Cisco Traffic Anomaly Detector Module Configuration Guide (Software Version 6.1 and 6.1-XG)
Index

Table Of Contents

Symbols - Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - R - S - T - U - V - W - X - Z

Index

Symbols

# (number sign) 11-4

* (wildcard) 3-7, 5-6, 11-3

Numerics

1-Gbps and 2-Gbps bandwidth options

displaying software license key 12-2

displaying software version 12-2

understanding 1-6

upgrading to 2 Gbps 13-17

2-Gbps operation upgrade

activating additional data port 13-18

regenerating SSL certificates 13-18

A

AAA

accounting 4-14

authentication 4-6

authorization 4-12

configuring 4-5

aaa accounting command 4-14

aaa authentication command 4-6

aaa authorization command 4-12

accounting, configuring 4-14

action command 7-19

action flow 11-6

add-service command 7-10

admin privilege level 3-2, 4-7

always-accept 7-21

always-ignore 7-21

anomaly

detected 11-2

flow 11-3

anomaly detection engine memory usage 12-25, 12-27

AP

booting to 2-12

clearing configuration 13-19

clearing passwords 13-19, 13-22

upgrading 13-10

upgrading, inline 13-13

application partition

See AP

attack report

copying 11-7

detected anomalies 11-2

exporting 11-7, 13-6

exporting automatically 11-7

layout 11-1

notify 11-4

statistics 11-2

timing 11-1

viewing 11-4

attack types 11-5

authentication, configuring 4-6

authorization

configuring 4-9, 4-10

disabling zone command completion 4-13, 5-7

auth packet types 7-11

automatic detect mode 1-5

automatic protection mode 9-3

automatic protect mode 9-3, 10-1

B

bandwidth options

displaying software license key 12-2

displaying software version 12-2

understanding 1-6

upgrading to 2 Gbps 13-17

banner, configuring login 4-32

Berkeley Packet filter 6-7

boot command 2-12

burn flash 13-15

bypass filter

command 6-11

configuring 6-10

definition 1-5, 6-1

deleting 6-12

displaying 6-11

C

capture, packets 12-15

CFE 13-11, 13-14, 13-15

clear ap config command 13-19

clear ap password command 13-19, 13-22

clear counters command 3-9, 12-6

clear log command 12-12

CLI

changing prompt 4-27

command shortcuts 3-7

error messages 3-5

getting help 3-6

issuing commands 3-4

TAB completion 3-6

using 3-2

command completion 4-13

command line interface

See CLI 3-2

commands, deactivating 3-5

command shortcuts 3-7

config privilege level 3-2, 4-7

configuration, supervisor engine

saving 2-1

configuration file

copying 13-3

exporting 13-3

importing 13-4

viewing 12-3

configuration mode

accessing 4-13

described 3-3

configure command 2-10, 3-7

constructing policies 8-4

copy commands

ftp running-config 13-4

log 12-10, 12-11

packet-dump 12-17

reports 11-7

running-config 5-16, 13-3

zone log 12-11

copy-from-this 5-6

copy guard-running-config command 5-16, 5-18

copy login-banner command 4-33

copy-policies command 8-17

copy wbm-logo command 4-34

counters

clearing 3-9, 12-6

history 12-5

counters, viewing 12-5

cpu utilization 12-26

D

DDoS

nonspoofed attacks 1-3

overview 1-2

spoofed attacks 1-3

zombies 1-3

deactivate command 9-5

deactivating commands 3-5

default configuration, returning to 13-19

default-gateway command 3-10

description command 5-7

detect

automatic mode 1-5

interactive mode 1-5, 9-3

detect command 9-5

detected

anomalies 11-2

flow 11-6

detected attack 11-5

DETECTOR_DEFAULT 5-3

DETECTOR_WORM 5-3

diff command 8-14, 8-15

disable command 7-7

disabling, automatic export 13-7

DNS

detected anomalies 11-2

TCP policy templates 7-3

tcp protocol flow 11-5

dst-ip-by-ip activation form 9-4, 9-7

dst-ip-by-name activation form 9-4

dst traffic characteristics 7-12

dynamic filter

1000 and more 6-14

command 6-15, 6-16, 9-9

definition 1-5

deleting 6-16

displaying 6-13

displaying events 12-9

overview 6-2, 6-13

preventing production of 6-16

sorting 6-13

worm 7-23

dynamic filters 10-2

dynamic privilege level 3-2, 4-8

E

enable

command 4-11, 7-7

password command 4-10

enabling services 4-2

entire-zone activation form 9-4

event log

activating 12-10

deactivating 12-10

