Log Correlation Engine 3.2 Client Guide August 28, 2009 (Revision 6)

Size: px
Start display at page:

Download "Log Correlation Engine 3.2 Client Guide August 28, 2009 (Revision 6)"

Transcription

1 Log Correlation Engine 3.2 Client Guide August 28, 2009 (Revision 6) The newest version of this document is available at the following URL:

2 Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 LOG CORRELATION ENGINE CLIENT OVERVIEW... 3 LCE CLIENT TYPES AND PLATFORMS... 4 QUICK START SUMMARY... 6 LOG CORRELATION ENGINE UNIX CLIENTS... 6 UPGRADING LCE CLIENTS FROM THUNDER CLIENTS... 7 INSTALLING THE LCE UNIX CLIENTS... 7 Installation Directories... 9 REMOVING THE LCE CLIENTS LCE UNIX CLIENT CONFIGURATION Log Correlation Engine Log Agent Log Correlation Engine Splunk Client Log Correlation Engine OPSEC Client Tenable Network Monitor Client Tenable RDEP Monitor Client TNS NetFlow Monitor Client LCE UNIX CLIENT OPERATIONS Starting the LCE Unix Clients Halting the LCE Unix Clients Monitoring Log Correlation Engine Client Status LOG CORRELATION ENGINE WINDOWS CLIENT UPGRADING LCE CLIENTS FROM THUNDER CLIENTS INSTALLING THE WINDOWS CLIENT Installation Location Service Location USING THE LCE CLIENT ON VISTA AND WINDOWS REMOVING THE LCE WINDOWS CLIENT WINDOWS CLIENT CONFIGURATION LCE WINDOWS CLIENT OPERATIONS Starting the LCE Windows Client Halting the LCE Windows Client Remote Installation for Multiple Hosts FOR MORE INFORMATION ABOUT TENABLE NETWORK SECURITY APPENDIX 1: SAMPLE INSTALLATION OUTPUT APPENDIX 2: SAMPLE REMOVE OUTPUT APPENDIX 3: SAMPLE WINDOWS WMI CONFIGURATION FILE Copyright , Tenable Network Security, Inc. 2

3 Introduction This document describes the different clients that are available for Tenable Network Security s Log Correlation Engine 3.2. Please share your comments and suggestions with us by ing them to support@tenablesecurity.com. A working knowledge of Secure Shell, regular expressions and the Security Center operation and architecture is assumed. The reader should be familiar with general log formats from various operating systems, network devices and applications, as well as a basic understanding of Unix. This document is intended to be used with LCE installations for version 3.2 and higher. If you are using an older version of LCE (known as Thunder ), please refer to the LCE 2.0 Client Guide. Standards and Conventions Throughout the documentation, filenames, daemons and executables are indicated with a courier bold font such as gunzip, httpd and /etc/passwd. Command line options and keywords will also be printed with the courier bold font. Command line options may or may not include the command line prompt and output text from the results of the command. Often, the command being run will be boldfaced to indicate what the user typed. Below is an example running of the Unix pwd command. # pwd /opt/lce/ # Important notes and considerations are highlighted with this symbol and grey text boxes. Log Correlation Engine Client Overview The Log Correlation Engine (LCE) Clients are agents that are installed on systems whose logs, network traffic, performance and other types of protocols and technologies are to be monitored by forwarding the data securly to the LCE server. Once an LCE is installed and configured, one or more LCE clients can be used to send information back for normalization and correlation. This document details available LCE clients along with their installation and configuration. LCE clients can be configured to gather information and events from the following sources: Windows Event Logs Windows and Unix system and application logs Checkpoint OPSEC events Cisco RDEP events Netflow Splunk Sniffed TCP and UDP network traffic Copyright , Tenable Network Security, Inc. 3

4 Sniffed SYSLOG messages in motion Many of these agents are required to take advatage of the LCE s power. For example, to perform Blacklist correlation, the LCE clients that monitor network traffic via sniffing or netflow can be used to identify connections with known hostile IP addresses even if you don t have firewall or proxy logs. Running LCE Clients Directly on the LCE Server LCE clients can be run directly on the LCE server. They must be configured to connect to either the localhost ( ) or the external IP address of the LCE server. Multiple LCE client types (such as a and a Tenable NetFlow Monitor) can be run at the same time as well. See the section titled LCE Client Types and Platforms for a list of available clients. While using s to watch LCE log files, be extremely careful to avoid feedback loops. For example, choosing to tail the lce.log file would cause any log saved by the lced process to be grabbed by the, sent back to lced and repeated indefinitely. Running Multiple LCE Clients on One Host Remote systems can also run multiple LCE clients. All remote LCE clients must be configured with the same password that matches the one configured on the LCE server for the client s IP address. Only one entry is required in the lce.conf file on the LCE server. Maximum Number of LCE Clients A maximum of 8,192 individual LCE clients can be specified in the lce.conf file. If more are configured, the LCE server will produce an error informing the user of the limit. The LCE itself can be configured with the specific IP address of the remote LCE clients, or network CIDR blocks can be used. LCE Client Types and Platforms There are a number of different LCE client types available. All LCE clients report performance statistics (memory, disk space and CPU usage) on their host regardless of the platform. Client Type Platforms Function Red Hat ES 3, ES 4, ES 5 FreeBSD 6 and 7 AIX 5.3 Fedora Core 6 Monitors specific log files or directories for different operating systems. These clients will tail any number of log files and send the observed data to the LCE server for analysis. The Windows Log Agent also can monitor: Entries in the Windows event log USB device inserts and removals Copyright , Tenable Network Security, Inc. 4

5 Tenable RDEP Monitor Ubuntu 8.04 and 8.10 Solaris SPARC (8,9,10) Mac OS X Dragon Appliance MS Windows XP Professional, Windows Server 2003, Windows Server 2008, Windows Vista Red Hat ES 3, ES 4, ES 5 Entries in the event logs of remote Windows servers s are designed to send log data to the LCE. Log data is in ASCII text format and will never include binary files with the exception of process accounting data. The LCE Log Agents will check all data before sending, specifically omitting binary files such as.zip,.gz,.tar,.lzh,.bz2, etc. If a binary file is sent to the LCE, it has the potential to corrupt the database. This functionality is automatically performed by the LCE client software. Retrieves messages from one or more Cisco IDS devices using Cisco s Remote Data Exchange Protocol (RDEP) that can send events to the LCE for processing, or it can be configured to send IDS events directly to Security Center via SYSLOG. LCE OPSEC Client Red Hat ES 3, ES 4, ES 5 Splunk Client Red Hat ES 3, ES 4, ES 5 Based on Checkpoint s API for Linux, it monitors OPSEC compliant devices for new events. Accepts Splunk messages for logging to the LCE Server. Tenable Netflow Monitor Tenable Network Monitor Red Hat ES 3, ES 4, ES 5 FreeBSD 6 Red Hat ES 3, ES 4, ES 5 FreeBSD 6 Debian 4 When configuring Splunk to forward data to a non-splunk system, such as this agent, it is necessary to set sendcookeddata=false in outputs.conf. Receives NetFlow messages for logging to the LCE. Messages can be sent from multiple NetFlow sources to a single TNS_Netflow client. The client supports NetFlow version 5 and 9. Designed to monitor network traffic and send session information to the LCE server. Sniffs network traffic to identify TCP sessions as well as UDP, ICMP, and IGMP activity. It also has a very useful feature of sniffing live SYSLOG traffic in motion and sending it to the LCE as if the traffic were originally destined for it. This makes it very easy to centralize logs and not rely on forwarding of events from a different Copyright , Tenable Network Security, Inc. 5

6 log server. Quick Start Summary As clients are added for monitoring by the Log Correlation Engine (LCE), the following process can be used to ensure installation success: 1. Install the client as per the instructions in the LCE Unix Clients Installation section or the LCE Windows Client Installation section. 2. Configure the clients with the IP address of the LCE server as well as a password. Do not start the client yet. See the appropriate section to Configure LCE Unix Clients or LCE Windows Clients. 3. On the LCE server, edit the lce.conf file to add in the new parameters for the LCE client. Be sure to add in the correct remote IP address of the LCE client as well as the matching password. 4. Restart the LCE server. 5. Start the LCE client. 6. From the command prompt (Unix or DOS) run the command netstat an grep to display any network sessions on port This is the port used for communication to the LCE server. What to do if the Log Correlation Engine Client cannot Connect If the LCE client cannot connect, try the following: Check to see if there is a local firewall, network firewall or other network issue that would prevent connection from the LCE client to the LCE server. To test this, run a sniffer on the LCE server monitoring TCP port If no connections are observed from the system running the LCE client, something is blocking the connection. Running a sniffer on the system of the LCE client may also help determine if something is blocking. Verify that the passwords are correct. Both the LCE client and LCE server will log bad connection errors. Verify that the IP addresses of the LCE client and LCE server are correct. The client will not connect to the LCE server if it has the wrong IP address and the LCE server will not accept a random client unless it is specifically configured in the lce.conf file. Upgrade Considerations The LCE 3.x clients are designed to work optimally with the LCE 3.x server, but they will also function with the LCE 2.X server. However, some of the new features may not function with the older server. LCE 3.x clients contain many new features since the 2.x releases. In an environment with a Thunder 2.x server and LCE 3.x clients, some of the new features (e.g., heartbeatfrequency, statistics-frequency) will be backward compatible. Some features, such as the new server-port directive, will not work unless the server is upgraded to LCE 3.x. Log Correlation Engine Unix Clients Copyright , Tenable Network Security, Inc. 6

7 The LCE 3.2 Unix clients are shipped in a package format appropriate for the platform operating system and also includes system start up files. Upgrading LCE Clients from Thunder Clients If you were using the older Thunder clients, its is recommended that you do a fresh installation and save your old configuration files. You can use these as reference to configure the new configuration file that is provided in the release. To upgrade an existing LCE Unix Client, halt the running process, move the current configuration file to a safe place, install the new distribution and edit the new configuration using your old one as a reference. Installing the LCE Unix Clients Users of the Log Correlation Engine Unix Client for Red Hat ES 3 must have libpcap installed. Starting with LCE release 3.0, all LCE clients are shipped with an installation package appropriate to the host Operating System (rpm, dpkg, pkgadd, etc). Each client comes with an example client configuration file (e.g., lce_client.conf for the ), the program binary and is installed into the appropriate client directory, which will be created if it does not already exist. To install the LCE client, obtain the package for your OS platform and desired client and install as the root user on the target client system. The following table provides an installation example for each available LCE client on all supported platforms. Any special installation instructions are provided in a note following the example. LCE Client Type Installation Example Red Hat ES 3, ES 4, ES 5 Tenable RDEP Monitor LCE OPSEC Client Tenable NetFlow Monitor Tenable Network Monitor Tenable Splunk Client # rpm -ivh lce_client-3.x.x-esx.i386.rpm # rpm -ivh TenableRdepMonitor-3.x.x-esX.i386.rpm # rpm -ivh lce_opsec-3.x.x-esx.i386.rpm # rpm -ivh TenableNetFlowMonitor-3.x.x-esX.i386.rpm # rpm -ivh TenableNetworkMonitor-3.x.x-esX.i386.rpm # rpm ivh lce_splunk-3.x.x-esx.i386.rpm FreeBSD # pkg_add lce_client-3.x.x-freebsd.tbz Copyright , Tenable Network Security, Inc. 7

