Cisco Traffic Anomaly Detector Configuration Guide (Software Version 6.1)
Configuring the Detector

Table Of Contents

Configuring the Detector

Activating Detector Services

Configuring Access Control Using AAA

Configuring Authentication

Configuring Authentication Methods

Configuring Local Authentication

Configuring Authorization

Configuring Local Authorization

Configuring Authorization Methods

TACACS+ Server Sample Configuration

Disabling Tab Completion of Zone Names

Configuring Accounting

Configuring the TACACS+ Server Attributes

Configuring a TACACS+ Server IP Address

Configuring the TACACS+ Server Encryption Key

Configuring the TACACS+ Search Method

Configuring the TACACS+ Server Connection Timeout

Displaying TACACS+ Server Statistics

Establishing Communication with the Guard

Configuring the SSL Communication Channel Parameters

Enabling an SSL Communication Channel

Regenerating SSL Certificates

Configuring the SSH Communication Channel Parameters

Enabling an SSH Communication Channel

Regenerating SSH Communication Channel Keys

Establishing Communication Channels

Configuring a Date and a Time

Synchronizing the Detector Clock with an NTP Server

Managing SSH Keys

Adding SSH Keys

Deleting SSH Keys

Configuring the Keys for SFTP and SCP Connections

Changing the Hostname

Enabling SNMP Traps

Configuring SNMP Community Strings

Configuring the Login Banner

Configuring the Login Banner from the CLI

Importing the Login Banner

Deleting the Login Banner

Configuring the Web-Based Manager Logo

Importing the WBM Logo

Deleting the WBM Logo

Configuring the Session Timeout


Configuring the Detector


This chapter describes how to configure the Cisco Traffic Anomaly Detector (Detector) services.

This chapter refers to the Cisco Guard (Guard), the companion product of the Detector. The Guard is a Distributed Denial of Service (DDoS) attack detection and mitigation device that cleans the zone traffic as the traffic flows through it, dropping the attack traffic and injecting the legitimate traffic back into the network. When the Detector determines that the zone is under attack, it can activate the Guard attack mitigation services. The Detector can also synchronize zone configurations with the Guard. For more information about the Guard, see the Cisco Anomaly Guard Module Configuration Guide or the Cisco Guard Configuration Guide.

This chapter contains the following sections:

Activating Detector Services

Configuring Access Control Using AAA

Establishing Communication with the Guard

Configuring a Date and a Time

Synchronizing the Detector Clock with an NTP Server

Managing SSH Keys

Configuring the Keys for SFTP and SCP Connections

Changing the Hostname

Enabling SNMP Traps

Configuring SNMP Community Strings

Configuring the Login Banner

Configuring the Web-Based Manager Logo

Configuring the Session Timeout

Activating Detector Services

The Detector has several service options that you can activate by enabling the service and then defining the IP address that is permitted access to the service. With the exception of the Secure Shell service which is always active, this section describes how to activate the services.

The Detector services are as follows:

Internode communication service—The Detector uses this service when establishing a communication channel with the Cisco Guard (Guard). See the "Establishing Communication with the Guard" section for more information.

Network Time Protocol (NTP) service—The Detector uses this service to synchronize the Detector with a time synchronization server. See the "Synchronizing the Detector Clock with an NTP Server" section for more information.

Routing service—After you enable the routing service, you can configure the Detector to send Border Gateway Protocol (BGP) announcements to activate a Guard to protect the zone. See the "Activating Remote Guards Using BGP" section on page 8-9 for more information.

Simple Network Management Protocol (SNMP) server service—You can access the Detector using SNMP to retrieve information as defined by the following MIBs:

Riverhead private MIB

MIB2 (RFC1213-MIB)—All of the MIB groups with the exceptions of the EGP and transmission MIB groups

UCDAVIS (UCD-SNMP-MIB)—Only the following MIB groups: memory, latable, systemStats, version, and snmperrs

See the MIB file that is released with the software version for information about the MIB definitions.


Note The Riverhead MIB contains 64-bit counters. To read the MIB, you must use a browser that supports SNMP version 2.


SNMP trap service—When you activate the snmp-trap service, the Detector generates SNMP traps. See the "Enabling SNMP Traps" section for more information.

Secure Shell (SSH) service—The SSH service is always active. See the "Accessing the Detector with SSH" section on page 2-13 and the "Managing SSH Keys" section for more information.

Web-Based Manager (WBM) service—You can control the Detector from the web using a web browser. See the "Managing the Detector with the Web-Based Manager" section on page 2-11 for more information.

MultiDevice Manager (MDM) service—Using a web browser, you can monitor and control the Detector and other Guard and Detector devices from the MDM server. See the "Managing the Detector with the Cisco DDoS MultiDevice Manager" section on page 2-13 for more information.

To activate a Detector service, perform the following steps:


Step 1 Enable the Detector service by entering the following command in configuration mode:

service {internode-comm | mdm | ntp | router | snmp-server | snmp-trap | wbm}

Table 3-1 provides the keywords for the service command.

Table 3-1 Keywords for the service Command 

Service
Description

internode-comm

Specifies the internode communication service.

mdm

Specifies the MDM service.

ntp

Specifies the NTP service.

router

Specifies the routing service.

snmp-server

Specifies the SNMP server service.

snmp-trap

Specifies the SNMP trap service.

wbm

Specifies the WBM service.


Step 2 Permit access to the Detector service by entering one of the following commands:

For the MDM service, permit access to the Detector service from the MDM by entering the following command in configuration mode:

mdm server ip-addr

The ip-addr argument defines the IP address of your MDM server. Enter the IP address in dotted-decimal notation.

For all other services, permit access to the Detector service and enable connectivity by entering the following command in configuration mode:

permit {internode-comm {ip-address-general [ip-mask] | *} | ntp {ip-address-general 
[ip-mask] | *} | snmp-server {ip-address-general [ip-mask] | *} | ssh 
{ip-address-general [ip-mask] | *} [if-service] | wbm {ip-address-general [ip-mask] | 
*} [if-service]}

Table 3-2 provides the arguments and keywords for the permit command.

Table 3-2 Arguments and Keywords for the permit Command 

Parameter
Description

internode-comm

Specifies the internode communication service.

ip-address-general

IP address from which to permit access. Enter the IP address in dotted-decimal notation (for example, enter 192.168.10.2).

ip-mask

(Optional) IP subnet mask. Enter the subnet mask in dotted-decimal notation (for example, enter 255.255.255.0). The default subnet mask is 255.255.255.255.

*

Asterisk wildcard character that allows access by all remote manager IP addresses.


Caution For security reasons, we recommend that you not permit access to a service from all IP addresses.

ntp

Specifies the NTP service.

snmp-server

Specifies the SNMP server service.

ssh

Specifies the SSH service.

wbm

Specifies the WBM service.

if-service

(Optional) Management port designator that restricts user access to the management interface only. Enter eth0, eth1, or both.

To return to the default setting, use the no version of the command.




The following example shows how to activate a service:

user@DETECTOR-conf# service wbm
user@DETECTOR-conf# permit wbm 192.168.10.35

Configuring Access Control Using AAA

Authentication, Authorization, and Accounting (AAA) is a method for controlling user access to the Detector and the Detector services. AAA provides the following features:

Authentication—Identifies a user before the user is allowed access to the system and system services.

Authorization—Determines what a user is allowed to perform once access to the system is obtained. This process occurs after the user is authenticated.

Accounting—Records what a user is performing or has performed. Accounting allows you to track the services that users are accessing.

The Detector is preconfigured with the following system user accounts:

admin—The admin user account is configured with the administration access rights, allowing access to the Detector CLI and all its functionality. When connecting to the Detector CLI for the first time, you are required to set a password for this account. Use the admin user account to configure additional user accounts.

riverhead—The riverhead user account is configured with dynamic access rights. The Detector uses this user account to establish the initial communication channel with the Guard. When you connect to the Detector CLI for the first time, you are required to set a password for this account.

