Extreme Networks Security Risk Manager Adapter Configuration Guide
|
|
|
- Maria Walsh
- 10 years ago
- Views:
Transcription
1 Extreme Networks Security Risk Manager Adapter Configuration Guide Published July 2015
2 Copyright All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make changes in specifications and other information contained in this document and its website without prior notice. The reader should in all cases consult representatives of Extreme Networks to determine whether any such changes have been made. The hardware, firmware, software or any specifications described or referred to in this document are subject to change without notice. Trademarks Extreme Networks and the Extreme Networks logo are trademarks or registered trademarks of Extreme Networks, Inc. in the United States and/or other countries. All other names (including any product names) mentioned in this document are the property of their respective owners and may be trademarks or registered trademarks of their respective companies/owners. For additional information on Extreme Networks trademarks, please see: Support For product support, including documentation, visit: documentation/ For information, contact: Extreme Networks, Inc. 145 Rio Robles San Jose, California USA
3 Table of Contents Introduction to configuring adapters for Risk Manager... 4 Conventions...4 Providing Feedback to Us... 5 Getting Help... 6 Related Publications...6 Chapter 1: Adapters overview...8 Types of adapters...8 Chapter 2: Installing adapters Uninstalling an adapter Chapter 3: Methods for adding network devices Adding a network device Adding devices managed by a Juniper Networks NSM console...14 Adding devices managed by a CPSMS console...15 Adding devices managed by SiteProtector...17 Chapter 4: Supported adapters BIG-IP Check Point SecurePlatform Appliances...22 Check Point Security Management Server adapter...23 Cisco CatOS...24 Cisco IOS...25 Cisco Nexus...26 Cisco Security Appliances Fortinet FortiOS HP Networking ProVision...32 Juniper Networks JUNOS Juniper Networks NSM...35 Juniper Networks ScreenOS...36 Palo Alto...37 Sourcefire 3D Sensor...38 Index...40 Extreme Networks Security Risk Manager Adapter Configuration Guide 3
4 Introduction to configuring adapters for Risk Manager Extreme Networks Security Risk Manager is an appliance that is used to monitor device configurations, simulate changes to your network environment, and prioritize risks and vulnerabilities. Intended audience Network administrators who are responsible for installing and configuring adapters must be familiar with network security concepts and device configurations. Statement of good security practices IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. Extreme Networks systems, products and services are designed to be part of a lawful comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. EXTREME NETWORKS DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. Note Use of this Program may implicate various laws or regulations, including those related to privacy, data protection, employment, and electronic communications and storage. Extreme Networks Security Analytics may be used only for lawful purposes and in a lawful manner. Customer agrees to use this Program pursuant to, and assumes all responsibility for complying with, applicable laws, regulations and policies. Licensee represents that it will obtain or has obtained any consents, permissions, or licenses required to enable its lawful use of Extreme Networks Security Analytics. Conventions This section discusses the conventions used in this guide. Text Conventions The following tables list text conventions that are used throughout this guide. Extreme Networks Security Risk Manager Adapter Configuration Guide 4
5 Introduction to configuring adapters for Risk Manager Table 1: Notice Icons Icon Notice Type Alerts you to... Tip Helpful tips for using the product. Note Important features or instructions. Caution Risk of personal injury, system damage, or loss of data. Warning Risk of severe personal injury. New This command or section is new for this release. Table 2: Text Conventions Convention Screen displays This typeface indicates command syntax, or represents information as it appears on the screen. The words enter and type [Key] names Words in italicized type When you see the word enter in this guide, you must type something, and then press the Return or Enter key. Do not press the Return or Enter key when an instruction simply says type. Key names are written with brackets, such as [Return] or [Esc]. If you must press two or more keys simultaneously, the key names are linked with a plus sign (+). Example: Press [Ctrl]+[Alt]+[Del] Italics emphasize a point or denote new terms at the place where they are defined in the text. Italics are also used when referring to publication titles. Terminology When features, functionality, or operation is specific to a switch family, the family name is used. Explanations about features and operations that are the same across all product families simply refer to the product as the "switch." Providing Feedback to Us We are always striving to improve our documentation and help you work better, so we want to hear from you! We welcome all feedback but especially want to know about: Content errors or confusing or conflicting information. Ideas for improvements to our documentation so you can find the information you need faster. Broken links or usability issues. Extreme Networks Security Risk Manager Adapter Configuration Guide 5