8 Add the following line to /etc/rc.conf.local or /etc/rc.conf to enable the LCE client service: lce_clientd_enable="yes" Tenable Network Monitor Tenable NetFlow Monitor # pkg_add TenableNetworkMonitor-3.x.x-freebsd.tbz Add the following line to /etc/rc.conf.local or /etc/rc.conf to enable the Network Monitor service: tnmd_enable="yes" # pkg_add TenableNetFlowMonitor-3.x.x-freebsd.tbz Add the following line to /etc/rc.conf.local or /etc/rc.conf to enable the NetFlow Monitor service: tfmd_enable="yes" AIX # install d lce_client aix.bff all Fedora Core # rpm ivh lce_client-3.x.x-fc6.i386.rpm Solaris # gunzip -c lce_client-3.x.x-sparc.pkg.tar.gz tar -xvf - Mac OS X # pkgadd -d. The following packages are available: 1 lce-client-3-x-x LCE Client (sparc) 3.x.x Select package(s) you wish to process (or 'all' to process all packages). (default: all) [?,??,q]: 1 Download lce_client-3.x.x-osx.tar.gz to the client system and click on it to run the Mac Installer. Debian 4 Tenable Network Monitor # dpkg i TenableNetworkMonitor-3.x.x-debian4-i386.deb Ubuntu # dpkg i lce_client_3.x.x-ubuntu_i386.deb Copyright , Tenable Network Security, Inc. 8

9 Dragon Appliance # installpkg lce_client-3.x.x-dragon-skw.tgz Depending on how the users system is configured, the upgrade may produce messages such as: /sbin/ldconfig: File /usr/lib/libcprts.so is too small, not checked. These are not errors, just informational messages. A successful installation is indicated by the return of the command prompt with no errors. See Appendix 1 for example output of several installations. Once the client is installed, it is recommended that you customize the provided configuration file for your environment. Please see the section LCE Unix Client Configuration for more information. Installation Directories Client Software Installation Directory Red Hat ES 3, ES 4, ES 5 LCE OPSEC Client Tenable NetFlow Monitor Tenable Network Monitor Tenable RDEP Monitor Tenable Splunk Client /opt/lce_client /opt/lce_opsec /opt/netflow_monitor /opt/network_monitor /opt/rdep_monitor /opt/lce_splunk FreeBSD Tenable NetFlow Monitor Tenable Network Monitor /usr/local/lce_client /usr/local/netflow_monitor /usr/local/rdep_monitor AIX /opt/lce_client Fedora Core /opt/lce_client Copyright , Tenable Network Security, Inc. 9

10 Solaris /opt/lce_client Mac OS X /opt/lce_client Debian Tenable Network Monitor /opt/network_monitor Ubuntu /opt/lce_client Dragon Appliance /opt/lce_client Removing the LCE Clients To remove the LCE client, login as the root user, stop the client daemon (see the section Halting the LCE Unix Clients for directions) and run the appropriate commands for your client and platform as shown in the following table: LCE Client Type Removal Example Red Hat ES 3, ES 4, ES 5 Determine the name of the installed package: # rpm -qa grep lce_client lce_client-3.x.x-esx.2 # Remove the installed package: # rpm -ev lce_client-3.x.x-esx.2 Tenable RDEP Monitor Determine the name of the installed package: # rpm -qa grep TenableRdepMonitor TenableRdepMonitor-3.x.x-esX.2 # Remove the installed package: # rpm -ev TenableRdepMonitor-3.x.x-esX.2 LCE OPSEC Client Determine the name of the installed package: Copyright , Tenable Network Security, Inc. 10

11 # rpm -qa grep lce_opsec lce_opsec-3.x.x-esx.2 # Remove the installed package: # rpm -ev lce_opsec-3.x.x-esx.2 Tenable NetFlow Monitor Determine the name of the installed package: # rpm -qa grep TenableNetFlowMonitor TenableNetFlowMonitor-3.x.x-esX.2 # Remove the installed package: # rpm -ev TenableNetFlowMonitor-3.x.x-esX.2 Tenable Network Monitor Determine the name of the installed package: # rpm -qa grep TenableNetworkMonitor TenableNetworkMonitor-3.x.x-esX # Remove the installed package: # rpm -ev TenableNetworkMonitor-3.x.x-esX LCE Splunk Client Determine the name of the installed package: # rpm -qa grep splunk lce_splunk-3.x.x-es5.2 # Remove the installed package: # rpm -ev lce_splunk-3.x.x-es5.2 FreeBSD Determine the name of the installed package: # pkg_info grep lce lce_client-3.x.x TNS Log Correlation Engine tail client # Remove the installed package: # pkg_delete lce_client-3.x.x Delete the following line from /etc/rc.conf.local or Copyright , Tenable Network Security, Inc. 11

12 /etc/rc.conf to remove the LCE client service: lce_clientd_enable="yes" Tenable Network Monitor Determine the name of the installed package: # pkg_info grep network network_monitor-3.x.x TNS Log Correlation Engine tail client # Remove the installed package: # pkg_delete network_monitor-3.x.x Delete the following line from /etc/rc.conf.local or /etc/rc.conf to remove the LCE client service: tnmd_enable="yes" Tenable NetFlow Monitor Determine the name of the installed package: # pkg_info grep netflow netflow_monitor-3.x.x TNS Log Correlation Engine tail client # Remove the installed package: # pkg_delete netflow_monitor-3.x.x Delete the following line from /etc/rc.conf.local or /etc/rc.conf to remove the LCE client service: tfmd_enable="yes" AIX Determine the name of the installed package: # lslpp -L grep lce lce_client aix.rte C F Tenable LCE client # Remove the installed package: # installp -u lce_client aix.rte When the package is uninstalled, the lce_client.conf file is left in place. If the package is later re-installed, a new configuration file will be written, and the original will be renamed to lce_client.conf.save. Copyright , Tenable Network Security, Inc. 12

13 Fedora Core Determine the name of the installed package: # rpm -qa grep lce_client lce_client-3.x.x-fc8.2 Remove the installed package: # rpm -ev lce_client-3.x.x-fc8.2 Solaris Determine the name of the installed package: # pkginfo grep lce security lce-client-3-x-x LCE Client # Remove the installed package: # pkgrm lce-client-3-x-x Mac OS X To remove the LCE client on a Mac, you can either use a third party de-installation program or run the following commands from the command line prompt: # rm /opt/lce_client/lce_clientd # rm r /System/Library/StartupItems/LCEClient Debian 4 Tenable Network Monitor Determine the name of the installed package: # dpkg l grep tnm ii tnm 3.x.x Tenable Network Monitor. This program sniffs # Remove the installed package: # dpkg -r tnm Ubuntu Determine the name of the installed package: # dpkg -l grep lce ii lce-client-x-x-x Tenable Log Correlation Engine Client 3.x.x Copyright , Tenable Network Security, Inc. 13

14 # Remove the installed package: # dpkg -r lce-client-x-x-x Dragon Appliance # removepkg lce_client-3.x.x-dragon-skw.tgz LCE Unix Client Configuration The example configuration file has limited logging enabled and should be customized for the local applications and operating system. This section describes how to configure the LCE Unix clients. The configuration files for each of the clients on the supported operating systems are listed in the table below: Client Software Configuration File Red Hat ES 3, ES 4, ES 5 LCE OPSEC Client Tenable NetFlow Monitor Tenable Network Monitor Tenable RDEP Monitor Tenable Splunk Client /opt/lce_client/lce_client.conf /opt/lce_opsec/lce_opsec.conf /opt/netflow_monitor/tfm.conf /opt/network_monitor/tnm.conf /opt/rdep_monitor/trm.conf /opt/lce_splunk/lce_splunk.conf FreeBSD Tenable Log Agent Tenable NetFlow Monitor Tenable Network Monitor /usr/local/lce_client/lce_client.conf /usr/local/netflow_monitor/tfm.conf /usr/local/rdep_monitor/trm.conf AIX /opt/lce_client/lce_client.conf Fedora Core /opt/lce_client/lce_client.conf Solaris Copyright , Tenable Network Security, Inc. 14

15 /opt/lce_client/lce_client.conf Mac OS X /opt/lce_client/lce_client.conf Debian Tenable Network Monitor /opt/network_monitor/tnm.conf Ubuntu /opt/lce_client/lce_client.conf Dragon Appliance /opt/lce_client/lce_client.conf If changes are to be made to an existing configuration file and the client is already running, make the changes, halt the client and then restart it. See Halting the LCE Unix Client. Log Correlation Engine Log Agent LCE Unix Log Agents can be used to monitor log files that contain events received from other devices. For example, a Unix server could be configured to receive SYSLOG events from a nearby router. The and LCE server would parse all events as if they originally came from the Unix server. If there were IP address information in the SYSLOG message, then the LCE server would assign the source and destination events accordingly. To configure the lce.conf file, enter in a list of files or directories to be monitored. You will also need to include the relevant IP address and shared secret key of the LCE server in the lce-server section. The shared secret key may contain any ascii character except a semicolon (;) or space (). An example lce_client.conf configuration file is shown below: options { # LCE client log messages are written to a file named according to # the date in the directory specified below. log-directory./ # The files specified below are tailed. tail-file /var/log/messages tail-file /var/log/secure # All files in directories specified with the tail-dir option will # be tailed. # This can also be limited to files matching a certain pattern. # tail-dir /var/log/*.log Copyright , Tenable Network Security, Inc. 15

16 # tail-dir /security_logs/* # When a directory is monitored, the LCE client periodically re- # scans the directory to determine if any new files have been added. # The next option determines the number of seconds between each # scan. scan-frequency 60 # When the following line is uncommented, debugging is enabled in # the client. # client-debug # The following section defines the IP at which the LCE server is # located, as well as the authentication required to log in. Only 1 # LCE server is currently supported. For example, use the following # to configure an LCE server at (localhost) using the # password "s3kret" lce-server { client-auth auth-secret-key s3kret } # The LCE server can be configured to listen on a user-specified # port. The setting below should match the server setting, which is # by default. server-port # The heartbeat-frequency option defines the number of seconds # between each pair of client heartbeat messages that are sent to # the server. heartbeat-frequency 300 } # The LCE client provides the option of periodically sending a log # file containing performance statistics to the LCE server. The # following option determines the number of minutes between each # performance statistics report. When the next line # is commented out or removed, performance reporting is disabled. statistics-frequency 60 Two types of log directives can be used. The tail-file directive specifies a specific file to follow. The tail-dir directive specifies all files in a specific directory to be followed. This is invoked by specifying the path, followed by an asterisk. For example, the above configuration could be simplified to: options { tail-dir /var/log/* tail-dir /var/log/httpd/* } lce-server { client-auth auth-secret-key tenable } This would cause all new files or any existing files with new content in the /var/log and Copyright , Tenable Network Security, Inc. 16

17 /var/log/httpd directories to be tailed by the. Note that only regular text files are looked at in a specified directory not special files or sub-directories. Comments can be entered into the configuration file with lines starting with the # character. Once the configuration file is updated, check the client log to ensure it is operating properly and to validate that configuration directives were configured correctly. lce_client.conf The following table describes the configuration options available in the lce_client.conf configuration file: Option log-directory tail-file tail-dir accounting-file scan-frequency client-debug lce-server server-port heartbeat-frequency statistics-frequency Description Directory where logs are stored. If the logdirectory keyword is commented out, then the client install directory will be used. Otherwise ISO9000 compliant log files will be saved in the specified directory. Specifies which log(s) are to be tailed for monitoring by the. Configuration file allows multiple tail-file options. Specifies a directory or directories in which the will tail all regular text files. Specifies location of accounting file to be monitored. The binary entry for each executed command is converted to a plain text log and sent to the LCE server. Frequency with which the will re-scan the taildir directory to determine if new files have been added. Set debug mode on or off. Directs the to the IP address of the LCE, and specifies the password used to connect. Note: Each client can only connect to one server, and will connect to the first server specified if multiple lce-server directives exist. The port the LCE listens to as designated by the lce-server directive. The can be configured to send a heartbeat message to the LCE. This message indicates that the client is still alive and performing normally. The frequency with which the sends a log entry containing performance statistics to the LCE. Copyright , Tenable Network Security, Inc. 17

