0% found this document useful (0 votes)
474 views53 pages

QRadar Installation Guide 7.2.2 en PDF

Uploaded by

Sezer Özavcı
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
474 views53 pages

QRadar Installation Guide 7.2.2 en PDF

Uploaded by

Sezer Özavcı
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 53

IBM Security QRadar

Version 7.2.2

Installation Guide

IBM

GC27-6238-00
Note
Before using this information and the product that it supports, read the information in “Notices” on page 43.

© Copyright IBM Corporation 2004, 2014.


US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Contents
Introduction to QRadar installations . . . . . . . . . . . . . . . . . . . . . . . v

Chapter 1. QRadar deployment overview . . . . . . . . . . . . . . . . . . . . . 1


Activation keys and license keys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Integrated Management Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
QRadar components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Prerequisite hardware accessories and desktop software for QRadar installations . . . . . . . . . . . . 4
Supported web browsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Enabling document mode and browser mode in Internet Explorer . . . . . . . . . . . . . . . . 5

Chapter 2. Installing a QRadar Console or managed host . . . . . . . . . . . . . . 7

Chapter 3. QRadar software installations on your own appliance . . . . . . . . . . . 9


Prerequisites for installing QRadar on your own appliance . . . . . . . . . . . . . . . . . . . . 9
Preparing QRadar software installations for HA and XFS file systems . . . . . . . . . . . . . . . 10
Linux partition properties for your own appliance . . . . . . . . . . . . . . . . . . . . . 10
Installing RHEL on your own appliance . . . . . . . . . . . . . . . . . . . . . . . . . . 12

Chapter 4. Virtual appliance installations for QRadar SIEM and QRadar Log Manager 15
Overview of supported virtual appliances . . . . . . . . . . . . . . . . . . . . . . . . . 15
System requirements for virtual appliances . . . . . . . . . . . . . . . . . . . . . . . . 17
Creating your virtual machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Installing the QRadar software on a virtual machine. . . . . . . . . . . . . . . . . . . . . . 19
Adding your virtual appliance to your deployment . . . . . . . . . . . . . . . . . . . . . . 20

Chapter 5. Installations from the recovery partition . . . . . . . . . . . . . . . . 23


Reinstalling from the recovery partition . . . . . . . . . . . . . . . . . . . . . . . . . . 23

Chapter 6. Network settings management. . . . . . . . . . . . . . . . . . . . . 27


Changing the network settings in an all-in-one system . . . . . . . . . . . . . . . . . . . . . 27
Changing the network settings of a QRadar Console in a multisystem deployment . . . . . . . . . . . 27
Updating network settings after a NIC replacement . . . . . . . . . . . . . . . . . . . . . . 29

Chapter 7. Troubleshooting problems . . . . . . . . . . . . . . . . . . . . . . 31


Troubleshooting resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Support Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Service requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Fix Central . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Knowledge bases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
QRadar log files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Ports used by QRadar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Searching for ports in use by QRadar. . . . . . . . . . . . . . . . . . . . . . . . . . 40
Viewing IMQ port associations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Privacy policy considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

© Copyright IBM Corp. 2004, 2014 iii


iv IBM Security QRadar: Installation Guide
Introduction to QRadar installations
IBM® Security QRadar® appliances are preinstalled with software and the Red Hat
Enterprise Linux operating system. You can also install QRadar software on your
own hardware.

Information about installing IBM Security QRadar software applies to IBM Security
QRadar SIEM, IBM Security QRadar Log Manager, and IBM Security QRadar
Network Anomaly Detection products.

To install or recover a high-availability (HA) system, see the IBM Security QRadar
High Availability Guide.

Intended audience

Network administrators who are responsible for installing and configuring QRadar
systems must be familiar with network security concepts and the Linux operating
system.

Technical documentation

To find IBM Security QRadar product documentation on the web, including all
translated documentation, access the IBM Knowledge Center (http://
www.ibm.com/support/knowledgecenter/SS42VS/welcome).

For information about how to access more technical documentation in the QRadar
products library, see Accessing IBM Security Documentation Technical Note
(www.ibm.com/support/docview.wss?rs=0&uid=swg21614644).

Contacting customer support

For information about contacting customer support, see the Support and
Download Technical Note (http://www.ibm.com/support/docview.wss?rs=0
&uid=swg21612861).

Statement of good security practices

IT system security involves protecting systems and information through


prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed,
misappropriated or misused or can result in damage to or misuse of your systems,
including for use in attacks on others. No IT system or product should be
considered completely secure and no single product, service or security measure
can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a comprehensive security
approach, which will necessarily involve additional operational procedures, and
may require other systems, products or services to be most effective. IBM DOES
NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE
IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

© Copyright IBM Corp. 2004, 2014 v


vi IBM Security QRadar: Installation Guide
Chapter 1. QRadar deployment overview
You can install IBM Security QRadar on a single server for small enterprises, or
across multiple servers for large enterprise environments.

For maximum performance and scalability, you must install a high-availability


(HA) managed host appliance for each system that requires HA protection. For
more information about installing or recovering an HA system, see the IBM
Security QRadar High Availability Guide.

Activation keys and license keys


When you install IBM Security QRadar appliances, you must type an activation
key. After you install, you must apply your license keys. To avoid typing the
wrong key in the installation process, it is important to understand the difference
between the keys.
Activation key
The activation key is a 24-digit, 4-part, alphanumeric string that you
receive from IBM. All installations of QRadar products use the same
software. However, the activation key specifies which software modules to
apply for each appliance type. For example, use the IBM Security QRadar
QFlow Collector activation key to install only the QRadar QFlow Collector
modules.
You can obtain the activation key from the following locations:
v If you purchased an appliance that is preinstalled with QRadar software,
the activation key is included in a document on the enclosed CD.
v If you purchased QRadar software or virtual appliance download, a list
of activation keys is included in the Getting Started document. The
Getting Started is attached to the confirmation email.
License key
Your system includes a temporary license key that provides you with
access to QRadar software for five weeks. After you install the software
and before the default license key expires, you must add your purchased
licenses.
The following table describes the restrictions for the default license key:
Table 1. Restrictions for the default license key for QRadar SIEM and QRadar Network
Anomaly Detection installations
Usage Limit
Active log source limit 750
Events per second threshold 5000
Flows per interval 200000
User limit 10
Network object limit 300

© Copyright IBM Corp. 2004, 2014 1


Table 2. Restrictions for the default license key for QRadar Log Manager installations
Usage Limit
Active log source limit 750
Events per second threshold 5000
User limit 10
Network object limit 300

When you purchase a QRadar product, an email that contains your


permanent license key is sent from IBM. These license keys extend the
capabilities of your appliance type and define your system operating
parameters. You must apply your license keys before your default license
expires.
Related tasks:
Chapter 2, “Installing a QRadar Console or managed host,” on page 7
Install IBM Security QRadar Console or a managed host on the QRadar appliance
or on your own appliance.
“Installing RHEL on your own appliance” on page 12
You can install the Red Hat Enterprise Linux operating system on your own
appliance for use with IBM Security QRadar.
“Installing the QRadar software on a virtual machine” on page 19
After you create your virtual machine, you must install the IBM Security QRadar
software on the virtual machine.

Integrated Management Module


Use Integrated Management Module, which is on the back panel of each appliance
type, to manage the serial and Ethernet connectors.

You can configure Integrated Management Module to share an Ethernet port with
the IBM Security QRadar product management interface. However, to reduce the
risk of losing the connection when the appliance is restarted, configure Integrated
Management Module in dedicated mode.

To configure Integrated Management Module, you must access the system BIOS
settings by pressing F1 when the IBM splash screen is displayed. For more
information about configuring Integrated Management Module, see the Integrated
Management Module User's Guide on the CD that is shipped with your appliance.
Related concepts:
“Prerequisite hardware accessories and desktop software for QRadar installations”
on page 4
Before you install IBM Security QRadar products, ensure that you have access to
the required hardware accessories and desktop software.

QRadar components
IBM Security QRadar consolidates event data from log sources that are used by
devices and applications in your network.

Important: Software versions for all IBM Security QRadar appliances in a


deployment must be same version and fix level. Deployments that use different
versions of software are not supported.

2 IBM Security QRadar: Installation Guide


QRadar deployments can include the following components:
QRadar QFlow Collector
Passively collects traffic flows from your network through span ports or
network taps. The IBM Security QRadar QFlow Collector also supports the
collection of external flow-based data sources, such as NetFlow.
You can install a QRadar QFlow Collector on your own hardware or use
one of the QRadar QFlow Collector appliances.

