Navigating through Cisco Cyber Vision

Home

This page is where you'll land as logging in Cisco Cyber Vision.

The home page displays an operational and a security overview of the industrial network over the last month.

You can edit which information is displayed by ticking/unticking the different boxes available.

In the operational overview, you will find a pie chart with the protocol distribution and a list of the most critical events.

Below, a preset highlight you can edit to display your favorite presets.

In the security overview, you will find a pie chart representing the vulnerable devices per severities, and a pie chart representing the devices per risk score.

Below, a list of the most critical events, and events classified per category, as well as a preset highlight that you can edit.

The navigation bar on the left gives access to all other main pages of Cisco Cyber Vision:

  • Explore (1): This button leads to the overview of all presets by defaults or configured.

  • Reports (2): This button leads to the Reports page to export valuable information about the industrial network.

  • Events (3): This button leads to the Events page which contains graphics and a calendar of all events generated by Cisco Cyber Vision.

  • Monitor (4): This button leads to the Monitor mode to perform and automatize data comparisons of the industrial network.

  • Search (5): This button leads to the searching area to look for precise data in the industrial network.

  • Admin (6): This button leads to the Admin page.

Explore

Presets is a page containing an overview of all presets existing in Cisco Cyber Vision whether they are present by default or part of users' customizations. You can access this page by clicking the Explore button on the left navigation bar.

The top navigation bar (1) allows you to access the different presets (2) and then reach their different views.

Preset views

There are several types of views which relate to different perspectives:

  • The dashboard:

    The dashboard is a unique view which is displayed by default when accessing a preset. It offers an overview of data found by the preset. The fact that it's a tag-oriented view allows you to have a general insight of the network without going into deep and technical details.

  • The map:

    The map is a visual data view of the industrial network that gives you a broad insight of how components are connected to each others.

  • Lists:

    Lists are views specialized whether on devices or activities. These views provide classic but powerful data filtering to match what you are looking for. For more information, refer to the device and activity lists.

  • The Purdue Model:

    In this map, the components of a preset are distributed among the layers of the Purdue model architecture.

Views are always structured as shown below:

  • The top navigation bar (1), which allows you to easily switch between the different views thanks to its menu.

  • The filtering area on the left (2), which allows you to modify and manage the preset by adapting criteria and registering changes.

  • The view you're on (3), which dynamically evolves as you change and save criteria.

Example of the OT Devices preset on the dashboard view:

Display of preset views has been optimized to avoid lags, solve performance issues and prevent the application from crashing, especially in case of large data flow.

The entire database used to be checked over and over. Elements such as components, tags and activities were counted repeatedly and displayed simultaneously in the preset views, which were continuously refreshed.

As of Cisco Cyber Vision version 4.0.0, data found is stored instead of being directly displayed in the preset views. Preset views refresh occurs only when necessary or requested to not overload the application display. The elements visible in the preset views are actually data from the previous computation, which means that data displayed in the GUI and the data stored in the database, are asynchronous. This actually lighten data load on preset views.

In addition, computation adapts to the preset consultation frequency. That is, a preset often viewed by users will be computed accordingly. Instead, the system will not compute presets that are never used.

When on a preset, data are regularly computed thanks to an automatized data computation running in the background. However, this will not refresh the preset view. Two buttons are available in the preset view to act independently whether on the database or on the preset view to lighten the load on the system:

  • The New data button (4) appears each time a new computation is done and refresh the view as you click on it. The view will be updated to the last computation done in the system, which means that using this button won't necessarily show new data.

  • The Refresh button (5) forces data computation and refresh the preset view. This task requires more resources and should be used in the following cases:

    • If you expect that new data has been found during the most recent computation (e.g. a new device plugged into the network).

    • If custom data such as groups or names have been changed (e.g. if adding a device into a group).

In any cases, the computation is forced and the view is refreshed as you navigate in the application. For example, when accessing another preset or when moving from one view to another.


Note

New preset view optimization has also an impact on how criteria are handled in preset views. To be taken into account and thus for the computation to be forced, criteria must be saved as a new preset if acting from a default preset, or saved if in a custom preset.

Dashboard

The dashboard is the view by default when opening a preset. It gives you an overview of the preset's global risk score, number of devices, activities, vulnerabilities, events, variables and credentials.

The dashboard is also a tag-oriented view. It's an overview of all tags found -independently of the ones set as criteria- with the number of devices and activities found per tag.

Example: For the purpose of the whole example given below, we access the All data preset, select the Controller tag as criteria (under Device - Level 2), and save the selection as "Example: Controller tag".

Devices per tag: The number in brackets indicates there are 7 devices tagged as Controller (1). On the dashboard, you see this result accordingly (2). One device is tagged as Web Server (3). This means that one of the Controller is a Web Server. Following this logic, we can say that five of the Controllers are Rockwell Automation devices.

If you want to know more about one of these devices, switch to the device list view and reach them using the filter available in the tags column.

Activities per tag: As for activities, there is no activity tags set as criteria in the example below (4). Yet, you can see that many activities have been found (5). This is because the dashboard view collects all activities involved with the Controller devices found.

If you want to know more about one of these activities, switch to the activity list view and reach them using the filter available in the tags column.

Device and activity lists

The device and activity lists are two specialized and oriented views. Even though they are legated and share a large number of data, devices and activities are split in two different views to facilitate comprehension and visualization of data.

These views provide general information and advanced technical data about each element found in the preset. Check at the differences between the device and activity views.

The All Controllers preset in the device list view:

The All Controllers preset in the activity list view:

Lists are meant to perform an in-depth exploration of the network. Using this type of view is especially convenient when searching for a very specific data. To do so, different filters are available inside the lists to sort data:

  • The sort icon (1) is to sort data by alphabetical order or by ascending/descending order.

  • The filter icon (2) opens a field to type a specific data in, or a multiple choice menu (3) to filter tags.

 

Clicking an element in the lists opens its right side panel which leads to more advanced data.

Map

The Map is a visual representation of data of the industrial network that gives you a broad insight on how devices and components are interconnected. It's a good input to get to know how the network is structured. You can start organizing components in a way that makes sense to you by creating groups.

Maps display devices, components and activities according to criteria set in a preset. Grayed out devices and components are displayed because, even if they don't correspond to the preset's criteria, they are necessary to represent the activities of the preset.


Note

The map is self-organizing, that is, elements are redistributed as devices, components, conduits and activities appear or disappear, and as groups are created or deleted. Moreover, the map automatically adapts over time and when changing preset. This way, it is guaranteed that the map is always well organized and components never overlap.

By default, activities between groups are merged and displayed as conduits (A). You can tick the option "Show network activities" to see activities, which gives a more detailed view (B). Elements are here also automatically reorganized in the map to enhance visibility.

Vulnerabilities

The vulnerability dashboard gives you a visual representation and a list of the vulnerabilities detected within a preset.


Important

It is important to update the Knowledge DB in Cisco Cyber Vision as soon as possible after notification of a new version to be protected against vulnerabilities.

The pie chart presents the 10 most matched vulnerabilities within the preset, that is, the vulnerabilities that have affected more devices. You can click the number of devices detected to see the devices affected.

On the right, you'll see a summary of the total number of devices that are vulnerable in the preset selected.

Below, you have a list of all the vulnerabilities found in the preset with sort icons to sort data by alphabetical order or by ascending/descending order, and filter icons which opens a field to type a specific data.

For each vulnerability, the following data are displayed in columns:

  • The vulnerability name

  • Its CVE ID (world unique identifier for a Common Vulnerability Exposure)

  • Its CVSS score (Common Vulnerability Scoring System)

  • The devices affected by the vulnerability

Clicking an element in the lists opens its right side panel which leads to more details about the vulnerability, including its link to the National Vulnerability Database.

Security Insights

Security Insights is a view that provides statistics for DNS requests, HTTP requests, SMB Tree names and flows with no tag.

For each category, you will find the most frequent and rarest requests, and the list of all these requests.

Flows with no tag:

In this category, you will find a list of all flows with no tags, that is, traffic that Cisco Cyber Vision wasn't able to analyze. The reason can be that the protocol is not supported by Cisco Cyber Vision yet. However, this list is interesting from a security standpoint to make sure if such content is really supposed to be on the network and search why it cannot be inspected. A good starting point is to check flows with higher number of packets.

Purdue Model

This map displays the assets of a preset according to the Purdue model architecture. Components are distributed among the layers by considering their tags. The Purdue Model view doesn't undergo any aggregation and is self-organizing.

Assets of the preset All Controllers distributed among the layers of the Purdue model:

Components are distributed according to the different layers of the Purdue model:

  • Level 0-1: Process and basic control (IO Modules).

  • Level 2: Area supervisory control (PLCs, SCADA stations).

  • Level 3-4: Manufacturing zone and DMZ (all others).

Right side panel

A right side panel is a condensed view about a device, a component, a group of components or an activity's information. This view allows you to quickly scan general information about an element meanwhile you're keeping an eye on a broader view such as a device list or a map.

Right side panels differ depending on the type of element consulted. The higher part (1) of the right side panel gives you general information about the element. If consulting a device or a component, you can edit its name an add/remove it to/from a group.

The lower part contains a round button (2) which opens the element's technical sheet with all relevant information (available for devices, components and activities).

The rectangular buttons below (3) redirect to the corresponding information inside the technical sheet.

To access a right side panel you just need to click a device, a component or an activity on the map or a list.

Technical sheets

A technical sheet is an interactive and complete view of all information related to a device, a component, an activity or a flow. The views differ depending on the type of element consulted.