18 The following is an example of the heartbeat message sent from the to the LCE: # LCE Client Heartbeat Hostname: holodeckvista.lab.tenablesecurity.com IP: Revision: LCE Client Performance Reporting When the sends performance statistics to the LCE server, the exact information sent depends on the operating system (e.g., swap and cache data is not available on all platforms). The performance report is sent to the LCE server. The various performance logs are normalized to the lce event type for easy analysis. TASL scripts are available to monitor the performance of various systems and generate an alert when low resources are detected. When viewed using the Raw Syslog Events tool, the data appears similar to the following: LCE-Client-Statistics [Config280VM1, , Network Monitor 3.0] Network Statistics Udp: 1171 packets received 184 packets to unknown port received. 0 packet receive errors 1210 packets sent Memory Load: / kilobytes main memory used (92.61%), with kilobytes free (7.39%) 208/ kilobytes swap memory used (0.01%), with kilobytes free (99.99%) kilobytes of data cached Disk Load: 3.6G/4.3G (46%) disk storage used on LCE filesystem (54% free) CPU load average: 0.33, 0.25, 0.14 Log Correlation Engine Splunk Client When configuring Splunk to forward data to a non-splunk system, such as this agent, it is necessary to set sendcookeddata=false in outputs.conf. Splunk is a monitoring and reporting tool with search capabilities that consolidates metrics, logs and other data from various network devices and applications into a searchable repository. LCE Splunk Clients can be used to monitor log files that contain events received from Splunk servers. For example, a Unix server could be configured to receive Splunk events from a nearby Splunk server. The LCE Splunk Client and LCE server would parse all Copyright , Tenable Network Security, Inc. 18

19 events as if they originally came from the Splunk server. Tenable provides Splunk clients for Red Hat Enterprise Linux versions 3, 4 and 5. To configure the lce_splunk.conf file, enter in the IP address of the Splunk server to be monitored. You will also need to include the relevant IP address and shared secret key of the LCE server in the lce-server section. The shared secret key may contain any ascii character except a semicolon (;) or space (). An example lce_splunk.conf configuration file is shown below: options { # Splunk client log messages are written to a file named according # to the date in the directory specified below. log-directory./ # The splunk client listens for connections from Splunk servers at # the port specified below. Each Splunk server in the deployment # should be configured to forward data to this location. listen-port 9800 # The splunk client will only accept connections from servers # authorized with the splunk-server keyword. splunk-server # The following section defines the IP at which the LCE server is # located, as well as the authentication required to log in. Only # 1 LCE server is currently supported. For example, use the # following to configure an LCE server at (localhost) # using the password "s3kret" lce-server { client-auth auth-secret-key s3kret } # The LCE server can be configured to listen on a user-specified # port. The setting below should match the server setting, # which is by default. server-port # The heartbeat-frequency option defines the number of seconds # between each pair of client heartbeat messages that are sent # to the server. heartbeat-frequency 300 # The LCE client provides the option of periodically sending a log # file containing performance statistics to the LCE server. The # following option determines the number of minutes between each # performance statistics report. When the next line # is commented out or removed, performance reporting is disabled. statistics-frequency 60 # When the following line is uncommented, debugging is enabled in # the client. Copyright , Tenable Network Security, Inc. 19

20 } # client-debug lce_splunk.conf The following table describes the configuration options available in the lce_splunk.conf configuration file: Option log-directory listen-port splunk-server lce-server server-port heartbeat-frequency statistics-frequency client-debug Description Log directory storage point. Listening port of the Splunk client (9800 by default). IP Address of the Splunk server. IP Address of the LCE server. Port that the LCE server is configured to listen on. The number of seconds between each pair of client heartbeat messages that are sent to the server. The number of minutes between each performance statistics report to the LCE server. Whether debugging is enabled or disabled on the client. Log Correlation Engine OPSEC Client To configure the LCE OPSEC Client, edit the lce_opsec.conf file with a text editor. A script that pulls a cryptographic key from the desired OSPEC source is also required. The opsec_pull_cert script is bundled with OPSEC SDK and can be found at the following link: This script will be used in the event that authenticated connections are required from the Checkpoint firewall. The OPSEC API supports a variety of features for connecting to OPSEC enabled devices. These options are defined with examples throughout the lce_opsec.conf file. The file also includes two keywords for specifying the location of the LCE server IP and the shared secret. The shared secret key may contain any ascii character except a semicolon (;) or space (). The following is an example of the lce_opsec.conf configuration file: Copyright , Tenable Network Security, Inc. 20

21 # Messages generated during runtime will be stored in a dated file # of the format YYYYMon.log in the following directory. LOG_DIR="/opt/lce_opsec/" # DEBUG_MODE={yes YES no NO} DEBUG_MODE="no" # This option defines the location of the FW1 management station. # Only 1 station is currently supported. # FW1_SERVER=<IP address of FW1-Management Station> FW1_SERVER=" " # FW1_PORT=<Port number for LEA connections> FW1_PORT="50001" # FW1_LOGFILE=<Name of FW1-Logfilename> FW1_LOGFILE="fws.log" # FW1_OUTPUT=<files logs> FW1_OUTPUT="logs" # FW1_TYPE=<NG ng 2000> FW1_TYPE="NG" # FW1_MODE=<audit AUDIT normal NORMAL> FW1_MODE="NORMAL" # This option defines the number of seconds between each pair of client # heartbeat messages that are sent to the server. HEARTBEAT_FREQUENCY="300" # The LCE client provides the option of periodically sending a log file # containing performance statistics to the LCE server. The following option # determines the number of minutes between each performance statistics # report. When the next line is commented out or removed, performance # reporting is disabled. STATISTICS_FREQUENCY="60" # ONLINE_MODE=<yes YES no NO> ONLINE_MODE="no" # RESOLVE_MODE=<yes YES no NO> RESOLVE_MODE="no" # SHOW_FIELDNAMES=<yes YES no NO> SHOW_FIELDNAMES="yes" # RECORD_SEPARATOR=<char> RECORD_SEPARATOR=" " # DATEFORMAT=<CP UNIX STD> # CP = " 3Feb :15:16" # UNIX = " " # STD = " :15:16" DATEFORMAT="STD" Copyright , Tenable Network Security, Inc. 21

22 # # FW1-Authentication settings # # AUTHENTICATES={yes YES no NO} AUTHENTICATED="no" # OPSEC_CERTIFICATE=<Path and Name of Opsec Certificate> OPSEC_CERTIFICATE="opsec.p12" # OPSEC_CLIENT_DN=<DN of Opsec-Client> OPSEC_CLIENT_DN="CN=LEA-Client,O=fw1-ng.fellhauer-web.de..n77jpa" # OPSEC_SERVER_DN=<DN of Opsec-Server> OPSEC_SERVER_DN="cn=cp_mgmt,o=fw1-ng.fellhauer-web.de..n77jpa" # This option defines the location and authentication settings of the # Log Correlation Engine. Only 1 server is currently supported. LCE_SERVER=" " LCE_PASSWORD="tenable" LCE_PORT="31300 While running, the user should observe a network connection between the lce_opsec client and the Checkpoint firewall on TCP port 50001, as well as a network connection between the lce_opsec client and the LCE server on TCP port lce_opsec.conf The following table describes the configuration options available in the lce_opsec.conf configuration file: Option LOG_DIR DEBUG_MODE FW1_SERVER FW1_PORT FW1_LOGFILE Description Log message storage point. Set debug mode on or off. Location of the FireWall-1 management station. Listening port of the FireWall-1 management station as defined in the FW1_SERVER directive. Name of the FireWall-1 log file. This option must be commented out (place a # in front of the line) if online mode is enabled. See the ONLINE_MODE option below. FW1_OUTPUT Specify if the FireWall-1 log file output is files or logs. FW1_TYPE Specify the FireWall-1 type NG, ng or FW1_MODE Specify the FireWall-1 mode; AUDIT or NORMAL Copyright , Tenable Network Security, Inc. 22

23 HEARTBEAT_FREQUENCY STATISTICS_FREQUENCY ONLINE_MODE RESOLVE_MODE SHOW_FIELDNAMES RECORD_SEPARATOR DATEFORMAT AUTHENTICATED OPSEC_CERTIFICATE OPSEC_CLIENT_DN OPSEC_SERVER_DN LCE_SERVER LCE_PASSWORD LCE_PORT The LCE OPSEC client can be configured to send a heartbeat message to the LCE. This message indicates that the client is still alive and performing normally. The frequency with which the LCE OPSEC client sends a log entry containing performance statistics to the LCE. Specify the online mode; yes or no (Not case sensitive). Specify the resolve mode; yes or no (Not case sensitive). Specify if field names should be displayed; yes or no (Not case sensitive). Specify the character that acts as the record separator. Specify the log file date format; CP, UNIX or STD. Specify the FireWall-1 authentication settings; yes or no (Not case sensitive). The path and name of the OPSEC certificate file. The OPSEC Client Distinguished Name. The OPSEC Server Distinguished Name. The IP address of the LCE server. The password required to authenticate to the LCE server. The remote port of the LCE server designated in the LCE_SERVER directive. FW-1 Log Grabber Although Tenable provides a native LCE OPSEC Client, the client can be utilized to monitor logs generated by the open source FW-1 Log Grabber project. The open source tool is located at: To use this tool, add a client to your Linux server that is also running Log Grabber. Configure the lce.conf file of the client to monitor the log file generated by the Log Grabber program. At the LCE server, ensure that the firewall_checkpoint_loggrabber.prm library has been enabled. This library is used to process the Firewall log events generated by the Log Grabber tool. Linux Binary Compatibility Copyright , Tenable Network Security, Inc. 23

24 Depending on your specific Linux kernel, when starting, the lce_opsec client may complain about not being able to locate the libelf.so.0 library. If this is the case, please run the following command: # ln -s /usr/lib/libelf.so.1 /usr/lib/libelf.so.0 ldconfig # This will ensure that the lce_opsec client has proper access to the required system libraries. Firewall Connectivity Configuration of unauthenticated connections Configuration of FW-1 server: Modify $FWDIR/conf/fwopsec.conf and define the port to be used for unauthenticated lea connections: lea_server port Bounce FW-1 in order to activate changes # cpstop; cpstart Configuration of FW-1 policy: Add a rule to the policy to allow the port defined above from the lce_opsec-client machine to the FW-1 management server. Install the policy. Configuration of lce_opsec-client: Edit the FW1_PORT configuration file parameter to specify the port you defined on your FW-1 server (This example 50001). Configuration of authenticated connections Configuration of FW-1 server: Modify $FWDIR/conf/fwopsec.conf and define the port to be used for authenticated lea connections as well as the authentication algorithm. The default algorithm for authenticated connections is SSLCA: lea_server auth_port lea_server auth_type sslca cpstop; cpstart (if settings above are in place than bouncing the FW-1 Management Server is not necessary) Configuration of FW-1 policy: Create a new Opsec Application Object with the following details: o Name: e.g. thunder (thunder is an example Object name) o Vendor: User Defined o Server Entities: None o Client Entities: LEA Copyright , Tenable Network Security, Inc. 24

25 Initialize Secure Internal Communication (SIC) for recently created Opsec Application Object and enter (and remember) the initial password. Write down the DN of the recently created Opsec Application Object. This is your Client Distinguished Name, which you need later on. Open the object of your FW-1 management server and write down the DN of that object. This is the Server Distinguished Name, which you will need later on. Add a rule to the policy to allow the port defined above as well as port 18210/TCP (FW1_ica_pull) in order to allow pulling of PKCS#12 certificate from the lce_opsecclient machine to the FW-1 management server. The port 18210/TCP can be shut down after the communication between lce_opsec-client and the FW-1 management server has been established successfully. The pulling of the certificate will be accomplished with the opsec_pull_cert script. Install the policy. Configuration of lce_opsec-client: Execute the command opsec_pull_cert as follows and copy the resulting PKCS#12 file (default: opsec.p12) to your lce_opsec-client directory. (The opsec_pull_cert can be accessed at the following address: opsec_pull_cert \ -h <IP of FW-1 Management Server> \ -n <Name of Opsec Application Object> \ -p <Password you entered before in policy Example: #./opsec_pull_cert -h host -n object-name -p activation-key #./opsec_pull_cert -h n c001_lea -p abc123 The full entity sic name is: CN=c001_lea,O=cpmodule..gysidy Certificate was created successfully and written to "opsec.p12". The following options will need to be updated within the lce_opsec.conf: Edit the FW1_PORT configuration file parameter to specify the port you defined on your FW-1 server. (This example uses port ) Edit the AUTHENTICATED="yes" option within the lce_opsec.conf file. Edit the OPSEC_CERTIFICATE configuration file parameter according to the name of the PKCS#12 file that you created before using the opsec_pull_cert command. (The example above uses opsec.p12) Edit the OPSEC_CLIENT_DN configuration file parameter according to the Client DN that you have written down before. Copyright , Tenable Network Security, Inc. 25