Restriction: The component is available only for QRadar SIEM and


QRadar Network Anomaly Detection deployments.
QRadar Console
Provides the QRadar product user interface. The interface delivers
real-time event and flow views, reports, offenses, asset information, and
administrative functions.
In distributed QRadar deployments, use the QRadar Console to manage
hosts that include other components.
QRadar Event Collector
Gathers events from local and remote log sources. Normalizes raw log
source events. During this process, the Magistrate component examines the
event from the log source and maps the event to a QRadar Identifier
(QID). Then, the Event Collector bundles identical events to conserve
system usage and sends the information to the Event Processor.
QRadar Event Processor
Processes events that are collected from one or more Event Collector
components. The Event Processor correlates the information from QRadar
products and distributes the information to the appropriate area,
depending on the type of event.
The Event Processor also includes information that is gathered by QRadar
products to indicate behavioral changes or policy violations for the event.
When complete, the Event Processor sends the events to the Magistrate
component.
Magistrate
Provides the core processing components. You can add one Magistrate
component for each deployment. The Magistrate provides views, reports,
alerts, and analysis of network traffic and security events.
The Magistrate component processes events against the custom rules. If an
event matches a rule, the Magistrate component generates the response
that is configured in the custom rule.
For example, the custom rule might indicate that when an event matches
the rule, an offense is created. If there is no match to a custom rule, the
Magistrate component uses default rules to process the event. An offense is
an alert that is processed by using multiple inputs, individual events, and
events that are combined with analyzed behavior and vulnerabilities. The
Magistrate component prioritizes the offenses and assigns a magnitude
value that is based on several factors, including number of events, severity,
relevance, and credibility.

For more information about each component, see the Administration Guide.
Related concepts:

Chapter 1. QRadar deployment overview 3


Chapter 7, “Troubleshooting problems,” on page 31
Troubleshooting is a systematic approach to solving a problem. The goal of
troubleshooting is to determine why something does not work as expected and
how to resolve the problem.

Prerequisite hardware accessories and desktop software for QRadar


installations
Before you install IBM Security QRadar products, ensure that you have access to
the required hardware accessories and desktop software.

Hardware accessories

Ensure that you have access to the following hardware components:


v Monitor and keyboard, or a serial console
v Uninterrupted Power Supply (UPS) for all systems that store data, such as
QRadar Console, Event Processor components, or QRadar QFlow Collector
components
v Null modem cable if you want to connect the system to a serial console

Important: QRadar products support hardware-based Redundant Array of


Independent Disks (RAID) implementations, but do not support software-based
RAID installations.

Desktop software requirements

Ensure that following applications are installed on all desktop systems that you
use to access the QRadar product user interface:
v Java™ Runtime Environment (JRE) version 1.7 or IBM 64-bit Runtime
Environment for Java V7.0
v Adobe Flash version 10.x
Related tasks:
Chapter 2, “Installing a QRadar Console or managed host,” on page 7
Install IBM Security QRadar Console or a managed host on the QRadar appliance
or on your own appliance.
“Installing RHEL on your own appliance” on page 12
You can install the Red Hat Enterprise Linux operating system on your own
appliance for use with IBM Security QRadar.
“Installing the QRadar software on a virtual machine” on page 19
After you create your virtual machine, you must install the IBM Security QRadar
software on the virtual machine.

Supported web browsers


For the features in IBM Security QRadar products to work properly, you must use
a supported web browser.

When you access the QRadar system, you are prompted for a user name and a
password. The user name and password must be configured in advance by the
administrator.

The following table lists the supported versions of web browsers.

4 IBM Security QRadar: Installation Guide


Table 3. Supported web browsers for QRadar products
Web browser Supported version
Mozilla Firefox 17.0 Extended Support Release

24.0 Extended Support Release


32-bit Microsoft Internet Explorer, with 8.0
document mode and browser mode enabled
9.0
Google Chrome The current version as of the release date of
IBM Security QRadar V7.2.2 products

Enabling document mode and browser mode in Internet


Explorer
If you use Microsoft Internet Explorer to access IBM Security QRadar products,
you must enable browser mode and document mode.

Procedure
1. In your Internet Explorer web browser, press F12 to open the Developer Tools
window.
2. Click Browser Mode and select the version of your web browser.
3. Click Document Mode.
v For Internet Explorer V9.0, select Internet Explorer 9 standards
v For Internet Explorer V8.0, select Internet Explorer 8 standards
Related concepts:
“Prerequisite hardware accessories and desktop software for QRadar installations”
on page 4
Before you install IBM Security QRadar products, ensure that you have access to
the required hardware accessories and desktop software.

Chapter 1. QRadar deployment overview 5


6 IBM Security QRadar: Installation Guide
Chapter 2. Installing a QRadar Console or managed host
Install IBM Security QRadar Console or a managed host on the QRadar appliance
or on your own appliance.

IBM Security QRadar Network Anomaly Detection is a stand-alone appliance.


Install QRadar Network Anomaly Detection Console on a QRadar or on your own
appliance.

Software versions for all IBM Security QRadar appliances in a deployment must be
same version and fix level. Deployments that use different versions of software is
not supported.

Before you begin

Ensure that the following requirements are met:


__ v The required hardware is installed.
__ v For QRadar appliances, a notebook is connected to the serial port on the back
of the appliance, or a keyboard and monitor is connected.
__ v You are logged in as the root user.
__ v The activation key is available.

If you use a notebook to connect to the system, you must use a terminal program,
such as HyperTerminal. Ensure that you set Connect Using option to the
appropriate COM port of the serial connector. Ensure that you also set the
following properties:
Table 4. Terminal connection properties
Property Setting
Bits per second 9600
Stop Bits 1
Data bits 8
Parity None

Procedure
1. If you are using your own appliance, mount the QRadar ISO image
a. Create the /media/cdrom directory by typing the following command:
mkdir /media/cdrom
b. Obtain the QRadar software.
c. Mount the QRadar ISO image by typing the following command:
mount -o loop <path to the QRadar ISO> /media/cdrom
d. To begin the installation, type the following command:
/media/cdrom/setup
2. For all installations, ensure that the End User License Agreement (EULA) is
displayed.

Tip: Press the Spacebar key to advance through the document.

© Copyright IBM Corp. 2004, 2014 7


If you are installing QRadar on your own appliance, you are prompted to
continue the installation. This process might take up to several hours.
3. When you are prompted for the activation key, enter the 24-digit, 4-part,
alphanumeric string that you received from IBM.
The letter I and the number 1 (one) are treated the same. The letter O and the
number 0 (zero) are also treated the same.
4. For the type of setup, select normal.
5. Follow the instructions in the installation wizard to complete the installation.
The following table contains descriptions and notes to help you configure the
installation.
Table 5. Description of network settings
Network Setting Description
Host name Fully qualified domain name
Secondary DNS server address Optional
Public IP address for networks that use Optional
Network Address Translation (NAT)
Used to access the server, usually from a
different network or the Internet.

Configured by using Network Address


Translation (NAT) services on your network
or firewall settings on your network. (NAT
translates an IP address in one network to a
different IP address in another network).
Email server name If you do not have an email server, use
localhost.
Root password The password must meet the following
criteria:
v Contain at least 5 characters
v Contain no spaces
v Can include the following special
characters: @, #, ^, and *.

After you configure the installation parameters, a series of messages are


displayed. The installation process might take several minutes.
6. Apply your license key.
a. Log in to QRadar:
https://IP_Address_QRadar
The default Username is admin. The Password is the password of the root
user account.
b. Click the login.
c. Click the Admin tab.
d. In the navigation pane, click System Configuration.
e. Click the System and License Management icon.
f. From the Display list box, select Licenses, and upload you license key.
g. Select the unallocated license and click Allocate System to License.
h. From the list of licenses, select and license, and click Allocate License to
System.

8 IBM Security QRadar: Installation Guide


Chapter 3. QRadar software installations on your own
appliance
To ensure a successful installation of IBM Security QRadar on your own appliance,
you must install the Red Hat Enterprise Linux operating system.

Ensure that your appliance meets the system requirements for QRadar
deployments.

Prerequisites for installing QRadar on your own appliance


Before you install the Red Hat Enterprise Linux (RHEL) operating system on your
own appliance, ensure that your system meets the system requirements.