You cannot delete system user accounts.

You can divide the Detector user community into domains and assign passwords for secure management access. We recommend that you create new user accounts and avoid using the system user accounts after the initial configuration so that you can monitor user actions.

This section contains the following topics:

Configuring Authentication

Configuring Authorization

Configuring Accounting

Configuring the TACACS+ Server Attributes

Configuring Authentication

You can configure the authentication method that the Detector uses when a user tries to log into the Detector or requests a higher privilege level (using the enable command). The Detector offers the following authentication options:

Local authentication—Authentication method that uses locally configured login and enable passwords for authentication. This authentication method is the default. See the "Configuring Local Authentication" section for more information.

Terminal Access Controller Access-Control System Plus (TACACS+) authenticationRemote user authentication method using one or more TACACS+ servers.


Note You must configure authentication for the user on a TACACS+ server before configuring user authorization or the user may not be able to access the Detector (see the "Configuring Authorization" section).


You can configure the Detector to use one or both of the user authentication methods. When using TACACS+ authentication, you can define multiple TACACS+ servers. Defining more than one authentication method provides a backup in case the initial method fails due to a communication error.

The Detector authenticates a user by using each of the methods that you define and in the order in which you define them on the Detector. To view the list of defined authentication methods, enter the show running config command. The Detector attempts to authenticate the user using the first method on the list. If the first authentication method does not respond, the Detector sequentially selects the next authentication method on the list until it finds one that responds.

You can configure the action that the Detector takes when it receives a response from the first TACACS+ server by using the tacacs-server first-hit command. If you disable the first-hit option (the default setting) and the first server rejects the authentication, the Detector sequentially scans the other TACACS+ servers to find a server that accepts the authentication. User authentication fails when no defined TACACS+ servers accept the authentication or the Guard cannot communicate with any of the servers. If you enable the first-hit option, the Detector accepts the authentication response (reject or accept) of the first TACACS+ server to respond as the final decision. By default, the first-hit option is disabled. For more information about the tacacs-server first-hit command, see the "Configuring the TACACS+ Search Method" section.


Note You can configure the Detector to use its local database as a fallback for user authentication when the Detector cannot communicate with the TACACS+ servers (see the "Configuring Authentication Methods").


This section contains the following topics:

Configuring Authentication Methods

Configuring Local Authentication

Configuring Authentication Methods

To configure the authentication method that the Detector uses, perform the following steps:


Step 1 Configure the TACACS+ server connection if TACACS+ authentication is required. See the "Configuring the TACACS+ Server Attributes" section for more information.

Step 2 Define the authentication method by entering the following command in configuration mode:

aaa authentication {enable | login} {local | tacacs+} [tacacs+ | local]

Table 3-3 provides the keywords for the aaa authentication command.

Table 3-3 Keywords for the aaa authentication Command 

Parameter
Description

enable

Allows the Detector to authenticate when a user enters a higher privilege level.

login

Allows the Detector to authenticate when a user logs in.

local

Specifies that the Detector uses the local database to authenticate a user.

tacacs+

Allows a TACACS+ server to authenticate a user.

tacacs+ | local

(Optional) Specifies an alternative authentication method should the configured method fail.


If you access the Detector from a console session, it uses the local user database for authentication regardless of the defined authentication method.

To change the authentication method, reenter the command.


The following example shows how to configure authentication on entering a higher privilege level. The primary authentication method is configured to TACACS+, and the secondary authentication method is configured to the local user database.

user@DETECTOR-conf# aaa authentication enable tacacs+ local

Configuring Local Authentication

The Detector initially has a preconfigured username (called a user definition) with administration privileges, which allows you to create new users. The user definition allows you to divide the Detector user community into domains and to assign passwords for secure management access.

To enable authentication of CLI users with a TACACS+ server, see the "Configuring Authentication" section.

This section contains the following topics:

Adding a User

Changing Your Password

Changing the Passwords of Other Users

Deleting a User from the Local User Database

Adding a User

To add a user to the Detector local database, use the following command in configuration mode:

username username {admin | config | dynamic | show} [password]

Table 3-4 provides the arguments and keywords for the username command.

Table 3-4 Arguments and Keywords for the username Command 

Parameter
Description

username

Name of the user. A case-sensitive alphanumeric string from 1 to 63 characters that starts with an alphabetic letter. The string cannot contain spaces but can contain underscores.

admin

Provides access to all operations.

config

Provides access to all operations except for operations relating to user definition, deletion, and modification.

dynamic

Provides access to monitoring and diagnostic operations, detection, and learning-related operations. Users with Dynamic privileges can also configure flex-content filters and dynamic filters.

show

Provides access to monitoring and diagnostic operations.

password

(Optional) User password. Enter a case-sensitive 6- to 24-character alphanumeric string with no spaces. If you do not enter a password, you are prompted for it.


The following example shows how to configure a new user and set the password:

user@DETECTOR-conf# username Robbin config 123456

Users enter passwords in clear text but the Detector configuration file displays passwords in an encrypted manner. This example displays the Detector configuration file (running-config):

username Richard config encrypted 840xdMk3

The encrypted keyword in the previous example indicates that the password is encrypted.

To display the list of users configured on the Detector, use the show running-config or show detector commands.

To display a list of the users currently logged into the CLI, use the show users command.

Changing Your Password

You can change your own password. Administrators can change their own password and the passwords of other users (see the "Changing the Passwords of Other Users" section).

To change your own password, perform the following steps:


Step 1 Enter the following command in global mode:

password

Step 2 Enter your current password. The system prompts you for a new password.

Step 3 Enter a new password.

The password must be an alphanumeric, 6- to 24-character string with no spaces. The password is case sensitive. The system prompts you to confirm the new password by typing it again.


The following example shows how to change your password:

user@DETECTOR# password 
Old Password: <old-password>
New Password: <new-password>
Retype New Password: <new-password>

Changing the Passwords of Other Users

You must have administration user privileges to change the password of other users.

To change the password of another user, perform the following steps:


Step 1 Enter the following command in global mode:

password username-password

The username-password argument is the user whose password you are changing.

Step 2 Enter a new password.

The password must be an alphanumeric, 6- to 24-character string with no spaces. The password is case sensitive. The system prompts you to confirm the new password by typing it again.


The following example shows how the administrator changes the password of the user Jose:

user@DETECTOR# password Jose 
New Password: <new-password>
Retype New Password: <new-password>

Deleting a User from the Local User Database

When you delete a user from the local user database, the associated user cannot access the Detector if authentication is performed using the local user database only.

To delete a user from the Detector local user database, use the no username username command.

The following example shows how to delete a user from the local user database:

user@DETECTOR-conf# no username Robbin

Configuring Authorization

You can limit the services available to a user. When you enable authorization, the Detector verifies the user profile, which is located either in the local user database or on a TACACS+ security server. The user is permitted access to the requested service only if the information in the user profile allows it.

You can configure the authorization method that the Detector uses when a user tries to execute a command. The Detector offers the following authorization options:

TACACS+ authorizationRemote user authorization method that uses one or more TACACS+ servers.

Two types of TACACS+ authorization are supported:

EXEC authorization—Determines the user privilege level once when the user is authenticated upon logging into the Detector.

Command authorization—Consults a TACACS+ server to get authorization for each command after the user enters the command.

TACACS+ authorization enables you to specify access rights for each command.


Caution We recommend that you limit authorization to the copy running-config command because using the copy running-config command allows a user to execute all configuration commands, regardless of whether the user is actually authorized to use every command in the configuration file.

Local authorization—Authorization method that uses locally configured user profiles for command group access control. Authorization is defined for all commands at the specified privilege level. This authorization method is the default.

