TippingPoint Advanced Slides - V3c
TippingPoint Advanced Slides - V3c
TippingPoint Advanced Slides - V3c
Version 3.1
http://www.tippingpoint.com/training
2
Advanced Class Lab Guide IP Address Assignment Sheet (with login details) Electronic Materials from http://<ip of download server>
Advanced class slides (in PDF format) Windows Tools (Putty, Wireshark, Kiwi, etc) Latest Digital Vaccines TippingPoint OS images Marketing Materials (datasheets, product photos, etc) Product Documentation (manuals, MIB files, etc)
Course Objectives
Understand how to setup and configure TippingPoint IPS and SMS devices Understand how to manage your IPS and SMS devices including updating Digital Vaccines and the IPS and SMS software Understand how to create and apply security policies by configuring filters and applying security profiles to your IPS devices Understand Events and Reporting from an IPS and SMS perspective Understand how to troubleshoot and monitor the performance of an IPS device
4
Class Introductions
Instructor
Freddy Saenz, Senior Systems Engineer, Trainining
[email protected]
Student introductions
Name, company, and location Role Networking and security background Experience with TippingPoint products Objective for taking this class
Class Agenda
Introduction to the TippingPoint family of products IPS setup and basic health / administration SMS setup, IPS management and Segment Groups Basic filter management Advanced filter management Architecture & Performance IPS quarantine SMS Responder IP / DNS Reputation Maintenance & Troubleshooting
Capabilities of an IPS:
Perform as both a NETWORK device and as a SECURITY device NO FALSE POSITIVES (dont block what you shouldnt) Possess a flexible inspection engine to adapt to new threats Provide for policy and filter updates in real-time (no network outage)
9
Core
Perimeter
(1.5 1000Mbps)
WAN Perimeter
Internet
DMZ
DMZ Web Servers & Apps
Departmental Zones
Data Center
Data Center Servers, Apps & Data
VPN
Remote Offices
10Mbps 1Gbps
1Gbps 10Gbps
1Gbps 10Gbps
nx1Gbps nx10Gbps
10
Model
Segments
2 x Segments 4 x Segments
E-Series
600E, 1200E, 2400E, 5000E
4 x Segments
(Copper, Fiber or 50/50 mix)
10 x 1 Gig Segments
(5 x Copper + 5 x SFP)
N-Platform
660N, 1400N, 2500N, 5100N
1 x 10G Segment
(2500N/5100N only)
CoreController SMS
Security Management System
20 Gig
(load balancing)
3 x 10G Segments
11
10 x 1G Segments
(5 x Copper + 5 x SFP)
13
TippingPoint 10
2 x 10/100/1000 Segments / In-Built ZPHA
14
Security Management System (SMS) external server Local Security Manager (LSM) (IPS Web Interface)
Location 1
Location 2
Location N
16
@RISK
DV Labs - Research
Weekly Report
The SANS @RISK newsletter is available for free at: http://www.sans.org/newsletters/risk/ DVLabs - http://dvlabs.tippingpoint.com/ Info on DV team DV Team blog DVLabs advisories Digital Vaccines are delivered via Akamai for resiliency and redundancy
17
Vaccine Creation
Account holders also receive email notifications for new DVs and other support information
18
Link to ThreatLinQ: Event aggregation service utilizing customer and TippingPoint attack data for global threat analysis
19
ThreatLinQ Portal
Helps customers make decisions about how, why, and when to enable different TippingPoint filters
Data sourced real-time by TippingPoint Light-House deployments & customer data
Top Attacks Top Policy Filters Top Attack Sources World Map View Blogs & RSS feeds
20
Connect to the IPS console and answer the setup wizards questions The wizard can also be run from the IPS LCD panel if you do not have console access
22
Security Level sets user id and password policy (length & characters) We recommend using Level 2
23
After Security Level, you will be asked to create an initial super user account
24
Setting the IP address of the management port is most important. We can then manage via HTTPS and SSH
25
After the Setup , you are in the CLI, you may also connect to the CLI using SSH
26
Supported browsers IEv6+ and Firefox Browser checking can be disabled using IPS CLI command: conf t no browser-check