event monitor command 12-10

export, disabling automatic 13-7

export command 13-6

packet-dump 12-17

reports 11-7

exporting

configuration file 13-3

log file 12-11

reports automatically 11-7

exporting GUARD configuration 5-16, 5-18

export sync-config command 5-17

extracting signatures 12-21

F

facility 12-10

file server

configuring 13-2

displaying sync-config 13-8

file-server

command 5-17, 13-2

configuring 13-2

deleting 13-3

displaying 13-3, 13-8

displaying sync-config 5-18, 13-7

filters

bypass 1-5, 6-10

dynamic 1-5, 6-2, 6-13

flex-content 1-5, 6-2

fixed-threshold 7-16

flash-burn command 13-16

flex-content filter

configuring 6-3

definition 1-5, 6-1

displaying 6-9

filtering criteria 6-2

renumbering 6-3

fragments 11-5

detected anomalies 11-2

policy template 7-3

G

generating signatures 12-21

global mode 3-3

global traffic characteristics 7-12

Guard

configuration mode 3-3

exporting configuration 13-6

GUARD_DEFAULT 5-3

GUARD_LINK 5-3, 5-4

GUARD_TCP_NO_PROXY 5-4

GUARD_ zone policy template 7-4

guard-conf command 5-11

GUARD configuration, exporting 5-16, 5-18

GUARD configuration, importing 5-16

Guard-protection activation methods 9-4

H

histogram command 7-23

host, logging 12-10

host keys

deleting 4-21

host keys, deleting 4-22

hostname

changing 4-27

command 4-27

HTTP

detected anomalies 11-2

policy template 7-3

hw-module command 13-10, 13-11, 13-12, 13-14, 13-19, 13-22

hw-module commands 2-11

hybrid 11-5

I

idle session, configuring timeout 4-35

idle session, displaying timeout 4-35

importing GUARD configuration 5-16

inline upgrade 13-13

in packet types 7-11

installation, verifying 2-2

interactive

operation mode 10-4

policy status 7-21

interactive detect mode 1-5, 9-3

interactive protect mode 10-1

interactive-status command 7-21

interface

activating 3-8, 3-9

clearing counters 3-9

command 3-8

configuration mode 3-3

configuring IP address 3-8

IP address

modifying, zone 5-9

ip address command

deleting 5-9

excluding 5-8

interface 3-8

zone 5-8

ip route command 3-10

IP scan 11-5

detected anomalies 11-2

policy template 7-3

IP summarization 12-14, 12-15

IP threshold configuration 7-18

K

key, generating for license 13-17

key command

add 4-22, 4-25

generate 4-23, 4-26

remove 4-25

key publish command 4-23

L

learning

command 8-6, 8-7

constructing policies 8-4

overview 8-2

policy-construction command 8-5

synchronizing results 8-4

terminating process 8-6, 8-7

threshold-tuning command 8-6

tuning thresholds 8-6

learning accept command 8-5, 8-7

learning parameters, displaying 8-9

learning-params

deactivating periodic action 8-7

deactivating periodic-action command 8-5

periodic-action command 5-13, 8-5, 8-7, 8-9

threshold-multiplier command 7-16

threshold-selection command 8-7, 8-10

threshold-tuned command 5-9, 8-11

learning-params command 5-13, 5-18

learning-params fixed-threshold command 7-16

licenses

generating key 13-17

ordering XG upgrade license 13-17

LINK templates 8-4

log file

clearing 12-12

exporting 12-10, 12-11

viewing 12-11

logging, viewing configuration 12-11

logging command 12-10

logging parameters, configuring 12-8

login banner

configuring 4-32

deleting 4-34

importing 4-33

login-banner command 4-32

logo

adding WBM 4-34

deleting WBM 4-35

M

maintenance partition

See MP

management

MDM 3-13

overview 3-11

port 2-3

SSH 3-13

VLAN 2-3

WBM 3-11

max-services command 7-6

MDM, activating 3-13

memory consumption 12-25

memory usage, anomaly detection engine 12-25, 12-27

min-threshold command 7-6

monitoring, network traffic 12-17

MP

booting to 2-12

upgrading 13-12

upgrading, inline 13-13

mtu command 3-9

N

netstat command 12-28

network server

configuring 13-2

deleting 13-3

displaying 13-3, 13-8

displaying sync-config 5-18, 13-7, 13-8

network server, configuring 13-2

no learning command 8-6, 8-7

non_estb_conns packet type 7-11

nonspoofed attacks 1-3

no proxy policy templates 7-4

notify 11-4

notify policy action 7-20

ns policy templates 7-4

O

other protocols