Detector can use local authorization when communication to the TACACS+ server fails.

You can configure a sequential authorization list that defines the methods for authorizing a user, allows you to designate one or more methods to be used for authorization, and provides a backup if communication to the initial method fails.

The Detector uses the first method that you listed to authorize users; if that method does not respond, the Detector selects the second authorization method. The authorization fails only if both authorization methods do not succeed.

To configure the Detector to consider an authentication rejection as final and stop further searching with other TACACS+ servers or the local user database, you can configure the TACACS+ server parameters. See the "Configuring the TACACS+ Server Attributes" section for more information.

This section contains the following topics:

Configuring Local Authorization

Configuring Authorization Methods

TACACS+ Server Sample Configuration

Disabling Tab Completion of Zone Names

Configuring Local Authorization

Access to Detector operations depends on the user privilege level. You can limit the operations available to a user. The Detector checks the user profile to verify the user access rights. Once authorized, the user is granted access to the requested operation only if the information in the user profile allows it. See Table 2-1 for more information about user privilege levels.

This section contains the following topics:

Assigning Privilege Levels with Passwords

Moving Between User Privilege Levels

Assigning Privilege Levels with Passwords

You can set passwords that restrict access to user privilege levels. After you specify the privilege level and the password, you can give the password to the users who need to access this level. Without knowing the privilege level password, the user cannot move to the password-protected level.

To set a local password to control access to a privilege level, use the following command in configuration mode:

enable password [level level] [password]

Table 3-5 provides the arguments and keywords for the enable password command.

Table 3-5 Arguments and Keywords for the enable password Command 

Parameter
Description

level level

(Optional) Specifies the user privilege level. The level can be one of the following:

admin—Provides access to all operations.

config—Provides access to all operations except for operations relating to user definition, deletion, and modification.

dynamic—Provides access to monitoring and diagnostic operations, detection, and learning-related operations. Users with Dynamic privileges can also configure flex-content filters and dynamic filters.

show—Provides access to monitoring and diagnostic operations.

The default level is admin.

password

(Optional) Password for the privilege level. The password must be an alphanumeric, 6- to 24-character string with no spaces. The password is case sensitive. If you do not enter a password, you are prompted for it.


The following example shows how to assign a password to the user privilege level admin:

user@DETECTOR-conf# enable password level admin <password>

Moving Between User Privilege Levels

Authorized users can move between user privilege levels.

To move between user privilege levels, perform the following steps:


Step 1 Enter the following command in global mode:

enable [level]

The level argument specifies the user privilege level. This level can be one of the following:

admin—Provides access to all operations.

config—Provides access to all operations except for operations relating to user definition, deletion, and modification.

dynamic—Provides access to monitoring and diagnostic operations, detection, and learning-related operations. Users with Dynamic privileges can also configure flex-content filters and dynamic filters.

show—Provides access to monitoring and diagnostic operations.

The default level is admin.

Step 2 Enter the privilege level password.


The following example shows how to switch to the admin privilege level:

user@DETECTOR> enable admin 
Enter enable admin Password: <password>

To return to the show privilege level (as described in Table 3-5), use the disable command.

Configuring Authorization Methods

To configure the authorization method, perform the following steps:


Step 1 Configure the TACACS+ server connection if TACACS+ authorization is required. See the "Configuring the TACACS+ Server Attributes" section for more information.

Step 2 Define the authorization method by entering one of the following commands in configuration mode:

aaa authorization exec tacacs+

aaa authorization commands level tacacs+

To remove an authorization method, use the no form of the command.

Table 3-6 provides the arguments and keywords for the aaa authorization command.

Table 3-6 Arguments and Keywords for the aaa authorization Command 

Parameter
Description

exec

Runs authorization to determine if the user is allowed to run an EXEC shell. The Detector consults the TACACS+ server to determine the privilege level for an authenticated user.


Caution You must configure the user on a TACACS+ server before you configure authorization or the user may not be able to access the Detector.

commands

Runs authorization for all commands at the specified privilege level. To configure authorization for more than one privilege level, use the command for each privilege level that requires authorization.

level

Authorization for one of the following privilege levels:

admin—Provides access to all operations.

config—Provides access to all operations except for operations relating to user definition, deletion, and modification.

dynamic—Provides access to monitoring and diagnostic operations, detection, and learning-related operations. Users with Dynamic privileges can also configure flex-content filters and dynamic filters.

tacacs+

Verifies the user access rights with a TACACS+ server.


We recommend that you do not configure authorization for show privilege level commands because it may affect Detector performance.



Note No TACACS+ authorization is performed for commands that you enter from console sessions.


The following example shows how to configure authorization for commands that require the config privilege level:

user@DETECTOR-conf# aaa authorization commands config tacacs+ 


Caution You must grant access to the Dynamic user privilege level or specify access rights to the configure command to enable access to the configuration command mode.

TACACS+ Server Sample Configuration

You can specify authorization for each command in the TACACS+ server database.

The following example shows how to configure authorization on a TACACS+ server for the user Zoe:

user=Zoe {
	cmd = detect {
		permit .*
	}
	cmd = "no detect" {
		permit .*
	}
	cmd = learning {
		deny policy*
	}
	cmd = "no learning" {
		deny .*
	}
	cmd = dynamic-filter {
		permit .*
	}
	cmd = "no dynamic-filter" {
		permit .*
	}
}

Disabling Tab Completion of Zone Names

You can limit the access to the zone configurations to authorized users only by disabling the tab completion feature when entering the zone names. This setting applies to all commands in which you specify the zone name.

When you enter commands in global or configuration mode, such as the zone command, no zone command, show zone command, and deactivate command, the Detector no longer displays or completes the zone name. You must enter the complete zone name to configure a zone, change the zone operation mode, or display zone statistics.

The Detector sends the tab-complete zone-list command to the TACACS+ server when you disable tab completion of zone names. Configure authorization for the tab-complete zone-list command on the TACACS+ server to enable tab completion of zone names to authorized users.

The following example shows how to disable tab completion of zone names for all the zone commands:

user@DETECTOR-conf# aaa authorization commands zone-completion tacacs+

To enable tab completion of zone names, use the no form of the command.

Configuring Accounting

Accounting management allows you to track the services that users are accessing and save the accounting information about a TACACS+ server. You can enable accounting of requested services for billing, reporting, or security purposes. By default, the Detector is configured with accounting management disabled.

To configure accounting, perform the following steps:


Step 1 Configure the TACACS+ server connection. See the "Configuring the TACACS+ Server Attributes" section for more information.

Step 2 Configure accounting by entering the following command in configuration mode:

aaa accounting commands {show | dynamic | config | admin} stop-only {local | tacacs+} 

Table 3-7 provides the keywords for the aaa accounting commands command.

Table 3-7 Keywords for the aaa accounting commands Command 

Parameter
Description

show | dynamic | config | admin

Defines accounting for the specified privilege level (see Table 2-1 for information about user privilege levels).

stop-only

Records the action when the command execution terminates.

tacacs+

Uses a TACACS+ server database to record accounting information.

local

Does not save accounting information.


To configure accounting for more than one privilege level, enter the aaa accounting command for each privilege level as required.

We recommend that you enable accounting management for the config user privilege level only. Tracking and saving accounting data may affect Detector performance.

Use the no form of the command to remove the accounting management for a privilege level.


The following example shows how to configure accounting for commands that require the config privilege level on a TACACS+ server.

user@DETECTOR-conf# aaa accounting commands config stop-only tacacs+ 

Configuring the TACACS+ Server Attributes

You must configure the TACACS+ server attributes to enable authentication, authorization, or accounting with a TACACS+ server.


Caution You must configure the TACACS+ server attributes before you apply the TACACS+ authentication method or you may not be able to access the Detector.