A device's technical sheet:

A technical sheet is composed of a top bar and of a list of tabs. The higher part (1) recaps the information found in the right side panel. The rectangular buttons on the right redirect to the corresponding information inside the technical sheet. In a device or a component's technical sheet, you can also edit the element's name, add/remove it to/from a group and add custom properties.

The lower part (2) contains detailed information classified under tabs, displaying or not according to the element you're on:

  • Basics contains an element's properties and tags that are categorized with their definition. Device's components also appear if applicable.

  • Risk score with an overview and a more detailed and focused views.

  • Security contains a component's vulnerabilities you can acknowledge and credentials.

  • Activity is about an activity's flows and contains a Mini Map which is a view that is restricted to a device or a component and its activities.

  • Automation contains variable accesses.

You can access technical sheets through a device, component or an activity's right side panel, clicking the technical sheet button. A flow's technical sheet is visible when clicking on a particular flow.

Mini map

The Mini Map is a visual representation restricted to a specific device or component and its activities.

This view is accessible through the Activity tab of a Component's technical sheet.

The option "Show inner components" enables an exploded view of the devices.

Clicking any element in the Mini Map will open its ride side panel so you can have access to further information.

Reports

Reports are exportable files which improve your visibility of valuable information about your industrial network. Information is collected and categorized according to different perspectives which are components, flows, vulnerabilities and PLCs. Reports can be generated for a time period you define into spreadsheets (XLSX) or printable (HTML that you can export to PDF).

Below is the description of the four types of reports available:

  • The inventory report lists and details all components of your industrial network. They are sorted by group. For each component different information is given like the component name, when it was active for the first and the last time and tags that qualify its activity. If available, you will also find technical details such as its MAC and IP addresses, hardware and firmware versions, the serial number and extra properties.

  • The activity report lists and details all communications exchanged between the components of your industrial network. They are sorted by group and by direction (inner, incoming and outgoing communications regarding a group). Information provided includes the protocol, which source and destination ports have been used and tags that qualify its activity.

  • The vulnerability report lists all components detected as vulnerable and gives further details about vulnerabilities. Vulnerabilities are based on the Knowledge DB provided by Cisco. So, the more you keep the Knowledge DB up to date, the better you will be notified about new known vulnerabilities. The report contains information about the vulnerability, its impact level, its CVSS (Common Vulnerability Scoring System) and solutions. A vulnerability is often about outdated software parts. It is strongly recommended to fix outdated states as soon as possible. Links to manufacturers' websites are provided for this purpose.

  • The PLC report lists all PLCs in your industrial network. For each PLC, the report lists and details properties, events, programs, program blocks and variable accesses, if there are any.

All reports generated are displayed in the History section from which you can rename, download and delete reports.

Events

Cisco Cyber Vision provides many events significant for the network security especially the ones which relate to the industrial activity (such as New program downloaded/uploaded, New start/stop CPU command, New init command...). Many other events are also available such as events related to vulnerabilities, comparison results, sensors activity, etc.

Refer to the events administration page on the GUI to see all events available.

The Events page provides two views to give high visibility on these events:

  • The Dashboard: a visual and continuously-updated view of the current state of the installation based on the number of events (by severity and over time).

  • The Calendar: a chronological and continuously-updated view of the events within which you can search events.

The Dashboard

Events are presented in the Dashboard under doughnut and line charts.

Doughnut charts present events numbers and percentages per categories and severities.

You can see the list of events per categories in the administration events page.

Clicking the doughnut redirects you to the Calendar view that is filtered with the corresponding category and severity so you can quickly access more events details.

Below, the line chart puts an emphasis on the number of events per severity over time.

Clicking event markers (1) on the line chart lets you see the number of events per category according to a specific time (2).

Click a category event tab (3) to see events details in the Calendar view by means of the link "Show in calendar" (4). Events will be filtered with the corresponding category, severity and event type.

The Calendar

The Calendar is a chronological view in which you can see and search events. Use the search bar to search events by MAC and IP addresses, component name, destination and source flow, severity and category.

You can also see events that have happened during the day, week, month and year.

Clicking on a result event will show you details about the event.

When an event is related to a component or an activity, you can jump to its technical sheet by clicking See technical sheet.

When a Monitor event is generated, the short description includes a link to view the differences in the Monitor page.

Monitor

Monitor mode

Cisco Cyber Vision provides a monitoring tool called the Monitor mode to detect changes inside industrial networks. Because a network architecture (PLC, switch, SCADA) is constant and its behaviors tend to be stable over time, an established and configured network is predictable. However, some behaviors are unpredictable and can even compromise a network's operation and security. The Monitor mode aims to show the evolution of a network's behaviors, predicted or not, based on presets. Changes, either normal or abnormal, are noted as differences in the Monitor mode when a behavior happens. Using the Monitor mode is particularly convenient for large networks as a preset shows a network fragment and changes are highlighted and managed separately, in the Monitor mode's views.

Baselines as Preset's normal states

A Preset is a set of criteria which aims to show a detailed fragment of a network. To start monitoring a network, you need to pick up a preset, and to define what would be its normal, stable state. This will represent the preset's baseline. A state may rely on a period, as a network fragment may be subject to several states. Hence, it is possible to create several planned, controlled and time-framed baselines per preset, and to monitor the whole network. For example, a normal state of the network can be a typical weekday operating mode, in which numerous processes are performed iteratively. During weekends, these processes may be slowed down, different, or even stopped. Any network phase can be saved as a baseline by selecting the time span in which it occurs, and monitored. Other examples of baselines can be a regular maintenance period, a degraded mode, a weekend and night mode, and so forth. A baseline is created for a situation considered as part of a normal operating process in which all network behaviors (components, activities, properties, tags, variable accesses) will be taken into account for review.

Review and assignment of differences

A difference is a new or changed behavior happening within a fragment of a network. Any difference detected is highlighted in the Monitor mode through several views such as a map, a component list and an activity list. When reviewing these, they can be acknowledged or reported. It depends on whether you consider them as normal or not, and their level of criticality. That is, you can include these changes into your baseline if it is part of a normal network development process, or take action in case of suspicious behavior. By doing so, each baseline will be refined bit by bit over time and become more compliant with your needs.

Monitor mode's views

Like in the Explore mode, the Monitor mode offers several views of data so you can see them through different representations. The difference, though, is that in the Monitor mode views new and changed detected elements are highlighted in red.

For more information about the views listed below, refer to the Explore chapter.

The map view:

non-aggregated components

The component list view:

The activity list view:

In any view, on the left side, there is:

  • a fixed panel with a summary of the elements that have been detected in the Monitor mode,

  • the last time this baseline has been checked,

  • the preset it belongs to along with the list of criteria selected.

You can also modify the baseline settings. And the Explore button redirects you to the corresponding preset in the Explore mode.

In any view, if you click one of the elements, for example below the activity marked as new in the activity list, a right side panel opens. It gives you:

  • information about the activity such as the two components it belongs to,

  • the date of the first and the last activity,

  • its tags,

  • buttons to perform several actions.

Clicking the Show details buttons opens a window on top with more information, in the example below, it shows the activity tags with the category they belong to and their description.

Click the collapse button to come back to the initial view.

However, to go deeper into analysis, click the Investigate with flows button.

New and changed differences

When a difference is detected, it appears in red in the Monitor mode. There are two types of differences: new and changed ones. A component, an activity, a tag, a property and a variable access can appear (new) or evolve (change). Here below are a few examples of how differences are represented in the Monitor mode:

A new component (plain red) and a changed component (hyphenated red)

Changed component's properties, with the former crossed out property:

New and changed component and activity tags:

New and changed activity's variable access:

Each difference must be reviewed to identify a potential threat and refine the baseline. Refer to the section Review differences.

Review differences

When differences are detected by the Monitor mode, what one wants to do is to review them to see if they are a potential threat to the network, and clear their data from any red-alarming elements. Several actions are available to help you do so, which will, moreover, allows you to enrich the current baseline, clean it, or report abnormalities. These are available at different levels depending on whether you want to perform a deep behavior review on a component or activity particulars, or at a higher macro level for a quick review. Thus, you can perform these actions on tags, properties, variable accesses, components, activities and baselines.

In any case, any action taken on the Monitor mode will generate an event that you can see on the Events page.

Acknowledge differences

Acknowledge in the Monitor mode

"Acknowledge" is an action to be used to indicate that determined behaviors -or differences- are safe and normal. In fact, by doing this action, the difference will be included in the baseline. You can acknowledge differences on any element of the Monitor mode: tags, properties, variable accesses, components, activities and baselines.

Acknowledge a component or an activity

Acknowledge will display as such if the behavior is notified as changed. However, if the behavior concerning a component or an activity is notified as new, an additional action is required when clicking the button "Acknowledge" because a distinction has to be made according to whether the behavior in question is exceptional or part of an iterative process.

  • Acknowledge & Include

    This action is to be used for a behavior which is part of a normal process and is meant to happen regularly over time. By using this button, the behavior will be included into the current baseline. If later the component or the activity changes -because for example a new tag has been detected on them- you will be alerted through the Monitor mode: it will turn to "changed" and appear hyphenated and red. This action is useful to refine a baseline as it evolves over time.

    Ex: You can perform this action on a new machine installed in the network, or a new activity due to a new supported protocol.