The following table describes the system requirements:


Table 6. System requirements for RHEL installations on your own appliance
Requirement Description
Supported software version Version 6.5
Bit version 64-bit
KickStart disks Not supported
Network Time Protocol (NTP) package Optional

If you want to use NTP as your time server,


ensure that you install the NTP package
Memory (RAM) for Console systems Minimum 24 GB

Important: You must upgrade your system


memory before you install QRadar.
Memory (RAM) for Event Processor 12 GB
Memory (RAM) for QRadar QFlow Collector 6 GB
Free disk space for Console systems Minimum 256 GB

Important: For optimal performance, ensure


that an extra 2-3 times of the minimum disk
space is available.
QRadar QFlow Collector primary drive Minimum 70 GB
Firewall configuration WWW (http, https) enabled

SSH enabled

Important: Before you configure the


firewall, disable the SELinux option. The
QRadar installation includes a default
firewall template that you can update in the
System Setup window.

© Copyright IBM Corp. 2004, 2014 9


Preparing QRadar software installations for HA and XFS file
systems
As part of configuring high availability (HA), the QRadar installer requires a
minimal amount of free space in the storage file system, /store/, for replication
processes. Space must be allocated in advance because XFS file systems cannot be
reduced in size after they are formatted.

To prepare the XFS partition for use with HA systems, you must do the following
tasks:
1. Use the mkdir command to create the following directories:
v /media/cdrom
v /media/redhat
2. Mount the QRadar software ISO image by typing the following command:
mount -o loop <path_to_QRadar_iso> /media/cdrom
3. Mount the RedHat Enterprise Linux V6.5 software by typing the following
command:
mount -o loop <path_to_RedHat_6.5_64bit_dvd_iso_1> /media/redhat
4. If your system is designated as the primary host in an HA pair, run the
following script:
/media/cdrom/post/prepare_ha.sh
5. To begin the installation, type the following command:
/media/cdrom/setup

Note: This procedure is not required on your HA secondary host.

Linux partition properties for your own appliance


If you use your own appliance, you can delete and re-create partitions on your Red
Hat Enterprise Linux operating system rather than modify the default partitions.

Use the values in following table as a guide when you recreate the partitioning on
your Red Hat Enterprise Linux operating system.

Restriction: Resizing logical volumes by using a logical volume manager (LVM) is


not supported.
Table 7. Partition guide for RHEL
File system Forced to be
Partition Description Mount point type Size primary SDA or SDB
/boot System boot /boot EXT4 200 MB Yes SDA
files

10 IBM Security QRadar: Installation Guide


Table 7. Partition guide for RHEL (continued)
File system Forced to be
Partition Description Mount point type Size primary SDA or SDB
swap Used as empty swap Systems with No SDA
memory when 4 to 8 GB of
RAM is full. RAM, the size
of the swap
partition must
match the
amount of
RAM

Systems with
8 to 24 GB of
RAM,
configure the
swap partition
size to be 75%
of RAM, with
a minimum
value of 8 GB
and a
maximum
value of 24
GB.
/ Installation / EXT4 20000 MB No SDA
area for
QRadar, the
operating
system, and
associated files.
/store/tmp Storage area /store/tmp EXT4 20000 MB No SDA
for QRadar
temporary files
/var/log Storage area /var/log EXT4 20000 MB No SDA
for QRadar and
system log files
1
/store Storage area /store XFS On Console No SDA
for QRadar appliances:
data and approximately If 2 disks,
configuration 80% of the SDB
files available
storage.

On managed
hosts other
than QFlow
Collectors and
Store and
Forward
Event
Collectors:
approximately
90% of the
available
storage.
1
/store/ariel/ Storage area /store/ariel/ XFS on On Console No SDA
persistent_data for ariel persistent_data Consoles appliances:
database cursor 20% of the If 2 disks,
EXT4 on available SDB
managed storage.
hosts
On managed
hosts other
than QFlow
Collectors and
Store and
Forward
Event
Collectors:
10% of the
available
storage.

Chapter 3. QRadar software installations on your own appliance 11


Table 7. Partition guide for RHEL (continued)
File system Forced to be
Partition Description Mount point type Size primary SDA or SDB
1
The /store and /store/ariel/persistent_data together take 100% of the disk space that remains after you create
the first 5 partitions.

Restrictions
Future software upgrades might fail if you reformat any of the following partitions
or their subpartitions:
v /store
v /store/tmp
v /store/ariel
v /store/ariel/persistent_data

Installing RHEL on your own appliance


You can install the Red Hat Enterprise Linux operating system on your own
appliance for use with IBM Security QRadar.

Procedure
1. Copy the Red Hat Enterprise Linux 6.4 operating system DVD ISO to one of
the following portable storage devices:
v Digital Versatile Disk (DVD)
v Bootable USB flash drive
For information about creating a bootable USB flash drive, see the Installing
QRadar Using a Bootable USB flash drive technote on the IBM web site
(www.ibm.com/support).
2. Insert the portable storage device into your appliance and restart your
appliance.
3. From the starting menu, select one of the following options:
v Select the USB or DVD drive as the boot option.
v To install on a system that supports Extensible Firmware Interface (EFI), you
must start the system in legacy mode.
4. When prompted, log in to the system as the root user.
5. To prevent an issue with Ethernet interface address naming, on the Welcome
page, press the Tab key and at the end of the Vmlinuz initrd=initrd.image
line add biosdevname=0.
6. Follow the instructions in the installation wizard to complete the installation:
a. Select the Basic Storage Devices option.
b. When you configure the host name, the Hostname property can include
letters, numbers, and hyphens.
c. When you configure the network, in the Network Connections window,
select System eth0 and then click Edit and select Connect automatically.
d. On the IPv4 Settings tab, from the Method list, select Manual.
e. In the DNS servers field, type a comma-separated list.
f. Select Create Custom Layout option.
g. Configure EXT4 for the file system type for the /, /boot, and /var/log
partitions.
h. Reformat the swap partition with a file system type of swap.

12 IBM Security QRadar: Installation Guide


i. Select Basic Server.
7. When the installation is complete, click Reboot.

What to do next

After installation, if your onboard network interfaces are named anything other
than eth0, eth1, eth2, and eth3, you must rename the network interfaces.
Related reference:
“Linux partition properties for your own appliance” on page 10
If you use your own appliance, you can delete and re-create partitions on your Red
Hat Enterprise Linux operating system rather than modify the default partitions.

Chapter 3. QRadar software installations on your own appliance 13


14 IBM Security QRadar: Installation Guide
Chapter 4. Virtual appliance installations for QRadar SIEM and
QRadar Log Manager
You can install IBM Security QRadar SIEM and IBM Security QRadar Log Manager
on a virtual appliance. Ensure that you use a supported virtual appliance that
meets the minimum system requirements.

To install a virtual appliance, complete the following tasks in sequence:


__ v Create a virtual machine.
__ v Install QRadar software on the virtual machine.
__ v Add your virtual appliance to the deployment.

Overview of supported virtual appliances


A virtual appliance is a IBM Security QRadar system that consists of QRadar
software that is installed on a VMWare ESX virtual machine.

A virtual appliance provides the same visibility and function in your virtual
network infrastructure that QRadar appliances provide in your physical
environment.

After you install your virtual appliances, use the deployment editor to add your
virtual appliances to your deployment. For more information on how to connect
appliances, see the Administration Guide.

The following virtual appliances are available:

QRadar SIEM All-in-One Virtual 3199

This virtual appliance is a QRadar SIEM system that can profile network behavior
and identify network security threats. The QRadar SIEM All-in-One Virtual 3199
virtual appliance includes an on-board Event Collector and internal storage for
events.

The QRadar SIEM All-in-One Virtual 3199 virtual appliance supports the following
items:
v Up to 1,000 network objects
v 200,000 flows per interval, depending on your license
v 5,000 Events Per Second (EPS), depending on your license
v 750 event feeds (more devices can be added to your licensing)
v External flow data sources for NetFlow, sFlow, J-Flow, Packeteer, and Flowlog
files
v QRadar QFlow Collector and Layer 7 network activity monitoring

To expand the capacity of the QRadar SIEM All-in-One Virtual 3199 beyond the
license-based upgrade options, you can add one or more of the QRadar SIEM
Event Processor Virtual 1699 or QRadar SIEM Flow Processor Virtual 1799 virtual
appliances:

© Copyright IBM Corp. 2004, 2014 15


QRadar SIEM Flow Processor Virtual 1799

This virtual appliance is deployed with any QRadar SIEM 3105 or QRadar SIEM
3124 series appliance. The virtual appliance is used to increase storage and
includes an on-board Event Processor, and internal storage.

QRadar SIEM Flow Processor Virtual 1799 appliance supports the following items:
v 600,000 flows per interval, depending on traffic types
v 2 TB or larger dedicated flow storage
v 1,000 network objects
v QRadar QFlow Collector and Layer 7 network activity monitoring

You can add QRadar SIEM Flow Processor Virtual 1799 appliances to any QRadar
SIEM 3105 or QRadar SIEM 3124 series appliance to increase the storage and
performance of your deployment.

