Cisco IDS Network Module for Cisco 2600, 3600, and 3700 Routers
CISCO/라우터 & 라우팅 시스템 2007/05/04 12:21The Cisco® IDS Network Module is part of the Cisco integrated intrusion detection system (IDS) network security solutions that enable organizations to protect assets and reduce operating costs.
Figure 1. Cisco IDS Network Module Sensors Deployment on Cisco 2600, 2800, 3600, 3700, or 3800
FLEXIBLE DEPLOYMENT OPTIONS IN CISCO ROUTERS:
Figure 2.
CISCO IDS NETWORK MODULE FOR THE CISCO 2600, 2800, 3600, 3700, AND 3800 SERIES ROUTERS: INTEGRATING IDS AND BRANCH OFFICE ROUTING
• Physical Space Savings-The Cisco IDS Network Module uses a single network module slot in a Cisco Series branch office router.
• Investment Protection-Designed to take advantage of the Integrated Services Routers 2811, 21,51 and 3800 Routers Enhanced Network Modules (NMEs) slot.
• Simple Power and Cable Management-The IDS network module takes advantage of the power options of the router, including DC power and redundant power.
• Common Management Interface-The IDS network module can be configured and managed from the Cisco IOS® command-line interface (CLI). This network module supports all the same CiscoWorks Management Center for IDS Sensors that the Cisco IPS 4200 Series supports, allowing customers to use one centralized management system for both appliance and router sensors.
• Network Command and Control Interface-By using the external Fast Ethernet port for command and control, the Cisco IDS Network Module internal router connection is free to capture the packets to the network module for processing by the IDS engine.
• Separate Processor for the Cisco IDS Network Module to Maximize Performance-Having a dedicated CPU in the network module frees the router CPU from process-intensive IDS tasks.
• Lower Operational Costs-The Cisco IDS network module is covered via Cisco maintenance service for the router. This setup minimizes network operational costs.
• Storage-The NM-CIDS ship with a 40-gigabyte hard disk that is used for logging (security forensic ) and storage of signatures
• Performance-the Cisco IDS Network Module can monitor up to 45 Mbps of traffic and is suitable for T1/E1 and T3 environments.
• Security In Depth-A router installed with this IDS network module also supports other Cisco IOS security features such as VPN, firewall, Multiprotocol Label Switching (MPLS), Network Address Translation (NAT), and Web Cache Control Protocol (WCCP), while supporting all common Cisco IOS functions.
• Dedicated Command and Control-The external Ethernet port is used for command and control to enable a secure outbound port for management. This setup also allows for both security operations and network operations to have their own command and control interfaces.
Figure 3. Cisco IDS Network Module
CISCO INTRUSION PROTECTION SYSTEM ADVANTAGES
Accurate Prevention Technologies
• Risk Rating-Offers unprecedented reliability and complete confidence to enable your inline prevention deployment. Traditional intrusion prevention has relied on severity rating as its sole method of determining the potential damage associated with an event; Cisco Risk Rating provides a more accurate representation and risk-balanced assessment of the potential damage per event through the use of four separate values:
–Event severity-A user-modifiable weighted value indicating potential damage per event
–Signature fidelity- A user-modifiable weighted value indicating accuracy of the signature
–Asset value-A user-defined value indicating the importance of the attack target
–Attack relevancy-An internal weighted value based on the susceptibility of the target to this attack type
• Meta-Event Generator (MEG)-Provides unique correlation of events in order to accurately detect and stop worms. As worms move through your network, they generate many alarms of varying degrees of severity. Cisco MEG links these seemingly unrelated lower-severity alarms into a high-severity, high-risk event, enabling the user to confidently drop the associated packets. MEG achieves this by modeling worm behavior, correlating specific time between events, network behavior, and multiple exploit behavior.
Flexible Deployment Options
Easy Installation
Hardware Architecture
Figure 4. Architecture of the Integrated Cisco IDS Network Module with the CiscoWorks VPN/Security Management Solution 2.1
Primary Management Features
• CiscoWorks Management Center for IDS Sensors-Used for configuring network and switch IDS sensors and provides a scalable foundation to configure multiple sensors concurrently using group profiles
• CiscoWorks Monitoring Center for Security-Integrated monitoring used to capture, store, view, correlate, and report on events from network IDS, switch IDS, host IDS, firewalls, and routers
• Cisco CS-MARS-offers a family of high-performance, scalable appliances for threat management, monitoring, and mitigation. Cisco CS-MARS combines network intelligence, context correlation, vector analysis, anomaly detection, hotspot identification, and automated mitigation capabilities
CISCO IDS NETWORK MODULE PRODUCT SUMMARY
Network Modules
Table 1. Cisco IDS Network Module Product Number
Product Part Number |
Description |
NM-CIDS-K9 |
Cisco IDS Network Module, 40-GB IDE hard disk |
Required Software Licenses
Table 2.