To configure the TACACS+ server attributes, perform the following steps:


Step 1 Configure the IP address of the TACACS+ server by entering the tacacs-server host ip-address port port_number command.

See the "Configuring a TACACS+ Server IP Address" section for more information.

Step 2 Configure the encryption key that the Detector uses to access the TACACS+ server by entering the tacacs-server key tacacs-key command.

See the "Configuring the TACACS+ Server Encryption Key" section for more information.

Step 3 (Optional) Configure the search method that the Detector uses for authentications by entering the tacacs-server first-hit command.

See the "Configuring the TACACS+ Search Method" section for more information.

Step 4 (Optional) Configure the TACACS+ server connection timeout by entering the tacacs-server timeout timeout command.

See the "Configuring the TACACS+ Server Connection Timeout" section for more information.

Step 5 Display the TACACS+ server connection statistics by entering the show tacacs statistics command.

See the "Displaying TACACS+ Server Statistics" section for more information.


The Detector user privilege levels relate to the TACACS+ privilege numeration as follows:

admin = 15

config = 10

dynamic = 5

show = 0

This section contains the following topics:

Configuring a TACACS+ Server IP Address

Configuring the TACACS+ Server Encryption Key

Configuring the TACACS+ Search Method

Configuring the TACACS+ Server Connection Timeout

Displaying TACACS+ Server Statistics

Configuring a TACACS+ Server IP Address

You can configure the Detector to use a sequential list of TACACS+ servers for authentication, authorization, and accounting. The Detector uses the TACACS+ server list to authenticate or authorize users or send an accounting event; if that server does not respond, the Detector selects the second server. Authentication or authorization fails only if all servers listed do not respond.

Alternatively, you can configure the Detector to use only the first TACACS+ server on the list to authenticate users (see the "Configuring the TACACS+ Search Method" section for more information).

You must define the IP address of each TACACS+ server on the list. You can define a maximum of nine TACACS+ servers.

To add a TACACS+ server to the list and assign its IP address, use the following command in configuration mode:

tacacs-server host ip-address [port port_number]

Table 3-8 provides the arguments and keywords for the tacacs-server host command.

Table 3-8 Arguments and Keywords for the tacacs-server host Command 

Parameter
Description

ip-address

IP address of the TACACS+ server. Enter the IP address in dotted-decimal notation (for example, an IP address of 192.168.100.1).

port port_number

(Optional) Specifies the port number to use. If you do not specify a port number, the Detector uses port 49 by default.


The TACACS+ servers are added to the list in the order in which you enter them. You can add a maximum of nine servers to the list.

The following example shows how to add a server to the TACACS+ server list:

user@DETECTOR-conf# tacacs-server host 192.168.33.45 port 60

Configuring the TACACS+ Server Encryption Key

You must configure the encryption key to access a TACACS+ server. The key must match the key on the TACACS+ servers. The key cannot contain spaces.

To configure the server encryption access key, use the following command in configuration mode:

tacacs-server key tacacs-key

The argument tacacs-key is an alphanumeric string that contains up to 100 characters.


Note You can define only one encryption key. When using several TACACS+ servers, the Detector uses the same key to encrypt communication with all TACACS+ servers.


Disable the encryption function by using the following command:

no tacacs-server key

The following example shows how to set the TACACS+ server encryption key to MyKey:

user@DETECTOR-conf# tacacs-server key MyKey

Configuring the TACACS+ Search Method

You can configure the Detector to consider an authentication rejection as final and stop further searching with other TACACS+ servers by using the tacacs-server first-hit command in configuration mode. The Detector performs user authentication using only the first TACACS+ server on the server list. If the first TACACS+ server does not respond, the Detector selects the next server on the list. The Detector regards the first user authentication approval or rejection received as the final decision and stops attempting to authenticate the user with other TACACS+ servers.

To configure the Detector to continue a sequential search of the defined TACACS+ servers in an attempt to find a server that accepts the user authentication, use the no tacacs-server first-hit command in configuration mode. This method is the default setting for the first-hit operation. User authentication fails if all of the defined TACACS+ servers reject the user authentication or the Detector cannot communicate with any of the servers.

The following example shows how to configure the TACACS+ search method so that the Detector uses only the first TACACS+ server on the list to authenticate users:

user@DETECTOR-conf# tacacs-server first-hit

Configuring the TACACS+ Server Connection Timeout

You can configure the amount of time that the Detector waits for a reply from the TACACS+ server. When the timeout ends, the Detector either attempts to establish a connection with the next TACACS+ server (if a server was configured) or falls back to local AAA (if a fallback was configured). Authentication and authorization fail if no fallback method is configured.


Note The same server timeout is used for communication with all TACACS+ servers.


To configure the TACACS+ server connection timeout, use the following command in configuration mode:

tacacs-server timeout timeout

The timeout argument specifies the amount of time (in seconds) that the Detector waits for a TACACS+ server to reply. The default timeout is 0.

The following example shows how to configure the TACACS+ server connection timeout to 600 seconds:

user@DETECTOR-conf# tacacs-server timeout 600


Tip You may want to increase the timeout value if you have network problems or if the TACACS+ servers are slow to respond and cause persistent timeouts.


Displaying TACACS+ Server Statistics

You can display statistical information for the TACACS+ servers that you define by using the show tacacs statistics command in configuration mode.

To clear the TACACS+ statistics, use the clear tacacs statistics command in configuration mode.

Table 3-9 displays the fields in the show tacacs statistics command output.

Table 3-9 Field Descriptions in the show tacacs statistics Command Output 

Field
Description

PASS

Number of times that the Detector accessed the TACACS+ server successfully and was granted access.

FAIL

Number of times that the Detector accessed the TACACS+ server successfully and was denied access.

ERROR

Number of times that the Detector could not access the TACACS+ server.


Establishing Communication with the Guard

You can establish a secure communication channel between the Detector and the Guards that you define on the Detector remote Guard lists. The secure communication channel enables the Detector to perform the following tasks:

Activate the Guard—When the Detector detects a zone traffic anomaly, it uses the communication channel to activate the Guard that provides zone protection and to poll the Guard during zone protection.

Synchronize a zone configuration—The Detector uses the communication channel to exchange zone configuration information with the Guard.

After you configure the communication channel parameters on both the Detector and Guard, from the Detector, you initiate a connection with the Guard which enables the Detector to exchange the keys and certificates that are required to establish a secure communication channel with the Guard. The Detector then closes the connection and establishes the communication channel when it needs to activate the Guard, synchronize a zone configuration, or poll the Guard.

The Detector and Guard support the following two types of communication channels:

Secure Shell (SSH) version 2—Enables the Detector to activate the Guard.

Secure Sockets Layer (SSL)—Enables the Detector to activate the Guard, poll the Guard, and synchronize zone configurations.

You use the zone remote Guard list and default remote Guard list on the Detector to specify the Guards that the Detector communicates with for zone protection and synchronization. When you specify a Guard on a remote Guard list, you select the type of communication channel that the Detector is to establish with the Guard: SSH or SSL. Both devices require the SSH service for establishing a SSH or SSL communication channel. By default, the SSH service is always enabled on both devices. When you establish an SSL communication channel, the Detector uses the SSH communication channel only for the initial connection with a Guard. At this time, the devices exchange their keys and certificates.


Note Before you can establish a communication channel with a Guard, you must add the Guard to a remote Guard list on the Detector. See the "Activating Remote Guards to Protect a Zone" section on page 8-5 for more information.


This section contains the following topics:

Configuring the SSL Communication Channel Parameters

Configuring the SSH Communication Channel Parameters

Establishing Communication Channels

Configuring the SSL Communication Channel Parameters

Configure an SSL communication channel between the Detector and the Guard when you need the Detector to interact with the Guard as follows:

Activate the Guard when the Detector detects a traffic anomaly.