detected anomalies 11-2

policy template 7-3

out_pkts packet types 7-11

P

packet-dump

auto-capture command 12-14

automatic

activating 12-14

deactivating 12-15

displaying settings 12-15

exporting 12-17, 13-6

signatures 12-22

packet-dump command 12-15

packets, capturing 12-15

password

changing 4-8

enabling 4-10

encrypted 4-8

recovering 13-19, 13-22

pending 10-2

pending dynamic filters 10-2

displaying 10-3, 10-6

periodic action

accepting policies automatically 8-5, 8-7

deactivating 8-5, 8-7

permit

command 3-12, 3-13, 4-3

permit ssh command 4-22

ping command 12-32

pkts packet type 7-12

policy

action 7-13, 7-19, 7-20

activating 7-14

adding services 7-9

backing up current 7-27, 8-18

command 7-13

configuration mode 3-3

constructing 1-4, 8-2, 8-4

copying parameters 8-17

copy-policies 8-17

deleting services 7-10

disabling 7-14

inactivating 7-14

learning-params, fixed-threshold command 7-16

marking as tuned 5-9, 8-11

marking threshold as fixed 7-16

multiplying thresholds 7-17

navigating path 7-13

packet types 7-11

show statistics 7-25

state 7-14

threshold 7-13, 7-15

threshold-list command 7-18

timeout 7-13, 7-19

traffic characteristics 7-12

tuning thresholds 1-4, 8-2, 8-6

using wildcards 7-13, 7-24, 7-26

viewing statistics 8-8

policy set-timeout command 7-19

policy template

command 7-4, 7-5, 7-7

configuration command level 7-5

configuration mode 3-3

displaying list 7-4

Guard policy templates for synchronization 7-4

max-services 7-6

min-threshold 7-6

overview 7-3

parameters 7-5

state 7-7

worm_tcp 7-5

policy-template add-service command 7-10

policy-template remove service command 7-10

policy-type activation form 9-4

port scan 11-5

detected anomalies 11-2

policy template 7-3

power enable command 2-11

privilege levels 3-2

assigning passwords 4-10

moving between 4-11

protect

activation methods 9-4

automatic mode 9-3, 10-1

deactivating 9-5

interactive mode 10-1

protect command 9-5

protection-end-timer 9-7, 9-9

protect-ip-state command 9-4

protect learning command 8-6

protocol traffic characteristics 7-12

proxy policy templates, no proxy policy templates 7-4

public key, displaying 4-26

R

rates

history 12-5

viewing 12-5

reactivate-zones 13-8

rebooting parameters 13-8

recommendations 10-2

accepting 10-7

activating 10-4, 10-6

change decision 7-21

command 10-6

deactivating 10-3, 10-8

dynamic filters 10-2

ignoring 10-7

overview 10-2

viewing 10-4

viewing pending-filters 10-3, 10-6

reload command 13-8

remote-activate policy action 7-20

remote Guard

activating 6-15

terminating protection 9-7, 9-9

remote-guard command 9-7, 9-8

remote Guard list

displaying 9-8

remote Guards

activating 9-5

default list 9-7

list 9-8

list activation order 9-8

remove service command 7-10

renumbering flex-content filters 6-3

replied IP summarization 12-14, 12-15

report

See attack report 11-1

reports

details 11-4

exporting 13-6

reqs packet type 7-11

reset command 2-11

router configuration mode 3-3

routing table

manipulation 3-10

viewing 3-11

running-config

copy 5-16, 13-3

show 12-3

S

scanners traffic characteristics 7-12

service

adding 7-9

command 3-11, 3-13, 4-2

copy 8-17

deleting 7-10

MDM 3-13

permissions 4-3

snmp-trap 4-28

WBM 3-11

services, enabling 4-2

session, configuring timeout 4-35

session, displaying idle timeout 4-35

session timeout, disabling 4-35

session-timeout command 4-35

set-action 7-20

show commands

counters 12-5

cpu 12-26

diagnostic-info 12-24

dynamic-filters 6-13

file-servers 13-3, 13-8

flex-content-filter 6-9

host-keys 4-22, 4-24

learning parameters 8-9

learning-params 7-16

log 12-11

log export-ip 12-11

logging 12-11

login-banner 4-33

memory 12-25

module 2-2, 13-11, 13-12

packet-dump 12-15

packet-dump signatures 12-22

policies 7-24

policies statistics 7-25, 8-8

public-key 4-24, 4-26

rates 12-5

recommendations 10-4, 10-5

recommendations pending-filters 10-3, 10-6

remote-guards 9-8

reports details 11-4

running-config 12-3

show 12-4

sorting dynamic-filters 6-13