QRadar SIEM Event Processor Virtual 1699


This virtual appliance is a dedicated Event Processor that allows you to scale your
QRadar SIEM deployment to manage higher EPS rates. The QRadar SIEM Event
Processor Virtual 1699 includes an on-board Event Collector, Event Processor, and
internal storage for events.

The QRadar SIEM Event Processor Virtual 1699 appliance supports the following
items:
v Up to 10,000 events per second
v 2 TB or larger dedicated event storage

The QRadar SIEM Event Processor Virtual 1699 virtual appliance is a distributed
Event Processor appliance and requires a connection to any QRadar SIEM 3105 or
QRadar SIEM 3124 series appliance.

QRadar Data Node Virtual 1400

This virtual appliance provides retention and storage for events and flows. The
virtual appliance expands the available data storage of Event Processors and Flow
Processors, and also improves search performance.

Size your QRadar Data Node Virtual 1400 appliance appropriately, based on the
EPS rate and data retention rules of the deployment.

Data retention policies are applied to a QRadar Data Node Virtual 1400 appliance
in the same way that they are applied to stand-alone Event Processors and Flow
Processors. The data retention policies are evaluated on a node-by-node basis.
Criteria, such as free space, is based on the individual QRadar Data Node Virtual
1400 appliance and not the cluster as a whole.

Data Nodes can be added to the following appliances:


v Event Processor (16XX)
v Flow Processor (17XX)
v Event/Flow Processor (18XX)
v All-In-One (2100 and 31XX)

16 IBM Security QRadar: Installation Guide


To enable all features included in the QRadar Data Node Virtual 1400 appliance,
install using the 1400 activation key.

QRadar VFlow Collector 1299

This virtual appliance provides the same visibility and function in your virtual
network infrastructure that a QRadar QFlow Collector offers in your physical
environment. The QRadar QFlow Collector virtual appliance analyzes network
behavior and provides Layer 7 visibility within your virtual infrastructure.
Network visibility is derived from a direct connection to the virtual switch.

The QRadar VFlow Collector 1299 virtual appliance supports a maximum of the
following items:
v 10,000 flows per minute
v Three virtual switches, with one more switch that is designated as the
management interface.

The QRadar VFlow Collector 1299 virtual appliance does not support NetFlow.

System requirements for virtual appliances


To ensure that IBM Security QRadar works correctly, ensure that virtual appliance
that you use meets the minimum software and hardware requirements.

Before you install your virtual appliance, ensure that the following minimum
requirements are met:
Table 8. Requirements for virtual appliances
Requirement Description
VMware client VMware ESXi Version 5.0

VMware ESXi Version 5.1

For more information about VMWare clients, see the VMware


website (www.vmware.com)
Virtual disk size on all Minimum: 256 GB
appliance except QRadar
QFlow Collector Important: For optimal performance, ensure that an extra 2-3
appliances times of the minimum disk space is available.
Virtual disk size for Minimum: 70 GB
QRadar QFlow Collector
appliances

The following table describes the minimum memory requirements for virtual
appliances.
Table 9. Minimum and optional memory requirements for QRadar virtual appliances
Minimum memory Suggested memory
Appliance requirement requirement
QRadar VFlow Collector 6 GB 6 GB
1299
QRadar Event Collector 12 GB 16 GB
Virtual 1599

Chapter 4. Virtual appliance installations 17


Table 9. Minimum and optional memory requirements for QRadar virtual
appliances (continued)
Minimum memory Suggested memory
Appliance requirement requirement
QRadar SIEM Event 12 GB 48 GB
Processor Virtual 1699
QRadar SIEM Flow 12 GB 48 GB
Processor Virtual 1799
QRadar SIEM All-in-One 24 GB 48 GB
Virtual 3199
QRadar Log Manager 24 GB 48 GB
Virtual 1790

Related tasks:
“Creating your virtual machine”
To install a virtual appliance, you must first use VMware vSphere Client 5.0 to
create a virtual machine.

Creating your virtual machine


To install a virtual appliance, you must first use VMware vSphere Client 5.0 to
create a virtual machine.

Procedure
1. From the VMware vSphere Client, click File > New > Virtual Machine.
2. Use the following steps to guide you through the choices:
a. In the Configuration pane of the Create New Virtual Machine window,
select Custom.
b. In the Virtual Machine Version pane, select Virtual Machine Version: 7.
c. For the Operating System (OS), select Red Hat Enterprise Linux 6 (64-bit).
d. On the CPUs page, configure the number of virtual processors that you
want for the virtual machine:
When you configure the parameters on the CPU page, you must configure a
minimum of two processors. The combination of number of virtual sockets
and number of cores per virtual socket determines how many processors
are configured on your system.
The following table provides examples of CPU page settings you can use:
Table 10. Sample CPU page settings
Number of processors Sample CPU page settings
2 Number of virtual sockets = 1

Number of cores per virtual socket = 2


2 Number of virtual sockets = 2

Number of cores per virtual socket = 1


4 Number of virtual sockets = 4

Number of cores per virtual socket = 1


4 Number of virtual sockets = 2

Number of cores per virtual socket = 2

18 IBM Security QRadar: Installation Guide


e. In the Memory Size field, type or select 8 or higher.
f. Use the following table to configure you network connections.
Table 11. Descriptions for network configuration parameters
Parameter Description
How many NICs do you want to connect You must add at least one Network Interface
Controller (NIC)
Adapter VMXNET3

g. In the SCSI controller pane, select VMware Paravirtual.


h. In the Disk pane, select Create a new virtual disk and use the following
table to configure the virtual disk parameters.
Table 12. Settings for the virtual disk size and provisioning policy parameters
Property Option
Capacity 256 or higher (GB)
Disk Provisioning Thin provision
Advanced options Do not configure

3. On the Ready to Complete page, review the settings and click Finish.

Installing the QRadar software on a virtual machine


After you create your virtual machine, you must install the IBM Security QRadar
software on the virtual machine.

Before you begin

Ensure that the activation key is readily available.

Procedure
1. In the left navigation pane of your VMware vSphere Client, select your virtual
machine.
2. In the right pane, click the Summary tab.
3. In the Commands pane, click Edit Settings.
4. In the left pane of the Virtual Machine Properties window, click CD/DVD
Drive 1.
5. In the Device Status pane, select the Connect at power on check box.
6. In the Device Type pane, select Datastore ISO File and click Browse.
7. In the Browse Datastores window, locate and select the QRadar product ISO
file, click Open and then click OK.
8. After the QRadar product ISO image is installed, right-click your virtual
machine and click Power > Power On.
9. Log in to the virtual machine by typing root for the user name.
The user name is case-sensitive.
10. Ensure that the End User License Agreement (EULA) is displayed.

Tip: Press the Spacebar key to advance through the document.


11. For the type of setup, select normal.

Chapter 4. Virtual appliance installations 19


12. For QRadar Console installations, select the Enterprise tuning template.
13. Follow the instructions in the installation wizard to complete the installation.
The following table contains descriptions and notes to help you configure the
installation.
Table 13. Description of network settings
Network Setting Description
Host name Fully qualified domain name
Secondary DNS server address Optional
Public IP address for networks that use Optional
Network Address Translation (NAT)
Used to access the server, usually from a
different network or the Internet.

Configured by using Network Address


Translation (NAT) services on your network
or firewall settings on your network. (NAT
translates an IP address in one network to a
different IP address in another network).
Email server name If you do not have an email server, use
localhost.
Root password The password must meet the following
criteria:
v Contain at least 5 characters
v Contain no spaces
v Can include the following special
characters: @, #, ^, and *.

After you configure the installation parameters, a series of messages are


displayed. The installation process might take several minutes.
Related tasks:
“Creating your virtual machine” on page 18
To install a virtual appliance, you must first use VMware vSphere Client 5.0 to
create a virtual machine.

Adding your virtual appliance to your deployment


After the IBM Security QRadar software is installed, add your virtual appliance to
your deployment.

Procedure
1. Log in to the QRadar Console.
2. On the Admin tab, click the Deployment Editor icon.
3. In the Event Components pane on the Event View page, select the virtual
appliance component that you want to add.
4. On the first page of the Adding a New Component task assistant, type a
unique name for the virtual appliance.
The name that you assign to the virtual appliance can be up to 20 characters in
length and can include underscores or hyphens.
5. Complete the steps in the task assistant.
6. From the Deployment Editor menu, click File > Save to staging.
7. On the Admin tab menu, click Deploy Changes.