26 Edit the OPSEC_SERVER_DN configuration file parameter according to the Server DN that you have written down before. Reading Live or Past Log Entries The LCE OPSEC Client can operate in online and offline modes. In the online mode it will report events as they occur, i.e. real-time. In the offline mode the client will read all of the events that are currently in the log and forward them onto the LCE server. To see past log entries, use the offline mode. To see real-time entries, use the online mode. Some examples of manual invocation: (The following is configurable within the lce_opsec.conf as well)./lce_opsec --online./lce_opsec --offline Standard lce_opsec invocation involves running: service lce_opsec start. When run in this manner, the ONLINE_MODE parameter is read from the lce_opsec.conf file. Tenable Network Monitor Client The Tenable Network Monitor (TNM) is designed to monitor network traffic and send session information to the LCE server. It can also sniff SYSLOG messages sent from one point to another and treat them as if they were originally sent directly to the LCE. The following is an example of the tnm.conf congfiguration file: options { # Network Monitor log messages are stored in files named according # to the date in the following directory. log-directory "./"; # The heartbeat-frequency option defines the number of seconds # between each pair of client heartbeat messages that are sent to # the server. heartbeat-frequency "300"; # The network monitor provides the option of periodically sending a # log file containing performance statistics to the LCE server. The # following option determines the number of minutes between each # performance statistics report. When the next line is commented # out or removed, performance reporting is disabled. statistics-frequency "60"; # The network monitor automatically generates a TCPDUMP filter # expression that selects which network packets will be processed. # This expression is based on the syslog monitoring settings below. # The following option allows the default filter to be # overridden with a custom expression. filter-expression "tcp or icmp or udp port 514"; # This section defines the IP address and authentication password # for connections to the Log Correlation Engine server. In the # example, the server is located at (localhost), where a Copyright , Tenable Network Security, Inc. 26

27 # password of "tenable" has been set for the client. Only one LCE # server is currently supported. lce-server { client-auth auth-secret-key "tenable"; } # The LCE server can be configured to listen on a user-specified # port. The setting below should match the server setting, which is # by default. server-port "31300"; # The network monitor will report traffic from only the interfaces # listed below. #interface "eth0"; interface "vxn0"; # Traffic containing syslog messages is forwarded to the LCE server # for the hosts matching the filtering criteria in the final # section. The following specifies the protocol/port pairs for which # all traffic will be processed as syslog messages. # These settings should match the syslog or syslog-ng configuration. monitor-syslog-port "udp/514"; monitor-syslog-port "tcp/1468"; } # When the below option is set to yes, only syslog messages are # reported, and all all other traffic is ignored. syslog-only "no"; # The following section defines the networks on which syslog will be # monitored. The network monitor will report syslog messages received at the # above specified ports for any IP address matching the filter criteria. include-networks { " /32"; " "; } exclude-networks { } tnm.conf The following table describes the configuration options available in the tnm.conf configuration file: Option log-directory Description Directory where LCE client logs are stored. If the logdirectory keyword is commented out, then the client install directory will be used. Otherwise ISO9000 compliant log files will be saved in the specified directory. Copyright , Tenable Network Security, Inc. 27

28 heartbeat-frequency statistics-frequency filter-expression lce-server server-port interface monitor-syslog-port syslog-only include-networks exclude-networks The Tenable Network Monitor can be configured to send a "heartbeat" message to the LCE. This message indicates that the client is still alive and performing normally. The frequency with which the Tenable Network Monitor sends a log entry containing performance statistics to the LCE. The network monitor automatically generates a TCPDUMP filter expression that selects which network packets will be processed. This expression relies upon the syslog monitoring settings being enabled. Directs the Tenable Network Monitor to the IP address of the LCE, and specifies the password used to connect. The port the LCE listens to as designated by the lce-server directive. The network interface(s) that the Tenable Network Monitor will report traffic from. The protocol/port designation that is used to forward syslog messages to the LCE server. Directive to only report syslog messages; yes or no. Specify which networks are to be included in monitoring activity. Designate specific networks that should be excluded from monitoring activity. Functionality The tnm tool will report on TCP sessions it sees. For example, if there is an FTP session, it will report when the session starts and when it is completed. If the session has no activity for a certain amount of time, tnm will time out the session and log it as complete. For UDP and ICMP protocols, tnm will log the individual packets. When sending network traffic activity to the LCE, care should be taken when choosing the traffic source to monitor. The amount of network logs generated while monitoring a busy T3, 100 Mb or even Gigabit link can vastly outweigh the total amount of firewall, web log and IDS logs. However, monitoring activity on key servers, key protocols or even known malicious IP addresses is extremely useful. When used to aggregate SYSLOG messages from another set of servers, make sure to specify the correct destination IP addresses for the syslog messages. Otherwise, the Tenable Network Monitor may ignore SYSLOG messages you actually want gathered. Tenable also reccomends deploying the TNM directly in front of or on any SYSLOG gathering servers. Copyright , Tenable Network Security, Inc. 28

29 The advantage of this is to work with the logs directly as they arrive from their source servers. SYSLOG servers that forward messages often add additional data in front of the log, which increases the overall log size. Also, logs that are forwarded often include source names for systems they may not be resolvable via DNS, making it harder to understand which system generated a log file. Using the TNM to sniff logs in motion preserves the source IP address of the original log. Command Line Options The tnm binary has several command line options that are printed out when it is invoked without any options. Here is a list of the current options: usage:./tnm [ -v ] [ -r <pcap file> ] [ -t <TCP timeout> ] [ expression ] The v option turns on increased verbosity. The r option specifies a TCPDUMP binary file that can be used to send older logs to the LCE. The t option specifies the amount of time of inactivity to be used by tnm before considering a TCP session dead. The last part of the command line allows for specification of a specific packet filter. Command line filtering options must be enclosed in quotation marks. For example, the following command line can be used to run tnm and log all network data except for UDP packets and ports 80 and #./tnm "not proto 17 and not port 80 and not port 6346" & The tnm is usually started via the network_monitor RC script in the system startup directory (for example, /etc/rc.d/init.d on Red Hat Linux systems). To change the default packet filter in the start up script, edit this script and go to the following entry on or about line 21: $NETWORK_MONITOR_DIR/$NETWORK_MONITOR_BIN &> /dev/null & To modify this default setting, add your filter statement after the command statement such as this: $NETWORK_MONITOR_DIR/$NETWORK_MONITOR_BIN tcp or icmp or udp port 514 &> /dev/null This particular statement matches on any TCP or ICMP traffic and also collects any UDP based SYSLOG traffic. Performance Considerations When running the TNM, you should consider how much data you are collecting and what you are doing with the data. If you are not doing anything with a certain set of data and you do not have a requirement to collect it, you can increase the performance of your LCE and the total volume of logs you can store at one time by not collecting it. Consider these strategies when collecting logs: Ignoring UDP traffic in general, or at least UDP protocols to your basic services can save you many records. For example, ignoring DNS lookups to your DNS servers will save you logging these events that are repetitious. Copyright , Tenable Network Security, Inc. 29

30 If you have very good logs from your , web and other types of servers, consider ignoring port 80, port 443, port 25 and so on to these servers. If you have a long term requirement to store logs but not necessarily network traffic, consider deploying a single LCE for log aggregation and then add a secondary LCE to gather network traffic. You might be able to store your logs much longer than your network traffic. With two LCEs, the Security Center can also query both of these and unify their results. Tenable RDEP Monitor Client Cisco s line of intrusion detection appliances makes use of a protocol known as RDEP. The Tenable RDEP Monitor (TRM) client is designed to connect into a Cisco IDS appliance and retrieve new events for processing by the LCE. Since the Security Center does not support the RDEP protocol, this client can also be used to create SYSLOG messages that can be read by the Security Center. The trm.conf file has several configuration options as shown in the following example: options { # This section defines the login information for the LCE server. Only # one LCE server is currently supported. lce-server ; lce-password "tenable"; # The LCE server can be configured to listen on a user-specified port. # The setting below should match the server setting, which is by # default. server-port 31300; # The heartbeat-frequency option defines the number of seconds between # each pair of client heartbeat messages that are sent to the server. heartbeat-frequency 300; # The LCE client provides the option of periodically sending a log file # containing performance statistics to the LCE server. The following # option determines the number of minutes between each performance # statistics report. When the next line is commented out or removed, # performance reporting is disabled. statistics-frequency 60; # run forever #daemonize; # print parsed events to standard error debug; # only parse and forward the latest events latest-events-only; # The next option sets the amount of time in seconds between each # interval at which the IDS device is checked for new events. This # option is only meaningful if daemonize is set above. poll-interval 300; # In addition to the Log Correlation Engine, events downloaded from the Copyright , Tenable Network Security, Inc. 30

31 # RDEP device can also be forwarded to up to 8 syslog servers. The # syslog-server keyword defines the address at which each is located. # syslog-server ; # The following section sets configuration information for an RDEP # server. Multiple servers can be added by providing an RDEP-server {} # block for each. RDEP-server { address ; port "443"; use-ssl; user "cisco"; password "Att@ck!"; # subscription based retrieval retrieval-method subscribe; event-types { evalert; } alert-severities { # or all # informational # low; medium; high; } } } trm.conf The following table describes the configuration options available in the trm.conf configuration file: Option lce-server lce-password server-port heartbeat-frequency statistics-frequency Description Specifies which LCE server this client will send events to. An LCE server is not required to use this tool. Specifies the password for the LCE server, if used. Specifies the port that the LCE server listens on. Determines how often the TRM client sends a heartbeat message to the LCE to indicate that the client is still alive and performing normally. Determines how often the TRM client sends performance statistics to the LCE server. Copyright , Tenable Network Security, Inc. 31

32 daemonize debug latest-events-only poll-interval syslog-server RDEP-server Specifies tha the trm client is to run in the background as a daemon, if uncommented. Prints out a variety of status messages to the command line, if enabled. It is recommended that this be enabled when connecting to the remote Cisco IDS sensors for the first time. Causes the trm binary to skip to the most recent event and then only report new events. Tenable recommends that the trm be configured to skip forward to the last event by enabling this option. Specifies how often (in seconds) the trm shall attempt to connect to the remote Cisco IDS sensors. Tenable recommends five minute intervals on busy or heavily loaded Cisco IDS sensors. However, smaller time intervals such as 30 seconds will provide more fidelity in event logging. If SYSLOG event forwarding is desired, the IP address of this server (most likely the IP of the Security Center) can be specified with this keyword. This section specifies a single Cisco IDS sensor to aggregate events from. Multiple RDEP-server entries can be specified in a single trm.conf file. This particular construct specifics the IP address, account, and password for the trm to log into the sensor. In addition, there are some default parameters such as which port, the type of encryption (the use-ssl keyword) and the event-type keyword that specify how the events are to be retrieved. Last, the alert-severity keyword is used to specify what type of IDS events from the Cisco sensor are to be retrieved. Sending Events to the Security Center Specifying the IP address of the Security Center with the syslog-server keyword will send new IDS events from one or more Cisco sensors to the Security Center. TNS NetFlow Monitor Client The Tenable NetFlow Monitor (TFM) client takes advantage of the ability in most modern routers to use the NetFlow protocol to send network session statistics to remote collectors for processing and reporting. This enables you to monitor network traffic without having to install a sniffer on a hub or switched span port. The following is an example tfm.conf configuration file: options { # Log messages will be stored in a file named according to date in # the following directory. log-directory "./"; Copyright , Tenable Network Security, Inc. 32

