RSa Basic
RSa Basic
Revision: H1CY10
ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLECTIVELY, "DESIGNS") IN THIS MANUAL ARE PRESENTED "AS IS," WITH ALL FAULTS. CISCO AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THE DESIGNS, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE DESIGNS ARE SUBJECT TO CHANGE WITHOUT NOTICE. USERS ARE SOLELY RESPONSIBLE FOR THEIR APPLICATION OF THE DESIGNS. THE DESIGNS DO NOT CONSTITUTE THE TECHNICAL OR OTHER PROFESSIONAL ADVICE OF CISCO, ITS SUPPLIERS OR PARTNERS. USERS SHOULD CONSULT THEIR OWN TECHNICAL ADVISORS BEFORE IMPLEMENTING THE DESIGNS. RESULTS MAY VARY DEPENDING ON FACTORS NOT TESTED BY CISCO. CCDE, CCENT, Cisco Eos, Cisco HealthPresence, the Cisco logo, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/ or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0812R) Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Cisco Unified Communications SRND (Based on Cisco Unified Communications Manager 7.x) 2010 Cisco Systems, Inc. All rights reserved.
The modular design of the architecture means that technologies can be added when the organization is ready to deploy them. It also provides configurations and topologies tested by Cisco that CCNA -level engineers can use for design and installation, and to support organizational needs. Cisco offers a number of options to provide Security Management capabilities. This guide is focused on our partnership with RSA and their products that meet Ciscos goal to deliver affordable, easy-to-use security information and an event management (SIEM) solution.
500
1000
1200
2500
3000
5000
7500
RSA enVision supports IronPort ESA, IronPort WSA, IPS, ASA, CS-Mars, Cisco ISR, ASR, Cisco ACS, Aironet AP, Catalyst Switches running Catos, Network Compliance Manager, Content Engine, Content Services Switch, Mobility Services Engine, Security Agent, Security Manager, Unified Computing System Manager, VPN Concentrator, and Wireless LAN Controller.
To configure enVision to enable SDEE for ASA IPS AIP-SSM Events: 1. Log in to enVision. 2. Depending on your enVision version, do one of the following: If you are using an enVision version prior to 4.0, Click Overview > System Configuration > Services > Device Services > Manage Secure IDS (XML) Service If you are using enVision version 4.0 or newer, Click Overview > System Configuration > Services > Device Services > Manage SDEE Service enVision displays the Manage Secure IDS (XML) Service or Manage Secure SDEE Service window. 3. Perform one of the following actions: Click Add to add an IDS server. Click the IP Address of the server to modify an IDS server. The system displays the Add/Modify Secure IDS (XML) Server window.
Value Host-ip value of the of the Cisco ASA SSM. User account on the Cisco ASA SSM with administrative privileges. Password to the user account with administrative privileges. Password to the user account with administrative privileges.
2. You must apply access-list to the sensor to allow enVision access to the sensor. Complete the following task on the Cisco Secure IDS/IPS event source. a. Access the Cisco IDS/IPS console and log on using administrative credentials. b. Type the following commands:
configure terminal service host network-settings
c. Configure the access-list to allow enVision host or the network that hosts enVision to access the sensor. Here are some examples:
access-list 10.4.200.0/24 (to allow a network) access-list 10.4.200.66 (to allow a host)
d. Exit the configuration mode, confirming to save changes when prompted. 3. Set up the NIC SDEE Service (prior to enVision 4.0 known as Secure IDS/IPS XML Service) in enVision. See the enVision online Help for instructions on how to set up this service.
NOTE: enVision uses the TCP port 443 (open outbound) to obtain information from this device.
f. Copy the generated SSH key to a new text file, and save the text file as id_rsa.pub. NOTE: The entire SSH key must be on a single line and cannot include any spaces. If necessary, remove spaces.
Directory = CISCO_IRONPORT_WSA_ironport-IP-address, where ironport-IP-address is the actual IP address of the device, for example, CISCO_IRONPORT_WSA_1.2.3.4 Username = nic_sshd b. Click Submit. c. Copy the generated SSH Key to a new text file. Save the text file as id_rsa.pub. NOTE: The entire key must be on a single line. Also, remove any spaces from the key.