6 Introduction to configuring adapters for Risk Manager If you would like to provide feedback to the Extreme Networks Information Development team about this document, please contact us using our short online feedback form. You can also us directly at Getting Help If you require assistance, contact Extreme Networks Global Technical Assistance Center using one of the following methods: Web Phone (toll-free in U.S. and Canada) or For the Extreme Networks support phone number in your country: To expedite your message, enter the product name or model number in the subject line. Before contacting Extreme Networks for technical support, have the following information ready: Your Extreme Networks service contract number A description of the failure A description of any action(s) already taken to resolve the problem (for example, changing mode switches or rebooting the unit) The serial and revision numbers of all involved Extreme Networks products in the network A description of your network environment (such as layout, cable type, other relevant environmental information) Network load and frame size at the time of trouble (if known) The device history (for example, if you have returned the device before, or if this is a recurring problem) Any previous Return Material Authorization (RMA) numbers Related Publications The Extreme Security product documentation listed below can be downloaded from documentation.extremenetworks.com. Extreme Security Analytics Threat Protection Extreme Networks Security API Reference Guide Extreme Networks Security Application Configuration Guide Extreme Networks Security Ariel Query Language Guide Extreme Networks Security DSM Configuration Guide Extreme Security DSM Configuration Guide Addendum Extreme Networks Security Hardware Guide Extreme Networks Security Installation Guide Extreme Networks Security Juniper NSM Plug-in User Guide Extreme Networks Security Log Manager Administration Guide Extreme Networks Security Risk Manager Adapter Configuration Guide 6
7 Introduction to configuring adapters for Risk Manager Extreme Networks Security Log Sources User Guide Extreme Networks Security Managing Log Sources Guide Extreme Networks Security Offboard Storage Guide Extreme Security Release Notes Extreme Networks Security Risk Manager Adapter Configuration Guide Extreme Networks Security Risk Manager Getting Started Guide Extreme Networks Security Risk Manager Installation Guide Extreme Networks Security Risk Manager Migration Guide Extreme Networks Security Risk Manager User Guide Extreme Networks Security Troubleshooting System Notifications Guide Extreme Networks Security Upgrade Guide Extreme Networks Security Vulnerability Manager Release Notes Extreme Networks Security Vulnerability Manager User Guide Extreme Networks Security WinCollect User Guide Extreme Networks SIEM Administration Guide Extreme Networks SIEM Getting Started Guide Extreme Networks SIEM High Availability Guide Extreme Networks SIEM Troubleshooting Guide Extreme Networks SIEM Tuning Guide Extreme Networks SIEM Users Guide Migrating Extreme Security Log Manager to Extreme SIEM Extreme Security Threat Protection Extreme Security Intrusion Prevention System Hardware Replacement Guide Extreme Security Threat Protection Release Notes Extreme Networks Security Risk Manager Adapter Configuration Guide 7
8 1 Adapters overview Types of adapters Use adapters to integrate Extreme Networks Security Risk Manager with your network devices. By configuring adapters, Risk Manager can interrogate and import the configuration parameters of network devices, such as firewalls, routers, and switches. Note You cannot import devices that use a management server IP, for example, CPSMS and Extreme Networks Internet Security Systems GX. Network topology and configuration Risk Manager uses adapters to collect network configurations. The adapters turn the configuration information into a format that is unified for all supported device models, manufacturers, and types. Risk Manager uses the data to understand your network topology and configuration of your network devices. To connect external devices in the network, Risk Manager must be able to access the devices. Risk Manager uses configured user credentials to access the device and download configurations. Process for integrating network devices To integrate network devices with Risk Manager, follow these steps: 1 Configure your network device with appropriate access to Risk Manager. 