33 # This section defines the login information for the LCE server. # Only one server is currently supported. lce-server { client-auth auth-secret-key "tenable"; } # The LCE server can be configured to listen on a user-specified # port. The setting below should match the server setting, which is # by default. server-port 31300; netflow-server-port 9995; # The heartbeat-frequency option defines the number of seconds # between each pair of client heartbeat log messages that are sent # to the server. heartbeat-frequency 300; # The LCE client provides the option of periodically sending a log # file containing performance statistics to the LCE server. The # following option determines the number of minutes between each # performance statistics report. When the next line # is commented out or removed, performance reporting is disabled. statistics-frequency 60; # The netflow agent implements a white list of matching IP # elements including IP protocol, IP address and port numbers. # If multiple elements are specified, then only sessions matching # at least one variable in each element will be matched. In the # below example, only UDP and TCP sessions would be logged from # with a source port of 1024 and a destination port # of 53. If multiple destination or source ports were required # for matching, they could be entered in on other lines. Only # one include-filter can be used per netflow agent. # Example #1. include-filter { proto 6; } exclude-filter { port 20; port 21; # port 22; # port 25; port 80; port 53; port 110; port 123; port 161; port 143; port 443; port 1434; port 1863; port 5050; Copyright , Tenable Network Security, Inc. 33

34 } port 5190; port 8200; # Example #2 - logging all ftp, web, smtp and dns traffic # include-filter { # port 21; # port 25; # port 53; # port 80; # } } # Example #3 - logging all ftp, web, smtp and dns traffic from # /8 # include-filter { # cidr / ; # port 21; # port 25; # port 53; # port 80; # } tfm.conf The following table describes the configuration options available in the tfm.conf configuration file: Option log-directory lce-server server-port netflow-server-port heartbeat-frequency Description Directory where LCE client logs are stored. If the logdirectory keyword is commented out, then the client install directory will be used. Otherwise ISO9000 compliant log files will be saved in the specified directory. Directs the TFM client to the IP address of the LCE, and specifies the password used to connect. Note: Each client can only connect to one server, and will connect to the first server specified if multiple lce-server directives exist. The port the LCE listens to as designated by the lce-server directive. Specifies the NetFlow port to monitor. The netflow-serverport keyword should not change unless you have specifically modified the configuration of your networking devices to report NetFlow data on non-standard ports. The TFM client can be configured to send a heartbeat message to the LCE. This message indicates that the client is still alive and performing normally. Copyright , Tenable Network Security, Inc. 34

35 statistics-frequency include-filter exclude-filter The frequency with which the LCE client sends a log entry containing performance statistics to the LCE. The filtering section is used to limit the amount of data logged. Unlike the TNM that has command line filtering courtesy of the libcap packet capture library, TFM filtering is specified inside the tfm.conf file. Filtering is accomplished by specifying one or more protocol, network or port combinations. In the provided tfm.conf file, several examples are given that look for generic matches. The filtering logic works such that any reported NetFlow session must match at least one of the specified filters in each section. Negative filtering can also be used. Consider the following section from a tfm.conf file: include-filter { proto 6; } exclude-filter { port 20; port 21; port 22; port 25; port 80; port 53; port 110; port 123; port 161; port 143; port 443; port 1434; port 1863; port 5050; port 5190; port 8200; } In this example, the tfm would look for all TCP traffic, but would also ignore any sessions occurring on the ports listed in the exclude filter. Tenable NetFlow Monitor Event Types These are the event types that the Tenable NetFlow Monitor can currently generate: TFM-TCP_Session_Whole TFM-TCP_Session_Partial TFM-UDP_Activity TFM-TCP_Session_Whole_1MB TFM-TCP_Session_Whole_10MB TFM-TCP_Session_Whole_100MB TFM-TCP_Session_Whole_1000MB Copyright , Tenable Network Security, Inc. 35

36 Usage TFM-TCP_Session_Whole_Long TFM-TCP_Session_Partial_Long Once the tfm.conf file is configured correctly, simply invoke the tfm binary from the command line. Traffic from NetFlow version 9 will produce records that will have a trailing 0. This will be seen in Security Center when viewing log data from the LCE. An example of these records is shown below: Tue Jul 18 13:30:27 - TFM-TCP_Session_Partial[46 0]: :5190 -> : Tue Jul 18 13:30:39 - TFM-TCP_Session_Partial[9492 0]: : > : Tue Jul 18 13:31:05 - TFM-TCP_Session_Partial[0 757]: :4136 -> : LCE Unix Client Operations This section describes the administrative functions of the LCE Unix clients including starting, halting and monitoring. Starting the LCE Unix Clients As noted earlier in this document, the LCE 3.2 package includes start-up scripts that are installed in the system start-up directory (usually /etc/init.d) on the respective platform. The provided start-up scripts are designed to check if the LCE client is already running and will not start a second instance. Although it is possible to manually start the LCE client without using the provided script, it is not recommended to do so as it could result in multiple instances of the LCE client daemon running. If there are errors in the configuration file, they will be displayed in the LCE Client log, which is under the appropriate client directory (/opt/lce_client for the, /opt/network_monitor for the Tenable Network Monitor client, etc) in the format of YEARMon.log. At the LCE server, using the netstat an grep command will list all of the established LCE client connections. At any time, the version of the LCE client can be determined by running it with the -v option, as follows: #./lce_clientd -v LCE Client # Below is a table that displays how to start the client software on the various platforms: Copyright , Tenable Network Security, Inc. 36

37 Client Software Starting Methods Red Hat ES 3, ES 4, ES 5 LCE OPSEC Client LCE Splunk Agent Tenable NetFlow Monitor Tenable Network Monitor Tenable RDEP Monitor # service lce_client start or # /etc/init.d/lce_client start # service lce_opsec start or # /etc/init.d/lce_opsec start # service lce_splunk start or # /etc/init.d/lce_splunk start # service netflow_monitor start or # /etc/init.d/netflow_monitor start # service network_monitor start or # /etc/init.d/network_monitor start # service rdep_monitor start or # /etc/init.d/rdep_monitor start FreeBSD TNS NetworkMonitor TNS NetFlowMonitor # /usr/local/etc/rc.d/lce_client start # /usr/local/etc/rc.d/network_monitor start # /usr/local/etc/rc.d/netflow_monitor start AIX # /etc/rc.d/init.d/lce_client start Fedora Core # /etc/init.d/lce_client start Solaris # /etc/init.d/lce_client start Mac OS X # SystemStarter start LCEClient Debian Copyright , Tenable Network Security, Inc. 37

38 Tenable Network Monitor # /etc/init.d/network_monitor start Ubuntu # /etc/init.d/lce_client start Dragon Appliance # /etc/rc.d/rc.lce_client start Halting the LCE Unix Clients LCE client software can be halted using any one of three methods; Use the kill command to cause the process of the lce_client program to stop running, use the service command or use the init.d script. The following table demonstrates how to halt the various client software: Client Software Halting Methods Red Hat ES 3, ES 4, ES 5 LCE OPSEC Client LCE Splunk Agent Tenable NetFlow Monitor Tenable Network Monitor Tenable RDEP Monitor # service lce_client stop or # /etc/init.d/lce_client stop # service lce_opsec stop or # /etc/init.d/lce_opsec stop # service lce_splunk stop or # /etc/init.d/lce_splunk stop # service netflow_monitor stop or # /etc/init.d/netflow_monitor stop # service network_monitor stop or # /etc/init.d/network_monitor stop # service rdep_monitor stop or # /etc/init.d/rdep_monitor stop FreeBSD Tenable Network Monitor # /usr/local/etc/rc.d/lce_client stop # /usr/local/etc/rc.d/network_monitor stop Copyright , Tenable Network Security, Inc. 38

39 Tenable NetFlow Monitor # /usr/local/etc/rc.d/netflow_monitor stop AIX # /etc/rc.d/init.d/lce_client stop Fedora Core # /etc/init.d/lce_client stop Solaris # /etc/init.d/lce_client stop Mac OS X # SystemStarter stop LCEClient Debian Tenable Network Monitor # /etc/init.d/network_monitor stop Ubuntu # /etc/init.d/lce_client stop Dragon Appliance # /etc/rc.d/rc.lce_client stop Monitoring Log Correlation Engine Client Status While running, the lced process will keep track of LCE client status in a file named client.status located in the /opt/lce/admin/log directory. Below is an example listing: # pwd /opt/lce/admin/log # cat client.status Client[ ]: HeartBeatTime[Jul 07, 08 13:43] : Logged in Alive Client[ ]: Not logged in Client[ ]: Not logged in Client[ ]: Not logged in Client[ ]: HeartBeatTime[Jul 07, 08 13:44] : Logged in Alive Client[ ]: Not logged in Client[ ]: HeartBeatTime[Jul 07, 08 13:44] : Logged in Alive Client[ ]: Not logged in Client[ ]: HeartBeatTime[Jul 07, 08 13:43] : Logged in Alive # Copyright , Tenable Network Security, Inc. 39

40 For each configured LCE client, the IP address specified in the lce.conf file will be displayed as well as if it has logged in, the time of the last heartbeat and if the client is considered alive or dead. The tail-f command is not effective on this log file since it is completely rewritten each time the lced process detects a change in a client s status. The following are possible status messages and their descriptions: Message Not logged in Logged in Dead Logged in Alive Description The client has not logged in at all yet, or has been shutdown gracefully. The client has logged in before but, for some reason, has not sent in any data. This could be an indication of an issue on the client side. The client is working and sending data when it needs to. Log Correlation Engine Client Reconnection Attempts The LCE client will attempt to reconnect every minute until it can re-establish a connection with the server if the following conditions occur: The lced process stops The network connection between the client and the server breaks The client is removed from the server s configuration file (this requires a restart of the service to take affect) Log Correlation Engine Windows Client The Log Correlation Engine Windows Log Agent client monitors events as well as specific log files or directories for new logs. Currently Tenable has two Windows s, one for Windows XP/2003 platforms and one for Windows Vista/2008 platforms. Platform LCE Client Type Install File Name and Utility MS Windows XP Professional, Windows Server 2003 Windows Server 2008, Windows Vista lce_client _windows.msi lce_client _windows.msi Upgrading LCE Clients from Thunder Clients If you were using a version of the LCE Windows Log Agent client prior to LCE 3.0 (previously referred to as the Thunder client), you must remove the old client before installing the Copyright , Tenable Network Security, Inc. 40

41 new version. If you attempt to intall the new client without removing the old one, a window will be displayed reminding you to remove the old client as follows: Installing the Windows Client The LCE Windows Log Agent client installs by clicking on the.msi distribution file, which will launch the InstallShield Wizard. A license agreement will be displayed that the user must agree to before installation can commence. The user will be asked to choose if the application is to be shared or not, as shown in the following screen: Installation Location The next screen allows the user to change the default installation location: Copyright , Tenable Network Security, Inc. 41

42 If you wish to use the default location, simply click on Next and a screen will be displayed to begin the installation by clicking on Install. After a few minutes, the InstallShield Wizard will display a screen indicating that the installation is complete. You may be prompted to restart your system for the configuration changes to take effect once installation is complete. Service Location Once installation is complete, a new Windows Service named the Tenable LCE Client will be added that can be viewed through the Control Panel / Administrative Tools / Services window as shown below: Copyright , Tenable Network Security, Inc. 42

43 Using the LCE Client on Vista and Windows 2008 The latest OS releases from Microsoft contain a new security layer called User Account Control (UAC). The LCE Windows client needs administrative privileges to operate. This may be accomplished using one of the following two methods: 1. Disable UAC on the machine. This will cause the system to behave in a manner similar to XP in that all applications started by an administrator account will have non-interactive administrative privileges. To accomplish this, click on Control Panel and then User Accounts and select admin. The following screen will be displayed: Copyright , Tenable Network Security, Inc. 43