To login: use the username / password created during the initial setup
27
Main Navigation
28
Log Summary IPS filter hits: Block & Alert log Device Logs: System & Audit log
29
System Log contains Log ID, Log Entry Time, Security Level, Component, and Message
Logs can be downloaded, searched and reset
30
The Audit Log can only be reset and viewed by a user with super-user privileges
31
32
33
Edit / Delete Users 3 Access Levels: Super-user: All privileges, including ability to create / edit users and view / reset audit log Administrator: Can make configuration changes, cant view / reset audit log Operator: As administrator but view only
34
Password Security Level Initially set during OBE, controls username / password format Password Expiration policy
Note: It is possible to lock yourself out of the system due to excessive failed logins (alternative user / password recovery)
35
Station 2
IPS
Station n
IPS
Tomahawk
Tomahawk
Tomahawk
Management Network
SMS
Tomahawk Details
Linux server with three NICs
Two are connected to IPS One is connected to management network
Student logs in via SSH to the Tomahawk over the management network and run a number of scripts
attacks 10 perf_http_rate 100
Student
37
38
Security Profiles
Security Profile management and distribution
Events/Reporting
Centralized event collection and reporting
Integration
SMS API Syslog integration with SIM vendors Quarantine integration
41
42
43
44
SMS IP Configuration
Choose IPv4 or IPv6 or dual-stack
Enter IP, Mask, Default Gateway & DNS
DNS is used to resolve the TMC address and may also be resolve IP addresses associated with filter events
45
47
49
General
Reboot / Shutdown the SMS
Update SMS Software & apply Patches SMS System / Audit Logs SMS System / Port Health
50
Management
System Information
Server Properties
Services
As of 3.1 Ping is enabled by default
Remote Syslog
Allows you to offload all SMS events to an external syslog server (typically an external SIM) Can also offload SMS/device Audit & system logs
51
Network
SMS IP Settings
SMTP Settings
For email alerts, and emailing reports
DNS Settings
Required for TMC access
52
53
54
User Permissions
Users can be granted permissions to SMS resources (Profile, Device, Segment Groups) a few ways:
At user creation time, by a user with SuperUser privileges Implicitly, by creation of an SMS resource (Profile or Segment Group Administrators only)
56
58
59
Information for all devices under SMS management, including TOS / DV version
61
62
63
SMS imports all IPS filter events that occurred whilst unmanaged
65
Internet
Core Servers
User Group A
User Group B
2 Segment Groups
Perimeter: between users and the Internet (segment 1) Core: between users and core servers (segment 2)
67
68
69
Edit Permissions
70
71
Absolute Time
Specify Start and End Time
Controls
Refresh Button executes a query Cancel Button cancels an already executed query
73
74
test footer
75
Segment / Device
IPSDevice Segment (direction)
Network
Source / Destination Address Source / Destination Port Whois DNS lookup option
Filter Information
Name, Number, Classification, Category, Profile, Taxonomy CVE / Bugtraq ID Description
77
78
79
82
83
Note
Traffic entering on a Network Port will exit ONLY on the other Network Port in the Segment
Network Ports Segment
84
86
Force Speed / Duplex Disable unused ports Restart port (links down/up)
87
88
Internet
Users
Layer 2 Fallback
IPS
Inspection Engine
Internet
Users
89
90
91
If primary path fails (detected by loss of update packets), then network will transition to secondary path In this type of deployment, consider blocking traffic in L2FB
This will cause the network to transition to the secondary path, but still be inspected
IPS 1 enters Layer-2 Fallback Segments configured to block traffic in L2FB
A
Core IPS
IPS 2 B B
Core
A Layer-2 Fallback IPS 1
A A
Network transitions, traffic continues to pass and be inspected by IPS 2 Consider configuring IPS 2 to permit traffic in L2FB in case both IPSs fallback simultaneously
!