Synchronize zone configurations with the Guard.

Poll the Guard to identify that an attack on the zone has ended. If you enable the detect and learn process on the Detector, the Detector suspends the learning process (threshold tuning) when it detects an attack on the zone. The Detector polls the Guard that it activated to mitigate the attack to determine when the attack is over. At this point, the Detector automatically resumes the learning process.

Monitor communication with the Guard and notify you if remote actions fail, such as activating the Guard to protect the zone.

An SSL communication channel provides secure connections through a combination of authentication and data encryption and relies upon digital certificates, private-public key exchange pairs, and Diffie-Hellman key agreement parameters for this level of security. SSL encrypts the data so that only the intended recipient can decipher the data.

Each Guard and Detector uses a digital certificate to authenticate the device attempting to communicate with it over the communication channel. The identity of the Guard and the Detector in the SSL certificates is associated with the device IP address. To ensure a secure connection, the Detector generates a private-public key pair and distributes its public key to the Guards that you define on the remote Guard lists.

After you configure the SSL communication parameters on both the Guard and the Detector, you must establish the communication channel between the two devices, which you perform from the Detector. During the initial connection to the Guard, the Detector establishes an SSH communication channel with the user riverhead on the Guard and then the devices exchange the keys and certificates that are required to secure the communication channel. After the initial connection, the Detector establishes an SSL communication channel when needed to activate the Guard, poll the Guard, or synchronize zone configurations.

If you replace one of the devices on either end of an SSL communication channel or change one of their IP addresses, then you must regenerate the SSL certificates in both devices so that the two devices can successfully authenticate each other.

This section contains the following topics:

Enabling an SSL Communication Channel

Regenerating SSL Certificates

Enabling an SSL Communication Channel

To enable an SSL communication channel, you must configure the Detector and the Guard to allow the following connection types:

SSH—The Detector establishes the initial connection with the Guard using an SSH communication channel to exchange the keys and certificates.

SSL—The Detector uses an SSL communication channel to establish all connections with the Guard after the initial connection.


Caution If the Guard is authenticating users using TACACS+ authentication, you must define the user riverhead on the TACACS+ server to enable the Detector to establish the SSH communication channel during the initial connection with the Guard.

To enable an SSL communication channel, perform the following steps on both the Detector and the Guard:


Step 1 Permit access to the SSH service by the companion device IP address by entering the permit ssh ip-address-general [ip-mask] in configuration mode.

The ip-address-general and ip-mask arguments define the IP address of the companion device.

Step 2 Enable the communication channel service by entering the service internode-comm command in configuration mode.

Step 3 Permit access to the communication channel service by the companion device IP address by entering the permit internode-comm ip-address-general [ip-mask] command in configuration mode.

The ip-address-general and ip-mask arguments define the IP address of the companion device.


After you configure the Detector and the Guard to enable the SSL communication channel, you can establish the communication channel between them. For information on establishing the communication channel, see the "Establishing Communication Channels" section.

Regenerating SSL Certificates

The key that identifies the Guard and the Detector in the SSL certificates is associated with the device IP addresses. You must regenerate new SSL certificates for the Guard and the Detector on both ends of a communication channel when you make the following changes:

Change the IP address of one of the devices.

Replace one of the devices.

The process of regenerating new SSL certificates includes deleting the current certificates from both devices.

To display the current SSL certificates, use the show internode-comm certs command.

To regenerate the SSL certificates, perform the following steps:


Step 1 From the Detector, delete the SSL certificate of the Guard by using the following command in configuration mode:

cert remove cert-host-ip

The cert-host-ip argument specifies the IP address of the Guard. Enter an asterisk (*) to delete the SSL certificates of all the Guards that you define on the remote Guard lists.

The following example shows how to delete an SSL certificate:

user@DETECTOR-conf# cert remove 10.56.36.4

Step 2 From the Guard, delete the SSL certificate of the Detector by using the following command in configuration mode:

cert remove cert-host-ip

The cert-host-ip argument specifies the IP address of the Detector. Enter an asterisk (*) to delete the SSL certificates of all Detectors that have established communication channels with the Guard.

Step 3 If you replace the Guard, then you must also delete its SSH host key from the Detector. From the Detector, use the following command in configuration mode to delete the Guard SSH host keys:

no host-keys ip-address-general

The ip-address-general argument specifies the IP address of the remote device.

The following example shows how to delete host keys from the Detector:

user@DETECTOR-conf# no host-keys 10.56.36.4

Step 4 From the Detector, regenerate new SSL certificates by establishing a new SSL communication channel between the Guard and the Detector. For information about establishing a communication channel, see the "Establishing Communication Channels" section.


Configuring the SSH Communication Channel Parameters

Configure an SSH communication channel between the Detector and the Guard when the only interaction between the two devices that you need is for the Detector to activate the Guard when it detects a traffic anomaly. An SSH communication channel does not allow the Detector to perform the following tasks with the Guard:

Synchronize zone configurations with the Guard.

Poll the Guard to identify that an attack on the zone has ended. If you enable the detect and learn process on the Detector, the Detector suspends the learning process (threshold tuning) when it detects an attack on the zone. Because the Detector cannot poll the Guard to determine when the attack is over, it is unable to automatically resume the learning process when the attack ends.

Monitor communication with the Guard and notify you if remote actions fail, such as activating the Guard to protect the zone.

To allow the Detector to perform these tasks, you must configure an SSL communication channel (see the "Configuring the SSL Communication Channel Parameters" section).

To ensure a secure SSH communication channel, the Detector generates a private-public SSH key pair and distributes the public SSH key to the Guards listed in the remote Guard lists.

After you enable the SSH communication channel, you must establish the communication channel between the Detector and the Guard, which you perform from the Detector.

If you replace a Guard at one end of an SSH communication channel, then you must regenerate the SSH private (host) and public keys on the Detector so that it can successfully authenticate itself with the new Guard.

This section contains the following topics:

Enabling an SSH Communication Channel

Regenerating SSH Communication Channel Keys

Enabling an SSH Communication Channel

To enable an SSH communication channel between a Guard and a Detector, from the Guard, permit access to the SSH service by the Detector IP address by entering the permit ssh command in configuration mode.

After you enable the SSL communication channel between the Guard and the Detector, you can establish the communication channel between them. For information on establishing the communication channel, see the "Establishing Communication Channels" section.

Regenerating SSH Communication Channel Keys

If you replace a Guard that a Detector communicates with over an SSH communication channel, then you must perform the following steps to regenerate the SSH communication channel keys:


Step 1 Delete the SSH host key from the Detector by entering the no host-keys ip-address-general configuration mode command on the Detector.

The ip-address-general argument specifies the IP address of the remote device.

To display the host keys listed on the Detector, use the show host-keys command.

Step 2 Configure the SSH key on the remote Guard by performing one of the following actions:

Establish a new SSH communication channel from the Detector. (see the "Establishing Communication Channels" section).

Add the Detector public key manually to the remote Guard. You can copy the Detector public SSH key and paste it into the list of SSH keys that the Guard maintains.

To display the Detector public SSH key, use the show public-key command on the Detector.

To add the Detector public SSH key to the list of SSH keys that the Guard maintains, use the key add command on the Guard.


Establishing Communication Channels

Establish an SSH or SSL communication channel between the Detector and the Guard to enable the Detector to communicate directly with the Guard.


Note You must enable the communication channel on both the Detector and the Guard before you establish the communication channel. For information about enabling a communication channel, see the "Enabling an SSL Communication Channel" section or "Enabling an SSH Communication Channel" section.


During the initial connection between the two devices, the Detector exchanges the SSH keys and SSL certificates that are required to secure the communication channel. The Detector then closes the connection and establishes the communication channel when it needs to activate the Guard, synchronize a zone configuration with the Guard (SSL communication channel only), or poll the Guard (SSL communication channel only).