44 From this screen, select Turn User Account Control on or off. A User Account Control warning dialog is displayed. Click Continue and then the following screen will be displayed: Copyright , Tenable Network Security, Inc. 44

45 Make sure the box in front of Use User Account Control (UAC) to help protect your computer is not checked. 2. Run both the installer and the application as an administrator with UAC enabled. The following steps describe how to run the installer as an administrator: Login with an account with administrative rights. Open a command prompt as administrator. From the Start button, click on Run and enter cmd in the dialog box. Use the cd command to change directory to the location where the msi file is located. Run the following command (substituting the actual name of the.msi file): msiexec /i "lce_client _windows.msi" The following steps describe how to run the application as an administrator: Right click on the LCEConfig shortcut on the desktop. Select Properties from the pull-down menu. Choose the Shortcut tab from the dialog box. Click the Advanced button. Check Run as Administrator. Click OK on the Advanced properties panel. Click OK on the Shortcut properties panel. A dialog confirming administrative permission appears that must be acknowledged before the change occurs. Copyright , Tenable Network Security, Inc. 45

46 To run the LCE Windows client program, this shortcut must always be used. Removing the LCE Windows Client To remove the LCE Windows Log Agent client, under the Control Panel open Add or Remove Programs. Select Tenable LCE Client and then click on the Change/Remove button. This will open the InstallShield Wizard. Follow the directions in this wizard to completely remove the LCE client. Windows Client Configuration To configure the LCE Windows Log Agent client launch the LCE Configuration tool located at C\Program Files\Tenable\LCEClient\LCEConfig. This tool allows configuration of LCE server connectivity as well as configuration of the Windows event logs, file logs and directories that should be monitored. An example startup screen for the LCE Windows Client Configuration tool is shown below: General By default, the client is configured to connect to with a password of password. This must be modified to the IP address of the LCE server, and the password configured on the LCE server for this particular LCE Windows Log Agent client. When configuring the client, the default screen also includes the following three paramaters: Copyright , Tenable Network Security, Inc. 46

47 Heartbeats Send new events only this causes the client to monitor the Windows event log from the very moment it starts. It ignores all events that were previously in the event log. For testing purposes, it may be useful to send all of the events currently in the event log by unchecking this box. Poll every some number of seconds this causes the client to poll the local system to see if any USB or disk drives were removed or added since the last polling. If any changes were detected, the client will send a log that results in a Windows-LCE_Client_Detected_Attached_Drive or a Windows- LCE_Client_Detected_Removed_Drive event. Send performance data every some number of seconds this specifies how often the performance data is sent to the LCE. The Heartbeats tab of the LCE Client Configuration tool allows you to set how often a heartbeat message will be sent to the LCE server indicating that the client is still alive and functioning normally, as shown in the screen below: The following is an example of the heartbeat message sent from the LCE Windows Log Agent client to the LCE: LCE Client Heartbeat Hostname: ga2k3ten IP: Revision: Windows LCE Client v Local Event Logs The LCE Windows Log Agent client can also be configured to send any combination of event logs that are available. The Local Event Logs tab displays a list of available event log sources to send to the LCE server. By default, the security, application and system logs will be present, but other applications may add their own log file sources. An example of the Local Event Logs tab is shown below: Copyright , Tenable Network Security, Inc. 47

48 Remote Events Logs The Remote Event Logs tab can be used to configure forwarding of Windows events from remote hosts using WMI. To add a host, click on the New button and fill in the information in the following screen: Copyright , Tenable Network Security, Inc. 48

49 This will create an XML file called lce_wmi_config.xml, located in the LCE client folder (usually C:\Documents and Settings\All Users\Application Data\Tenable\LCE Client on Windows XP/2003 or C:\ProgramData\Tenable on Vista/2008). Each time you add a new host, it will be appended to the lce_wmi_config.xml file. The lce_wmi_config.xml file for Windows Vista/2008 is stored in a System folder and will not show up under a standard Windows search or default file browsing. To add a list of hosts from a file, use the Add hosts from file.. button to select an XML formatted file with multiple hosts. For example, a user could individually add each remote host in the LCE client on one system and manually copy the XML file to another system and use the Add hosts from file button to import it to that system s LCE log Agent client. See Appendix 3 for an example of the lce_wmi_config.xml file. If the system where the LCE client is running is part of a workgroup, the client service needs to run as an administrator account in order to receive events from remote hosts. By default, the LCE client is configured to log on and run as the Local System account. To change this to log on as an administrator account, go to the Services utility under Administrative Tools, right-click on the Tenable LCE Client service, select Properties and then select the Log On tab. An example screen capture is shown below: Copyright , Tenable Network Security, Inc. 49

50 Restart the LCE client service for the setting to take effect. Log Files The Log Files tab in the LCE Client Configuration tool allows you to select which log files you wish to send to the LCE server. It can be directed to tail specific log files or all of the log files in a given directory. When tailing a log file, the LCE Windows Log Agent client will continuously check the file for any new data written to it. When tailing an entire directory of log files, the LCE Windows Log Agent client will tail all of the files present in that directory, including new files. To add a specific log file to tail, click on the Add log file tab and select which log file you want to have tailed. To tail an entire directory of log files, click on the Add log folder tab and select the log file folder you wish to tail. An example screen capture showing the LCE Windows Log Agent client configured to tail both a specific log file and a log folder is shown below: Copyright , Tenable Network Security, Inc. 50

51 If you choose to add a log folder, a dialog box will be displayed allowing you to to specify which log files you wish to include or exclude. If you do not wish to include or exclude any specific log files in this folder, simply close this box and the log files for the entire folder will be tailed. A sample of this dialog box is shown below: LCE Windows Client Operations This section describes the administrative functions of the LCE Windows Log Agent client, including starting, halting and monitoring. Starting the LCE Windows Client Whenever there is a configuration change, the LCE Windows Log Agent client will prompt the user if it should restart the LCE Windows Client service in order for the changes to take Copyright , Tenable Network Security, Inc. 51

Log Correlation Engine 3.0 Client Guide May 5, 2009 (Revision 2)

Log Correlation Engine 3.0 Client Guide May 5, 2009 (Revision 2) Log Correlation Engine 3.0 Client Guide May 5, 2009 (Revision 2) The newest version of this document is available at the following URL: http://cgi.tenablesecurity.com/lce_3.0_clients.pdf Table of Contents

More information

Log Correlation Engine 3.6 Client Guide

Log Correlation Engine 3.6 Client Guide Log Correlation Engine 3.6 Client Guide May 7, 2012 (Revision 8) The newest version of this document is available at the following URL: http://static.tenable.com/prod_docs/lce_3.6_clients.pdf Copyright

More information

Log Correlation Engine 4.2 Client Guide. September 13, 2016 (Revision 24)

Log Correlation Engine 4.2 Client Guide. September 13, 2016 (Revision 24) Log Correlation Engine 4.2 Client Guide September 13, 2016 (Revision 24) Table of Contents Introduction...4 Standards and Conventions... 4 Log Correlation Engine Client Overview...4 Running LCE Clients

More information

Log Correlation Engine 4.2 Quick Start Guide. September 4, 2014 (Revision 3)

Log Correlation Engine 4.2 Quick Start Guide. September 4, 2014 (Revision 3) Log Correlation Engine 4.2 Quick Start Guide September 4, 2014 (Revision 3) Table of Contents Introduction... 3 Standards and Conventions... 3 Product Overview... 3 Prerequisites... 3 LCE Quick Start...

More information

Log Correlation Engine 3.4 Statistics Daemon Guide July 29, 2010 (Revision 3)

Log Correlation Engine 3.4 Statistics Daemon Guide July 29, 2010 (Revision 3) Log Correlation Engine 3.4 Statistics Daemon Guide July 29, 2010 (Revision 3) The newest version of this document is available at the following URL: http://cgi.tenablesecurity.com/lce_3.4_stats.pdf Table

More information

LCE Splunk Client 4.6 User Manual. Last Revised: March 27, 2018

LCE Splunk Client 4.6 User Manual. Last Revised: March 27, 2018 LCE Splunk Client 4.6 User Manual Last Revised: March 27, 2018 Table of Contents Getting Started with the LCE Splunk Client 3 Standards and Conventions 4 Install, Configure, and Remove 5 Download an LCE

More information

Log Correlation Engine 4.4 Client Guide. September 13, 2016 (Revision 3)

Log Correlation Engine 4.4 Client Guide. September 13, 2016 (Revision 3) Log Correlation Engine 4.4 Client Guide September 13, 2016 (Revision 3) Table of Contents Introduction... 4 Standards and Conventions... 4 Log Correlation Engine Client Overview... 4 Running LCE Clients

More information

Log Correlation Engine 4.0 Statistics Daemon Guide. August 13, 2012 (Revision 1)

Log Correlation Engine 4.0 Statistics Daemon Guide. August 13, 2012 (Revision 1) Log Correlation Engine 4.0 Statistics Daemon Guide August 1, 2012 (Revision 1) Table of Contents Introduction... Standards and Conventions... Basic Operation... Configuring the Statistics Daemon... 6 File

More information

Log Correlation Engine 3.0 Log Normalization Guide October 29, 2008 (Revision 1)

Log Correlation Engine 3.0 Log Normalization Guide October 29, 2008 (Revision 1) Log Correlation Engine 3.0 Log Normalization Guide October 29, 2008 (Revision 1) The ne west version of this document is available at the following URL: http://cgi.tenablesecurity.com/lce_3.0_log_analysis.pdf

More information

RSA NetWitness Platform

RSA NetWitness Platform RSA NetWitness Platform Event Source Log Configuration Guide Check Point Security Suite, IPS-1 Last Modified: Wednesday, May 9, 2018 Event Source Product Information: Vendor: Check Point Event Source:

More information

Log Correlation Engine 4.4 Statistics Daemon Guide. February 26, 2015 (Revision 1)

Log Correlation Engine 4.4 Statistics Daemon Guide. February 26, 2015 (Revision 1) Log Correlation Engine 4.4 Statistics Daemon Guide February 26, 2015 (Revision 1) Table of Contents Introduction... Standards and Conventions... Basic Operation... Configuring the Statistics Daemon...

More information

Log Correlation Engine OPSEC Client Guide. December 11, 2018

Log Correlation Engine OPSEC Client Guide. December 11, 2018 Log Correlation Engine OPSEC Client 4.5.0 Guide December 11, 2018 Table of Contents Introduction... 3 Standards and Conventions... 3 Log Correlation Engine OPSEC Client... 3 Setting up Authenticated LEA

More information

STEPS ON THE FIREWALL MANAGER

STEPS ON THE FIREWALL MANAGER STEPS ON THE FIREWALL MANAGER Configure sslca 1 Navigate to the Check Point FW- 1 configuration directory. For example, on the Management Server where the LEA Server is running: For versions R65/R71: /$FWDIR/conf

More information

Log Correlation Engine 3.2 Log Normalization Guide May 19, 2009 (Revision 1)

Log Correlation Engine 3.2 Log Normalization Guide May 19, 2009 (Revision 1) Log Correlation Engine 3.2 Log Normalization Guide May 19, 2009 (Revision 1) The newest version of this document is available at the following URL: http://cgi.tenablesecurity.com/lce_3.2_log_analysis.pdf

More information

Log Correlation Engine 3.4 Log Normalization Guide July 29, 2010 (Revision 3)

Log Correlation Engine 3.4 Log Normalization Guide July 29, 2010 (Revision 3) Log Correlation Engine 3.4 Log Normalization Guide July 29, 2010 (Revision 3) The newest version of this document is available at the following URL: http://cgi.tenablesecurity.com/lce_3.4_log_analysis.pdf

More information

Check Point Guide. Configure ETAgent to read CheckPoint Logs. EventTracker 8815 Centre Park Drive Columbia MD

Check Point Guide. Configure ETAgent to read CheckPoint Logs. EventTracker 8815 Centre Park Drive Columbia MD Check Point Guide Configure ETAgent to read CheckPoint Logs Publication Date: Oct 23, 2013 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document

More information

Server Monitoring. AppDynamics Pro Documentation. Version 4.1.x. Page 1

Server Monitoring. AppDynamics Pro Documentation. Version 4.1.x. Page 1 Server Monitoring AppDynamics Pro Documentation Version 4.1.x Page 1 Server Monitoring......................................................... 4 Standalone Machine Agent Requirements and Supported Environments............