B
Access
92
Core IPS
IPS 4 B B
Core
A
A A B
If wire mode selected, then 1B would also drop, causing switch to transition
Access
93
The External ZPHA is powered by the IPS USB port The ZPHA bypasses the IPS during
TOS updates (if device does not support hitless OS update) Power outages IPS 1 Hardware upgrades USB connection
for power
ZPHA
Connection made when USB link drops power
Internet
Users
94
Device A
Net A A B Net B
Device B
When the ZPHA has power and traffic is shunted to the IPS, Auto-MDI will handle any cabling issues When the ZPHA is in by-pass mode, ensure the path from Device A to Device B (Orange Lines) has the proper cabling (straight through vs. cross over)
To negate MDI/MDI-X or wiring issues, best practice is to deploy while IPS is powered off and ensure you have link
95
Distribution Progress
View details for past or current TOS distributions Stop a current distribution Clear old distributions
97
Import from local file system Download from TMC Choose version and select Download All versions for all device types are downloaded Distribution Specific device group(s) All devices Specific device
98
99
100
Only a single Digital Vaccine can be installed on an IPS at any given time
This is in addition to a custom DV or auxiliary DV which supplements the main primary DV
Each profile may have different filters enabled as required for that network location (Segment)
By default all Filters are controlled by their Category Setting and each Category set to Recommended
Filters can be controlled either by Category
For example setting the Spyware to Block / Notify will enable all current and new spyware filters to Block / Notify
You dont configure the Digital Vaccine, you control the Profile which accompanies it
103
Hidden
Intellectual Property
3248
Spyware
Disabled
IPS Profile
Category Setting Vulnerability: Recommended Exploits: Recommended Spyware: Block / Notify Filter Overrides 0164 3798 3248 Filter Filter Filter Enabled: Permit + Notify Enabled: Block + Notify Disabled Packet Trace: No Packet Trace: Yes Exceptions: None Exceptions: 172.16.240.2/32
104
Customized filtering
Advanced DDoS, Traffic Management Filters, IP Reputation, Thresholding
105
Profiles Tab
IPS Profiles
Digital Vaccines
106
DV Inventory
Shows Active DV and list of other available DVs
DV Distribution Progress
Details DV distribution progress and history
107
Distribute
Distributes and installs selected DV to one or more IPS devices, which impacts inspection and possibly network / IPS performance
Activate
Activate only impacts the SMS (no change is made to the inline IPS devices). SMS can only edit filter policy from filters contained within the Active DV
DVs can optionally be Activated and Distributed as part of the download procedure
108
DV Distribution
Select Priority Note: High Priority could cause IPS performance issues Distribution status
109
IPS Profiles
Profile Inventory
Shows all available Profiles
Distribution Progress
Current progress & history
110
113
You can select the required Action Set for your desired Category
114
116
Save filter search query and Reset All for new searches
117
Editing Filters
Select one or more Filters then right-click, select Edit
Editing Filters
Override the Category Setting by choosing an Action Set for the Filter
119
120
Distribution of Profiles
Once you are finished editing Profiles, you need to Distribute it to a Segment or Segment Group for it to take effect
Anywhere you see the Distribute button, you may select it to distribute the profile
121
You can select whether to Distribute the Profile to a Segment Group, single Segment or Device
Be careful to select the appropriate Priority, as this may impact your network
122
123
Note: If you edit an existing Shared Setting, you must redistribute any Profile which uses it
126
127
129
Once created, new Action Sets are available for controlling Category settings and Filter Overrides
Note: If an Action Set calls for the IPS to generate a syslog message, then you must define a remote syslog server under Device Configuration From Devices Tab Right-click device Edit > Device Configuration
130
Scheduled Distributions Determining what Profile is running on which Segment LSM Profile Management
Importing Profiles from the IPS
131
Policy by Direction
Each physical IPS segment is actually defined as two virtual Segments to account directionality A B & B A
The Profile distributed to the A B Segment can be different from the B A Segment
For example if Segment 1 is your Perimeter and you wanted to support policy by direction:
Determine how its physically wired
You would first need to determine how the Segment is physically wired, and whether A B is out-bound vs. in-bound
You would edit the Filters in the In-bound and Out-bound Profiles accordingly Distribute the Perimeter In-bound Profile to the Perimeter In-bound Segment Groups
And same for Perimeter Out-bound
132
133
134
Profile Compare
Allows you to compare two or more Profiles and see the deltas between them
135
View just the differences Edit Filter directly from this screen
136
137
Search across all Profiles and edit the same filters(s) in multiple Profiles
138
Profile Snapshots
When distributing a Profile to your device, you get a snapshot of your profile called a Distribution Snapshot
This is a restore point, allowing you to roll-back to this point at a later time To roll-back simply Active / Distribute the required version A User Snapshot may be created as well Profile Versions Tab allows you to manage snapshot versions
139
Profile Versions
Major number increases at each distribution (if a change has been made) The minor number for each individual filter or category change