Caution If the Guard is authenticating users using TACACS+ authentication, you must define the user riverhead on the TACACS+ server in order for the key publish command to function.

To establish a communication channel from the Detector to the Guard, perform the following steps on the Detector:


Step 1 Generate the SSH private-public key pair by entering the following command in configuration mode:

key generate

If an SSH key pair already exists, the following message appears:

/root/.ssh/id_rsa already exists.
Overwrite (y/n)? 

Choose the desired option by entering one of the following options:

y—The Detector generates a new SSH key pair.

n—The Detector does not generate a new SSH key pair.

Step 2 Publish the public SSH key only, which is required for an SSH communication channel, or publish the public SSH key and generate and exchange the SSL certificate, which is required for an SSL communication channel. Use one of the following commands in configuration mode:

key publish remote-guard-address {ssh | ssl}

key publish *

Table 3-10 provides the arguments and keywords for the key publish command.

Table 3-10 Arguments and Keywords for the key publish Command 

Parameter
Description

remote-guard-address

Remote Guard IP address.

ssh

Publishes the SSH public key to the remote Guard that is defined by the remote-guard-address argument.

ssl

Publishes the SSH public key and generates and exchanges an SSL certificate with the remote Guard that is defined by the remote-guard-address argument.

*

Publishes the SSH key and generates and exchanges SSL certificates with all of the Guards that are configured in the remote Guard lists.

The Detector establishes an SSH communication channel with each of the Guards in the remote Guard lists. Repeat Step 3 and Step 4 for each remote Guard.


Step 3 To prevent a man-in-the-middle attack (attack in which an attacker is able to intercept and modify messages going between two victims), SSH uses host keys to verify the remote host, or Guard, authenticity. When initiating an SSH communication channel to a Guard for the first time, the Guard sends its public key to the Detector. If this is the first connection initiated from the Detector to the Guard, the following message appears:

The authenticity of host '<remote-hostname> (<remote-host IP
address>)' can't be established.
RSA key fingerprint is <RSA key fingerprint> 
Are you sure you want to continue connecting (yes/no)?

Enter yes.

The following prompt appears:

riverhead@remote-Guard-IP-address's password:

Step 4 Enter the password configured on the Guard for the user riverhead.


The following example shows how to generate the private-public SSH key pair and establish an SSH communication channel between the Detector and a remote Guard that has an IP address of 192.168.100.33:

user@DETECTOR-conf# key generate
user@DETECTOR-conf# key publish 192.168.100.33 ssh
/root/.ssh/id_rsa already exists.
Overwrite (y/n)? y
The authenticity of host '192.168.100.33 (192.168.100.33)' can't be
established.
RSA key fingerprint is
de:cb:ac:36:9a:fe:33:f9:6a:d8:7b:98:a9:51:75:54.
Are you sure you want to continue connecting (yes/no)? yes
riverhead@192.168.100.33's password: <password>
user@DETECTOR-conf# 

The following example shows how to establish a communication channel with all the Guards that you define in the remote Guard lists:

user@DETECTOR-conf# key publish *

To display the Detector SSH public key, use the show public-key command.

To display the host keys listed on the Detector, use the show host-keys command.

Configuring a Date and a Time

To set the time and the date, use the following command in configuration mode:

date MMDDhhmm[[CC]YY][.ss]

Table 3-11 provides the arguments for the date command.

Table 3-11 Arguments for the date Command 

Parameter
Description

MM

Month in numeric figures.

DD

Day of the month.

hh

Hour (24-hour clock).

mm

Minutes.

CC

(Optional) First two digits of the year (for example, 2007).

YY

(Optional) Last two digits of the year (for example, 2007).

.ss

(Optional) Seconds (the decimal point must be present).


The following example shows how to set the date to October 8 of the year 2007 and the time to 5:10 pm (1710) and 17 seconds.

user@DETECTOR-conf# date 1008171007.17
Wed Oct  8 17:10:17 EDT 2007

Synchronizing the Detector Clock with an NTP Server

You can configure the Detector system clock to synchronize with a Network Time Protocol (NTP) server. To configure the Detector clock to synchronize with an NTP server, perform the following steps in configuration mode:


Step 1 Configure the date and time locally by entering the following command:

date MMDDhhmm[[CC]YY][.ss]

See the "Configuring a Date and a Time" section for more information.

Step 2 Configure the Detector system time zone by entering the following command:

timezone timezone-name

The timezone-name argument specifies the name of the time zone. The name is composed of the continent /city options.

The following are the continent options:

Africa, America, Antarctica, Arctic, Asia, Atlantic, Australia, Europe, Indian, Pacific

EtcA wild card for a desired timezone


Tip The time zone name is case sensitive. Type the desired continent name and press Tab twice for a list of relevant cities.


Step 3 Enable the NTP service by entering the following command:

service ntp

Step 4 Permit access to the NTP service from a network address by entering the following command:

permit ntp ip-address

Step 5 Configure the IP address of the desired NTP server by entering the following command:

ntp server ip-address

The ip-address argument specifies the NTP server IP address.

You must reload the Detector configuration.


The following example shows how to configure an NTP server:

user@DETECTOR-conf# date 1008171007.17
user@DETECTOR-conf# timezone Africa/Timbuktu
user@DETECTOR-conf# service ntp
user@DETECTOR-conf# permit ntp 192.165.200.224
user@DETECTOR-conf# ntp server 192.165.200.224

Managing SSH Keys

The Detector supports SSH for secure remote login. You can add a list of SSH keys to enable secure communication from a remote device to the Detector without entering a login and password.

The following sections describe how you can manage the Detector SSH key list:

Adding SSH Keys

Deleting SSH Keys

Adding SSH Keys

You can enable an SSH connection without entering a login and password by adding the remote connection SSH public key to the Detector SSH key list.

Enter the following command in configuration mode:

key add [user-name] {ssh-dsa | ssh-rsa} key-string comment

Table 3-12 provides the arguments and keywords for the key add command.

Table 3-12 Arguments and Keywords for the key add Command 

Parameter
Description

user-name

(Optional) Name of the user to which the SSL key is added. Only an administrator can add an SSH key for other users.

The default is to add the SSH key for the current user.

ssh-dsa

Specifies the SSH version 2-DSA key type.

ssh-rsa

Specifies the SSH version 2-RSA key type.

key-string

Public SSH key that was created on a Guard or remote terminal. The key string is limited to 8192 bits.

You must copy the complete key excluding the key type identification (ssh-rsa or ssh-dsa).

comment

Device description. The comment format is usually in the format of user@hostname for the user and machine used to generate the key. For example, the default comment used for the SSH public keys that the Guard generates is root@GUARD.


The following example shows how to add an SSH RSA key:

user@DETECTOR-conf# key add ssh-rsa 14513797528175730. . .user@Detector.com

Deleting SSH Keys

You can remove an SSH key from the list. If you remove the SSH key, you must authenticate the next time that you establish an SSH session with the Detector.

To remove an SSH key from the Detector, use the following command in configuration mode:

key remove [user-name] key-string

Table 3-13 provides the arguments for the key remove command.

Table 3-13 Arguments for the key remove Command 

Parameter
Description

user-name

(Optional) Name of the user from which the SSH keys are removed.

Only an administrator can delete an SSH key for other users. The default is to delete the SSH key for the current user.

key-string

Public SSH key to delete.

Paste the SSH public key onto the prompt. Paste only the key without the identification field (ssh-rsa or ssh-dsa).


The following example shows how to view a user key so that it can be cut and pasted into the key remove command:

user@DETECTOR-conf# show keys Lilac
ssh-rsa 2352345234523456... user@Detector.com
user@DETECTOR-conf# key remove Lilac 2352345234523456...