2 Install the appropriate adapter for your network device on your Risk Manager appliance. 3 Use Configuration Source Management to add your network devices to Risk Manager. 4 Define the communication method (protocol) required for communication to your network devices. For more information, see the Extreme Networks Security Risk Manager User Guide. If Risk Manager and your network devices cannot communicate, see the disconnected configuration toolkit information in the Extreme Networks Security Risk Manager User Guide. Types of adapters Extreme Networks Security Risk Manager supports several types of adapters. The following adapters are supported: BIG-IP Check Point SecurePlatform Appliances Extreme Networks Security Risk Manager Adapter Configuration Guide 8
9 Adapters overview Check Point Security Management Server Cisco Catalyst (CatOS) Cisco Internet Operating System (IOS) Cisco Nexus Cisco Security Appliances Fortinet FortiOS HP Networking ProVision Juniper Networks ScreenOS Juniper Networks JUNOS Juniper Networks NSM Palo Alto Sourcefire 3D Sensor Extreme Networks Security Risk Manager Adapter Configuration Guide 9
10 2 Installing adapters Uninstalling an adapter You must download the adapter files to your Extreme Networks SIEM Console, and then copy them to Extreme Networks Security Risk Manager. After you establish the initial connection, Extreme Networks SIEM Console is the only device that can communicate directly with Risk Manager. 1 Using SSH, log in to your Extreme Networks SIEM Console as the root user. 2 Download the compressed file for the Risk Manager adapters from Fix Central ( support/fixcentral/) to your Extreme Networks SIEM Console. 3 To copy the compressed file from your Extreme Networks SIEM Console to Risk Manager, type the following command: scp adapters.zip root@ip_address: The IP_address option is the IP address or host name of Risk Manager. For example: scp adapters.bundle zip root@ : 4 On your Risk Manager appliance, type the password for the root user. 5 Using SSH from your Extreme Networks SIEM Console, log in to your Risk Manager appliance as the root user. 6 To unpack and install the adapters, type the following commands from the root directory that contains the compressed file: unzip adapters.zip rpm -Uvh *.rpm For example: unzip adapters.bundle zip rpm -Uvh *.rpm 7 To restart the services for the ziptie server and complete the installation, type the following command: service ziptie-server restart Important Restarting the services for the ziptie server interrupts any device backups that are in progress from Configuration Source Management. Extreme Networks Security Risk Manager Adapter Configuration Guide 10
11 Installing adapters Uninstalling an adapter Use the rpm command to remove an adapter from Extreme Networks Security Risk Manager. 1 Using SSH, log in to the Extreme Networks SIEM Console as the root user. 2 To uninstall an adapter, type the following command: rpm -e adapter file Example rpm -e adapters.cisco.ios-2011_ noarch.rpm Extreme Networks Security Risk Manager Adapter Configuration Guide 11
12 3 Methods for adding network devices Adding a network device Adding devices managed by a Juniper Networks NSM console Adding devices managed by a CPSMS console Adding devices managed by SiteProtector Use Configuration Source Management to add network devices to Extreme Networks Security Risk Manager. The following table describes the methods that you can use to add a network device. Table 3: Methods for adding a network device to Risk Manager Method Add Device Discover Devices Discover NSM Add one device. Add multiple devices. Add devices that are managed by a Juniper Networks NSM console. Discover CPSMS From SiteProtector Add devices that are managed by a Check Point Security Manager Server (CPSMS). Discover Add devices from SiteProtector. Adding a network device To add a network device to Extreme Networks Security Risk Manager, use Configuration Source Management. Review the supported software versions, credentials, and required commands for your network devices. For more information, see Supported adapters on page Click the Admin tab. 2 On the Admin navigation menu, click Plug-ins 3 On the Risk Manager pane, click Configuration Source Management. 4 On the navigation menu, click Credentials. Extreme Networks Security Risk Manager Adapter Configuration Guide 12