Device Network Configuration Segment Group Details If you un-manage / re-manage an IPS, the SMS will lose this information as it doesnt know if the profile was changed
141
142
Create Profile
143
144
145
146
Action / State Use Category or Override Enable / disable filter Action Set
Select Profile
149
150
151
Non-DV Filters
Version 3.1
Non-DV Filters
Filters which statistically analyze flows or inspect at the IP header Examples include
Traffic Management Filters Advanced DDoS IP Reputation
153
Configured within the applicable Profile Once matched traffic can be:
Blocked (silently no notifications) Allowed (traffic will be inspected against the DV) Rate-limit (traffic will be inspected against the DV) Trust (no further inspection occurs)
Direction to apply this filter: A B, B A or Both Traffic Definition Protocol (IP, TCP, UDP, ICMP) Trust / Block IP fragments SRC/DST IP (can use named resources)
155
Advanced DDoS
Provides protection against your publically available servers
Typically your DMZ
SYN-Flood Attack
Attacker sends many spoofed TCP SYN packets Server never receives ACK
Connection table fills up quickly New requests are ignored
Connection Requests (spoofed IP) SYN
Data
SYN+ACK
CLIENT
SERVER
ATTACKER
SERVER
157
CLIENT
SYN SYN+ACK
IPS
SERVER
Connection Complete
ACK
159
Notification Threshold
The IPS will only generate an event when rejected SYNs rise above this rate (note protection is immediate)
N-Platform Configuration
Enable SYN-Proxy
N-Platform can be enabled here E-Series is done under Devices Tab
161
LSM Reports
Rate Limit & DDoS report Note: useful for real-time reports
162
Run Rate-Limit SMS Report Create TM Filter to Block all Tomahawk traffic (optional) Note: Ensure you remove all TM Filters when finished
163
Lets examine the art of filter writing, by using the Microsoft RPC DCOM buffer overflow vulnerability for our example:
Referenced in Microsoft security bulletin MS03-026 Exploited by both the Blaster and Nachi worms to name a few
165
Interface: ISystemActivator
000001a0-00000000-c000000000000046 v0.0
Pkt 2
Pkt 3
Vulnerability-Specific Filters
In EVERY attack, the following must be true to exploit the buffer overflow
TCP session established to appropriate port (135) BIND is to the appropriate RPC interface REQUEST is to appropriate function call (opnum=4) SERVERNAME parameter must be longer than 44 characters
Exploit-Specific Filters
An exploit-specific filter detects the shellcode used in a particular exploit, which could lead to false positives / negatives
Example: The following hex string can be used to detect the MS Blaster worm:
EB 19 5E 31 C9 81 E9 89 FF FF FF 81 36 80 BF 32 94 81 EE FC FF FF FF E2 F2 EB 05 E8 E2 FF FF FF 03 53 06 1F 74 57 75 95 80 BF BB 92 7F 89 5A 1A CE B1 DE 7C E1 BE 32
TippingPoint Architecture
Flow Table
Suspicious
Flow Control
DROP
DROP
Threat Verification
MGMT
TRIGGER DV VERIFICATION POLICY NOTIFICATION ENGINE
DROP
PROFILE
FILTER MATCH
This has a significant perform gains, as the IPS no longer needs to inspect the packets belonging to a blocked flow
Blocked streams remain for 30 minutes by default Changing a filter set to block to something else (permit or disable), will not clear a blocked stream
You may have to manually clear out a blocked stream
The same principle applies if the DV filter has an Action Set of Rate-Limit
170
5 Tuple
Select to flush
172
Performance Overview
The TippingPoint IPS is built on a real-time operating system
Inspecting traffic is the highest priority Other tasks are all lower priority
Block and Notify operations perform better than Permit and Notify operations
We are first and foremost an IPS (Prevention) and not an IDS (Detection)
Overall system performance can be optimized automatically as well as through manual intervention
Automatic Optimization Manual Optimization Properly size the device (rated throughput) Define Trust/Block TM Rules Create Exceptions Disable poorly performing filters Use Blocks instead of Permits Reduce Packet traces & notifications
173
174
Performance Protection
Sending notifications takes up CPU cycles Notifications can be suspended automatically if experiencing congestion Performance Protection settings
Logging Mode: Always log / Disable if congested Congestion Percentage: Default:1.0% Range: 0.1% to 99.9% Disable Time: Notification suppression time, Default: 600 seconds
175
176
177
Ensure traffic not too close to maximum rating for that device
178
Monitoring Throughput
179
Look how many packets are being dropped due to Congestion Run command more than once to see if congestion is increasing On N-Platform its named Dropped instead of Congestion
180
Monitoring Congestion
181
Note: they are candidates, as they may detect attacks in the future!
182
Solution
Route traffic around the IPS or get a bigger IPS / CoreController Use inspection by-pass rules (N-Platform only) Could be a network MTU issue Lots of IP in IP traffic Trust fragmented traffic between trusted servers Check that you do not have high-priority enabled Distribute at a quieter time Place device into L2FB, then distribute, then remove L2FB Ensure you apply filters only where needed (i.e. VoIP filters only on voice vlan) Disable filters which you know you no longer need (patched, dont use application / OS, old vulnerability, etc) Use show np rule-stats to identify filter candidates to disable Consider using traffic management trust rules to trust backups or other trusted bulk transfer applications Check you dont have excessive Permit + Notifies, packet traces or email notifications Look to set filters which are firing to Block only (ie SQL slammer) Review other solutions above
183
Browse to www.google.com.. .