  • Acknowledge & Keep Warning

    This action is to be used when a behavior is punctual and not part of a process. In this case, such behavior must not be considered as abnormal but rather as an unusual one, which doesn't have a bad impact on the network. By using this button, the behavior will be acknowledged and so cleared, but will not be included into the baseline. Consequently, you'll be notified if it happens again as a new behavior in the monitored baseline.

    Ex: You can perform this action on a new component and a new activity due to an exceptional maintenance act.

Report differences

This action is to be applied on a difference you consider to be an anomaly, that is, a behavior that is abnormal and may compromise the operating capability and security of the network. However, before reporting the anomaly, the first thing to do is to investigate, and, if possible, to resolve it. In any case, when reporting an anomaly, you must fill in a message of incident response or acknowledgment (in which context the incident has happened, potential threats, or how it has been fixed). Once an anomaly is reported, it is cleared and not included in the baseline, and an event is generated with a default severity level higher than the acknowledge action. You will be alerted in the Monitor mode if the incident occurs again.

Remove and keep warning

This action will remove the component or activity from the current baseline. This is to be used when you consider an element should not appear in a baseline, or you don't want to see it anymore. However, you will be alerted if the component or activity comes back, and the difference will appear as new. This action is also available on variable accesses through Individual acknowledgment.


Note

If a difference keeps coming back in a baseline and you don't want to see it, you should modify the preset instead.

Individual acknowledgment

Individual acknowledgment is an advanced usage of Cisco Cyber Vision. This feature is available on changed components and activities, that is, on elements already included in a baseline. It allows you to access their details to perform a deep behavior review by acknowledging and reporting one by one the differences detected on the network. Thus, individual acknowledgment is available on components' properties and tags, and on activities' tags and variable accesses.

  • Component properties

    New and changed properties display in red. Concerning changed properties, the former one is crossed out and the new one displays next to it. They will always display in red, unless you acknowledge them.

  • Component and activity tags

    New and changed tags display in red. They will be cleared as you acknowledge or report them (i.e. they are no longer displayed in red).

  • Activity variable accesses

    New and changed variable accesses display in red. A variable access can be acknowledged, reported, and, in addition to other elements, deleted (i.e. button "Remove and keep warning"). Deleting a variable access is to be used when you consider that it should not be part of the current baseline and you don't want to see it. It will be removed from the baseline and disappear. If, however, the variable access happens again, you will be alerted and it will display in red.

Once all component or activity's elements are reviewed (i.e. acknowledged, reported, or removed), the entity they belong to is cleared (the component or activity itself is no longer displayed in red). Any action performed in the Monitor mode will appear in the Event page.

Investigate with flows

This button is not an action but an option to get more information and context about the differences detected on the network. In fact, each difference found, since it belongs to a component or an activity, is related to a flow. This view allows you to perform forensic analysis and may give you some clues to understand what happened.

Ex: You can search from which flow exactly a tag comes from.

Create a baseline from a default preset

  1. Access the Explore page.

  2. In Basics, click the preset Essential data.

  3. Click the button Add a new baseline from preset.

  4. A pop-up appears to invite you to check your new baseline. Click Go check it out.

  5. All elements displays. Some components and activities may already appear in red as new or changed.

Create a baseline from a group

To create groups:

Procedure


Step 1

Access the All data preset.

Step 2

Create two groups of components.

Step 3

Click the Autolayout button.

Example:

We create a group HMI and a group PLC.

To create presets from groups:

Step 4

In criteria, access the groups filter, and select the first one of the group you created.

Example:

We select the HMI group in the filter.

The HMI group displays in the map with its related activities.

Step 5

Create a preset from this view.

Step 6

Click Save as and name the preset HMI.

Step 7

Repeat the previous steps for the PLC group.

Step 8

Go to All Presets. You will see your two new presets.

To create a baseline from presets:

Step 9

Access the HMI preset.

Step 10

Click the button "Add a new baseline from preset".

Step 11

Name it HMI.

Step 12

Repeat the previous steps for the PLC preset.

Step 13

Access the Monitor mode. You will see your two new baselines.


Create a weekend baseline

Create another baseline to monitor the network during weekends.

  1. Access the All data preset.

  2. Set the period for the weekend. For example, from Friday 5 p.m. to Monday 4 a.m.

  3. Click the button "Add a new baseline from preset".

  4. Name the baseline "All data weekend" and add the description "Must be active from Friday 5pm till Monday 4am".

Enable a baseline monitoring

To make the most of the Monitor mode, it is sometimes insightful to create several baselines per preset. However, only one baseline can be active at a time per preset. This is because a baseline is to be used to monitor a well-defined network process during a specific period of time (e.g. baselines Normal operating mode, Maintenance, Week-end, Night). Two baselines cannot happen at the same time on a preset, and you need to enable the proper baseline as the network enters a new operating phase. Consequently, when you enable a baseline on a preset, the active one is automatically disabled.

To enable a baseline:

Procedure


Step 1

Access the Monitor page.

Step 2

Click the monitored preset settings menu on the preset you want to monitor.

Step 3

Under Monitored baseline, select the baseline you want to enable.

Step 4

Click Ok.

The baseline selected turns to green and is enabled.


Use cases

Detection of assets newly connected to the network

A basic use case in Cisco Cyber Vision is to detect if and when a new equipment connects to the industrial network being monitored. However, the first thing to do when using Cisco Cyber Vision is to organize components in an intelligible way. In this use case, we choose to organize components according to the network's topology, that is, per production chain. In fact, a network can be divided into several areas, such as several production chains with different criticality levels, where a Cisco Cyber Vision Sensor is placed to capture and monitor its traffic. This topology can be reflected in Cisco Cyber Vision by creating groups which represent a production chain and contain its components. In clear, here we intend to detect a new component and its related activities within a specific area. Thus, it will be possible to see whether a component connects with this production chain. Its related activities will also be highlighted in the Monitor mode.

Key Differences: New components and their related activities on the network

Aim: Monitor the production line 2 of the industrial network.

Since a sensor is placed on each production chain, we use the sensor filter to display each production chain. In our example, the industrial network we're monitoring has 3 production lines on which we have positioned a sensor. We want to see and monitor what is happening on production line 2. To do so, we access the Preset All data in the Explore mode and we select the filter SENSOR_Line2 (it is possible to rename sensors to identify which area of the network they're monitoring) so only traffic captured on Production Line 2 appears.

What we need to do then, is to organize the components into groups, per function:

  • PLCs in Line 2

  • IT

  • Broadcast

  • Multicast

As a result, we have a filtered and organized view of production chain 2.

Now that the network data is filtered and grouped, we save the selection as a new preset that we name Line 2.

The preset Line 2 contains components and activities we consider to be interacting in a normal way, that is, production line 2 is in normal operating state. We save the preset's normal state as a baseline that we name Line 2 - Normal State.

We come back later to check Production Line 2. As we access the Explore mode we notice that there are 10 components instead of 9. Number of activities and events have increased too. The baseline Line 2 - Normal State reports 3 alerts.

To understand what had happened exactly, we access the baseline in the Monitor mode.

The left panel indicates that 1 new component and 2 new activities have been found.

As we click the new component, the right side panel opens with the component's detailed properties.

As we observe the component's details, we learn that it is in fact a controller, and properties look like what we're already used to see on the network regarding other components' characteristics. After confirming on site, we discover that a new PLC has been connected to the network to enlarge Production Line 2.

Then, we check that this new component behaves normally by looking at its activities. It has been identified because it has sent a broadcast packet (probably ARP) and then has connected to the Weintek machine using a legitimate protocol. Actions like Read variable accesses look normal too.

Since the component and activities will be part of the normal operating process of Production Line 2, the differences can be acknowledged and included in the baseline to be notified if any change occurs.

We return to the Explore mode and add the component into the Line 2 group.

Eventually, we access the Events page and see that all previous actions are reported here, from the detection of a new component and activities on the network, to adding the component into the group Line 2.

Tracking sensitive assets properties

To ensure a network's security, its critical assets need to be monitored closely. Usually, critical assets are controllers which ensure the plant's operation. To monitor them, we're going to check its properties. The properties to keep an eye on are programs and firmware versions changes that might cause malfunctions or even stop a production line.

Preset Definition: Preset need to be defined per Group or multiple Group

Key Differences: New properties or changed properties on components

In the Explore mode, we access the Preset All data (1). We group the components per function (Broadcast, Multicast, Production Line 2) to organize our data. We select the Controllers component filter (2), so only the components marked with the Controller tag, their activities and related components display.

Now that the network data is filtered and grouped, we save the selection as a new preset (3) that we name Controllers.

The preset Controllers contains components and activities we consider to be operating in a normal way. We save the preset's normal state as a baseline that we name Controllers - Normal State.

We access the Monitor mode. The new baseline Controllers - Normal State displays.

A few moments pass and two alerts are reported in the Controllers preset. We access the baseline to see what happened.

The left panel reports that one component and one activity have changed in the scope of the preset.

As we click on the changed component in the map, a right side panel opens with more information. Changes appear in red. The tag indicates that it's a controller. The properties lldp-description and firmware version have changed and the former version is crossed off.

The particularity here is that no activity on the network seems to explain why the SIEMENS component's firmware version rolled back. To figure this out, we meet with the technical operator in charge of the production line. This person informs us that the latest version was causing several issues on the network. Consequently, a rollback has been performed by a maintenance operator to solve these until a new fix comes out. We conclude that this was part of a normal maintenance act and we acknowledge the differences.

Once differences are acknowledged, they are considered as normal and do not appear in red anymore. If a new change happens such as the version update, the component will appear as changed again in the Monitor mode.