13 Methods for adding network devices 5 On the Network Groups pane, click Add a new network group. a b Type a name for the network group, and click OK. Type the IP address of your device, and click Add. You can type an IP address, a range of IP addresses, a CIDR subnet, or a wildcard. Use a wildcard type 10.1.*.* or to use a CIDR, type /24. c d Restriction Do not replicate device addresses that exist in other network groups in Configuration Source Management. Ensure that the addresses that you add are displayed in the Network address box beside the Add address box. Repeat the previous two steps for each IP address that you want to add. 6 On the Credentials pane, click Add a new credential set. a b Type a name for the credential set, and click OK. Select the name of the credential set that you created and enter values for the parameters. The following table describes the parameters. Table 4: Parameter options for credentials Parameter Username Password Enable Password SNMP Get Community SNMPv3 Authentication Username A valid user name to log in to the adapter. For adapters, the user name and password that you provide requires access to several files, such as the following files: rule.c objects.c implied_rules.c Standard.PF The password for the device. The password for second-level authentication. This password is required when the credentials prompt for the user credentials in expert mode. Optional Optional Extreme Networks Security Risk Manager Adapter Configuration Guide 13
14 Methods for adding network devices Table 4: Parameter options for credentials (continued) Parameter SNMPv3 Authentication Password SNMPv3 Privacy Password Optional Optional The protocol that is used to decrypt SNMPv3 traps. Restriction If your network device meets one of the following conditions, you must configure protocols in Configuration Source Management: Your device uses a non-standard port for the communication protocol. You want to configure the protocol that Extreme Networks Security Risk Manager uses to communicate with specific IP addresses. For more information about configuring sources in the Extreme Networks Security Risk Manager User Guide. 7 On the navigation menu, add a device. To add one network device, click Add Device. To add multiple IP addresses for network devices, select Discover Devices. 8 Enter the IP address for the device and select the adapter type, and then click Add. A blue question mark is displayed in the device list for devices that are not backed up. 9 Select the device that you added to the device list, and click Backup. 10 Repeat these steps for each type of network device that you want to add. After you add all of the required devices, you can configure protocols. For more Extreme Networks Security Risk Manager User Guide. Adding devices managed by a Juniper Networks NSM console Use Configuration Source Management to add all devices from a Juniper Networks NSM console to Extreme Networks Security Risk Manager. Review the supported software versions, credentials, and required commands for your network devices. For more information, see Supported adapters on page In Extreme SIEM, click the Admin tab. 2 On the Admin navigation menu, click Plug-ins 3 On the Risk Manager pane, click Configuration Source Management. 4 On the navigation menu, click Credentials. Extreme Networks Security Risk Manager Adapter Configuration Guide 14
15 Methods for adding network devices 5 On the Network Groups pane, click Add a new network group. a b Type a name for the network group, and click OK. Type the IP address of your device, and click Add. You can type an IP address, a range of IP addresses, a CIDR subnet, or a wildcard. Use a wildcard type 10.1.*.* or to use a CIDR, type /24. c d Restriction Do not replicate device addresses that exist in other network groups in Configuration Source Management. Ensure that the addresses that you add are displayed in the Network address box beside the Add address box. Repeat the previous two steps for each IP address that you want to add. 6 On the Credentials pane, click Add a new credential set. a b Type a name for the credential set, and click OK. Select the name of the credential set that you created and enter values for the parameters. The following table describes the parameters. Table 5: Parameter options for Juniper NSM web services credentials Parameter Username Password A valid user name to log in to the Juniper NSM web services. For Juniper NSM web services, this user must be able to access the Juniper NSM server. The password for the device. Enable Password Not required. Restriction Juniper Networks NSM does not support SNMP. 7 On the navigation menu, Discover from NSM. 8 Enter values for the IP address and user credentials, click OK and then click GO. 9 Select the device that you added to the device list, and click Backup and then click Yes. After you add all of the required devices, you can configure protocols. For more information, see the Extreme Networks Security Risk Manager User Guide. Adding devices managed by a CPSMS console Use Configuration Source Management to add all devices from a Check Point Security Manager Server (CPSMS) to Extreme Networks Security Risk Manager. Review the supported software versions, credentials, and required commands for your network devices. For more information, see Supported adapters on page 19. Extreme Networks Security Risk Manager Adapter Configuration Guide 15