More information

Log Correlation Engine 5.1 User Guide. Last Updated: August 28, 2018

Log Correlation Engine 5.1 User Guide. Last Updated: August 28, 2018 Log Correlation Engine 5.1 User Guide Last Updated: August 28, 2018 Table of Contents Welcome to Log Correlation Engine 9 Standards and Conventions 10 Components of the Log Correlation Engine 11 Hardware

More information

Log Correlation Engine 3.6 Administration and User Guide

Log Correlation Engine 3.6 Administration and User Guide Log Correlation Engine 3.6 Administration and User Guide May 7, 2012 (Revision 7) The newest version of this document is available at the following URL: http://cgi.tenable.com/lce_3.6_admin_user.pdf Copyright

More information

Entrust. Discovery 2.4. Administration Guide. Document issue: 3.0. Date of issue: June 2014

Entrust. Discovery 2.4. Administration Guide. Document issue: 3.0. Date of issue: June 2014 Entrust Discovery 2.4 Administration Guide Document issue: 3.0 Date of issue: June 2014 Copyright 2010-2014 Entrust. All rights reserved. Entrust is a trademark or a registered trademark of Entrust, Inc.

More information

Getting Started with. Agents for Unix and Linux. Version

Getting Started with. Agents for Unix and Linux. Version Getting Started with Agents for Unix and Linux Version 10.1.0.0 Copyright RES Software Development B.V. All rights reserved. Commercial Computer Software documentation/data Restricted Rights. RES and RES

More information

Identity Firewall. About the Identity Firewall

Identity Firewall. About the Identity Firewall This chapter describes how to configure the ASA for the. About the, on page 1 Guidelines for the, on page 7 Prerequisites for the, on page 9 Configure the, on page 10 Monitoring the, on page 16 History

More information

SecurityCenter 4.8.x Upgrade Guide. December 16, 2014 (Revision 1)

SecurityCenter 4.8.x Upgrade Guide. December 16, 2014 (Revision 1) SecurityCenter 4.8.x Upgrade Guide December 16, 2014 (Revision 1) Table of Contents Introduction... 3 Standards and Conventions... 3 Software Requirements... 4 Supported Operating Systems... 4 Dependencies...

More information

SecurityCenter 5.1 Upgrade Guide. November 12, 2015 (Revision 2)

SecurityCenter 5.1 Upgrade Guide. November 12, 2015 (Revision 2) SecurityCenter 5.1 Upgrade Guide November 12, 2015 (Revision 2) Table of Contents Introduction... 3 Standards and Conventions... 3 Software Requirements... 4 Supported Operating Systems... 4 Dependencies...

More information

HPE Security ArcSight Connectors

HPE Security ArcSight Connectors HPE Security ArcSight Connectors SmartConnector for Barracuda Firewall NG F- Series Syslog Configuration Guide October 17, 2017 Configuration Guide SmartConnector for Barracuda Firewall NG F-Series Syslog

More information

IMC inode Intelligent Client v7.0 (E0106) Copyright (c) Hewlett-Packard Development Company, L.P. and its licensors.

IMC inode Intelligent Client v7.0 (E0106) Copyright (c) Hewlett-Packard Development Company, L.P. and its licensors. IMC inode Intelligent Client v7.0 (E0106) Copyright (c) 2011-2014 Hewlett-Packard Development Company, L.P. and its licensors. Table of Contents 1. What's New in this Release 2. Problems Fixed in this

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

SecurityCenter Upgrade Guide. July 21, 2015 (Revision 1)

SecurityCenter Upgrade Guide. July 21, 2015 (Revision 1) SecurityCenter 5.0.1 Upgrade Guide July 21, 2015 (Revision 1) Table of Contents Introduction... 3 Standards and Conventions... 3 Software Requirements... 4 Supported Operating Systems... 4 Dependencies...

More information

Log Correlation Engine 4.0 High Performance Configuration Guide

Log Correlation Engine 4.0 High Performance Configuration Guide Log Correlation Engine 4.0 High Performance Configuration Guide July 10, 2012 (Revision 2) Copyright 2002-2012 Tenable Network Security, Inc. Tenable Network Security, Nessus and ProfessionalFeed are registered

More information

Getting Started Guide. Installation and Setup Instructions. For version Copyright 2009 Code 42 Software, Inc. All rights reserved

Getting Started Guide. Installation and Setup Instructions. For version Copyright 2009 Code 42 Software, Inc. All rights reserved Installation and Setup Instructions For version 06.11.2009 Copyright 2009 Code 42 Software, Inc. All rights reserved About This Guide This guide shows you how to install, activate and back up with CrashPlan

More information

Installing SmartSense on HDP

Installing SmartSense on HDP 1 Installing SmartSense on HDP Date of Publish: 2018-07-12 http://docs.hortonworks.com Contents SmartSense installation... 3 SmartSense system requirements... 3 Operating system, JDK, and browser requirements...3

More information

Identity Firewall. About the Identity Firewall. This chapter describes how to configure the ASA for the Identity Firewall.

Identity Firewall. About the Identity Firewall. This chapter describes how to configure the ASA for the Identity Firewall. This chapter describes how to configure the ASA for the. About the, page 1 Guidelines for the, page 7 Prerequisites for the, page 9 Configure the, page 10 Collect User Statistics, page 19 Examples for

More information

Installation and Administration Guide

Installation and Administration Guide Integrity Document Library Installation and Administration Guide Installing and using Integrity Agent for Linux 1-0277-0650-2006-03-09 Smarter Securi- Editor's Notes: 2006 Check Point Software Technologies

More information

EMC Avamar 7.3 for IBM DB2

EMC Avamar 7.3 for IBM DB2 EMC Avamar 7.3 for IBM DB2 User Guide 302-002-846 REV 01 Copyright 2001-2016 EMC Corporation. All rights reserved. Published in the USA. Published April, 2016 EMC believes the information in this publication

More information

Security Manager Policy Table Lookup from a MARS Event

Security Manager Policy Table Lookup from a MARS Event CHAPTER 17 Security Manager Policy Table Lookup from a MARS Event This chapter describes how to configure and use Security Manager and MARS so as to enable bi-directional lookup between events recieved

More information

Host Identity Sources

Host Identity Sources The following topics provide information on host identity sources: Overview: Host Data Collection, on page 1 Determining Which Host Operating Systems the System Can Detect, on page 2 Identifying Host Operating

More information

Aker Secure Roaming User's Manual

Aker Secure Roaming User's Manual Aker Secure Roaming User's Manual Introduction 1 - Installation o 1-1 System requirements o 1-2 Installation o 1-3 Removal 2 - Secure Roaming Server o 2-1 Server configuration page o 2-2 Client configuration

More information

PVS 5.1 User Guide. Last Updated: October 10, 2016

PVS 5.1 User Guide. Last Updated: October 10, 2016 PVS 5.1 User Guide Last Updated: October 10, 2016 Table of Contents PVS 5.1 User Guide 1 Welcome to PVS 1 Getting Started with PVS 2 PVS Workflow 3 Hardware Requirements 4 Software Requirements 6 Licensing

More information

PVS 4.4 User Guide. Revision April, 2016

PVS 4.4 User Guide. Revision April, 2016 PVS 4.4 User Guide Revision 2 18 April, 2016 PVS 4.4 User Guide 1 About PVS 1 Getting Started with PVS 2 Hardware Requirements 3 Software Requirements 5 Licensing Requirements 6 Install, Upgrade, Configure,

More information

EventSentry Quickstart Guide

EventSentry Quickstart Guide Contents I Part I About This Guide 2 Part II Overview 3 Part III Installing EventSentry 6 1 Installation with... Setup 7 2 Management Application... 8 3 Configuration... 9 4 Remote Update... 12 5 Heartbeat

More information

Forescout. Configuration Guide. Version 3.5

Forescout. Configuration Guide. Version 3.5 Forescout Version 3.5 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Utilities. Introduction. Working with SCE Platform Files. Working with Directories CHAPTER

Utilities. Introduction. Working with SCE Platform Files. Working with Directories CHAPTER CHAPTER 4 Revised: September 27, 2012, Introduction This chapter describes the following utilities: Working with SCE Platform Files, page 4-1 The User Log, page 4-5 Managing Syslog, page 4-8 Flow Capture,

More information

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Installing Connector on Linux

Installing Connector on Linux CHAPTER 3 Revised: July 15, 2010 Overview This chapter provides a step-by-step guide to installing the Linux Connector on x86 and x86-64 servers running either Red Hat Enterprise Linux version 5 or Cent

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Quick Installation Guide for Oracle Identity Management 11g Release 1 (11.1.1) E10033-01 May 2009 This guide is designed to help you quickly install the most common Oracle Identity

More information

Cisco Unified Operating System Administration Web Interface

Cisco Unified Operating System Administration Web Interface Cisco Unified Operating System Administration Web Interface ServerGroup, page 1 Hardware, page 2 Network Configuration, page 3 Software Packages, page 4 System, page 5 IP Preferences, page 6 Ethernet Configuration,

More information

Cisco Stealthwatch Cloud. Private Network Monitoring Advanced Configuration Guide

Cisco Stealthwatch Cloud. Private Network Monitoring Advanced Configuration Guide Cisco Stealthwatch Cloud Private Network Monitoring Advanced Configuration Guide TOC About Stealthwatch Cloud Private Network Monitor Sensor 3 Checking Your Sensor Version 4 Manually Installing the Package

More information

HPE Security ArcSight Connectors

HPE Security ArcSight Connectors HPE Security ArcSight Connectors SmartConnector for HPE H3C Syslog Configuration Guide October 17, 2017 Configuration Guide SmartConnector for HPE H3C Syslog October 17, 2017 Copyright 2012 2017 Hewlett

More information

Contents. 1 Introduction... 2 Introduction to Installing and Configuring LEI... 4 Upgrading NotesPump to LEI...

Contents. 1 Introduction... 2 Introduction to Installing and Configuring LEI... 4 Upgrading NotesPump to LEI... Contents 1 Introduction... Organization of this Manual... Related Documentation... LEI and DECS Documentation... Other Documentation... Getting Started with Lotus Enterprise Integrator... 2 Introduction

More information

Logging. About Logging. This chapter describes how to log system messages and use them for troubleshooting.

