Gbps operation upgrade

configuring proxies 14-18

regenerating SSL certificates 14-19

updating existing port interface configurations 14-18

A

AAA

accounting 4-13

authentication 4-6

authorization 4-11

configuring 4-4

aaa accounting command 4-13

aaa authentication command 4-6

aaa authorization command 4-11

accounting, configuring 4-13

action command 8-20

action flow 12-13

activation

activation-extent command 10-7

activation-interface command 10-5

interface 10-4

method 10-4

sensitivity 10-7

add-service command 8-9

admin privilege level 3-2, 4-7

advertised routes, viewing 5-7, 5-10, 5-14

always-accept 8-23

always-ignore 8-23

analysis protection level 1-5, 8-10

anomaly

detected 12-3

flow 12-9

anomaly detection engine memory usage 13-27, 13-29

anti-spoofing 1-3

anti-spoofing drop statistics 15-8

anti-zombie 1-3

AP

booting to 2-9

clearing configuration 14-19

clearing passwords 14-19, 14-22

upgrading 14-10

upgrading, inline 14-14

application partition

See AP

attack-detection command 10-9

attack report

copying 12-14, 12-15

detected anomalies 12-3

exporting 12-14

exporting automatically 12-14

layout 12-1

malicious packets statistics 12-2

mitigated attacks 12-4

notify 12-9

statistics 12-2

timing 12-1

viewing 12-10, 15-5

attack reports

exporting 14-6

attack statistics 15-6

attack type

client 12-5

malformed packets 12-6

mitigated attack 12-11

user defined 12-6

zombie 12-5, 12-8

authentication, configuring 4-6

authorization

disabling zone command completion 4-13, 6-7

authorization, configuring 4-9

auth packet types 8-11

automatic protection mode 10-4

automatic protect mode 1-5, 10-4, 11-1

B

bad packets to proxy drop statistics 15-8

bandwidth options

configuration differences 1-8

displaying software license key 13-2

displaying software version 13-2

understanding 1-7

upgrading to 3 Gbps 14-16

banner

configuring login 4-30

basic

user filter actions 7-14

basic protection level 1-5, 8-10

Berkeley Packet filter 7-9

block dynamic filter actions 7-20

block-unauthenticated policy action 8-21

boot command 2-9

burn flash 14-15

bypass filter

command 7-12

configuring 15-4

definition 1-5, 7-2

deleting 7-14

displaying 7-13

C

capture, packets 13-17

CFE 14-11, 14-14, 14-15

clear ap config command 14-19

clear ap password command 14-19, 14-22

clear counters command 3-10, 13-6

clear log command 13-13

CLI

changing prompt 4-25

command shortcuts 3-6

error messages 3-5

getting help 3-5

issuing commands 3-3

TAB completion 3-6

using 3-1

client attack 12-11

client attack mitigated attacks 12-5

command completion 4-13

command line interface

See CLI 3-1

command shortcuts 3-6

comparator 7-3

config privilege level 3-2, 4-7

configuration

file

copying 14-3

exporting 14-3

importing 14-4

viewing 13-3

importing 14-4

saving supervisor engine 2-1

configuration, accessing command mode 4-12

configuration mode 3-2

configure command 2-7, 3-7

constructing policies 9-5

copy command

packet-dump 13-19

copy commands

ftp running-config 14-4

log 13-10, 13-12

reports 12-14, 12-15

running-config 6-12, 14-3

zone log 13-12

copy-from-this 6-5

copy guard-running-config command 6-11

copy login-banner command 4-30

copy-policies command 9-17

copy wbm-logo command 4-32

counters

clearing 3-10, 13-6

history 13-5

counters, viewing 13-5

cpu utilization 13-28

D

DDoS

attack classification 15-6

nonspoofed attacks 1-3

overview 1-2

spoofed attacks 1-2

zombies 1-3

deactivate command 10-12

deactivating commands 3-4

deactivating protection 10-9

default configuration, returning to 14-19

default-gateway command 3-11

default zone 10-6

description command 6-7

detected

anomalies 12-3

flow 12-13

diff command 9-15

disable command 8-6

disabling

automatic export 14-7

distributed denial of service

See DDoS

diversion

command 5-5, 5-6