Product |
IOS IP/FW/IDS |
IOS IP/FW/IDS PLUS IPSEC 56 |
IOS IP/FW/IDS PLUS IPSEC 3DES |
IOS IP/IPX/AT/DEC/FW/IDS PLUS |
IOS ENTERPRISE/FW/IDS PLUS IPSEC 56 |
IOS ENTERPRISE/FW/IDS PLUS IPSEC 3DES |
IOS Advanced Security |
IOS Advanced IP Services |
IOS Advanced Enterprise Services |
Supported Routers
Table 3. Platforms that support the Cisco IDS Network Module
Router |
NM-CIDS-K9 |
Cisco 2600 Series |
No |
Cisco 2600XM Series, and 2691 |
Yes |
Cisco 2811, 2821, and 2851 |
Yes |
Cisco 3620, 3631, 3640, and 3640A |
No |
Cisco 3660 |
Yes |
Cisco 3725, and 3745 |
Yes |
Cisco 3825, and 3845 |
Yes |
HARDWARE SPECIFICATIONS
Table 4. Hardware specifications of Cisco IDS Network Module
Feature |
NM-CIDS-K9 |
Hardware Features | |
Processor |
· 500-MHz Intel Mobile Pentium III |
Default Synchronous Dynamic RAM (SDRAM) |
· 256 MB |
Maximum SDRAM |
· 512 MB |
Internal Disk Storage |
· Cisco IDS Network Module 40 GB IDE |
Network Interfaces |
· One internal 10-/100-Mbps Ethernet port to router backplane, plus one external 10-/100-Mbps Ethernet port |
Flash Memory |
· 16-MB internal plus optional external compact Flash memory |
Physical Specifications | |
Dimensions (H x W x D) |
· 1.55 x 7.10 x 7.2 inches
· 3.9 x 18.0 x 18.3 Centimeters |
Weight |
· 1.5 lb maximum
· 0.7 kg Maximum |
Operating Humidity |
· 5 to 95% noncondensing |
Operational Temperature |
· 32 to 104°F
· 0 to 40°C |
Nonoperating Temperature |
· -40 to 185°F
· -40 to 85°C |
Operational Altitude |
· 0 to 10,000 feet
· 0 to 3000 Meters |
Safety |
· UL 1950; CSA-C22.2 No. 950, EN 60950, IEC 60950 |
EMC |
· FCC Part 15 Class A; EN55022 Class B; AS/NZS 3548 Class A; CISPR22 Class B; VCCI Class B; EN55024; EN61000-3-2; EN61000-3-3 |
PRODUCT SPECIFICATIONS CHARACTERISTICS
Table 5. Specifications of Cisco IDS Network Module
Feature |
NM-CIDS-K9 |
Hardware Features | |
Performance When Cisco IDS Network Module is Deployed in a Cisco 2600XM Series Router |
Up to 10 Mbps |
Performance When Cisco IDS Network Module is Deployed in a Cisco 2800, 3700, and 3800 Series Router |
Up to 45 Mbps |
Standard Monitoring Interface |
Router internal bus |
Standard Command and Control Interface |
Network module external 10/1010/100BASE-T |
Optional Interface |
No |
Performance Upgradable |
N |
Stateful Pattern Recognition |
Yes |
Heuristic Detection |
Yes |
Anomaly Detection |
Yes |
Sweeps or Floods |
Yes |
Denial-of-Service (DoS) Mitigation |
Yes |
Worms or Viruses |
Yes |
Common Gateway Interface (CGI) or WWW Attacks |
Yes |
Buffer Overflow Protection |
Yes |
Remote-Procedure Call (RPC) Attack Detection |
Yes |
IP Fragmentation Attacks |
Yes |
Internet Control Message Protocol (ICMP) Attacks |
Yes |
Simple Message Transfer Protocol (SMTP), Send Mail, Internet Message Access Protocol (IMAP), or Post Office Protocol (POP) Attacks |
Yes |
File Transfer Protocol (FTP), Secure Shell Protocol (SSH), Telnet, and rlogin Attacks |
Yes |
Domain Name System (DNS) Attacks |
Yes |
TCP Hijacks |
Yes |
Windows or NetBIOS Attacks |
Yes |
TCP Application Protection |
Yes |
BackOrifice Attacks |
Yes |
Network Timing Protocol (NTP) Attacks |
Yes |
Customizable Signatures Using Signature Micro-Engine Technology |
Yes |
Automated Signature Updates |
Yes |
Alarm Summarization |
Yes |
Support for 802.1q Traffic |
Yes |
IP Security (IPSec) or Secure Sockets Layer (SSL) Between Sensor and Management Console |
Yes |
Encrypted Signature Packages |
Yes |
SSH for Remote Administration |
Yes |
Serial Control Protocol (SCP) Support for Secure File Transfer |
Yes |
IP Fragmentation Reassembly |
Yes |
TCP Stream Reassembly |
Yes |
Unicode Deobfuscation |
Yes |
Router Access-Control-List (ACL) Modifications |
Yes |
Firewall Policy Modifications |
Yes |
Switch ACL Modifications |
Yes |
Session Termination via TCP Resets |
Yes |
IP Session Logging or Session Replay |
Yes |
Alarm Display |
Yes |
E-mail Alerts |
Yes |
E-page Alerts |
Yes |
Customizable Script Execution |
Yes |
Multiple Alarm Destinations |
Yes |
Third-Party Tool Integration |
Yes |
IDS Active Update Bulletins |
Yes |
Web User Interface (HTTPS) |
Yes |
CLI (Console) |
Yes |
CLI (Telnet or SSH) |
Yes |
CiscoWorks VPN Security Management Solution Support |
Yes |
Redundant Power Supply |
Yes only for Cisco 3745/3845 |
Monitoring Link Failure Detection |
Yes |
Communications Failure Detection |
Yes |
Services Failure Detection |
Yes |
Device Failure Detection |
Yes |
Note:
• Five hundred new TCP connections per second
• Five hundred HTTP transactions per second
• Average packet size of 445 bytes
• Running Cisco IDS 5.0 Sensor Software
댓글을 달아 주세요