An event is generated accordingly to the previous behaviors that have happened on preset Controllers and actions.

Detect changes that impact availability and integrity

First evidence that someone might have hacked your industrial control system and is trying to disrupt your industrial processes are Stop CPU orders or new programs sent into a Controller's memory. A station that starts to send such content inside a network must be detected as soon as possible. It is possible to monitor a network by watching all control system behaviors.

This can be done in Cisco Cyber Vision by using the Control System Activities preset, which is a default preset and will check all activity tags categorized as Control System Behavior and consequently all related components. Key differences in such use case are new or changed activities. Moreover, components' tags and properties will give further context to help understanding of what is happening in the network.

Preset Definition: Preset need to be defined per activities tag like "Control Systems Behaviors"

Key Differences: New or changed activities

To do so, we access the preset Control System Activities (1) and we create a baseline from this preset (2) that we name Control System Activities - Normal State (3).

As we access the Monitor mode we can access and see the Control System Activities's baseline we just created. Nothing has happened yet on the preset.

After a few moments, new differences are detected on the preset. The left panel and the Map help identifying what has happened: a new component had an activity which changed another component and its activity with another component (1).

Clicking the new component (2) opens a right side panel which offers more information. The tag Windows indicates that the new component is a Windows machine (3). Below, its properties are listed and give more information about the machine.

Clicking the new activity between the new machine and the CPU opens its right side panel and gives more information about what happened. New tags such as Firmware Download, Start CPU, Stop CPU, Read and Write Var, which are suspicious, indicate the type of actions the new Windows machine has performed on the CPU.

These elements let us think that this is actually an attack. We report this issue and start to counter the attack immediately with the security team. If other suspicious changes happen, the Monitor mode will notify them.

Search

This page is available to search for components among unstructured data. You can search components by name, custom name, IP, MAC, tag and property value.


Note

Devices are not available in this page yet.

Results out of a Station research:

In the example above, 20 components have been found with the mention "station" in their name, property values and tags.

It is possible to create a preset out of your research results (1). Presets created out of results will automatically update as new data are detected on the network.

If you mouse over a component, the button that gives access to its technical sheet (2) appears. This view will give you access to advanced data about the component.

Admin

System

Center shutdown/reboot

You can trigger a safe shutdown and reboot of the Center from the System administration page.

The reboot can be used in case of a minor bug. For instance, in case of a system overload.

Upgrade with a combine update file

Version releases usually include updates for both the sensors and the Center (i.e. combined updates). If operating conditions make it possible , you can update the Center and all its online sensors at once from the user interface. You can proceed to a combined update without opening a shell prompt and using SSH.


Note

Combined updates are applied to the Center and all its online sensors. Make sure (by accessing the sensor administration page) that all your sensors are connected and SSH is authorized between the Center and the sensors before proceeding to a combined update.

Important

Rolling back to an older Cisco Cyber Vision version is not possible.

Requirements:

  • A combined update.

To verify that the file you just downloaded is healthy, it is recommended to use the SHA512 checksum provided by Cisco.

To do so (Windows users):

Procedure

Step 1

Access Cisco Cyber Vision download page.

Step 2

Download the file.

Step 3

Open a shell prompt such as Windows Powershell and use the following command to retrieve the file checksum:

Get-FileHash .\CiscoCyberVision-<TYPE>-<VERSION>.<EXT> -Algorithm SHA512 | Format-List

Step 4

In the download page, mouse over the file and copy the SHA512 checksum.

Step 5

Compare both checksums.

  • If both checksums are identical it means the file is healthy.

  • If the checksums do not match try to download the file again.

  • If, after downloading the file again the checksums still don’t match, please contact Cisco support.

To update the Center and all its online sensors:

Step 6

Access the Cisco Cyber Vision's user interface.

Step 7

Access System administration > System and use the System update button.

Step 8

Select the update file CiscoCyberVision-update-combined-<VERSION>.dat

Step 9

Confirm the update.

As the Center and sensors updates proceed, you are redirected to a holding page. Once the update is finished the Center and the sensors need to reboot and you will be logged out from the user interface.

Step 10

Log in again to the user interface.

Step 11

If there were offline sensors when the update occurred, the same procedure can be used as many times as necessary to update all sensors.


Syslog configuration

Cisco Cyber Vision provides syslog configuration so that events can be exported and used by a SIEM. To configure which machine the syslogs will be sent to:

Procedure

Step 1

Click Configure.

Step 2

Select a protocol.

Step 3

Enter the IP address of the SIEM reachable from the Administration network interface (i.e. eth0) of the Center.

Step 4

Enter the port on the SIEM that will receive syslog.

Step 5

Select the variant of syslog format:

  • Standard: event messages are sent in a format specific to Cisco Cyber Vision and with legacy timestamps (one-second precision).

  • CEF: industry standard ("Common Event Format") which is understood by most SIEM solutions (no extra configuration is needed on the SIEM). This is the recommended option.

  • RFC3164: extended syslog header format with microsecond precision for timestamps.

Step 6

If you select TCP + TLS connection an additional "set certificate" button displays to import a p12 file. This file is to be provided by the administrator of your SIEM solution to secure the communications between the Center and the syslog collector.


Import/Export

You can import and export the Cisco Cyber Vision database from the System administration.

This can be used on a regular basis to backup the industrial network data on Cisco Cyber Vision or if you need to transfer the database to a different Center.

Exports are possible up to 2 GB of data to avoid side effects related to slow database exports. If the database is larger than 2 GB, you will get an error message. In this case, you must connect to the Center using SSH and perform a data dump using the command sbs db dump.

Network data, events, users will be kept as well as all customizations (e.g. groups, component names).

As for configurations, only those made in the Cisco Cyber Vision user interface will be kept. Thus, if you change Center you will have to perform a basic configuration of the Center and then configure Cisco Cyber Vision again (refer to the Center Quickstart Guide).


Note

Import can last up to one hour for big databases. However, you can refresh the page from time to time to check that the import keeps going on normally (i.e. no error message).

Knowledge DB

Cisco Cyber Vision uses an internal database which contains the list of recognized vulnerabilities, icons, threats, etc.


Important

It is important to update the Knowledge DB in Cisco Cyber Vision as soon as possible after notification of a new version to be protected against vulnerabilities.

To update the Knowledge DB:

Procedure

Step 1

Download the latest.db file available.

Step 2

From the Cisco Cyber Vision system administration page click the Import a knowledge DB button to upload the file.

Step 3

Importing the new database will rematch your existing components against any new vulnerabilities and update network data.


Certificate fingerprint

The certificate fingerprint is used to register and enroll a Global Center with its synchronized Centers and vice versa.

For more information, refer the the Centers installation guides.

Reset

A Reset to Factory Defaults should be performed carefully with the help of Cisco product support and be used only as a last resort when all other troubleshooting attempts have failed. Please read below all implications of taking this action.

Reset to Factory Defaults is to be used as a last resort to clear all existing data from the Center.

Proceeding to a Reset to Factory Defaults will lead to the deletion of:

  • Some Center configuration data elements.

  • The GUI configuration (such as user accounts, the setup of event severities, etc.).

  • Data collected by the sensors.

  • The configuration of all known sensors (such as IP addresses, capture modes, etc.).

Root password, certificates and configurations from the Basic Center configuration will be kept.

Once a Reset to Factory Defaults has been performed, the GUI page refreshes with the Cisco Cyber Vision installation wizard (refer to the Center Quickstart Guide).

Data management

From the system administration page, you can manage data stored on Cisco Cyber Vision by clearing data to optimize the Center performances, setting data expiration time, and customize traffic ingestion.

Cisco Cyber Vision update procedure will not purge any data automatically. The Center's 3.2.x database will be migrated to the new 4.0.0 schema. All components, activities, flows, events, etc. will be migrated. Since the migration process can take hours (from 1 to 24hours), it is possible to proceed to a data purge in release 3.2.x to shorten the migration process. This purge can be launched either from the Clear data page in the Graphic User Interface (UI), or from the Command Line Interface (CLI), using the following command where different options will be offered:

sbs-db --help

Once migrated, the database content will be managed with version 4.0.0 new data retention policies. Expiration settings will be applied, and the system will purge by default:

  • Events after 6 months

  • Flows after 6 months

  • Variables after 2 years

The user will have 3 days once the migration from 3.2.x to 4.0.0 is done to set expiration settings as needed before default settings are applied by the system.

Clear data

From this page, you can clear data stored on Cisco Cyber Vision to optimize the Center's performances.

You can clear data partially or totally, like below:

  • all data

  • activities, flows and variables

  • flows and variables

  • variables

Clearing data should be performed carefully with the help of Cisco Cyber Vision product support and be used only as a last resort when all other troubleshooting attempts have failed. Clearing any data can impact monitoring of the network. Please read below all implications about all data clearance.

About all data clearance:

Clearing all data is to be used as a last resort in case of database overload issues.

This will result in the entire database content deletion. Network data such as components, flows, events and baselines will be deleted from Cisco Cyber Vision and the GUI will be emptied.

All configurations will be saved. Existing users and user data configuration (such as capture modes, events severity set up, syslog configuration) will remain unchanged.

Expiration settings

From this page, you can set data expiration time. Data is removed on a daily-basis once they expire. You can set an expiration time to events, flows and variables independently, and for a period of 7 days, 1 month, 3 months, 6 months or 1 year.

Ingestion configuration

The ingestion configuration page allows you to configure flow and variable traffic storage.

You can choose whether to store flows and variables.