20 IBM Security QRadar: Installation Guide


8. Apply your license key.
a. Log in to QRadar:
https://IP_Address_QRadar
The default Username is admin. The Password is the password of the root
user account.
b. Click the login.
c. Click the Admin tab.
d. In the navigation pane, click System Configuration.
e. Click the System and License Management icon.
f. From the Display list box, select Licenses, and upload you license key.
g. Select the unallocated license and click Allocate System to License.
h. From the list of licenses, select and license, and click Allocate License to
System.
Related tasks:
“Creating your virtual machine” on page 18
To install a virtual appliance, you must first use VMware vSphere Client 5.0 to
create a virtual machine.

Chapter 4. Virtual appliance installations 21


22 IBM Security QRadar: Installation Guide
Chapter 5. Installations from the recovery partition
When you install IBM Security QRadar products, the installer (ISO image) is
copied to the recovery partition. From this partition, you can reinstall QRadar
products. Your system is restored back to the default configuration. Your current
configuration and data files are overwritten

When you restart your QRadar appliance, an option to reinstall the software is
displayed. If you do not respond to the prompt within 5 seconds, the system
continues to start as normal. Your configuration and data files are maintained. If
you choose the reinstall option, a warning message is displayed and you must
confirm that you want to reinstall.

After a hard disk failure, you might not be able to reinstall from the recovery
partition because the recovery partition is no longer be available. If you experience
a hard disk failure, contact Customer Support for assistance.

Any software upgrades of QRadar version 7.2.0 replaces the existing ISO file with
the newer version.

These guidelines apply to new QRadar version 7.2.0 installations or upgrades from
new QRadar version 7.0 installations on QRadar version 7.0 appliances.

Reinstalling from the recovery partition


You can reinstall IBM Security QRadar products from the recovery partition.

Before you begin

Locate your activation key. The activation key is a 24-digit, four-part, alphanumeric
string that you receive from IBM. You can find the activation key in one of the
following locations:
v Printed on a sticker and physically placed on your appliance.
v Included with the packing slip; all appliances are listed along with their
associated keys.

If you do not have your activation key, go to the IBM Support website
(www.ibm.com/support) to obtain your activation key. You must provide the serial
number of the QRadar appliance. Software activation keys do not require serial
numbers.

If your deployment includes offboard storage solutions, you must disconnect your
offboard storage before you reinstall QRadar. After you reinstall, you can remount
your external storage solutions. For more information on configuring offboard
storage, see the Offboard Storage Guide.

Procedure
1. Restart your QRadar appliance and select Factory re-install.
2. Type flatten.

© Copyright IBM Corp. 2004, 2014 23


The installer partitions and reformats the hard disk, installs the OS, and then
reinstalls theQRadar product. You must wait for the flatten process to complete.
This process can take up to several minutes. When the process is complete, a
confirmation is displayed.
3. Type SETUP.
4. Log in as the root user.
5. Ensure that the End User License Agreement (EULA) is displayed.

Tip: Press the Spacebar key to advance through the document.


6. For QRadar Console installations, select the Enterprise tuning template.
7. Follow the instructions in the installation wizard to complete the installation.
The following table contains descriptions and notes to help you configure the
installation.
Table 14. Description of network settings
Network Setting Description
Host name Fully qualified domain name
Secondary DNS server address Optional
Public IP address for networks that use Optional
Network Address Translation (NAT)
Used to access the server, usually from a
different network or the Internet.

Configured by using Network Address


Translation (NAT) services on your network
or firewall settings on your network. (NAT
translates an IP address in one network to a
different IP address in another network).
Email server name If you do not have an email server, use
localhost.
Root password The password must meet the following
criteria:
v Contain at least 5 characters
v Contain no spaces
v Can include the following special
characters: @, #, ^, and *.

After you configure the installation parameters, a series of messages are


displayed. The installation process might take several minutes.
8. Apply your license key.
a. Log in to QRadar:
https://IP_Address_QRadar
The default Username is admin. The Password is the password of the root
user account.
b. Click the login.
c. Click the Admin tab.
d. In the navigation pane, click System Configuration.
e. Click the System and License Management icon.
f. From the Display list box, select Licenses, and upload you license key.
g. Select the unallocated license and click Allocate System to License.

24 IBM Security QRadar: Installation Guide


h. From the list of licenses, select and license, and click Allocate License to
System.

Chapter 5. Installations from the recovery partition 25


26 IBM Security QRadar: Installation Guide
Chapter 6. Network settings management
Use the qchange_netsetup script to change the network settings of your IBM
Security QRadar system. Configurable network settings include host name, IP
address, network mask, gateway, DNS addresses, public IP address, and email
server.

Changing the network settings in an all-in-one system


You can change the network settings in your all-in-one system. An all-in-one
system has all IBM Security QRadar components that are installed on one system.

Before you begin

You must have a local connection to your QRadar Console.

Procedure
1. Log in to as the root user.
2. Type the following command:
qchange_netsetup
3. Follow the instructions in the wizard to complete the configuration.
The following table contains descriptions and notes to help you configure the
network settings.
Table 15. Description of network settings for an all-in-one QRadar Console
Network Setting Description
Host name Fully qualified domain name
Secondary DNS server address Optional
Public IP address for networks that use Optional
Network Address Translation (NAT)
Used to access the server, usually from a
different network or the Internet.

Configured by using Network Address


Translation (NAT) services on your network
or firewall settings on your network. (NAT
translates an IP address in one network to a
different IP address in another network).
Email server name If you do not have an email server, use
localhost.

A series of messages are displayed asQRadar processes the requested changes.


After the requested changes are processed, the QRadar system is automatically
shutdown and restarted.

Changing the network settings of a QRadar Console in a multisystem


deployment
To change the network settings in a multi-system IBM Security QRadar
deployment, remove all managed hosts, change the network settings, readd the
managed hosts, and then reassign the component.

© Copyright IBM Corp. 2004, 2014 27


Procedure
1. To remove managed hosts, log in to QRadar:
https://IP_Address_QRadar
The Username is admin.
a. Click the Admin tab.
b. Click the Deployment Editor icon.
c. In the Deployment Editor window, click the System View tab.
d. For each managed host in your deployment, right-click the managed host
and select Remove host.
e. On the Admin tab, click Deploy Changes.
2. To change network settings on the QRadar Console, use SSH to log in to
QRadar as the root user.
The user name is root.
a. Type the following command: qchange_netsetup.
b. Follow the instructions in the wizard to complete the configuration,
The following table contains descriptions and notes to help you configure
the network settings.
Table 16. Description of network settings for a multisystem QRadar Console deployment
Network Setting Description
Host name Fully qualified domain name
Secondary DNS server address Optional
Public IP address for networks that use Optional
Network Address Translation (NAT)
Used to access the server, usually from a
different network or the Internet.

Configured by using Network Address


Translation (NAT) services on your network
or firewall settings on your network. (NAT
translates an IP address in one network to a
different IP address in another network).
Email server name If you do not have an email server, use
localhost.

After you configure the installation parameters, a series of messages are


displayed. The installation process might take several minutes.
3. To readd and reassign the managed hosts, log in to QRadar.
https://IP_Address_QRadar
The Username is admin.
a. Click the Admin tab.
b. Click the Deployment Editor icon.
c. In the Deployment Editor window, click the System View tab.
d. Click Actions > Add a managed host.
e. Follow the instructions in the wizard to add a host.
Select the Host is NATed option to configure a public IP address for the
server. This IP address is a secondary IP address that is used to access the
server, usually from a different network or the Internet. The Public IP
address is often configured by using Network Address Translation (NAT)

28 IBM Security QRadar: Installation Guide


services on your network or firewall settings on your network. NAT
translates an IP address in one network to a different IP address in another
network
4. Reassign all components that are not your QRadar Console to your managed
hosts .
a. In the Deployment Editor window, click the Event View tab, and select the
component that you want to reassign to the managed host.
b. Click Actions > Assign.
c. From the Select a host list list, select the host that you want to reassign to
this component.
d. On the Admin tab, click Deploy Changes.

Updating network settings after a NIC replacement


If you replace your integrated system board or stand-alone (Network Interface
Cards) NICs, you must update your IBM Security QRadar network settings to
ensure that your hardware remains operational.

About this task

The network settings file contains one pair of lines for each NIC that is installed
and one pair of lines for each NIC that was removed. You must remove the lines
for the NIC that you removed and then rename the NIC that you installed.