configuring inline 5-8

configuring out-of-path 5-11

definition 5-1

hijacking 5-4

injection 5-5, 5-15

mechanism 5-3

network configuration 5-2

restoring default values 5-5

troubleshooting 15-2

viewing advertised routes 5-7, 5-10, 5-14

DNS

detected anomalies 12-3

drop statistics 15-7, 15-8

TCP policy templates 8-2

drop

dynamic filter action 7-19

policy action 8-21

statistics 15-7

user filter action 7-15

dropped packets

learning 9-2

drop-statistics command 15-6

dst traffic characteristics 8-12

dynamic filter

1000 and more 7-21

actions 7-19

command 7-23, 7-24

deactivating 7-24

definition 1-5

deleting 7-24, 15-4

displaying 7-21, 15-3

displaying events 13-9

inactivating 15-4

overview 7-2, 7-19

preventing production of 7-24

sorting 7-21

terminating 7-25

zone malicious rate 7-25

dynamic filters 11-2

dynamic privilege level 3-2, 4-7

E

enable

command 4-10, 8-6

password command 4-10

enabling services 4-2

even log

deactivating 13-10

event log

activating 13-10

event monitor command 13-10

export

disabling automatic 14-7

export command 14-6

packet-dump 13-18, 13-19

reports 12-14

exporting

configuration file 14-3

log file 13-12

reports automatically 12-14

exporting GUARD configuration 6-11

extracting signatures 13-23

F

facility 13-11

file server

configuring 14-2

file-server

command 14-2

configuring 14-2

deleting 14-2

displaying 14-3, 14-7

file server, displaying sync-config 14-7

filter rate

termination threshold 7-25

filters

bypass 1-5, 7-12

dynamic 1-5, 7-2, 7-19

flex-content 1-5, 7-4

user 1-5, 7-14

filter-termination command 7-25

fixed-threshold 8-16

flash-burn command 14-16

flex-content filter

configuring 7-4

default configuration 13-37

definition 1-5, 7-2

displaying 7-10

dropped 15-7

filtering criteria 7-4

renumbering 7-4

fragments

detected anomalies 12-3

policy template 8-2

G

generating signatures 13-23

global mode 3-2

global traffic characteristics 8-12

Guard

configuring multiple 2-10

self protection 13-36

GUARD_DEFAULT 6-3

GUARD_LINK 6-3

GUARD_TCP_NO_ PROXY 6-3

GUARD_VOIP 6-3

GUARD configuration, exporting 6-11

GUARD configuration, importing 6-12

Guard module configuration

resetting 14-23

H

high availability 2-11

host, logging 13-11

host keys

deleting 4-20, 4-22

hostname

changing 4-25

command 4-25

HTTP

detected anomalies 12-3

policy template 8-2

hw-module command 14-10, 14-11, 14-12, 14-14, 14-19, 14-22

hw-module commands 2-8

hybrid 12-11

I

idle session, configuring timeout 4-33

idle session, displaying timeout 4-33

importing

configuration 14-4

importing GUARD configuration 6-12

incoming TCP drop statistics 15-7

injecting

VRF 5-17

injecting, tunnel 5-19

inline upgrade 14-13

in packet types 8-11

installation

verifying 2-2

interactive

operation mode 11-4

policy status 8-23

interactive protection mode 10-4

interactive protect mode 1-6, 10-4, 11-1

interactive-status command 8-22

interface

activating 3-7, 3-8

clearing counters 3-10

command 3-8, 3-9

configuration mode 3-2

configuring IP address 3-8

ip address

modifying, zone 6-9

IP address command

excluding 6-8

ip address command

deleting 6-9

interface 3-8

zone 6-8, 10-3

ip route command 3-11

IP scan

detected anomalies 12-3

policy template 8-2

IP summarization 13-14, 13-16

IP threshold configuration 8-18

K

key

generating for license 14-17

key command

add 4-22

generate 4-24

remove 4-23

L

land attack drop statistics 15-8

layer 3 interface

configuring on VLAN 2-6

learning

command 9-6, 9-8

constructing policies 9-5

dropped packets 9-2

policy-construction command 9-5

synchronizing results 9-4

terminating process 9-6, 9-8

threshold-tuning command 9-7

tuning thresholds 9-7

learning accept command 9-6, 9-8

learning params

threshold-selection command 9-10

learning-params

deactivating periodic action 9-8