Corporate Network
walk-in worm Infected PC
Internet
186
Name
187
188
189
Restrictions / Exceptions Which IP CIDR can or can not be quarantined. The Filter will still match, this setting determines whether to quarantine the host
Quarantined Access List of CIDRs which a quarantined host can access for example a remediation servers
190
IPS Quarantine
When traffic hits a Block + Quarantine filter:
A Blocked Stream is generated A Quarantined Host is generated
191
192
IP / DNS REPUTATION
193
Reputation data can be entered manually or sourced from TippingPoint with Reputation DV service
Manual entries: can be added individually, from event viewer, or imported from file (csv format) Reputation DV service from TippingPoint (future)
Reputation Filter determines what action to perform when traffic matches a reputation criteria
Configured as part of your IPS Profile (then distributed to appropriate Segment or Segment Group) Reputation Filters can use any available Action Set
Including Block, Permit, Rate Limit & Quarantine
194
Access Switch
195
Each database entry can optionally contain a tag You can create your own tag categories
Type, score, country, etc
Name
Type
Text, Numeric, List, Boolean, Date
197
List Entries
198
Once your tags are defined, you can start entering or importing your entries
199
Add Entry
IP Address / DNS domain Reputation Data
201
Reputation Settings
Match against source, destination or both addresses Block or Permit while performing database lookup
202
Reputation Criteria
203
Reputation: Events
204
SMS RESPONDER
205
Actions (close)
Response Opened
Actions (open)
Syslog / trap
2. Choose Policies
3. Click New
208
Responder: Initiation
1. Policy Name
2. Policy Initiation
209
210
Responder: Actions
212
213
Tomahawk Tomahawk
Student
Student
Student traffic passes through IPS when connecting to Tomahawk via management network
214
217
218
219
220
If using IPS Quarantine as a Responder Action, you must specify which devices will implement the Action
221
Were using Permit for Flow Control As we want SMS Responder to determine if / when to block
222
We must tie this Action Set to the desired SMS Responder Policy
223
The SMS Responder Policy receives the filter hit (because we checked appropriate Responder policy in the Action Set)
The Responder Policy will eventually become Active because more than 20 hits will be seen within 2 minutes
The policy will go into effect, and the IPS devices will be told to Quarantine the attacking IP address
224
225
Auto DV Activation
Enable Auto DV Download Enable Auto DV Activation Disable Auto DV Distribution
228
Useful for:
Saving a known good configuration Cloning configurations Backup purposes (Disaster Recovery)
231
Device configuration
IPS configuration and snapshots from devices (if stored on the SMS)
233
234
235
236
237
238
SMS #1 192.168.1.20
SMS #2 192.168.1.21
239
NOTE: Since this procedure requires a reboot of the IPS device, be aware that traffic through the device may be interrupted
240
242
243
CLI basics
help Run this command to enter the help mode ? will display sub-commands or usage information
show ? for example
Sticky commands
conf t <enter> will enter the configuration mode Ctrl-c or exit to escape this mode
Auto-complete
Press tab key for auto-complete sh<tab> will get you show
Shortcuts
conf t for configure terminal sh for show
244
Snapshot commands: create and manage IPS snapshots Other useful top-level commands
reboot restarts the IPS halt gracefully halts the system in preparation for a power off setup re-run the setup wizard traffic-capture capture traffic on inspection segments
245
247
248
ARP Listing
show arp
TraceRoute
traceroute
249
Blocked Streams Quarantined host entry IP Reputation entry set to Block Traffic Management Filter set to Block
250
Has Policy been distributed to proper segment Filter Exception Profile Exception Traffic Management Filter set to Trust
251
ThreatLinQ
Helps with Policy decisions and dealing with timely/imminent threats Blog Articles on current threats and how to deal with them Top Attacks, Movers and Shakers Highest rated policy filters Note: Consider configuring your SMS to share info with Threatlinq (opt-in via Edit Preference Security)
252
How to join
TippingPoint Users Group - http://mail.unc.edu/lists/ List Name is "tippingpoint" Register and receive access by administrator
253
THANK YOU!
http://www.tippingpoint.com/training
255