Your network settings file might resemble the following example, where
NAME="eth0" is the NIC that was replaced and NAME="eth4" is the NIC that was
installed.
# PCI device 0x14e4:0x163b (bnx2)
SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*",
ATTR{address}=="78:2a:cb:23:1a:2f", ATTR{type}=="1",
KERNEL=="eth*", NAME="eth0"

# PCI device 0x14e4:0x163b (bnx2)


SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*",
ATTR{address}=="78:2a:cb:23:1a:2f", ATTR{type}=="1",
KERNEL=="eth*", NAME="eth0"

# PCI device 0x14e4:0x163b (bnx2)


SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*",
ATTR{address}=="78:2a:cb:23:1a:2f", ATTR{type}=="1",
KERNEL=="eth*", NAME="eth4"

# PCI device 0x14e4:0x163b (bnx2)


SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*",
ATTR{address}=="78:2a:cb:23:1a:2f", ATTR{type}=="1",
KERNEL=="eth*", NAME="eth4"

Procedure
1. Use SSH to log in to the IBM Security QRadar product as the root user.
The user name is root.
2. Type the following command:
cd /etc/udev/rules.d/
3. To edit the network settings file, type the following command:
vi 70-persistent-net.rules
4. Remove the pair of lines for the NIC that was replaced: NAME=”eth0”.

Chapter 6. Network settings management 29


5. Rename the Name=<eth> values for the newly installed NIC.

Example: Rename NAME="eth4" to NAME="eth0".


6. Save and close the file.
7. Type the following command: reboot.

30 IBM Security QRadar: Installation Guide


Chapter 7. Troubleshooting problems
Troubleshooting is a systematic approach to solving a problem. The goal of
troubleshooting is to determine why something does not work as expected and
how to resolve the problem.

Review the following table to help you or customer support resolve a problem.
Table 17. Troubleshooting actions to prevent problems
Action Description
Apply all known fix packs, service levels, A product fix might be available to fix the
or program temporary fixes (PTF). problem.
Ensure that the configuration is Review the software and hardware
supported. requirements.
Look up error message codes by selecting Error messages give important information to
the product from the IBM Support Portal help you identify the component that is
(http://www.ibm.com/support/entry/ causing the problem.
portal) and then typing the error message
code into the Search support box.
Reproduce the problem to ensure that it If samples are available with the product, you
is not just a simple error. might try to reproduce the problem by using
the sample data.
Check the installation directory structure The installation location must contain the
and file permissions. appropriate file structure and the file
permissions.

For example, if the product requires write


access to log files, ensure that the directory has
the correct permission.
Review relevant documentation, such as Search the IBM knowledge bases to determine
release notes, technotes, and proven whether your problem is known, has a
practices documentation. workaround, or if it is already resolved and
documented.
Review recent changes in your computing Sometimes installing new software might cause
environment. compatibility issues.

If you still need to resolve problems, you must collect diagnostic data. This data is
necessary for an IBM technical-support representative to effectively troubleshoot
and assist you in resolving the problem. You can also collect diagnostic data and
analyze it yourself.
Related concepts:
“QRadar components” on page 2
IBM Security QRadar consolidates event data from log sources that are used by
devices and applications in your network.

Troubleshooting resources
Troubleshooting resources are sources of information that can help you resolve a
problem that you have with a product. Many of the resource links provided can
also be viewed in a short video demonstration.

© Copyright IBM Corp. 2004, 2014 31


To view the video version, search for "troubleshooting" through either Google
search engine or YouTube video community.
Related concepts:
“QRadar log files” on page 33
Use the IBM Security QRadar log files to help you troubleshoot problems.

Support Portal
The IBM Support Portal is a unified, centralized view of all technical support tools
and information for all IBM systems, software, and services.

Use IBM Support Portal to access all the IBM support resources from one place.
You can adjust the pages to focus on the information and resources that you need
for problem prevention and faster problem resolution. Familiarize yourself with the
IBM Support Portal by viewing the demo videos (https://www.ibm.com/blogs/
SPNA/entry/the_ibm_support_portal_videos).

Find the IBM Security QRadar content that you need by selecting your products
from the IBM Support Portal (http://www.ibm.com/support/entry/portal).

Service requests
Service requests are also known as Problem Management Records (PMRs). Several
methods exist to submit diagnostic information to IBM Software Technical Support.

To open a service request, or to exchange information with technical support, view


the IBM Software Support Exchanging information with Technical Support page
(http://www.ibm.com/software/support/exchangeinfo.html). Service requests can
also be submitted directly by using the Service requests (PMRs) tool
(http://www.ibm.com/support/entry/portal/Open_service_request) or one of the
other supported methods that are detailed on the exchanging information page.

Fix Central
Fix Central provides fixes and updates for your system software, hardware, and
operating system.

Use the pull-down menu to go to your product fixes on Fix Central


(http://www.ibm.com/support/fixcentral). You might also want to view Getting
started with Fix Central (http://www.ibm.com/systems/support/fixes/en/
fixcentral/help/getstarted.html).

Knowledge bases
You can often find solutions to problems by searching IBM knowledge bases. You
can optimize your results by using available resources, support tools, and search
methods

Use the following knowledge bases to find useful information.


Technotes and APARs
From the IBM Support Portal (http://www.ibm.com/support/entry/
portal), you can search technotes and APARs (problem reports).
IBM masthead search
Use the IBM masthead search by typing your search string into the Search
field at the top of any ibm.com page.

32 IBM Security QRadar: Installation Guide


External search engines
Search for content by using any external search engine, such as Google,
Yahoo, or Bing. If you use an external search engine, your results are more
likely to include information that is outside the ibm.com® domain.
However, sometimes you can find useful problem-solving information
about IBM products in newsgroups, forums, and blogs that are not on
ibm.com.

Tip: Include “IBM” and the name of the product in your search if you are
looking for information about an IBM product.

QRadar log files


Use the IBM Security QRadar log files to help you troubleshoot problems.

You can review the log files for the current session individually or you can collect
them to review later.

Follow these steps to review the QRadar log files.


1. To help you troubleshoot errors or exceptions, review the following log files.
v /var/log/qradar.log
v /var/log/qradar.error
2. If you require more information, review the following log files:
v https://console_ip/system_info.cgi
v /var/log/qradar-sql.log
v /opt/tomcat5/logs/catalina.out
v /opt/imq/share/var/instances/imqbroker/log/log.txt
v /var/log/qflow.debug
3. To collect log files for an IBM technical-support representative, from the
command line, run the following command:
/opt/qradar/support/get_logs.sh -s
The command creates a logs_<console_name>_<date_time>.tar.bz2 file in the
/var/log directory.
Related concepts:
“Troubleshooting resources” on page 31
Troubleshooting resources are sources of information that can help you resolve a
problem that you have with a product. Many of the resource links provided can
also be viewed in a short video demonstration.

Ports used by QRadar


Review the common ports that are used by IBM Security QRadar, services, and
components.

For example, you can determine the ports that must be opened for the QRadar
Console to communicate with remote Event Processors.

Ports and iptables

The listen ports for QRadar are valid only when iptables is enabled on your
QRadar system.

Chapter 7. Troubleshooting problems 33


SSH communication on port 22

All the ports that are described in following table can be tunneled, by encryption,
through port 22 over SSH. Managed hosts that use encryption can establish
multiple bidirectional SSH sessions to communicate securely. These SSH sessions
are initiated from the managed host to provide data to the host that needs the data
in the deployment. For example, Event Processor appliances can initiate multiple
SSH sessions to the QRadar Console for secure communication. This
communication can include tunneled ports over SSH, such as HTTPS data for port
443 and Ariel query data for port 32006. QRadar QFlow Collectors that use
encryption can initiate SSH sessions to Flow Processor appliances that require data.

QRadar ports

Unless otherwise noted, information about the assigned port number, descriptions,
protocols, and the signaling direction for the port applies to all IBM Security
QRadar products.

The following table lists the ports, protocols, communication direction, description,
and the reason that the port is used.
Table 18. Listening ports that are used by QRadar, services, and components
Port Description Protocol Direction Requirement
22 SSH TCP Bidirectional from the QRadar Remote management
Console to all other access
components.
Adding a remote
system as a managed
host

Log source protocols


to retrieve files from
external devices, for
example the log file
protocol

Users who use the


command-line
interface to
communicate from
desktops to the
Console

High-availability
(HA)
25 SMTP TCP From all managed hosts to the Emails from QRadar
SMTP gateway to an SMTP gateway

Delivery of error and


warning email
messages to an
administrative email
contact
37 rdate (time) UDP/TCP All systems to the QRadar Time synchronization
Console between the QRadar
Console and managed
QRadar Console to the NTP hosts
or rdate server

34 IBM Security QRadar: Installation Guide


Table 18. Listening ports that are used by QRadar, services, and components (continued)
Port Description Protocol Direction Requirement
111 Port mapper TCP/UDP Managed hosts that Remote Procedure
communicate to the QRadar Calls (RPC) for
Console required services,
such as Network File
Users that connect to the System (NFS)
QRadar Console
135 and DCOM TCP WinCollect agents and This traffic is
dynamically Windows operating systems generated by
allocated that are remotely polled for WinCollect, Microsoft
ports above events. Security Event Log
1024 for RPC Protocol, or Adaptive
calls. Bidirectional traffic between Log Exporter.
QRadar Console components Note: DCOM
that use the Microsoft Security typically allocates a
Event Log Protocol and random port range
Windows operating systems for communication.
that are remotely polled for You can configure
events or bidirectional traffic Microsoft Windows
between or Event Collectors products to use a
that use the Microsoft Security specific port. For
Event Log Protocol and more information, see
Windows operating systems your Microsoft
that are remotely polled for Windows
events. documentation.