10
11
Cisco MARS Configuration Instructions Important: For Cisco MARS, you can set up one of two collection methods, the originally supported Syslog collection and the newly added File Reader Service to collect raw message logs. The collection methods function differently. The Syslog collection method collects Cisco MARS log messages. The File Reader Service collects the logs of the event sources which Cisco MARS is reporting on. To configure Cisco MARS, you must complete these tasks: I. Configure Cisco MARS to send logs to RSA enVision for syslog collection II. Set up the NIC File Reader Service III. Create a Windows user account IV. Create an SFTP user account V. Configure Cisco MARS for File Reader Service to collect raw message logs Set Up the NIC File Reader Service Set up the NIC File Reader Service for the event source. For complete instructions, see the RSA enVision Help topic Set Up File Reader Service. To configure RSA enVision to receive Cisco MARS log files: 1. Log on to enVision. 2. Click Overview > System Configuration > Services > Device Services > Manage File Reader Service.
12
d. Click Apply. e. Click Refresh until the Status column shows the site/node is stopped.
Create an SFTP User Account To create an SFTP user account: 1. Click Start > Administrative Tools > WinSSHD Control Panel. 2. On the Server tab, click Edit Settings. 3. Click Configuration > Access Control > Windows Accounts. 4. Select the nic_sshd account and click Copy. 5. Change the Windows account name to the user account that you created in Active Directory Users and Computers, and complete the fields as follows: a. Ensure that Password authentication is set to Allowed. b. Ensure that Public key authentication is set to Disabled. c. Ensure that Permit SCP is set to No. d. Ensure that Permit SFTP is set to Yes. 6. Click OK. 7. Click OK to commit the changes, and close the WinSSHD Settings window. Configure Cisco MARS for File Reader Service to Collect Raw Message Logs NOTE: To configure Cisco MARS for File Reader Service to collect raw message logs, you must obtain RSA enVision 4.0 Service Pack 3, bug fix (EBF) ENV-32744. To collect raw message logs on Cisco MARS: 1. Log on to your Cisco MARS appliance. 2. Under the Device Configuration and Discovery Information section, click Admin > System Maintenance > Data Archiving, and complete the fields as follows. a. In the Archiving Protocol field, select SFTP. b. In the Remote Host IP field, enter the IP address of your enVision appliance. c. In the Remote Path field, type /CiscoMars_Syslog_IP address of Cisco MARS d. In the Remote Storage Capacity in Days field, leave the default as 10 days. e. In the Username field, enter the user name that you created for the SFTP account on enVision. f. In the Password field, enter the password that you created for the SFTP account on enVision.
14
User Session Activity by Date/Time: Lists all the successful and failed log in/ log out attempts to enVision. User Session Activity by User: Lists all the successful and failed log in/log out attempts to enVision the specified user. Step 6: Procedure to handle an incident on RSA enVision An incident is an event or set of events that warrants further investigation, such as a disk failure, an unexpected spike in network traffic, or the signature of a known threat. Because of the wealth of data that the RSA enVision platform automatically collects, it can be configured to recognize incidents and issue real-time alerts. The alert is the beginning of the enVision incident-management process. RSA enVision provides for closed-loop incident management, from configuring alerts, through creating and assigning response tasks, to monitoring incident response and resolution. Real-Time Alerts RSA enVision generates real-time alerts in response to sets of circumstances that the administrator has specified. RSA enVision analyzes all incoming events, and issues an alert immediately when the specified conditions are met. The alert is reported in the enVision GUI and can be directed to other destinations, such as email, instant message, or a text file stored on the local system. An alert can also be configured to automatically generate an incident-response task. Incident-Response Tasks RSA enVision can group events into tasks for the purpose of investigation, and assign the tasks to analysts (or to an intermediate dispatcher) for response. Analysts display and work with the tasks in RSA enVision Event Explorer. Managers and administrators can monitor the analysts progress in the enVision GUI.
For more information on how to become a RSA reseller, please visit the Partner Section of our website
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of C07-608448-00 06/10 the word partner does not imply a partnership relationship between Cisco and any other company. (1005R)
17