101communication LLC CertCities.com -- The Ultimate Site for Certified IT Professionals
   Certification Communities:  Home  Microsoft®  Cisco®  Oracle®  A+/Network+"  Linux/Unix  More  
    CertCities.com is proud to present our sponsor this month: Thomson Prometric
Editorial
Choose a Cert
News
Exam Reviews
Features
Columns
Salary Surveys
Free Newsletter
Cert on the Cheap
Resources
Forums
Practice Exams
Cert Basics
Links Library
Tips
Pop Quiz
Industry Releases
Windows Certs
Job Search
Conferences
Contributors
About Us
Search


Advanced Search
CertCities.com

CertCities.com
Let us know what you
think! E-mail us at:
.. Home .. Certifications .. Cisco .. Columns ..Cisco Column Thursday, August 21, 2003

TechMentor Conference & Expo PDF Brochure - Download It Now!

Save 30% on CertCities.com's Guide to IT Certification on the Cheap

 Link State Update   Eric Quinn
Eric Quinn



 Bad Packets!
Tips on using IDS software and hardware to sniff out unwanted traffic on your network.
by Eric Quinn , courtesy of TCPMag.com
8/2/2001 -- Intrusion detection is the process of finding bad packets on your network. A device is going to sit on your LAN and monitor all the packets that it can see. Beyond the sniffer capabilities though, An Intrusion Detection System (IDS) device will take the packets it grabs and compare them to the signatures of undesirable packets.

IDS devices can be network appliances or they can be software solutions. An example of a software-based IDS is BlackIce Defender, which serves as an IDS device for a PC. Another example would be Snort, a software-based IDS using the GNU General Public License for both Linux and Windows 2000.

An appliance would be a combination of hardware and software, like the 4200 series IDS sensors by Cisco.

Firewalls can keep out undesirable packets based on lots of criteria, but they only go so far. If you have a DMZ interface configured on a PIX, and you’re allowing HTTP traffic to come from the outside to go to the DMZ because that's where your Web server is, then you're allowing all sorts of Web traffic. Your firewall isn't going to look inside the packet and determine that just because a certain character string exists, the packet should be denied. The PIX doesn't subscribe to any of the security newsletters letting it know what the latest IIS exploits are.

An IDS is going to be able to look inside those HTTP packets and compare the contents to all of the strings for HTTP. If the next exploit says, "Hackers can take down a Web server by typing http://www.target.com/crashme!" then you can have your IDS look for HTTP packets that contain the text string of "crashme!"

Even better, the Cisco IDS sensor can be configured to talk to a Cisco router and configure an extended access list to keep out that traffic. In the case of a text string inside an HTTP packet, the router would filter out all HTTP traffic from the source to the destination.

Cisco has three IDS products, the 4210, the 4230 and the 6000 IDS blade. The 4200s are network appliances; there are no user-upgradeable parts. The 4210 can monitor up to 45mbps worth of traffic and is suited for monitoring WAN connections after they pass through the perimeter router. The 4230 can monitor 100mbps worth of traffic. Both have two interfaces, one for monitoring and one for control. Cisco used to make a token ring version called the 4220 but it was "End of Life'd" (EOL) late last year. The IDS blade for the 6000 series switch can monitor VLAN traffic within the 6000/6500 as long as the switch is equipped with a policy feature card (PFC).

A 4200 IDS sensor will be configured to monitor traffic on the monitor port, which doesn’t have an IP address. The control port has an IP address and is how the sensor communicates with the management GUI as well as any router it needs to talk to. While the GUI isn't absolutely necessary since the sensor runs on Solaris and everything can be configured through the command line, many people are much more comfortable using the GUI since they get reports. A GUI is available for Solaris, HP-UX and Windows NT. One for Windows 2000 should be released soon.

The GUI allows you to receive information regarding what's going on on your network. You can configure the sensor to do several things when it detects an unwanted packet (although if you’re using the IDS blade, you lose several abilities). One of the better functions of the GUI is report writing. It can generate several types of reports -- ranging from deeply technical to executive overview -- about the packets it has seen on the network.

The down side to the Cisco IDS product line is the amount of data it can deal with. None of Cisco's products can handle more than 100mbps. This isn't much of a problem with the 6000 switch blade because you can be very particular about the type of traffic the blade looks at; but if you have a fabric-enabled switch, you can easily flood out the blade. Other vendors have products that support much higher throughput and it’s my hope that Cisco IDS devices soon will as well. Finally, if you want to monitor a gigabit connection, you can only do so with the blade. Cisco doesn’t make gigabit ports with the 4200 series devices.

Do you have IDS tips to share? Questions about this topic? Post your comments below!


Eric Quinn, CCNP, CCDP, CCSI, is a security instructor and consultant. He is also co-author of the CCNP Remote Access Exam Cram by Coriolis Press. He writes the “Link State Update” column for TCPmag.com, and is a contributing editor for CertCities.com. Reach him at .

 

More articles by Eric Quinn:

Post your comment below, or better yet, go to our Discussion Forums and really post your mind.
Current CertCities.com user Comments for "Bad Packets!"
1/9/02 - Anonymous says: Does the IDS Blade monitor just the switch or the entire network?
2/15/02 - Dave Warde  from Central New Jersey says: We had two Cisco IDS sensors at my last company (sniff, sniff...now a dot goner!). We were still in the post installation "shake-down" phase and were swamped with data, most of it false alarms. From your perspective, is signature based IDS getting any better? Thanks
Add your comment here:
Name: (optional)
Location: (optional)
E-mail Address: (optional)
Comments:  
 
top

Sponsored Link:
Don’t let your IT Investment Go to Waste: Get Certified with Thomson Prometric!

Home | Microsoft | Cisco | Oracle | A+/Network+ | Linux/Unix | MOUS | List of Certs
Advertise | Certification Basics | Conferences | Contact Us | Contributors | Features | Forums | Links | News | Pop Quiz | Industry Releases | Reviews | Tips
Search | Site Map | MCPmag.com | TCPmag.com | OfficeCert.com | TechMentor Conferences | 101communications | Privacy Policy
This Web site is not sponsored by, endorsed by or affiliated with Cisco Systems, Inc., Microsoft Corp., Oracle Corp., The Computing Technology Industry Association, Linus Torvolds, or any other certification or technology vendor. Cisco® and Cisco Systems® are registered trademarks of Cisco Systems, Inc. Microsoft, Windows and Windows NT are either registered trademarks or trademarks of Microsoft Corp. Oracle® is a registered trademark of Oracle Corp. A+®, i-Net+™, Network+™, and Server+™ are trademarks and registered trademarks of The Computing Technology Industry Association. (CompTIA). Linux™ is a registered trademark of Linus Torvalds. All other trademarks belong to their respective owners.
All content copyright 2000-03 101communications LLC, unless otherwise noted. All rights reserved.
Reprints allowed with written permission from the publisher. For more information, e-mail