Bidirectional traffic between


Adaptive Log Exporter agents
and Windows operating
systems that are remotely
polled for events.
137 Windows NetBIOS UDP Bidirectional traffic between This traffic is
name service WinCollect agents and generated by
Windows operating systems WinCollect, Microsoft
that are remotely polled for Security Event Log
events Protocol, or Adaptive
Log Exporter.
Bidirectional traffic between
QRadar Console components
or Event Collectors that use
the Microsoft Security Event
Log Protocol and Windows
operating systems that are
remotely polled for events.

Bidirectional traffic between


Adaptive Log Exporter agents
and Windows operating
systems that are remotely
polled for events

Chapter 7. Troubleshooting problems 35


Table 18. Listening ports that are used by QRadar, services, and components (continued)
Port Description Protocol Direction Requirement
138 Windows NetBIOS UDP Bidirectional traffic between This traffic is
datagram service WinCollect agents and generated by
Windows operating systems WinCollect, Microsoft
that are remotely polled for Security Event Log
events Protocol, or Adaptive
Log Exporter..
Bidirectional traffic between
QRadar Console components
or Event Collectors that use
the Microsoft Security Event
Log Protocol and Windows
operating systems that are
remotely polled for events.

Bidirectional traffic between


Adaptive Log Exporter agents
and Windows operating
systems that are remotely
polled for events
139 Windows NetBIOS TCP Bidirectional traffic between This traffic is
session service WinCollect agents and generated by
Windows operating systems WinCollect, Microsoft
that are remotely polled for Security Event Log
events Protocol, or Adaptive
Log Exporter.
Bidirectional traffic between
QRadar Console components
or Event Collectors that use
the Microsoft Security Event
Log Protocol and Windows
operating systems that are
remotely polled for events.

Bidirectional traffic between


Adaptive Log Exporter agents
and Windows operating
systems that are remotely
polled for events
199 NetSNMP TCP QRadar managed hosts that TCP port for the
connect to the QRadar NetSNMP daemon
Console that listens for
communications (v1,
External log sources to v2c, and v3) from
QRadar Event Collectors external log sources
427 Service Location UDP/TCP The Integrated
Protocol (SLP) Management Module
uses the port to find
services on a LAN.
443 Apache/HTTPS TCP Bidirectional traffic for secure Configuration
communications from all downloads to
products to the QRadar managed hosts from
Console the QRadar Console

QRadar managed
hosts that connect to
the QRadar Console

Users to have log in


access to QRadar

QRadar Console that


manage and provide
configuration updates
for WinCollect agents

36 IBM Security QRadar: Installation Guide


Table 18. Listening ports that are used by QRadar, services, and components (continued)
Port Description Protocol Direction Requirement
445 Microsoft Directory TCP Bidirectional traffic between This traffic is
Service WinCollect agents and generated by
Windows operating systems WinCollect, Microsoft
that are remotely polled for Security Event Log
events Protocol, or Adaptive
Log Exporter.
Bidirectional traffic between
QRadar Console components
or Event Collectors that use
the Microsoft Security Event
Log Protocol and Windows
operating systems that are
remotely polled for events

Bidirectional traffic between


Adaptive Log Exporter agents
and Windows operating
systems that are remotely
polled for events
514 Syslog UDP/TCP External network appliances External log sources
that provide TCP syslog to send event data to
events use bidirectional traffic. QRadar components

External network appliances Syslog traffic includes


that provide UDP syslog WinCollect agents
events use uni-directional and Adaptive Log
traffic. Exporter agents
capable of sending
either UDP or TCP
events to QRadar
762 Network File TCP/UDP Connections between the The Network File
System (NFS) QRadar Console and NFS System (NFS) mount
mount daemon server daemon, which
(mountd) processes requests to
mount a file system at
a specified location
1514 Syslog-ng TCP/UDP Connection between the local Internal logging port
Event Collector component for syslog-ng
and local Event Processor
component to the syslog-ng
daemon for logging
2049 NFS TCP Connections between the The Network File
QRadar Console and NFS System (NFS)
server protocol to share files
or data between
components
2055 NetFlow data UDP From the management NetFlow datagram
interface on the flow source from components,
(typically a router) to the such as routers
QRadar QFlow Collector.
3389 Remote Desktop TCP/UDP If the Windows
Protocol (RDP) and operating system is
Ethernet over USB configured to support
is enabled RDP and Ethernet
over USB, a user can
initiate a session to
the server over the
management network.
This means the
default port for RDP,
3389 must be open.

Chapter 7. Troubleshooting problems 37


Table 18. Listening ports that are used by QRadar, services, and components (continued)
Port Description Protocol Direction Requirement
3900 Integrated TCP/UDP Use this port to
Management interact with the
Module remote QRadar console
presence port through the
Integrated
Management Module.
4333 Redirect port TCP This port is assigned
as a redirect port for
Address Resolution
Protocol (ARP)
requests in QRadar
offense resolution
5432 Postgres TCP Communication for the Required for
managed host that is used to provisioning managed
access the local database hosts from the Admin
instance tab
6543 High-availability TCP/UDP Bidirectional between the Heartbeat ping from a
heartbeat secondary host and primary secondary host to a
host in an HA cluster primary host in an
HA cluster to detect
hardware or network
failure
7676, 7677, Messaging TCP Message queue Message queue
and four connections (IMQ) communications between broker for
randomly components on a managed communications
bound ports host. between components
above 32000. on a managed host

Ports 7676 and 7677


are static TCP ports
and four extra
connections are
created on random
ports.
7777 - 7782, JMX server ports TCP Internal communications, JMX server (Mbean)
7790, 7791 these ports are not available monitoring for ECS,
externally hostcontext, Tomcat,
VIS, reporting, ariel,
and accumulator
services
Note: These ports are
used by QRadar
support.
⌂7789 HA Distributed TCP/UDP Bidirectional between the Distributed Replicated
Replicated Block secondary host and primary Block Device is used
Device host in an HA cluster to keep drives
synchronized between
the primary and
secondary hosts in
HA configurations
7800 Apache Tomcat TCP From the Event Collector to Real-time (streaming)
the QRadar Console for events
7801 Apache Tomcat TCP From the Event Collector to Real-time (streaming)
the QRadar Console for flows
7803 Apache Tomcat TCP From the Event Collector to Anomaly detection
the QRadar Console engine port
8000 Event Collection TCP From the Event Collector to Listening port for
service (ECS) the QRadar Console specific Event
Collection service
(ECS).

38 IBM Security QRadar: Installation Guide


Table 18. Listening ports that are used by QRadar, services, and components (continued)
Port Description Protocol Direction Requirement
8001 SNMP daemon UDP External SNMP systems that UDP listening port for
port request SNMP trap external SNMP data
information from the QRadar requests.
Console
8005 Apache Tomcat TCP None A local port that is
not used by QRadar
8009 Apache Tomcat TCP From the HTTP daemon Tomcat connector,
(HTTPd) process to Tomcat where the request is
used and proxied for
the web service
8080 Apache Tomcat TCP From the HTTP daemon Tomcat connector,
(HTTPd) process to Tomcat where the request is
used and proxied for
the web service.
9995 NetFlow data UDP From the management NetFlow datagram
interface on the flow source from components,
(typically a router) to the such as routers
QFlow Collector
10000 QRadar TCP/UDP User desktop systems to all Server changes, such
web-based, system QRadar hosts as the hosts root
administration password and firewall
interface access
23111 SOAP web server TCP SOAP web server
port for the event
collection service
(ECS)
23333 Emulex Fibre TCP User desktop systems that Emulex Fibre Channel
Channel connect toQRadar appliances HBAnywhere Remote
with a Fibre Channel card Management service
(elxmgmt)
32004 Normalized event TCP Bidirectional between QRadar Normalized event
forwarding components data that is
communicated from
an off-site source or
between Event
Collectors
⌂32005 Data flow TCP Bidirectional between QRadar Data flow
components communication port
between Event
Collectors when on
separate managed
hosts
32006 Ariel queries TCP Bidirectional between QRadar Communication port
components between the Ariel
proxy server and the
Ariel query server
32009 Identity data TCP Bidirectional between QRadar Identity data that is
components communicated
between the passive
vulnerability
information service
(VIS) and the Event
Collection service
(ECS)
32010 Flow listening TCP Bidirectional between QRadar Flow listening port to
source port components collect data from
QRadar QFlow
Collectors