Configuring the Keys for SFTP and SCP Connections

Secure File Transfer Protocol (SFTP), which is layered on top of SSH, and Secure Copy Protocol (SCP), which relies on SSH, provide a secure and authenticated method for copying files. SFTP and SCP use public key authentication and strong data encryption, which prevents login, data, and session information from being intercepted or modified in transit.

To configure the keys for SFTP and SCP connections, perform the following steps:


Step 1 Display the Detector public key on the Detector by entering the show public-key command in configuration mode.

If the key exists, skip Step 2 and proceed to Step 3.

If no key exists, proceed to Step 2.

Step 2 Generate a private-public key pair on the Detector by entering the key generate command in configuration mode.


Caution We recommend that you do not regenerate the private-public key pair if one already exists. Unnecessarily regenerating the key pair may cause future communication problems with remote Guards that are not currently online. If you regenerate the private-public key pair, you must publish the new public key by using the key publish command to all remote Guards that are configured in the Detector default remote Guard lists and the zone remote Guard lists.

If an SSH key pair already exists, the following message appears:

/root/.ssh/id_rsa already exists.
Overwrite (y/n)? 

Type y to regenerate the key.

The Detector creates the public-private key pair. To display the Detector public key, use the show public-key command in configuration mode.

Step 3 Copy the public key from the Detector and paste it into the key file on the network server.

For example, if you are connecting to a network server that is installed on a Linux operating system with the username user account, add the Detector public key to the /home/username/.ssh/authorized_keys2 file.

Make sure that the key is copied as a single line. If the key is copied as two lines, delete the new line character at the end of the first line.


Note If you do not copy the public key and paste it into the key file on the network server, you cannot configure automatic export functions (such as the export reports command) and you have to enter your password each time that you manually connect to the network server.



Changing the Hostname

You can change the hostname of the Detector. The change takes effect immediately and the new hostname is automatically integrated into the CLI prompt string.

To change the Detector hostname, use the following command in configuration mode:

hostname name

The name argument specifies the new hostname.

The following example shows how to change the hostname of the Detector:

user@DETECTOR-conf# hostname CiscoDetector
admin@CiscoDetector-conf#

Enabling SNMP Traps

You can enable the Detector to send SNMP traps and notify you of significant events that occur on the Detector. In addition, you can configure the Detector SNMP trap generator parameters and define the scope of the SNMP trap information that the Detector reports.

A trap is logged in the Detector event log and displayed in the event monitor when a trap condition occurs, regardless of whether the SNMP agent sends the trap.

To configure the Detector to send SNMP traps, perform the following steps:


Step 1 Enable the SNMP trap generator service by entering the following command in configuration mode:

service snmp-trap

Step 2 Configure the SNMP trap generator parameters (the trap destination IP address and the trap information scope) by entering the following command:

snmp trap-dest ip-address [community-string [min-severity]]

Table 3-14 provides the arguments for the snmp trap-dest command.

Table 3-14 Arguments for the snmp trap-dest Command 

Parameter
Description

ip-address

Destination host IP address.

community-string

(Optional) Community string that is sent with the trap. This string must match the community string defined for the destination host. The default community string is public. Enter an alphanumeric string from 1 to 15 characters. The string cannot contain spaces.

min-severity

(Optional) Trap information scope. Define the scope by stating the minimum severity-level coverage. The trap then displays all specified severity-level events and above. For example, if you specify Warnings, the trap displays all severity-level events from Warnings to Emergencies. The following list states the severity-level options:

Emergencies—System is unusable (severity=0).

Alerts—Immediate action needed (severity=1).

Critical—Critical conditions (severity=2).

Errors—Error conditions (severity=3).

Warnings—Warning conditions (severity=4).

Notifications—Normal but significant conditions (severity=5).

Informational—Informational messages (severity=6).

Debugging—Debugging messages (severity=7).

By default, the report displays all severity-level events.



To delete SNMP trap generator parameters, use the no snmp trap-dest command. Enter an asterisk (*) to remove all SNMP trap destination parameters.

The following example shows that traps with a severity level equal to or higher than the errors severity level are sent to the destination IP address 192.168.100.52 with the SNMP community string of tempo:

user@DETECTOR-conf# snmp trap-dest 192.168.100.52 tempo errors 

Table 3-15 lists the SNMP traps that the Detector generates.

Table 3-15 SNMP Traps 

SNMP Trap
Severity
Description

rhExcessiveUtilizationTrap

EMERGENCY

The Detector cannot add new dynamic filters because more than 150,000 dynamic filters are active concurrently in all the Detector zones.

rhExcessiveUtilizationTrap

EMERGENCY

The anomaly detection engine memory limit was reached (higher than 90 percent).

rhGeneralTrap

ALERT

The disk space is 80 percent.

rhExcessiveUtilizationTrap

CRITICAL

The Gigabit interface link utilization in bps1 is above 85 percent.

rhExcessiveUtilizationTrap

CRITICAL

The memory utilization is above 85 percent.

rhExcessiveUtilizationTrap

CRITICAL

The accelerator card CPU utilization is above 85 percent.

rhGeneralTrap

CRITICAL

The HW diagnostics card reported an error.

rhLinkStatusTrap

CRITICAL

The link is down.

rhDynamicFilterTrap

ERROR

The number of pending dynamic filters is 1000, and new pending dynamic filters will be discarded.

rhProtectionTrap

ERROR

The Detector failed to activate a remote Guard to protect the zone by using an SSL communication channel.

rhZoneGenericTrap

ERROR

The Detector failed to synchronize the zone configuration.

rhGeneralTrap

ERROR

The Detector failed to activate zone anomaly detection as follows:

From detect or from learn to detect and learn

From detect and learn to detect or to learn

The Detector deactivated zone anomaly detection and the learning process.

rhDynamicFilterTrap

WARNING

The Detector failed to add dynamic filters.

This error may occur in one of the following situations:

There are too many active dynamic filters.

The dynamic filter action is remote-activate and the Detector failed to connect to a remote Guard that is listed in the remote Guard lists.

rhExcessiveUtilizationTrap

WARNING

The Detector has more than 135,000 dynamic filters that are active concurrently in all the zones. When the number of active dynamic filters reaches 150,00, the Detector cannot add new dynamic filters.

rhGeneralTrap

WARNING

The disk space is 75 percent.

rhPolicyConstructionTrap

WARNING

The policy construction phase of the learning process has failed.

rhDetectionTrap

WARNING

The Detector failed to start zone anomaly detection.

rhReloadTrap

WARNING

The Detector has restarted. The trap contains a MIB2 warm-start or cold-start trap and information about what caused the Detector to restart.

rhReloadTrap

WARNING

The Detector has shut down. The trap contains a MIB2 warm-start or cold-start trap and information about what caused the Detector to shut down.

rhThresholdTuningTrap

WARNING

The threshold tuning phase of the learning process has failed.

rhAttackTrap

NOTIFICATIONS

An attack has started.

rhAttackTrap

NOTIFICATIONS

An attack has ended.

rhLinkStatusTrap

NOTIFICATIONS

The link is up.

rhPolicyConstructionTrap

NOTIFICATIONS

The policy construction phase of the learning process has been started.

rhPolicyConstructionTrap

NOTIFICATIONS

The policy construction phase of the learning process has been accepted.

rhPolicyConstructionTrap

NOTIFICATIONS

The policy construction phase of the learning process has been stopped.

rhDetectionTrap

NOTIFICATIONS

The zone anomaly detection has started.

rhDetectionTrap

NOTIFICATIONS

The zone anomaly detection has ended.

rhProtectionTrap

NOTIFICATIONS

The Detector has successfully activated a remote Guard to protect the zone by using an SSL communication channel.

rhThresholdTuningTrap

NOTIFICATIONS

The threshold tuning phase of the learning process has been started.

rhThresholdTuningTrap

NOTIFICATIONS

The threshold tuning phase of the learning process has been accepted.

rhThresholdTuningTrap

NOTIFICATIONS

The threshold tuning phase of the learning process has been stopped.

rhZoneGenericTrap

NOTIFICATIONS

The Detector has started to synchronize the zone configuration.

rhZoneTrap

NOTIFICATIONS

A new zone has been created.

rhZoneTrap

NOTIFICATIONS

A zone has been deleted.

rhDynamicFilterControlTrap

INFO

The number of attack-detection events that the Detector did not send for a specific policy.

rhDynamicFilterControlTrap

INFO

The Detector has more than 1000 active dynamic filters and will not send traps for dynamic filters that it deletes.

rhDynamicFilterTrap

INFO

A dynamic filter has been added.

rhDynamicFilterTrap

INFO

A dynamic filter has been deleted.

rhDynamicFilterTrap

INFO

A pending dynamic filter has been added.

