Lab 5 - Enable and Verify Encrypted Traffic Analytics
Lab 5 - Enable and Verify Encrypted Traffic Analytics
Activity Procedure
Complete the following steps:
Step 1 Connect to the Admin-PC console and browse to the StealthWatch Flow
Collector for NetFlow VE GUI at the https://192.168.2.29.
Login using the username admin with the password ISEisC00L.
Step 2 From the StealthWatch Flow Collector for NetFlow VE GUI, verify that it is
already configured with the following parameters:
StealthWatch FC IP address: 192.168.2.29/24
Hostname: fcfn-01
This web page reports the System IP address is 192.168.2.29, the hostname is
fcfn-01, and the domain name is isesda.com.
Step 3 Open another Chrome web browser, an additional tab within Chrome. Access the
appliance web administration interface by typing https://192.168.2.35/ into the
address bar or by choosing the SMC bookmark and login using the username
admin with the password ISEisC00L. Then click Sign In.
Locate the fcfn01 in the appliance Inventory list and click the ellipsis (...) in the
Actions column and select Edit Appliance Configuration from the menu.
On the Appliance tab, scroll down and locate the panel for Host Naming.
Step 7 From the Appliance Configuration – SMC, Click the Configuration Menu at
the upper-right side of the screen, and choose the Host Naming menu item and
verify that the following SMC System settings are configured:
SMC IP address: 192.168.2.35
SMC hostname: smc-01
Domain Name: isesda.com
Step 8 From the Stealthwatch Appliance Configuration – SMC GUI, verify that the
DNS and NTP setting is the following:
NTP IP Address: 192.168.2.14
DNS IP address: 192.168.2.14
Click the Configuration Menu at the upper-right side of the screen and choose
the NTP Server menu item.
The DNS Server table above reports that this SMC System is configured with
DNS Server IP address 192.168.2.14.
Step 9 Verify Global Threat Analytics enabled on the SMC.
To verify the Cognitive Intelligence component enabled on the SMC. Click the
Configuration Menu at the upper-right side of the screen, and choose the
External Services menu item.
Return to your SMC’s Security Insight Dashboard page if you already have it
open. If not, you can access it by entering https://192.168.2.35 in the URL field
or by selecting the SMC bookmark. Login using the username admin with the
password ISEisC00L. Then click Sign In.
Click the Desktop Client button in the top right of the screen. Your web browser
will now download the Stealthwatch_Desktop_Client-v7.1.3.exe file.
In the Security Warning pop-up window, click Run.
Step 12 Return to your SMC’s Security Insight Dashboard page, find the HTTPS flows
using the Flow Search feature that you generated using the following
parameters:
Search Type: flow
Time Range: Last 30 Days
Applications: HTTPS
Port/Protocol: 443/tcp
From the SMC VE GUI landing page, navigate to the Analyze > Flow Search
web page.
After you click Search, the SMC VE GUI should report the following results of the
discovered HTTPS flow between the Web Server 192.168.8.200 and the Web
Client 192.168.2.111.
Note You can switch between the two views, the listing or the iconized view of the the Flow Search
Results, by using the switch on the right side of the Flow Search Result window.
Activity Procedure
Complete the following steps:
Step 1 From the Admin-PC, download the web page at the
https://192168.8.200/indexy.html URL a few times to generate HTTPS traffic
from the 192.168.8.200 Web Server to the 192.168.2.111 Web Client for your
later inspection.
Connect to the Admin-PC console and click on the Google Chrome browser icon
on the Ubuntu Desktop.
From the Google Chrome browser Tools menu, select the Clear browsing
data... option.
In the new window, select All time value from the Time range drop-down menu.
Make sure all boxes are checked. Click the Clear data button again.
Then click on the Proceed to 192.168.8.200 (unsafe) in the new webpage that is
loaded.
Navigate to the Enterprise > isesda.com > Inside Hosts > Catch All. Right-
click on the Catch All folder and then select Flows > Flow Table.
In the Filter—Flow Table dialog box, choose the Ports and Protocols parameter
and filter by protocol:
Inspect the Flow Table generated, you should see that the last flows correspond
to the following two-application traffic flows reported:
HTTPS packets from the Web Server (192.168.8.200) to the Admin-PC
Client (192.168.2.111)
ICMP Echo Reply packets from the POD-9300 switch interface
GigabitEthernet 1/0/4 to the Peer-POD-9300 switch interface GigabitEthernet
1/0/4
Step 4 In the SMC, generate the Transaction Report for the 192.168.2.111 Admin-PC
Host.
In the SMC, right-click the Client Host field for one of the 192.168.7.1 and
192.168.7.2 Client Host and from the menu select the Quick View This Row.
The following two windows will show a visual presentation of flow packet
directions in the Quick View window for each of the two flows:
Step 6 In the SMC, generate the daily security events and reports for the traffic flows
detected and analyzed by the Flow Collector and SMC for the rscat9k.local
Inside Hosts group.
In the SMC, navigate to the Reports > Daily Report (Today) and view the
resulting report.
If you had more traffic flow generated, then you could view the detailed alarm
reports here for the last day.
In the SMC GUI, you can generate the Summary or Alarms for the traffic flows
detected and analyzed for a specific group of hosts in a specific domain. The
SMC Alarm Reports such as this one in the example of a production system
Alarm Report below, lists many alarms related to the suspicious traffic types, mail
rejects, port scans, fake applications, and so on.
Following is an example of the SMC GUI graphical Alarm reports for the traffic in
a lab environment where more diverse traffic types are generated and thus,
analyzed.
The SMC GUI supports also more detailed Alarm Reports for each selected
alarm, such as the one below, where the source host IP address and Target host
IP addresses are provided along with the associated detailed description of the
Alarm.
In the Flow Search window, select the Time Range Today drop-down and click
Applications.
A pop-up appears. Scroll down and select the encryption fields to be added to
the columns displayed. After selecting all encryption fields, scroll down and click
Set.