If flows storage is enabled, it is possible to choose from which subnetworks flows should be stored. These subnetworks can be set on the Network organization page. The option "others", that is, flows that are not part of the industrial private network, is disabled by default.

It is also possible to choose if enabling flows aggregation and port scan detection.

Network organization

This page allows you to setup the subnetworks inside the industrial network by defining IP address ranges and declaring whether networks are internal or external.

Defining subnetworks is useful for several reasons:

  • It allows you to choose afterwards how related flows should be stored through the Ingestion configuration page.

  • It will impact devices' risk scores, since a private network is considered as safer than an external one.

  • Cisco Cyber Vision license will be more accurate, because devices from an external network will be excluded from the licensing devices count.

To define a subnetwork, you must click the Add a network button and give it a name, an IP address range, and a network type such as OT internal, IT internal or external.

Sensors

Sensor Explorer

The Sensor Explorer page allows you to install, manage, and obtain information about the sensors monitoring your industrial network.

First, you need to know that sensors can be used in two modes, and for different purposes:

  • Online mode: A sensor in online mode is placed at a particular and strategic point of the industrial network and will continually capture traffic.

    Applicable to: Cisco IE3400, IE3300 10G, Cisco IC3000, Catalyst 9300 and Cisco IR1101.

  • Offline mode: A sensor in offline mode allows you to easily connect it at different points of the industrial network that may be isolated or difficult to access to occasionally make traffic captures. Traffic is captured on a USB drive. The file will then be imported in Cisco Cyber Vision.

    Only applicable to Cisco IC3000.

On the Sensor Explorer page, you will see a list of your folders and sensors (when installed) and buttons that will allow you to perform several actions.

Installation modes, features, and information will be available depending on the sensor model and the mode in which it’s being used.

Additional information and actions are available as you click a sensor in the list. A right side panel will appear allowing you to see this information such as the serial number, and buttons to perform other actions.

Filter and sort the sensor list

Filtering

Clicking the Filter button allows you to filter the folders and sensors in the list by label, IP address, version, location, health and processing status.

The folders and sensors list without filtering:

Type in the field or select from the drop down menu to reach the folder(s) or sensor(s) and click the Apply button:

The folders and sensors list after filtering by label:

Sorting

Sort icons allow you to sort sensors by label, IP address, version, location, health and processing status by alphabetical or by ascending/descending order. Sort icons appear when applied or as you hover over them.

Sensors status

There are two types of sensor status:

  • The health status, which indicates at which step of the enrollment process the sensor is.

  • The processing status, which indicates the network connection state between the sensor and the Center.

Health status:

  • New

    This is the sensor's first status when it is detected by the Center. The sensor is asking the DHCP server for an IP address.

  • Request Pending

    The sensor has asked the Center for a certificate and is waiting for the authorization to be enrolled.

  • Authorized

    The sensor has just been authorized by the Admin or the Product user. The sensor remains as "Authorized" for only a few seconds before displaying as "Enrolled".

  • Enrolled

    The sensor has successfully connected with the Center. It has a certificate and a private key.

  • Disconnected

    The sensor is enrolled but isn't connected to the Center. The sensor may be shut down, encountering a problem, or there is a problem on the network.

Processing status:

  • Disconnected

    The sensor is enrolled but isn't connected to the Center. The sensor may be shut down, encountering a problem, or there is a problem on the network.

  • Not enrolled

    The sensor is not enrolled. The health status is New or Request Pending. The user must enroll the sensor for it to operate.

  • Normally processing

    The sensor is connected to the Center. Data are being sent and processed by the Center.

  • Waiting for data

    The sensor is connected to the Center. The Center has treated all data sent by the sensor and is waiting for more data.

  • Pending data

    The sensor is connected to the Center. The sensor is trying to send data to the Center but the Center is busy with other data treatment.

Sensors features

You will find in the Sensor Explorer page several features to manage and use your sensors. Some buttons are accessible from the Sensor Explorer page itself to manage one or more sensors. Other buttons are available when clicking a sensor in the list. A right side panel opens with additional sensor information and actions that are available or not depending on the sensor model, mode (online or offline) and the installation type performed.

  • The Start recording button records a traffic capture on the sensor. Records can be used for traffic analysis and may be requested by Cisco support in case of malfunctions. You can download the recording clicking the link below.


    Note

    This feature is targeted for short captures only. Performing long captures may cause the sensor overload and packets loss.
  • The Move to button is to move the sensor through different folders. For more information, refer to Organize sensors.

  • The Download package button provides a configuration file to be deployed on the sensor when installing the sensor manually (online mode). Only applicable to the Cisco IC3000. Refer to its Installation Guide.

  • The Capture Mode button can be used to set a filter on a sensor sending data to the Center. Refer to the procedure for Setting a capture mode.

  • The Redeploy button can be used to partly reconfigure the sensor, for example to change its parameters such as its IP address.

  • The Enable IDS button can be used to enable the SNORT engine embedded in some sensors to analyze traffic by using SNORT rules. SNORT rules management is available on the SNORT administration page.

  • The Reboot button can be used to reboot the sensor in case of a malfunction.

  • The Shutdown button triggers a clean shutdown of the sensor from the GUI.


    Note

    After performing a shutdown, you must switch the sensor ON directly and manually on the hardware.
  • The Uninstall button can be used to remove an uninstalled sensor from the list or to fully uninstall a sensor. Diverse options are available according to the sensor model or deployment mode. In the case of a sensor deployed through the management extension, the IOx app can be removed from the device, whereas a reset to factory defaults can be performed in other cases. In any case, the sensor will be removed from the Center.

Install sensor

From the Sensor Explorer page, you can:

  • Install a sensor manually.

  • Install a sensor via the IOx extension. To use the Install via extension button you must first install the sensor management extension via the Extensions page.

  • Capture traffic with an offline sensor (only applicable to Cisco IC3000).

    For more information about how to install a sensor, refer to the corresponding Sensor Installation Guide.

Manage credentials

The Manage credentials button, which you can have access by clicking Manage Cisco devices in the Sensor Explorer page, is to register your global credentials if configured before in the Local Manager.

This feature can be used to register your global credentials in Cisco Cyber Vision. This will allow you to enter these credentials only once and they will be used when performing actions that require these credentials, that is installing and updating sensors via the IOx extension.

Only one set of global credentials can be used per Cisco Cyber Vision instance, which means that you cannot have several set of sensors accessible by different global credentials in a single instance. If there are several sensor administrators, they must use the same global credentials registered in Cisco Cyber Vision. However, you can have a set of sensors using a single global credentials and other sensors with their own single credentials.

Global credentials are stored in Cisco Cyber Vision but are set at the switch level in the Local Manager. Consequently, if you lose your global credentials, you must refer to the switch customer support and documentation.

The Manage credentials button can be used the first time you register your global credentials and each time global credentials are changed in the Local Manager. To do so, enter the login and password and click Save.

Once the global credentials are registered, the feature will be enabled in the Install via extension procedure. Select the Use global credentials option to use your global credentials.

Organize sensors

You can create folders and move your sensors into the folders for more clarity. Folders can correspond to a location, a person in charge, a set of disconnected sensors, etc.

To create a folder and move a sensor in it:

  1. Click the Organize button and click Create folder.

  2. Write a folder name, and, if needed, a location and a description.

    The new folder is displayed in the sensor list.

  3. Select a sensor in the list and click the button Move selection to.

  4. Select the folder you want to place the sensor in or create a new folder. Root can be used to move sensors back into the primary list.

    The sensor is moved into the folder. The sensor version, health status and processing status are displayed in the folder line.

    If you move a sensor in a disconnected state inside this same folder, then its information will be displayed in the folder line rather than the sensor in connected state. Less secure sensor status are showcased in priority to drag your attention.

    The sensors inside a folder:

Set a capture mode

The Capture mode feature lets you choose which network communications will be analyzed by the sensors. You can set it by clicking an online sensor in the sensors list of the Sensor Explorer page or during a sensor installation.

Setting the capture mode on a sensor from the right side panel:

Capture modes:

The aim is mainly to focus the monitoring on relevant traffic but also to reduce the load on the Center.

For example, a common filter in a firewall can consist of removing the network management flows (SNMP). This can be done by setting a filter like "not (port 161 and host 10.10.10.10)" where "10.10.10.10" is the network management platform.

Using Capture mode Cisco Cyber Vision performance can be improved on large networks.

Capture modes operate because of filters applied on each sensor. Filters are set to define which types of incoming packets are to be analyzed by the sensors. You can set a different filter on each sensor according to your needs.

You can set the capture mode in the installation wizard when enrolling the sensors during the Center installation. This option is recommended if you already know which filter to set. Otherwise, you can change it at any time through the Sensor Explorer page in the GUI (provided that the SSH connection is allowed from the Center to the sensors).


Note

You can set a capture mode to offline sensors from a file containing the filter and registered on the USB drive. This will be then plugged on the Offline USB port of the device. For more information about setting a capture mode on an offline sensor contact the support.

The different capture modes are:

  • ALL: No filter is applied. The sensor analyzes all incoming flows and they will all be stored inside the Center database.

  • OPTIMAL (Default): The applied filter selects the most relevant flows according to Cisco expertise. Multicast flows are not recorded. This capture mode is recommended for long term capture and monitoring.

  • INDUSTRIAL ONLY: The filter selects industrial protocols only like modbus, S7, EtherNet/IP, etc. This means that IT flows of the monitored network won't be analyzed by the sensor and won't appear in the GUI.