deactivating periodic-action command 9-6

periodic-action command 9-6, 9-8, 9-10

threshold-multiplier command 8-16

threshold-selection command 9-8

threshold-tuned command 6-9, 9-12

learning-params fixed-threshold command 8-16

licenses

generating key 14-17

ordering XG upgrade license 14-17

LINK templates 9-5

load sharing 2-10

log file

clearing 13-13

exporting 13-10, 13-12

viewing 13-11

logging, viewing configuration 13-11

logging command 13-11

logging parameters, configuring 13-8

login banner

configuring 4-30

deleting 4-31

importing 4-30

login-banner command 4-30

logo, adding WBM 4-32

logo, deleting WBM 4-33

low rate zombie attack policies 8-8, 8-13, 8-22

M

maintenance partition

See MP

malformed packets 12-11

mitigated attacks 12-6

malformed packets drop statistics 15-8

malicious packets statistics

attack report 12-2

malicious rate termination threshold 7-24

management

MDM 3-15

overview 3-13

port 3-7

SSH 3-15

WBM 3-13

max-services command 8-5

MDM

activating 3-15

memory consumption 13-27

memory usage, anomaly detection engine 13-27, 13-29

MIB, supported 4-2

min-threshold command 8-6

mitigated attacks

client attack 12-5

malformed packets 12-6

overview 12-4

spoofed 12-4

user defined 12-6

monitoring

network traffic 13-18, 13-19

MP

booting to 2-9

upgrading 14-12

upgrading, inline 14-14

mtu command 3-8, 3-10

multiple Guards

configuring 2-10

N

netstat command 13-30

network server

configuring 14-2

deleting 14-2

displaying 14-3, 14-7

network server, displaying sync-config 14-7

no learning command 9-6, 9-8

non DNS drop statistics 15-8

nonspoofed attacks 1-3

no proxy policy templates 8-4

notify 12-9

notify policy action 8-21

ns policy templates 8-4

num_sources packet type 8-11

O

other protocols

detected anomalies 12-3

policy template 8-2

other protocols drop statistics 15-7

out_pkts packet types 8-11

outgoing TCP drop statistics 15-7

P

packet-dump

auto-capture command 13-16

automatic

activating 13-14

deactivating 13-16

displaying settings 13-16

exporting 13-18, 13-19, 14-6

signatures 13-24

packet-dump command 13-17

packets, capturing 13-17

password

changing 4-8

enabling 4-10

encrypted 4-7

recovering 14-19, 14-22

recovering from a lost password condition 14-20

password, recovering 14-20

pending 11-2

pending dynamic filters 11-2

displaying 11-3, 11-7

periodic action

accepting policies automatically 9-6, 9-8

deactivating 9-6, 9-8

permit

command 3-14, 3-15, 4-3

user filter action 7-14

permit ssh command 4-21

ping command 13-34

pkts packet type 8-12

policy

action 8-13, 8-20, 8-21

activating 8-14

adding services 8-9

backing up current 8-26, 9-18

command 8-13

configuration mode 3-3

constructing 1-4, 9-2, 9-5

copying parameters 9-17

copy-policies 9-17

deleting services 8-9

disabling 8-14

displaying zone policies 8-12

inactivating 8-14

learning-params, fixed-threshold command 8-16

marking as tuned 6-9, 9-12

marking threshold as fixed 8-16

multiplying thresholds 8-17, 15-3

navigating path 8-13

packet types 8-11

PPH policies 8-8, 8-13

PPH policies, configuring detection time 8-22

proxy threshold 8-19

show statistics 8-24

state 8-14

threshold 8-13, 8-15

threshold-list command 8-18

timeout 8-13, 8-19

traffic characteristics 8-12

tuning thresholds 1-4, 9-3, 9-7

using wildcards 8-13, 8-23, 8-25

viewing 15-3

viewing statistics 9-9

policy set-timeout command 8-20

policy template

command 8-4, 8-6

configuration command level 8-4

configuration mode 3-3

displaying list 8-4

max-services 8-5

min-threshold 8-6

overview 8-2

parameters 8-4

state 8-6

policy-template add-service command 8-9

policy-template remove service command 8-10

port scan

detected anomalies 12-3

policy template 8-2

power enable command 2-9

PPH policies 8-8, 8-13

PPH policies, configuring detection time 8-22

privilege levels 3-2