Chapter 7. Troubleshooting problems 39


Table 18. Listening ports that are used by QRadar, services, and components (continued)
Port Description Protocol Direction Requirement
32011 Ariel listening port TCP Bidirectional between QRadar Ariel listening port
components for database searches,
progress information,
and other associated
commands
32000-33999 Data flow (flows, TCP Bidirectional between QRadar Data flows, such as
events, flow components events, flows, flow
context) context, and event
search queries
40799 PCAP data TCP From Juniper Networks SRX Collecting incoming
Series appliances to QRadar packet capture
(PCAP) data from
Juniper Networks
SRX Series appliances.
Note: The packet
capture on your
device can use a
different port. For
more information
about configuring
packet capture, see
your Juniper
Networks SRX Series
appliance
documentation
ICMP ICMP Bidirectional traffic between Testing the network
the secondary host and connection between
primary host in an HA cluster the secondary host
and primary host in
an HA cluster by
using Internet Control
Message Protocol
(ICMP)

Searching for ports in use by QRadar


Use the netstat command to determine which ports are in use on the QRadar
Console or managed host. Use the netstat command to view all listening and
established ports on the system.

Procedure
1. Using SSH, log in to your QRadar Console, as the root user.
2. To display all active connections and the TCP and UDP ports on which the
computer is listening, type the following command:
netstat -nap
3. To search for specific information from the netstat port list, type the following
command:
netstat -nap | grep port

Examples:
v To display all ports that match 199, type the following command: netstat
-nap | grep 199
v To display all postgres related ports, type the following command: netstat
-nap | grep postgres
v To display information on all listening ports, type the following command:
netstat -nap | grep LISTEN

40 IBM Security QRadar: Installation Guide


Viewing IMQ port associations
You can view port numbers associations for messaging connections (IMQ) to which
application services are allocated. To look up the additional port numbers, connect
to the localhost by using telnet.

Important: Random port associations are not static port numbers. If a service is
restarted, the ports that generated for a service are reallocated and the service is
assigned a new set of port numbers.

Procedure
1. Using SSH to log in to the QRadar Console, as the root user.
2. To display a list of associated ports for the IMQ messaging connection, type the
following command:
telnet localhost 7676
3. If no information is displayed, press the Enter key to close the connection.

Chapter 7. Troubleshooting problems 41


42 IBM Security QRadar: Installation Guide
Notices
This information was developed for products and services offered in the U.S.A.

IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.

IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:

IBM Director of Licensing


IBM Corporation
North Castle Drive
Armonk, NY 10504-1785 U.S.A.

For license inquiries regarding double-byte character set (DBCS) information,


contact the IBM Intellectual Property Department in your country or send
inquiries, in writing, to:

Intellectual Property Licensing


Legal and Intellectual Property Law
IBM Japan Ltd.
19-21, Nihonbashi-Hakozakicho, Chuo-ku
Tokyo 103-8510, Japan

The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:

INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS


PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or
implied warranties in certain transactions, therefore, this statement may not apply
to you.

This information could include technical inaccuracies or typographical errors.


Changes are periodically made to the information herein; these changes will be
incorporated in new editions of the publication. IBM may make improvements
and/or changes in the product(s) and/or the program(s) described in this
publication at any time without notice.

Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.

© Copyright IBM Corp. 2004, 2014 43


IBM may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.

Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:

IBM Corporation
170 Tracer Lane,
Waltham MA 02451, USA

Such information may be available, subject to appropriate terms and conditions,


including in some cases, payment of a fee.

The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.

Any performance data contained herein was determined in a controlled


environment. Therefore, the results obtained in other operating environments may
vary significantly. Some measurements may have been made on development-level
systems and there is no guarantee that these measurements will be the same on
generally available systems. Furthermore, some measurements may have been
estimated through extrapolation. Actual results may vary. Users of this document
should verify the applicable data for their specific environment.

Information concerning non-IBM products was obtained from the suppliers of


those products, their published announcements or other publicly available sources.
IBM has not tested those products and cannot confirm the accuracy of
performance, compatibility or any other claims related to non-IBM products.
Questions on the capabilities of non-IBM products should be addressed to the
suppliers of those products.

All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.

All IBM prices shown are IBM's suggested retail prices, are current and are subject
to change without notice. Dealer prices may vary.

This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.

If you are viewing this information softcopy, the photographs and color
illustrations may not appear.

Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corporation in the United States, other countries,
or both. If these and other IBM trademarked terms are marked on their first
occurrence in this information with a trademark symbol (® or ™), these symbols

44 IBM Security QRadar: Installation Guide


indicate U.S. registered or common law trademarks owned by IBM at the time this
information was published. Such trademarks may also be registered or common
law trademarks in other countries. A current list of IBM trademarks is available on
the Web at Copyright and trademark information (www.ibm.com/legal/
copytrade.shtml).

The following terms are trademarks or registered trademarks of other companies:

Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered
trademarks or trademarks of Adobe Systems Incorporated in the United States,
and/or other countries.

Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Oracle and/or its affiliates.

Linux is a registered trademark of Linus Torvalds in the United States, other


countries, or both.

Microsoft, Windows, Windows NT, and the Windows logo are trademarks of
Microsoft Corporation in the United States, other countries, or both.

Other company, product, and service names may be trademarks or service marks
of others.

Privacy policy considerations


IBM Software products, including software as a service solutions, (“Software
Offerings”) may use cookies or other technologies to collect product usage
information, to help improve the end user experience, to tailor interactions with
the end user or for other purposes. In many cases no personally identifiable
information is collected by the Software Offerings. Some of our Software Offerings
can help enable you to collect personally identifiable information. If this Software
Offering uses cookies to collect personally identifiable information, specific
information about this offering’s use of cookies is set forth below.

Depending upon the configurations deployed, this Software Offering may use
session cookies that collect each user’s session id for purposes of session
management and authentication. These cookies can be disabled, but disabling them
will also eliminate the functionality they enable.

If the configurations deployed for this Software Offering provide you as customer
the ability to collect personally identifiable information from end users via cookies
and other technologies, you should seek your own legal advice about any laws
applicable to such data collection, including any requirements for notice and
consent.

For more information about the use of various technologies, including cookies, for
these purposes, See IBM’s Privacy Policy at http://www.ibm.com/privacy and

Notices 45
IBM’s Online Privacy Statement at http://www.ibm.com/privacy/details the
section entitled “Cookies, Web Beacons and Other Technologies” and the “IBM
Software Products and Software-as-a-Service Privacy Statement” at
http://www.ibm.com/software/info/product-privacy.

46 IBM Security QRadar: Installation Guide


Index
A K R
activation keys knowledge bases recovery partitions
description 1 masthead search 32 installations 23
APAR (autnorized program analysis Support Portal 32 reinstalling
report) recovery partitions 23
knowledge base 32
architecture L
components 3
license keys S
description 1 service requests
Linux operating system opening Problem Management
B installing on your own appliance 12 Records (PMR) 32
browser mode partition properties 10 software requirements
Internet Explorer web browser 5 description 4
Support Portal
M overview 32
C Magistrate
components component description 3
description 3 managed hosts T
Console installing 7 technical library
components 3 location v
installing 7 technotes
customer support
contact information v
N knowledge base 32
troubleshooting
network administrator
getting fixes 32
description v
resources 32
network settings
D all-in-one Console 27
Support Portal 32
understanding symptoms of a
document mode changing 27
problem 31
Internet Explorer web browser 5 multi-system deployment 28
video documentation resources 32
documentation NIC replacements 29
technical library v

P V
F partition properties
video documentation
YouTube 32
Fix Central requirements 10
virtual appliances
getting fixes 32 ports
description 15
searching 40
installing 15
portsusage 33
requirements 17
I preparing
installation 9
virtual machines
installing adding 20
Problem Management Records
managed host 7 creating 18
service requests
QRadar Console 7 installing software 19
See Problem Management Records
recovery partitions 23
virtual appliances 15
Integrated Management Module
See also Integrated Management Q W
web browser
Module QRadar Console
supported versions 4
overview 2 installing 7
QRadar QFlow Collector
component description 3

© Copyright IBM Corp. 2004, 2014 47

You might also like