16 Methods for adding network devices You must obtain the OPSEC Entity SIC name, OPSEC Application Object SIC name, and the one-time password for the Pull Certificate password before you begin this procedure. For more information, see your CPSMS documentation. Note The Device Import feature is not compatible with CPSMS adapters. You need to repeat this procedure for each CPSMS that you want to contact to initiate discovery of its managed firewalls. 1 Click the Admin tab. 2 On the Admin navigation menu, click Plug-ins 3 On the Risk Manager pane, click Configuration Source Management. 4 On the navigation menu, click Credentials. 5 On the Network Groups pane, click Add a new network group. a b c Type a name for the network group, and click OK. Type the IP address of your CPSMS device, and click Add. Restriction Do not replicate device addresses that exist in other network groups in Configuration Source Management. Ensure that the addresses that you add are displayed in the Network address box beside the Add address box. 6 On the Credentials pane, click Add a new credential set. a b Type a name for the credential set, and click OK. Select the name of the credential set that you created and type a valid user name and password for the device. 7 Type the OPSEC Entity SIC name of the CPSMS that manages the firewall devices to be discovered. This value MUST be exact and the format changes depending on the type of device from which you are discovering: Type Management Server Gateway to Management Server Name CN=cp_mgmt,O=<take O value from DN field> CN=cp_mgmt_<gateway hostname>,o=<take O value from DN field> For example, when you are discovering from the Management Server: OPSEC Application DN: CN=cpsms226,O=vm226-CPSMS..bs7ocx OPSEC Application Host: vm226-cpsms The Entity SIC Name is CN=cp_mgmt,O=vm226-CPSMS..bs7ocx For example, when you are discovering from the Gateway to Management Server: OPSEC Application DN: CN=cpsms230,O=vm226-CPSMS..bs7ocx OPSEC Application Host: vm230-cpsms2-gw3 The Entity SIC Name is CN=cp_mgmt_vm230-CPSMS2-GW3,O=vm226-CPSMS..bs7ocx Extreme Networks Security Risk Manager Adapter Configuration Guide 16
17 Methods for adding network devices 8 Use the Check Point SmartDashboard application to enter the OPSEC Application Object SIC name that was created on the CPSMS. For example: CN=cpsms230,O=vm226-CPSMS..bs7ocx 9 Obtain the OPSEC SSL Certificate: a b c d Click Get Certificate. In the Certificate Authority IP field, type the IP address. In the Pull Certificate Password field, type the one-time password for the OPSEC Application. Click OK. 10 Click OK. 11 Click Discover From Check Point SMS, and then enter the CPSMS IP address. 12 Click OK. 13 Repeat these steps for each CPSMS device that you want to add. After you add all the required devices you can backup your devices and then view them in the topology. Adding devices managed by SiteProtector Use Configuration Source Management to add devices from SiteProtector to Extreme Networks Security Risk Manager. The Extreme Networks Internet Security Systems GX and IBM Security SiteProtector System adapters must be installed before you can add devices. The Microsoft SQL protocol must be enabled to use Microsoft SQL Server port Click the Admin tab. 2 On the Admin navigation menu, click Plug-ins. 3 On the Risk Manager pane, click Configuration Source Management. 4 On the navigation menu, click Credentials. 5 On the Network Groups pane, click Add a new network group. a b c Type a name for the network group, and click OK. Type the IP address of your SiteProtector device, and click Add. Ensure that the addresses that you add are displayed in the Network address box beside the Add address box. 6 On the Credentials pane, click Add a new credential set. a b 7 Click OK. Type a name for the credential set, and click OK. Select the name of the credential set that you created and type a valid user name and password for the device. Restriction The user name and password are the same credentials used to access the SiteProtector Microsoft SQL Server database. 8 Click Discover From SiteProtector, and then enter the SiteProtector IP address. 9 Click OK. Extreme Networks Security Risk Manager Adapter Configuration Guide 17
18 Methods for adding network devices After you add all the required devices you can backup your devices and then view them in the topology. Extreme Networks Security Risk Manager Adapter Configuration Guide 18