assigning passwords 4-10

moving between 4-10

protect

activating 3-12

automatic mode 1-5, 10-4, 11-1

command 10-10

deactivating 10-12

deactivating automatically 10-9

entire zone 10-10

interactive mode 1-6, 10-4, 11-1

specific IP 10-11

specific ip address 10-11

specific zone IP 10-10

specific zone ip address 10-10

protect command 10-12

protection

activation sensitivity 10-7

protection-end-timer command 10-9

protection level

analysis 1-5, 8-10

basic 1-5, 8-10

strong 1-5, 8-11

protection levels

overview 8-10

protect learning command 9-7

protect-packet command 10-7

protocol traffic characteristics 8-12

proxy

command 3-13

configuring 3-12

displaying usage 13-7

no proxy policy templates 8-4

proxy-threshold command 8-19

public-key

displaying 4-24

R

rate-limit command 6-7, 7-12

Rate Limiter

dropped 15-7

rates

history 13-5

rates, viewing 13-4

reactivate-zones 14-8

rebooting

parameters 14-8

recommendations 11-2

accepting 11-8

activating 11-4, 11-7

change decision 8-22

command 11-7

deactivating 11-4, 11-9

displaying 11-5

dynamic filters 11-2

ignoring 11-8

overview 11-2

receiving notification 11-5

viewing 11-5

viewing pending-filters 11-3, 11-7

redirect/zombie

dynamic filter action 7-20

policy action 8-21

redundancy 2-10, 2-11

reload command 14-7

remove service command 8-9

renumbering flex-content filters 7-4

renumbering user filters 7-15

replied IP summarization 13-14, 13-16

replied ip summarizations

contained in attack reports 12-7

contained in packet-dump captures 13-22

replied packets 12-2

report

See attack report 12-1

reports

details 12-10

displaying subzones 10-8

exporting 14-6

reqs packet type 8-11

reset command 2-8

routing table

manipulation 3-11

viewing 3-12

RTP/RTCP 6-3

running-config

copy 6-12, 14-3, 14-4

show 13-3

S

self-protection command 13-36

service

adding 8-9

command 3-14, 3-15, 4-2

copy 9-17

deleting 8-9

MDM 3-15

permissions 4-3

snmp-trap 4-25

WBM 3-14

services

enabling 4-2

session, configuring timeout 4-33

session, displaying idle timeout 4-33

session timeout, disabling 4-33

session-timeout command 4-33

set-action 8-21

show commands

counters 13-5

cpu 13-28

diagnostic-info 13-26

drop-statistics 15-6

dynamic-filters 7-21, 15-3

file-servers 14-3, 14-7

flex-content-filter 7-10

host-keys 4-22

learning-params 8-16

log 13-11

log export-ip 13-11

logging 13-11

login-banner 4-30

memory 13-27

module 2-2, 14-11, 14-12

packet-dump 13-16

packet-dump signatures 13-24

policies 8-23, 15-2, 15-3

policies statistics 8-24, 9-9

public-key 4-24

rates 13-4, 15-1

recommendations 11-5, 11-6

recommendations pending-filters 11-3, 11-7

reports 15-5

reports details 12-10

running-config 13-3

show 13-4

sorting dynamic-filters 7-21

sync-config file-servers 14-7

templates 6-5

zone policies 8-23

show privilege level 3-2, 4-7

show public-key command 4-24

shutdown command 3-8

signature

generating 13-23

SIP

detected anomalies 12-3

drop statistics 15-8

malformed packets 12-7

policy template 8-3

spoofed attacks 12-5

user filter action 7-15

zone template 6-3

snapshot

backing up policies 8-26, 9-18

command 9-14

comparing 9-15

deleting 9-17

displaying 9-16

saving 9-14

snapshot command 9-13

snapshots

save periodically 9-9

SNMP

accessing 4-2

configuring trap generator 4-25

traps description 4-26

snmp commands

community 4-29

trap-dest 4-25

software license key

displaying key information 13-2

software version number, displaying 13-2

specific IP threshold 8-18

spoofed attack 12-11

spoofed attacks 1-2, 12-4

src traffic characteristics 8-12

SSH

configuring 3-15

deleting keys 4-23

generating key 4-24

service 3-15

state command 8-14, 15-4

static route

adding 3-11

strong

dynamic filter action 7-19

policy action 8-21

protection level 1-5, 8-11

user filter action 7-15

subzone 10-8