1 bps = bits per second


Configuring SNMP Community Strings

You can access the Detector SNMP server and retrieve information as defined by the Management Information Base 2 (MIB2) and the Cisco Riverhead proprietary MIB. The community string acts like a password and permits read access from the Detector SNMP agent. You can configure the Detector SNMP community string and enable access to the SNMP agent from clients in different organizational units and with different community strings.

To add an SNMP community string, use the following command in configuration mode:

snmp community community-string

The community-string argument specifies the desired Detector community string. Enter an alphanumeric string from 1 to 15 characters. The string cannot contain spaces. The Detector default community string is riverhead. You can specify as many community names as you want. To delete a community string, use the no community string command. Enter an asterisk (*) to remove all SNMP community strings.

The following example shows how to configure the SNMP community string:

user@DETECTOR-conf# snmp community tempo

Configuring the Login Banner

The login banner is the text that appears on the screen before user authentication when you open an SSH session, a console port connection, or a WBM session to the Detector.

You can configure a login banner to warn users against unauthorized access, describe what is considered the proper use of the system, and alert users that the system is being monitored to detect improper use and other illicit activity.

The Detector displays the login banner in the following locations:

CLI—Before the password login prompt or as a popup window (depending on the SSH client that you are using).

WBM—On the right side of the Detector login window.

This section contains the following topics:

Configuring the Login Banner from the CLI

Importing the Login Banner

Deleting the Login Banner

Configuring the Login Banner from the CLI

You can create a single or multiple message banner by using the login-banner command. If you enter more than one login banner, the new login banner is appended to the existing login banner as a new line.

To configure the login banner, use the following command in configuration mode:

login-banner banner-str

The banner-str argument specifies the banner text. The maximum string length is 999 characters. If you use spaces in the expression, enclose the expression in quotation marks (" ").

To display the login banner, use the show login-banner command.

The following example shows how to configure and display the login banner:

user@DETECTOR-conf# login-banner "Welcome to the Cisco Traffic Anomaly Detector"
user@DETECTOR-conf# login-banner "Unauthorized access is prohibited."
user@DETECTOR-conf# login-banner "Contact sysadmin@corp.com for access."
user@DETECTOR-conf# show login banner
Welcome to the Cisco Traffic Anomaly Detector
Unauthorized access is prohibited.
Contact sysadmin@corp.com for access.

Importing the Login Banner

You can import a text file from a network server to replace the existing login banner by entering one of the following commands in global mode or in configuration mode:

copy ftp login-banner server full-file-name [login [password]]

copy {sftp | scp} login-banner server full-file-name login

The maximum length of each line in the file that you import is 999 characters.

Because SFTP and SCP rely on SSH for secure communication, if you do not configure the key that the Detector uses before you enter the copy command with the sftp or scp option, the Detector prompts you for the password. See the "Configuring the Keys for SFTP and SCP Connections" section for more information about how to configure the key that the Detector uses for secure communication.

Table 3-16 provides the arguments and keywords for the copy login-banner command.

Table 3-16 Arguments and Keywords for the copy login-banner Command 

Parameter
Description

ftp

Specifies FTP.

sftp

Specifies SFTP.

scp

Specifies SCP.

server

IP address of the network server. Enter the IP address in dotted-decimal notation (for example, enter 192.168.10.2).

full-file-name

Complete name of the file. If you do not specify a path, the server copies the file from your home directory.

login

Server login name.

The login argument is optional when you define an FTP server. When you do not enter a login name, the FTP server assumes an anonymous login and does not prompt you for a password.

password

(Optional) Password for the remote FTP server. If you do not enter the password, the Detector prompts you for it.


The following example shows how to import the login banner from an FTP server:

user@DETECTOR-conf# copy ftp login-banner 10.0.0.191 /root/login-banner <user> <password>

Deleting the Login Banner

If you no longer want to display a message before user authentication, delete the login banner.

To delete the login banner, use the no login-banner command in configuration mode.

The following example shows how to delete the login banner:

user@DETECTOR-conf# no login-banner

Configuring the Web-Based Manager Logo

To customize your end-user interface, you can add a company logo or any customized logo to the Web-Based Manager (WBM) web pages.

The new logo appears in the following places:

On the Detector login page, under the Cisco Systems logo.

On all WBM pages, except for the Detector login page, on the right side of the Cisco Systems logo.

The new logo must be in GIF format. We recommend that the size of the new logo is as follows: width = 87 pixels and height = 41 pixels.

This section contains the following topics:

Importing the WBM Logo

Deleting the WBM Logo

Importing the WBM Logo

To import a new logo from a network server for use in the WBM, use the following command in global mode or in configuration mode:

copy ftp wbm-logo server full-file-name [login [password]]

copy {sftp | scp} wbm-logo server full-file-name login

Because SFTP and SCP rely on SSH for secure communication, if you do not configure the key that the Detector uses before you enter the copy command with the sftp or scp option, the Detector prompts you for a password. See the "Configuring the Keys for SFTP and SCP Connections" section for more information about how to configure the key that the Detector uses for secure communication.

Table 3-17 provides the arguments and keywords for the copy wbm-logo command.

Table 3-17 Arguments and Keywords for the copy wbm-logo Command 

Parameter
Description

ftp

Specifies FTP.

sftp

Specifies SFTP.

scp

Specifies SCP.

server

IP address of the network server. Enter the IP address in dotted-decimal notation (for example, enter 192.168.10.2).

full-file-name

Complete name of the file including the GIF file extension. If you do not specify a path, the server copies the file from your home directory.

login

(Optional) Server login name. The login argument is optional when you define an FTP server. When you do not enter a login name, the FTP server assumes an anonymous login and does not prompt you for a password.

password

(Optional) Password for the remote FTP server. If you do not enter the password, the Detector prompts you for it.


The following example shows how to import the WBM logo file from an FTP server:

user@DETECTOR-conf# copy ftp wbm-logo 10.0.0.191 /root/WBMlogo.gif <user> <password> 

Deleting the WBM Logo

To delete the WBM logo, use the no wbm-logo command in configuration mode.

The following example shows how to delete the login banner:

user@DETECTOR-conf# no wbm-logo

Configuring the Session Timeout

The session timeout is the amount of time that a session remains active when there is no activity. If there is no activity for the configured time, a timeout occurs, and then you must log in again. The session timeout is disabled by default.

The session timeout applies to the CLI only and does not apply to the WBM.

You can configure the number of minutes until the Detector disconnects an idle session automatically by entering the following command in configuration mode:

session-timeout timeout-val

The timeout-val argument specifies the number of minutes until the Detector disconnects an idle session automatically. Valid values are from 1 to 1440 minutes (one day).

The following example shows how to configure the Detector to disconnect an idle session after 10 minutes:

user@DETECTOR-conf# session-timeout 10

To prevent the Detector from disconnecting idle sessions automatically, use the no session-timeout command.

To display the value of the session timeout, use the show session-timeout command.