  • CUSTOM (advanced users): Use this capture mode if you want to fully customize the filter to be applied. To do so you will need to use the tcpdump syntax to define the filtering rules.

Management jobs

As some deployment tasks on sensors can take several minutes, this page shows the jobs execution status and advancement for each sensor deployed with the sensor management extension.

This page is only visible when the sensor management extension is installed in Cisco Cyber Vision.

You will find the following jobs:

  • Single deployment

    This job is launched when clicking the Deploy Cisco device button in the sensor administration page, that is when a new IOx sensor is deployed.

  • Single redeployment

    This job is launched when clicking the Reconfigure Redeploy button in the sensor administration page, that is when deploying on a sensor that has already been deployed. This option is used for example to change the sensor's parameters like enabling active discovery.

  • Single removal

    This job is launched when clicking the Remove button from the sensor administration page.

  • Update all devices

    This job is launched when clicking the Update Cisco devices button from the sensor administration page. A unique job is created for all managed sensors that are being updated.

If a job fails, you can click on the error icon to view detailed logs.

PCAP Upload

This page allows you to upload pcaps to view their data in Cisco Cyber Vision.

When selecting a pcap, two options are available:

  • You can choose to use the timestamp of the pcap or the current timestamp instead. Choosing the current timestamp can be useful if the pcap timestamp is old and searching for its data in Cisco Cyber Vision is thus easier.

  • You can define a preset from the pcap. Once the pcap is uploaded you'll just have to click the pcap link to be redirected to its preset.

Note that during the upload that the status for the DPI and Snort are displayed.

If uploading a large file, you have the possibility to pause it. To relaunch the upload, you just need to select the same pcap again with the browse button and click Resume.


Note

pcap data cannot be erased individually from Cisco Cyber Vision. You will need to use the Clear data button and it will affect the whole database. Upload pcaps with caution.

Users

Management

You can create, edit and delete users through the users administration page.

During their creation each user must be assigned with one of the following user roles (from full rights to read-only) or with a custom role (refer to Role Management).

  • Admin

    The Admin user has full rights on the Cisco Cyber Vision platform. Users who have this role assigned oversee all sensitive actions like user rights management, system updates, syslog configuration, reset and capture modes configuration on sensors.

  • Product

    The product user has access to several features of the system administration page (i.e. the system, sensors and events administration pages). This access level is for users who manage sensors from a remote location. In addition, they can manage the severity of events and, if enabled by the Admin user, can manage their export to syslog.

  • Operator

    This access level is for users who use the Monitor mode and manage groups but do not have to work with the platform administration. Thus, the Operator user has access to all pages, except the system administration page.

  • Auditor

    This access level provides read-only access to the Explore, Reports, Events and Search pages. Auditors can use sorting features (such as search bars and filters) that do not require persistent changes to the Cisco Cyber Vision data (unlike Autolayout), and generate reports.

You can create as many users as needed with any user rights. Thus, several administrators can use and administrate the whole platform.

However, each user must have their own account. That is:

  • Accounts must be nominative.

  • One email address for several accounts is not allowed (note that email will be requested for login access).

    Passwords must contain at least 6 characters and comply with the rules below. Passwords:

    • Must contain a lower case character: a-z.

    • Must contain an upper case character: A-Z.

    • Must contain a numeric character: 0-9.

    • Cannot contain the user id.

    • Must contain a special character: ~!"#$%&’()*+,-./:;<=>?@[]^_{|}.


      Important

      Passwords should be changed regularly to ensure the platform and the industrial network security.

Passwords' lifetime is defined in the Security settings page.

You can create custom user roles in the Role Management page.

You can map Cisco Cyber Vision user roles with an external directory's user groups in the LDAP settings page.

Role Management

In addition to the four Cisco Cyber Vision default roles (i.e. Admin, Auditor, Operator and Product), customized roles can be created and modified from the Role management page.

These roles will help you defining specific privileges and accesses for each group of users.

Default roles cannot be edited or deleted.

You can map Cisco Cyber Vision custom roles with an external directory's user groups in the LDAP settings page.

Create roles

This section explains how to create customized user roles on Cisco Cyber Vision. These can be later mapped to groups in Active Directory.

Procedure

Step 1

In Cisco Cyber Vision, navigate to Admin > Users > Role Management.

Step 2

Click the + button next to default user roles.

A new role tab appears.

Step 3

Type a role name and a description.

Step 4

Select an existing role from the Search/Add existing permissions drop down menu, or click the Add New Permissions button to build the new user role from scratch.

Step 5

Select/unselect permissions from the list as read or write

Step 6

Click save.

A message saying that the user role has been created successfully appears.

The new user role is displayed in the tab list.

You can modify or delete directly in the tab.


What to do next

Custom roles created can be mapped with an external directory's user groups in the LDAP settings page.

Security settings

From this page you can configure the security settings of users' password such as its lifetime, the number of authorized login attempts, the number of days before a password can be reused, etc.

Events

The severity of Events can be customized on the events administration page. By default, changes will be applied to future events only. However, you can apply new customized severities to past events by enabling Apply severity to existing events.


Important

This action is irreversible and can take several minutes to complete.

You can reset the severity to default.

You can enable or disable the export of events to syslog and database storage. These two options are active by default. However, make sure syslog has been configured before the export.

API

Token

Cisco provides a REST API. To use it you first need to create a token through the API administration page.

A token is a random password which authenticates a request to Cisco Cyber Vision to access or even modify the data in the Center through the REST API. For instance, you can request the latest 10 components detected on Cisco Cyber Vision or create new references. Requests can be used by external applications like a SOC solution.


Note

Best practice: create one token per application so you can remove or expire accesses separately.

Create your first token and enter a name that will help you identifying the token. For security reasons you can also use the status toggle button to disable authorization to use the token (for example, if the token created is to be used later and you want to prevent access until then) and set an expiration time.

Once the token is created click show to see and copy the token to the clipboard.

For more information about the REST API refer to the REST API user documentation available on cisco.com.

Documentation

This page is a simplified API development feature. It contains an advanced API documentation with a list of all possible routes that can be used and, as you scroll down the page to Models, a list of possible data responses (data type, code values and meaning).

In addition to information research, this page allows you to perform basic tests and call the API by sending requests such as GET, DELETE and POST. You will get real results from the Center dataset. Specifications about routes are available such as the route's structure, and parameters and arguments that can be set. An URL is generated and curl can be used in a terminal as it is.

However, for an advanced use, you must create an application that will send requests to the API (refer to the REST API documentation).


Important

All routes other than GET will modify data on the Center. As some actions cannot be reversed, use DELETE, PATCH, POST, PUT with caution.

Routes are classified by Cisco Cyber Vision's elements type (activities, baselines, components, flows, groups, etc.).

The category "Groups" containing all possible group routes:

To authorize API communications:

Procedure

Step 1

Access the API Token menu to create and/or copy a token.

Access the API Documentation page and click the Authorize button.

Step 2

Paste the token.

Step 3

Click Authorize.

Step 4

Click Close.

Closed lockers displays. They indicate that routes are secured and authorization to use them is up.

To use a route:

Step 5

Click a route to deploy it. In the example, we choose Get activity list.

Step 6

Click Try it out.

Step 7

You can set some parameters. In the example, we set page to 1 and size to 10.

Step 8

Click Execute.

Note 
You can only execute one route at a time.

A loading icon appears for a few moments. Responses display with curl, Request URL and the server response that you can copy or even download.

Step 9

When you're finished, click the Authorize button.

Step 10

Logout to clean the token variable, and click Close.


License

You can install a license in Cisco Cyber Vision in the License administration panel.

Licensing is based on device count. For device count to be more accurate, it is advised to setup the subnetworks of the monitored industrial network through the Network organization page. By doing so, you will declare which subnetworks are internal, and which are external. Devices from external subnetworks will be excluded from the license count and related costs would be reduced.

For more information about how to install a license, refer to the Cisco Cyber Vision Smart Licensing User Guide.

External Authentication

LDAP

Cisco Cyber Vision can delegate user authentication to external services using LDAP (Lightweight Directory Access Protocol), and in particular to Microsoft Active Directory services.

You can enable LDAP authentication in the LDAP Settings administration page.

Configuring LDAP:

LDAP integration can be done through normal connection or securely by using certificates depending on the installation compatibility.

Mapping Cisco Cyber Vision roles with Microsoft Active Directory groups:

User groups available in the external directory can be mapped to Cisco Cyber Vision Product, Operator and Auditor user roles or custom roles. Refer to Role Management to create custom roles.

Because the Admin user role is exclusively reserved for Cisco Cyber Vision internal usage, it cannot be mapped to any external users and thus is not proposed in LDAP settings.

Testing LDAP connection:

After setting up LDAP, the connection between the Cisco Cyber Vision Center and the external directory is to be tested. On the LDAP test connection window, you will use a user login and a password set in the external directory. The Center will attempt to authenticate on the directory server with these credentials. In return, you will get either a successful authentication, or a failed one with an error message.

Login in Cisco Cyber Vision:

When logging into Cisco Cyber Vision, the login format used will determine the base (i.e. internal or external) to be queried:

  • If you use an email, the Cisco Cyber Vision database is queried.

  • If you use the Active Directory format <domain_name>\<user_name> (e.g. cisco\john_doe), then the external directory is used to authenticate users.

Configure LDAP

This section explains how to configure LDAP in Cisco Cyber Vision using a normal connection or a secure connection.

Procedure

Step 1

In Cisco Cyber Vision, navigate to Admin > External Authentication > LDAP.