Logging. About Logging. This chapter describes how to log system messages and use them for troubleshooting. This chapter describes how to log system messages and use them for troubleshooting. About, page 1 Guidelines for, page 7 Configure, page 8 Monitoring the Logs, page 26 History for, page 29 About System

More information

AppGate 11.0 RELEASE NOTES

AppGate 11.0 RELEASE NOTES Changes in 11.0 AppGate 11.0 RELEASE NOTES 1. New packet filter engine. The server-side IP tunneling packet filter engine has been rewritten from scratch, reducing memory usage drastically and improving

More information

BIG-IP Local Traffic Management: Basics. Version 12.1

BIG-IP Local Traffic Management: Basics. Version 12.1 BIG-IP Local Traffic Management: Basics Version 12.1 Table of Contents Table of Contents Introduction to Local Traffic Management...7 About local traffic management...7 About the network map...7 Viewing

More information

Remote Access via Cisco VPN Client

Remote Access via Cisco VPN Client Remote Access via Cisco VPN Client General Information This guide describes step by step the configuration of a remote access to the Astaro Security Gateway by using the Cisco VPN Client. The Cisco VPN

More information

ExpressCluster X 2.0 for Linux

ExpressCluster X 2.0 for Linux ExpressCluster X 2.0 for Linux Installation and Configuration Guide 03/31/2009 3rd Edition Revision History Edition Revised Date Description First 2008/04/25 New manual Second 2008/10/15 This manual has

More information

Cisco Security Monitoring, Analysis and Response System 4.2

Cisco Security Monitoring, Analysis and Response System 4.2 Q&A Cisco Security Monitoring, Analysis and Response System 4.2 GENERAL Q. What is the Cisco Security Monitoring, Analysis and Response System? A. The Cisco Security Monitoring, Analysis and Response System

More information

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free: EventTracker Enterprise Install Guide 8815 Centre Park Drive Publication Date: Aug 03, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

FieldView. Management Suite

FieldView. Management Suite FieldView The FieldView Management Suite (FMS) system allows administrators to view the status of remote FieldView System endpoints, create and apply system configurations, and manage and apply remote

More information

GSS Administration and Troubleshooting

GSS Administration and Troubleshooting CHAPTER 9 GSS Administration and Troubleshooting This chapter covers the procedures necessary to properly manage and maintain your GSSM and GSS devices, including login security, software upgrades, GSSM

More information

SecurityCenter 5.1 Administration Guide. November 12, 2015 (Revision 2)

SecurityCenter 5.1 Administration Guide. November 12, 2015 (Revision 2) SecurityCenter 5.1 Administration Guide November 12, 2015 (Revision 2) Table of Contents Introduction... 6 Standards and Conventions... 6 Abbreviations... 7 SecurityCenter Administrator Functions... 7

More information

Frequently Asked Questions About Performance Monitor

Frequently Asked Questions About Performance Monitor APPENDIXA Frequently Asked Questions About Performance Monitor The following topics answer common questions about Performance monitor and contain troubleshooting tips: Installation, page A-1 Importing,

More information

User Identity Sources

User Identity Sources The following topics describe Firepower System user identity sources, which are sources for user awareness. These users can be controlled with identity and access control policies: About, on page 1 The

More information

EMC Avamar IBM DB and Service Packs for. User Guide REV 02

EMC Avamar IBM DB and Service Packs for. User Guide REV 02 EMC Avamar IBM DB2 7.4 and Service Packs for User Guide 302-003-182 REV 02 Copyright 2001-2017 EMC Corporation All rights reserved. Published March 2017 Dell believes the information in this publication

More information

Dell EMC Avamar Backup Clients

Dell EMC Avamar Backup Clients Dell EMC Avamar Backup Clients Version 7.5.1 User Guide 302-004-281 REV 01 Copyright 2001-2017 Dell Inc. or its subsidiaries. All rights reserved. Published September 2017 Dell believes the information

More information

Plasmon Diamond Library Manager

Plasmon Diamond Library Manager Plasmon Diamond Library Manager Release Details Product Release Notes Release Name: Diamond Library Manager Release Note Number: Note091 Release Version: 2.09.31 Release Date: 1 st July 2005 Release Type:

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

Installing or Upgrading ANM Virtual Appliance

Installing or Upgrading ANM Virtual Appliance CHAPTER 2 This chapter describes how to deploy Cisco ANM Virtual Appliance 4.3 (new installation) and how to upgrade from ANM software version 4.1 or 4.2 to software version 4.3. This chapter includes

More information

Nessus Network Monitor 5.4 User Guide. Last Updated: February 20, 2018

Nessus Network Monitor 5.4 User Guide. Last Updated: February 20, 2018 Nessus Network Monitor 5.4 User Guide Last Updated: February 20, 2018 Table of Contents Nessus Network Monitor 5.4 User Guide 1 Welcome to Nessus Network Monitor 8 NNM Workflow 9 System Requirements 10

More information

CounterACT Syslog Plugin

CounterACT Syslog Plugin Version 3.2.0 Table of Contents About the Syslog Plugin... 3 Multiple Destination Syslog Server Support... 3 Receiving Event Messages... 3 Sending Syslog Messages... 4 Sending CounterACT Event Messages...

More information

Avamar EMC. Backup Clients User Guide. Version 7.4 and Service Packs REV 02

Avamar EMC. Backup Clients User Guide. Version 7.4 and Service Packs REV 02 EMC Avamar Version 7.4 and Service Packs Backup Clients User Guide 302-003-180 REV 02 Copyright 2001-2017 EMC Corporation All rights reserved. Published March 2017 Dell believes the information in this

More information

Integrate Check Point Firewall. EventTracker v8.x and above

Integrate Check Point Firewall. EventTracker v8.x and above EventTracker v8.x and above Publication Date: March 23, 2017 Abstract This guide helps you in configuring Check Point and EventTracker to receive Check Point events. You will find the detailed procedures

More information

HP OO 10.x Network Architecture

HP OO 10.x Network Architecture Technical white paper HP OO 10.x Network Architecture Table of Contents Overview 2 Advancing to a Scalable Model 2 The Old Model 2 The New Model 3 Configuring the New Model 4 Firewall Configuration 4 Worker

More information

HPE Security ArcSight Connectors

HPE Security ArcSight Connectors HPE Security ArcSight Connectors SmartConnector for IP Flow (NetFlow/J-Flow) Configuration Guide October 17, 2017 SmartConnector for IP Flow (NetFlow/J-Flow) October 17, 2017 Copyright 2004 2017 Hewlett

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.3.4 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5

More information

MSE System and Appliance Hardening Guidelines

MSE System and Appliance Hardening Guidelines MSE System and Appliance Hardening Guidelines This appendix describes the hardening of MSE, which requires some services and processes to be exposed to function properly. This is referred to as MSE Appliance

More information

HPE Security ArcSight Connectors

HPE Security ArcSight Connectors HPE Security ArcSight Connectors SmartConnector for HPE c7000 Virtual Connect Module Syslog Configuration Guide October 17, 2017 SmartConnector for HPE c7000 Virtual Connect Module Syslog October 17, 2017

More information

Failover for High Availability in the Public Cloud

Failover for High Availability in the Public Cloud This chapter describes how to configure Active/Backup failover to accomplish high availability of the Cisco ASAv in a public cloud environment, such as Microsoft Azure. About Failover in the Public Cloud,

More information

July 18, (Revision 3)

July 18, (Revision 3) 3D Tool 2.0 User Guide July 18, 2011 (Revision 3) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security,

More information

StoneGate Management Center Release Notes for Version 4.2.1

StoneGate Management Center Release Notes for Version 4.2.1 StoneGate Management Center Release Notes for Version 4.2.1 Created: July 24, 2008 Table of Contents What s New... 3 System Requirements... 4 Build Version... 5 Compatibility... 5 Installation Instructions...

More information

CimTrak Product Brief. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

CimTrak Product Brief. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides

More information

Cisco Broadband Access Center Installation Guide

Cisco Broadband Access Center Installation Guide Cisco Broadband Access Center Installation Guide Release 3.6 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

SecurityCenter 5.0 SCAP Assessments. May 28, 2015 (Revision 2)

SecurityCenter 5.0 SCAP Assessments. May 28, 2015 (Revision 2) SecurityCenter 5.0 SCAP Assessments May 28, 2015 (Revision 2) Table of Contents Overview... 3 Standards and Conventions... 3 Abbreviations... 3 Simple Assessment Procedure... 4 XCCDF Certified vs. Lower-Tier

More information

VMware AirWatch Content Gateway Guide for Linux For Linux

VMware AirWatch Content Gateway Guide for Linux For Linux VMware AirWatch Content Gateway Guide for Linux For Linux Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Upgrading CFEngine Nova A CFEngine Special Topics Handbook

Upgrading CFEngine Nova A CFEngine Special Topics Handbook Upgrading CFEngine Nova A CFEngine Special Topics Handbook CFEngine AS This document describes how software updates work in CFEngine Nova. Copyright c 2010- CFEngine AS v 1 i Table of Contents What does

More information

Postgres Enterprise Manager Installation Guide

Postgres Enterprise Manager Installation Guide Postgres Enterprise Manager Installation Guide November 3, 2013 Postgres Enterprise Manager Installation Guide, Version 4.0.0 by EnterpriseDB Corporation Copyright 2013 EnterpriseDB Corporation. All rights

More information

KACE Systems Deployment Appliance (K2000) 4.1. Administrator Guide

KACE Systems Deployment Appliance (K2000) 4.1. Administrator Guide KACE Systems Deployment Appliance (K2000) 4.1 Administrator Guide Table of Contents About the KACE Systems Deployment Appliance (K2000)... 9 Getting started... 10 Tasks for getting started using the K2000

More information

Hortonworks SmartSense

Hortonworks SmartSense Hortonworks SmartSense Installation (January 8, 2018) docs.hortonworks.com Hortonworks SmartSense: Installation Copyright 2012-2018 Hortonworks, Inc. Some rights reserved. The Hortonworks Data Platform,

More information

Configuring Security Features on an External AAA Server

Configuring Security Features on an External AAA Server CHAPTER 3 Configuring Security Features on an External AAA Server The authentication, authorization, and accounting (AAA) feature verifies the identity of, grants access to, and tracks the actions of users

More information

Forcepoint Sidewinder Control Center, Virtual Appliance. Installation Guide 5.3.x. Revision A

Forcepoint Sidewinder Control Center, Virtual Appliance. Installation Guide 5.3.x. Revision A Forcepoint Sidewinder Control Center, Virtual Appliance Installation Guide 5.3.x Revision A Table of contents 1 Virtual Appliance requirements...3 Two Control Center options...3 Sizing guidelines... 3

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

CA Agile Central Administrator Guide. CA Agile Central On-Premises

CA Agile Central Administrator Guide. CA Agile Central On-Premises CA Agile Central Administrator Guide CA Agile Central On-Premises 2018.1 Table of Contents Overview... 3 Server Requirements...3 Browser Requirements...3 Access Help and WSAPI...4 Time Zone...5 Architectural

More information

Videoscape Distribution Suite Software Installation Guide

Videoscape Distribution Suite Software Installation Guide First Published: August 06, 2012 Last Modified: September 03, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

Log Correlation Engine 3.6 Architecture Guide

Log Correlation Engine 3.6 Architecture Guide Log Correlation Engine 3.6 Architecture Guide August 19, 2011 (Revision 5) The newest version of this document is available at the following URL: http://cgi.tenable.com/lce_3.6_architecture.pdf Copyright

More information

PXM45 Backup Boot Procedures

PXM45 Backup Boot Procedures APPENDIX B 2 When a PXM45 card starts up, it first loads the boot software on the card. If the PXM45 cannot load the runtime firmware, the card continues to run the boot software in what is called backup

More information

Configuring the Cisco NAM 2220 Appliance

Configuring the Cisco NAM 2220 Appliance CHAPTER 5 This section describes how to configure the Cisco NAM 2220 appliance to establish network connectivity, configure IP parameters, and how to perform other required administrative tasks using the

More information

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

PrepAwayExam.   High-efficient Exam Materials are the best high pass-rate Exam Dumps PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 250-530 Title : Administration of Symantec Network Access Control 12.1 Vendors : Symantec

More information

Log Sources Users Guide

Log Sources Users Guide Security Threat Response Manager Release 2010.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2011-10-10 Copyright Notice Copyright 2011

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

Teradici PCoIP Connection Manager 1.8 and Security Gateway 1.14

Teradici PCoIP Connection Manager 1.8 and Security Gateway 1.14 Teradici PCoIP Connection Manager 1.8 and Security Gateway 1.14 TER1502010/A-1.8-1.14 Contents Document History 4 Who Should Read This Guide? 5 PCoIP Connection Manager and PCoIP Security Gateway Overview

More information

CheckPoint q. Exam Code: Exam Name: Check Point Security Administration Featuring GAiA R77

CheckPoint q. Exam Code: Exam Name: Check Point Security Administration Featuring GAiA R77 CheckPoint.156-215.77.350q Number: 156-215.77 Passing Score: 800 Time Limit: 120 min File Version: 12.5 Exam Code: 156-215.77 Exam Name: Check Point Security Administration Featuring GAiA R77 Exam A QUESTION

More information