sync-config 5-18

sync-config file-servers 5-18, 13-7, 13-8

templates 5-6

zone policies 7-24

show privilege level 3-2, 4-8

show public-key command 4-26

shutdown command 3-9

signature

generating 12-21

snapshot

backing up policies 7-27, 8-18

command 8-13

comparing 8-14

deleting 8-16

displaying 8-16

overview 8-13

saving 8-13, 8-14

saving periodically 8-9

SNMP

configuring trap generator 4-28

traps description 4-29

snmp commands

community 4-32

trap-dest 4-28

software license key, displaying key information 12-2

software version number, displaying 12-2

SPAN, configuring 2-7

specific IP threshold 7-18

spoofed attacks 1-3

src traffic characteristics 7-12

SSH

configuring 3-13

deleting keys 4-25

generating key 4-23, 4-26

host key 4-24

service 3-13

viewing public key 4-24

ssh key, publishing 4-23

state command 7-14

static route, adding 3-10

supervisor engine

booting 2-12

configuring 2-1

powering off 2-11

resetting 2-11

saving configuration 2-1

shutting down 2-11

verifying configuration 2-12

syn_by_fin packet type 7-11

sync command 5-14, 5-15

synchronization

exporting configuration 13-6

syns packet type 7-11

syslog

configuring export parameters 12-10

configuring server 12-10

message format 12-10

system log, message format 12-10

T

TACACS+

authentication

key generate command 4-20

key publish command 4-23

clearing statistics 4-17

configuring server 4-14

server connection timeout 4-17

server encryption key 4-16

server IP address 4-15

viewing statistics 4-17

tacacs-server commands

clear statistics 4-17

first-hit 4-15

host 4-15, 4-16

key 4-15, 4-16

show statistics 4-17

timeout 4-15, 4-17

TCP

detected anomalies 11-2, 11-5

no proxy policy templates 7-4

policy templates 7-3

templates

LINK 8-4

viewing policies 5-6

zone 5-3

thresh-mult 7-17

threshold

command 7-15

configuring IP threshold 7-18

configuring list 7-18

configuring specific IP 7-18

marking as tuned 5-9, 8-11

multiplying before accepting 7-16

selection 8-13

setting as fixed 7-16

tuning 1-4, 8-2

worm 7-22

threshold-list command 7-18

threshold selection 8-7

threshold tuning

save results periodically 8-9

timeout command 7-19

timeout session, configuring 4-35

timeout session, disabling 4-35

traceroute command 12-31

traffic, monitoring 12-17

traffic sources

capturing 2-4

configuring 2-4

SPAN 2-4

VACL 2-4

trap 12-10

trap-dest 4-28

tuning policy thresholds 8-6

U

UDP

detected anomalies 11-3

policy templates 7-4

unauth_pkts packet type 7-12

unauthenticated TCP detected anomalies 11-3

upgrade command 13-19

upgrade license 13-17

upgrading

AP 13-10

inline 13-13

MP 13-12

user-detected anomalies 11-3

user filter

command 6-3

username

encrypted password 4-8

username command 4-7

users

adding 4-7

adding new 4-7

assigning privilege levels 4-7

deleting 4-9

privilege levels 3-2, 4-10

system users

admin 2-10

riverhead 2-10

username command 4-7

V

VACL, configuring 2-4

version, upgrading 13-19

W

WBM

activating 3-11

WBM logo

adding 4-34

deleting 4-35

worm

dynamic filter 7-23

identifying attack 7-23

overview 7-22

policy 7-11, 7-12

policy templates 7-4, 7-23

thresholds 7-22, 7-23

worm_tcp policy template 7-5

X

XG software image

license key 13-17

obtaining software image 13-17

XG software version, 2-Gbps operation 13-17

XML schema11-7to 11-9, 12-17, 13-7

Z

zombies 1-3

zone

anomaly detection 9-2

clearing counters 12-6

command 5-5, 5-6, 10-4

command completion 4-13, 5-7

comparing 8-15

configuration mode 3-3, 5-7

copying 5-6

creating 5-5

defining IP address 5-8

deleting 5-6

deleting IP address 5-9

duplicating 5-6

excluding IP address 5-8

exporting configuration 5-17

IP address 5-8

learning 8-2

LINK templates 8-4

modifying IP address 5-9

operation mode 5-6

reconfiguring 5-7

synchronize configuration 5-10

synchronizing automatically 5-13

synchronizing offline 5-15

templates 5-3

viewing configuration 5-8

viewing policies 7-24

viewing status 12-4

zone policy

marking as tuned 5-9, 8-11

zone synchronization 8-4