Step 2

Click New Settings.

The New LDAP Settings window pops up.


What to do next

Configure LDAP using a normal connection or a secure connection.

LDAP normal connection

After clicking the New Settings button, the following New LDAP Settings window pops up.

Before you begin
Procedure

Step 1

Fill in the LDAP settings.

Step 2

Click the Role Mapping tab.

Step 3

Fill in the following fields:

  1. Map one or more Cisco Cyber Vision default roles with an Active Directory group.

    Note 

    At least one default role must be mapped.

    Note 

    Because the Admin user role is exclusively reserved for Cisco Cyber Vision internal usage, it cannot be mapped to any external users and thus is not proposed in LDAP settings.

  2. Map Cisco Cyber Vision custom roles with Active Directory groups.

    You must type the exact group names as configured into the remote directory so they can be retrieved and mapped to user roles.

Step 4

Click OK.

Step 5

Click the Test connection button.

The Test Connection window pops up.

Step 6

Enter a user credentials to test the connection between Cisco Cyber Vision and Active Directory.

Note 

The Username format is domain\user.

A message Successful LDPA bind should appear.

Step 7

Click OK.

Step 8

Test the connection by logging out of Cisco Cyber Vision and logging in with the mapped user credentials.


Menus are displayed according to the rights granted to the user.

What to do next
LDAP secure connection

After clicking the New Settings button, the following New LDAP Settings window pops up.

Before you begin
Procedure

Step 1

Fill in the following fields:

  1. Tick LDAP over TLS/SLL.

  2. Fill in the LDAP settings.

  3. Upload a .pem root certificate or a chain certificate, or tick Use a self-signed certificate.

    If you upload a certificate, a message indicating that the certificate has been uploaded successfully appears.

    The certificate appears at the bottom of the New LDAP Settings window.

Step 2

Click OK.

Step 3

Click the Role Mapping tab.

Step 4

Fill in the following fields:

  1. Map one or more Cisco Cyber Vision default roles with an Active Directory group.

    Note 

    At least one default role must be mapped.

    Note 

    Because the Admin user role is exclusively reserved for Cisco Cyber Vision internal usage, it cannot be mapped to any external users and thus is not proposed in LDAP settings.

  2. Map Cisco Cyber Vision custom roles with Active Directory groups.

    You must type the exact group names as configured into the remote directory so they can be retrieved and mapped to user roles.

Step 5

Click OK.

Step 6

Click the Test connection button.

The Test Connection window pops up.

Step 7

Enter a user credentials to test the connection between Cisco Cyber Vision and Active Directory.

Note 

The Username format is <domain_name>\<user_name> (e.g. cisco\john_doe).

A message Successful LDPA bind should appear.

Step 8

Click OK.

Step 9

Test the connection by logging out of Cisco Cyber Vision and logging in with the mapped user credentials.


Menus are displayed according to the rights granted to the user.

What to do next

Snort

Snort is a network intrusion detection system (NIDS) software based on a text rules engine. It is provisioned in some Cisco Cyber Vision sensors like the senor embedded in the IC3000, but not activated by default. Cisco Cyber Vision Center stores the rules and configuration files but also intercepts Snort alerts and display them as event.

To activate the Snort engine in the sensor, the button "Enable IDS" from the sensors management page needs to be used:

The rules and the basic configuration of Snort are packaged in the Cisco Cyber Vision Knowledge Database and managed from the SNORT menu. This package is updated regularly by Cisco and need to be updated by retrieving the updated KDB from the official Cisco repository. By default standard rules are configured and some of them are enabled, others are disabled.

In the SNORT administration menu, rules coming from Cisco could be consulted and enabled or disabled. To simplify the usage rules were grouped in categories in order to enable or disable an entire category. The status button (1) column could be used to enable or disable the corresponding category. All category rules could be consulted by downloading the set of rules (2)

Categories list:

  • Browser

  • Deleted

  • Experimental-DoS

  • Experimental-Scada

  • Exploit-Kit

  • File

  • Malware-Backdoor

  • Malware-CNC

  • Malware-Other

  • Misc

  • OS-Other

  • OS-Windows

  • Server-Other

  • Server-Webapp

Some custom rules could be used in order to generate specific alerts. To do this, a file needs to be generated with a defined syntax as the base rule files. Snort also provides some help to generate rules (Snort_rule_infographic.pdf).

Custom rules file could be imported in the center by using the button "IMPORT CUSTOM RULES FILE". All custom rules are stored in the center, they could be downloaded for review by using the button "DOWNLOAD".

The predefined rules available in categories could be enabled or disabled individually by using the rule signature id (sid). To retrieve the sid the category file need to be downloaded and consulted, the sid is present at the end of the rule line. When a rule is disabled a "#" is added in front of the rule line to comment it. When a rule is enabled the "#"in front of the rule line is deleted. The 2 buttons "DISABLE" and "ENABLE" are used to do those actions.

When the configuration is done the rules definition (standard and custom) could be sent to the sensors by using the button "SYNCHRONIZE RUELS ON SENSORS".

In case of mistake, or to initialize the configuration, the button "RESET TO DEFAULT" could be used. All rules settings will be reset to the default Cisco Cyber Vision configuration.

Risk score

Integrations

pxGrid

From this page, you can configure ISE pxGrid Cisco Cyber Vision integration.

Cisco Platform Exchange Grid (pxGrid) is an open, scalable data-sharing and threat control platform that allows seamless integration between multivendor identity, network, security and asset management systems.

For more information about how to perform this integration, refer to the manual "Integrating Cisco Cyber Vision with Cisco Identity Services Engine (ISE) via pxGrid".

FMC

FMC administration page permits to configure a link between Cisco Cyber Vision with your Firepower Management Center. This connection will permit to send regularly (every 10 seconds) the components discovered by Cisco Cyber Vision. Every 10 seconds a list of new discovered components will be sent with the following properties in Cisco Cyber Vision:

  • Name

  • Id

  • Ip

  • Mac

  • And if they are available:

    • hw_version

    • model-ref

    • serial_number

    • fw_version

    • tags

The configuration of this connection consists of adding the IP address of FMC, then importing a certificate in Cisco Cyber Vision.

In FMC, to download the necessary certificate, please navigate to "System" then to "Integration" and open the "Host Input Client" tab. In the tab create a new Client with the button "Create Client". Add the Cisco Cyber Vision Center IP address as host name, then download the pkcs12 certificate.

Then, in FMC, menu "Policies", "Application Detectors" add a new Product Map with the button "Create Product Map Set". Please create the new product Map with the exact name and case as presented below:

The created hosts could be consulted in FMC, menu "Analysis", tab "Hosts – Network Map":

FTD

FTD administration page permits to connect Cisco Cyber Vision with your Firepower Threat Defense. It will allow to automatically kill anomalies detected by monitor mode and snort events. The corresponding session found in FTD will be killed.

Every 10 seconds Cisco Cyber Vision will browse the new monitor and SNORT events and send the corresponding action to the firewall. To enable that functionality, the user needs to add the following parameters in the FTD administration page:

  • Ip address of the firewall

  • Login: admin login, an ssh connection will be established between the center and the firewall

  • Password: corresponding password

  • Hostname: is the name of the device, by default "firepower"

Two option are available: kill session from monitor difference detection events and kill session from snort events.

SecureX

Cisco SecureX is an online platform that centralizes security events from different Cisco software equipments through an API. For example, events like Cisco Cyber Vision events or firewall events can be sent to Cisco SecureX and correlated to be presented through different dashboards.

The integration with SecureX will enable 3 features in Cisco Cyber Vision:

  • with SecureX SSO login, a button "Report to SecureX" will appear in some events of the event calendar page. this button will push the events to SecureX.

  • with SecureX SSO login, a SecureX Ribbon could be activated ans associated features could be used in Cisco Cyber Vision.

  • without SecureX SSO login, a button "Investigate in SecureX Threat Response" is displayed in component technical sheet.

The different topics below will cover the configuration of SecureX in Cisco Cyber Vision and the usage of the different features authorized.

SecureX configuration
Before you begin

The Cisco SecureX configuration in Cisco Cyber Vision requests:

  • An Admin access to Cisco Cyber Vision

  • A Cisco Cyber Vision Center with internet access

  • A SecureX account with an admin role.

Procedure

Step 1

To start the configuration, in Cisco Cyber Vision navigate to the Admin menu, then Integrations and finally SecureX.

Step 2

Then on the SecureX page select the Region to be used:


Step 3

Once the Region selected, the button Enable SecureX becomes available, click on it to enable the link.


Once enabled the button becomes red:

Reaching this step is enough to use the button "Investigate in SecureX Threat Response" in component technical sheet. The other 2 features need some extra steps explained below:

Step 4

Navigate to the user My Settings menu (on the top right corner of the user interface). A new menu SecureX is available on this page when SecureX is enabled.


Step 5

Click on the SecureX SSO button, a pop-up should appear with an authentication code:


Step 6

A new page is opened in the browser with a Grant Application Access to SecureX, click on Authorize Cyber Vision


Step 7

A positive answer from the system will display the following pop-up:


Step 8

Go back in Cyber Vision user interface, the SecureX area of the My Settings menu presents now a Logout of SecureX button and a slide button to activate the Ribbon:


Step 9

To activate the ribbon, click on the Ribbon Status slide and click on the button Save Settings




Step 10

Once done, the SecureX menu should be like:



What to do next

The 3 SecureX features are now enabled and could be used.