supervisor engine

booting 2-9

configuring 2-1

configuring VLANs 2-4

powering off 2-9

resetting 2-8

saving configuration 2-1

shutting down 2-8

verifying configuration 2-9

supervisor module

supported versions 14-8

syn_by_fin packet type 8-11

syns packet type 8-11

syslog

configuring export parameters 13-11

configuring server 13-11

message format 13-10

system log

message format 13-10

T

TACACS+

authentication

key generate command 4-19, 4-21

clearing statistics 4-17

configuring server 4-14

server connection timeout 4-16

server encryption key 4-16

server IP address 4-15

viewing statistics 4-17

tacacs-server commands

clear statistics 4-17

first-hit 4-14

host 4-14, 4-15

key 4-14, 4-16

show statistics 4-17

timeout 4-14, 4-17

TCP

detected anomalies 12-3

drop statistics 15-7, 15-8

no proxy policy templates 8-4

policy templates 8-2

templates

LINK 9-5

viewing policies 6-5

zone 6-3

thresh-mult 8-17, 15-3

threshold

command 8-15

configuring IP threshold 8-18

configuring list 8-18

configuring specific IP 8-18

filter rate termination 7-24

malicious rate termination 7-24

marking as tuned 6-9, 9-12

multiplying 15-3

multiplying before accepting 8-16

selection 9-14

setting as fixed 8-16

tuning 1-4, 9-3

threshold-list command 8-18

threshold selection 9-8

threshold tuning

save results periodically 9-9

timeout command 8-19

timeout session, configuring 4-33

timeout session, disabling 4-33

to-user-filters

dynamic filter action 7-19

policy action 8-21

traceroute command 13-33

traffic

monitoring 13-18, 13-19

trap 13-11

trap-dest 4-25

tuning policy thresholds 9-7

U

UDP

detected anomalies 12-3

drop statistics 15-7

policy templates 8-3

unauthenticated drop statistics 15-7

unauth_pkts packet type 8-12

unauthenticated TCP detected anomalies 12-3

upgrade command 14-20

upgrade license 14-17

upgrading

AP 14-10

inline 14-13

MP 14-12

user

detected anomalies 12-3

user defined mitigated attacks 12-6

user filter

actions 7-14, 7-19

command 7-4, 7-15, 7-16

configuring 7-14

definition 1-5, 7-2

deleting 7-19

displaying 7-18

renumbering 7-15

username

encrypted password 4-7

username command 4-7

users

adding 4-7

adding new 4-7

assigning privilege levels 4-6

deleting 4-8

privilege levels 3-2, 4-9

system users

admin 2-7

riverhead 2-7

username command 4-7

V

version, upgrading 14-20

VLAN

administrative 2-5

assigning 2-4

configuring 3-9

configuring layer 3 interface 2-6

configuring on supervisor engine 2-4

Voice over IP

See VoIP

VoIP

detected anomalies 12-3

drop statistics 15-8

malformed packets 12-7

policy template 8-3

spoofed attacks 12-5

user filter action 7-15

zone template 6-3

VPN Routing and Forwarding, See VRF

VRF, configuring injection 5-17

W

WBM

activating 3-13

WBM logo

adding 4-32

deleting 4-33

X

XG software image for 3 Gbps operation

obtaining software image 14-17

XG software license key 14-17

XG software version, 3 Gbps operation 14-16

XML schema12-14to 12-16, 14-7

Z

zombie 12-11

packet counter 13-5

zombie attack 12-13

zombies 1-3

zone

blocking criteria 15-3

blocking flows 15-2

clearing counters 13-6

command 6-4, 6-5, 11-4

command completion 4-13, 6-7

comparing 9-15

configuration mode 3-3, 6-6

copying 6-5

creating 6-4

creating default 10-6

defining IP address 6-8

definition 6-2

deleting 6-5

deleting IP address 6-9

duplicating 6-5

excluding IP address 6-8

IP address 6-8

LINK templates 9-5

malicious rate 10-9

modifying IP address 6-9

operation mode 6-5

protecting 10-2

reconfiguring 6-6

sub 10-8

synchronize configuration 6-9

synchronizing offline 6-11

templates 6-3

viewing configuration 6-7

viewing policies 8-23

viewing status 13-4

zone-malicious-rate 7-25

zone policies

displaying 8-12

zone policy

marking as tuned 6-9, 9-12

zone protection

terminating 10-12

zone synchronization 9-4