SecureX Ribbon in Cyber Vision
Once configured and activated, the SecureX Ribbon will appear on the bottom of the Cisco Cyber Vision user interface in the Explore menu, for example in the Device List:

The SecureX Ribbon usage is explained in the Cisco SecureX Getting Started Guide For example to find observables and investigate them in SecureX threat Response, click the Find Observables icon like below:

SecureX event integration

When the configuration of SecureX is made in Cisco Cyber Vision a button will appear in some events of the event calendar page, this button will push the event to SecureX and create incident.

The SecureX button will appear on 3 categories of event:

  • Anomaly Detection

  • Control Systems Events

  • Signature Based Detection

For example:

SecureX component button

When the SecureX configuration is done, a button will be avaialble in the component techncial sheet to investigate in SecureX Threat response the IP and MAC address of the component.

For example:

Extensions

From this page, you can manage Cyber Vision Extensions. Extensions are optional add-ons to Cyber Vision Center which provide more features, such as the management of new device types, additional detection engines, or integrations with external services.

Center certificate

The Center web server certificate page is to configure Cisco Cyber Vision user interface security with an enterprise certificate. You will have the option to upload a .p12 or to generate a CSR.

For more information, refer to the corresponding Center Installation Guide.

SNMP

SNMP Protocol in CyberVision is used for remote monitoring purposes.

Supported versions are:

  • SNMP V2C

  • SNMP V3

Older versions are not supported.


Important

It is highly recommended to use version 3 of the SNMP protocol. Version 2c is available due to a large number of infrastructures still using it. However, take into account that risks in terms of security are higher.


Snmp information:

  • CPU % per core

  • Load 0 to 100 (combination of CPU and I/O loads)

  • RAM kilobytes

  • Swap kilobytes

  • Traffic for all physical interfaces (nb bytes in and out/interface (since the snmp service startup))

  • Data storage (% - 250G)

  • Packets stats (packets/sec/int)

Configure SNMP

This section explains how to configure SNMP on a CyberVision Center.

Procedure

Step 1

In Cisco Cyber Vision, navigate to Admin > SNMP.

Step 2

Toggle the SNMP agent button.

A configuration menu appears.

Step 3

In the Monitoring hosts (IPv4) field, fill in the IP address of the Monitoring host.

Step 4

Select a version:

  • Version 3
  • Version 2c
Note 

For security reasons, it is recommended to use SNMP version 3.

  1. Version 3

    Select a security type:

    • NoAuth: Only a username is required. No authentication password required.

      Add the username that will be used for the SNMP authentication. "ics" is used by default.

    • Auth with NoPriv : A username and an encrypted password are required.

      Add the username that will be used for the SNMP authentication. "ics" is used by default.

      Add the Hash algorithm needed and its password. It must be at least 8 characters long.

    • Auth with Priv: Only the AES encryption is available. A username, an encrypted password, and an AES encryption are required.

      Add the username that will be used for the SNMP authentication. "ics" is used by default.

      Add the Hash algorithm needed and its password. It must be at least 8 characters long.

      Add the AES password. It must be at least 8 characters long.

  2. Version 2c

    Add the community string for the Center to communicate with the monitoring host.

Step 5

Toggle the Trap button.

The following configuration menu appears:

Step 6

Setup traps to be delivered.

  1. If SNMP v3 has been selected, the Engine ID field (i.e. the Center id) is displayed so you can customize it.

  2. Select and set the CPU and memory rate limit and threshold according to your needs.

Step 7

Click Save Configuration.


SNMP MIB

Table 1.

MIB

OID prefix

Description

*MIB-2*

.1.3.6.1.2.1.1

System

*IF-MIB*

.1.3.6.1.2.1.2.2.1.1

All physical interfaces

*IF-MIB*

.1.3.6.1.2.1.31.1.1

All physical interfaces

*HOST-RESOURCES-MIB*

.1.3.6.1.2.1.25.1

System

*HOST-RESOURCES-MIB*

.1.3.6.1.2.1.25.2.3

Storage

*HOST-RESOURCES-MIB*

.1.3.6.1.2.1.25.3.3

CPU

*HOST-RESOURCES-MIB*

.1.3.6.1.2.1.25.3.6

Disk

*UCD-SNMP-MIB*

.1.3.6.1.4.1.2021.4

Memory

*UCD-SNMP-MIB*

.1.3.6.1.4.1.2021.9

Disk

*UCD-SNMP-MIB*

.1.3.6.1.4.1.2021.10

Load

*UCD-SNMP-MIB*

.1.3.6.1.4.1.2021.11

CPU

*UCD-DISKIO-MIB*

.1.3.6.1.4.1.2021.13.15.1

Disk IO

System statistics

To access system statistics click the System statistics button on the top right corner of Cisco Cyber Vision.

Center

The Center statistics view provides data about the state of the Center CPU, RAM, disk, network interfaces bandwidth and database.


Note

Most data presented below evolve as you select a different period of time.

At the top of the page, you will find general information about the Center (the software version, the length of time that it has been operating (i.e. uptime), the Center system date and whether DHCP is enabled or not).

The button on the right generates a diagnostic file about the Center that is sometimes requested by the Cisco product support in case of trouble.

System health:

The system health gives you the state of the Center CPU, RAM and disk usage.

Usages (i.e. minimum, maximum and average) are indicated for each of these system resources while the absolute value is shown in a tooltip if you mouse over the line chart.

Below, you have the percentage of the system's current usage. Also, there is an indicative hardware score which is useful to Cisco product support.

The Compute Scores button initiates a new performance measure to compute a new score.

Network interfaces bandwidth:

The line charts represent the Administration and Collection network interfaces bandwidth with the number of bytes received and sent by the Center per second.

For example, the Collection network interface activity lets you see the amount of data exchanged between the Center and the sensors.

Disk I/O:

The line chart represents the Center hard disk usage with the number of bytes read and written per second.

Database:

This section describes the database state by showing cards with the number of flows, components and variables that have been detected by Cisco Cyber Vision. Flows distribution is shown in a pie chart.

Data is updated each time you access the Center statistics view (the latest count is indicated on top of the database section). However, the Get Count button actualizes the database performance to the current time.

The flows card indicates the total number of flows (i.e. broadcast, multicast and unicast which are stored in the database) detected by Cisco Cyber Vision. If you mouse over the card, you will get the number of activities and the flows evolution tendency. This information enables you to anticipate how the system load might be affected by flows in the future.

The variables card indicates the total number of variables detected by Cisco Cyber Vision. This indicator is important because an overload of variables could impact the Cisco Cyber Vision performances. If you mouse over the card you will get the number of process variables and the number of system variables.

  • Process variables are the number of variables used by PLCs' software. Process variables are visible in the Monitor mode of the Cisco Cyber Vision GUI.

  • System variables are the number of variables necessary to PLCs' proper operation. System variables are stored in the Cisco Cyber Vision database.

The flows distribution pie chart indicates the distribution of broadcast, multicast and unicast flows stored in the database. Mouse over the chart to see the absolute number of flows per flow type.

Sensors

The sensors statistics view provides data about the CPU, RAM, disk, network interfaces bandwidth and packets captured for each sensor enrolled in Cisco Cyber Vision.


Note

Most data presented below evolve as you select a different period of time.

On the left you have a list of the sensors (only one sensor is represented here). Click on a sensor name to access its statistics.

On top of the sensors statistics view you will find general information about the sensor: its status (i.e. Connected), its serial number, its IP and MAC addresses, its firmware version, the capture mode set and the time it has been operating (i.e. uptime).

The button on the right generates a diagnostic file about the sensor that is sometimes requested by the Cisco product support in case of trouble.

System health:

The system health gives you the state of the sensor CPU, RAM and disk usage.

Usages (i.e. minimum, maximum and average) are indicated for each of these system resources while the absolute value is shown in a tooltip if you mouse over te line chart.

Below, you have the percentage of the system current usage. There is also an indicative hardware score which is useful to Cisco product support.

Packets captured:

This line chart represents the number of packets that the sensor captures on the Industrial network interface (in bytes per second). Packets dropped are also represented but the value should stand to zero. If the dropped line shows activity then the sensor is overloaded and is not capturing traffic.

Network interfaces bandwidth:

The line charts represent the Collection and the Industrial network interfaces bandwidth with the number of bytes received and sent by the Center per second.

  • The Collection Network interface activity chart lets you see the amount of data exchanged between the Center and the sensors.

  • The Industrial ones lets you see the amount of data captured by the sensor on the industrial network through each ports couple.

    Data sent to the industrial network is also represented but value should stand to zero. If the transmitted line shows activity then the sensor is not passive anymore. If this situation happens, please contact Cisco support immediately.

Disk I/O:

The line chart represents the sensor hard disk usage with the number of bytes read and written per second.

My settings

You can set up your personal account by clicking Settings in the user menu on the top right corner of Cisco Cyber Vision.

From this page, you can:

  • Modify your first and last name.

  • Change the interface language. Cisco Cyber Vision is available in English, French, German, Japanese, Spanish and Turkish.

  • Change your password.

    Passwords must contain at least 6 characters and comply with the rules below. Passwords:

    • Must contain a lower case character: a-z.

    • Must contain an upper case character: A-Z.

    • Must contain a numeric character: 0-9.

    • Cannot contain the user id.

    • Must contain a special character: ~!"#$%&’()*+,-./:;<=>?@[]^_{|}.


      Important

      Passwords should be changed regularly to ensure the platform and the industrial network security.

      Note

      Your email will be requested for login access.
  • Restore interface notifications.

  • Clear application cookies.