19 4 Supported adapters BIG-IP Check Point SecurePlatform Appliances Check Point Security Management Server adapter Cisco CatOS Cisco IOS Cisco Nexus Cisco Security Appliances Fortinet FortiOS HP Networking ProVision Juniper Networks JUNOS Juniper Networks NSM Juniper Networks ScreenOS Palo Alto Sourcefire 3D Sensor Extreme Networks Security Risk Manager integrates with many manufacturers and vendors of security products. The list of supported adapters and documentation for them is constantly growing. If an adapter for your network device is not listed, contact your Extreme Networks sales representative. The following information is provided for each supported adapter: Supported versions Specifies the product name and version supported. Supports neighbor data SNMP discovery Specifies whether neighbor data is supported for this adapter. If your device supports neighbor data, then you get neighbor data from a device by using Simple Network Management Protocol (SNMP) and a command-line interface (CLI). Specifies whether the device allows discovery by using SNMP. Generic SNMP devices do not have routes and therefore, do not transmit traffic. Required credential parameters Specifies the necessary access requirements for Risk Manager and the device to connect. You can use Configuration Source Management to configure device credentials. Ensure that the device credentials configured in Risk Manager and in the device are the same. Extreme Networks Security Risk Manager Adapter Configuration Guide 19
20 Supported adapters If a parameter is not required, you can leave that field blank. Connection protocols Specifies the supported protocols for the network device. Required commands Specifies the list of commands that the adapter requires to log in and collect data. To run the listed commands on the adapter, the credentials that are provided in Risk Manager must have the appropriate privileges. Files collected Specifies the list of files that the adapter must be able to access. To access these files, the appropriate credentials must be configured for the adapter. BIG-IP Extreme Networks Security Risk Manager supports the BIG-IP adapter. The following table describes the integration requirements for the BIG-IP adapter. Table 6: Integration requirements for the BIG-IP adapter Integration requirement Versions Neighbor data support SNMP discovery Required credential parameters Connection protocols Commands that the adapter requires to log in and collect data BIG-IP version 10 and later. Supported Matches BIG-IP in SNMP sysdescr. Username Password Telnet SSH cat filename dmesg uptime route -n ip addr list snmpwalk -c public localhost snmpwalk -c public localhost Extreme Networks Security Risk Manager Adapter Configuration Guide 20
21 Supported adapters Table 6: Integration requirements for the BIG-IP adapter (continued) Integration requirement Commands that the adapter requires to log in and collect bigpipe data Commands that the adapter requires to log in and collect data Commands that the adapter requires to log in and collect tmsh data bigpipe global bigpipe system hostname bigpipe platform bigpipe version show bigpipe db packetfilter bigpipe db packetfilter.defaultaction bigpipe packet filter list bigpipe nat list all bigpipe vlan show all bigpipe vlangroup list all bigpipe vlangroup bigpipe interface show all bigpipe interface all media speed bigpipe trunk all interfaces bigpipe stp show all bigpipe route all list all bigpipe mgmt show all bigpipe mgmt route show all bigpipe pool bigpipe self bigpipe virtual list all bigpipe snat list all bigpipe snatpool list all b db snat.anyipprotocol tmsh -q list sys global-settings hostname tmsh -q show sys version tmsh -q show sys hardware tmsh -q list sys snmp sys-contact tmsh -q show sys memory tmsh -q list /net interface all-properties tmsh -q list net trunk tmsh -q list /sys db packetfilter tmsh -q list /sys db packetfilter.defaultaction tmsh -q list /net packet-filter tmsh -q list /net vlan all-properties tmsh -q show /net vlan tmsh -q list /net vlan-group all all-properties tmsh -q list net tunnels Extreme Networks Security Risk Manager Adapter Configuration Guide 21
22 Supported adapters Table 6: Integration requirements for the BIG-IP adapter (continued) Integration requirement Commands that the adapter requires to log in and collect tmsh data (continued) Files collected tmsh -q show /net vlan-group tmsh -q list ltm virtual tmsh -q list ltm nat tmsh -q list ltm snatpool tmsh -q list ltm snat tmsh -q list sys db snat.anyipprotocol tmsh -q list net stp-globals all-properties tmsh -q list net stp priority tmsh -q list net stp all-properties tmsh -q list net route tmsh -q list sys management-ip tmsh -q list sys management-route tmsh -q list ltm pool tmsh -q list net self tmsh -q list net ipsec /config/bigip.license /config/snmp/snmpd.conf /etc/passwd Check Point SecurePlatform Appliances Extreme Networks Security Risk Manager supports the Check Point SecurePlatform Appliances adapter. The following table describes the integration requirements for the Check Point SecurePlatform Appliances adapter. Table 7: Integration requirements for the Check Point SecurePlatform Appliances adapter Integration requirement Versions Versions R65 and later Restriction Nokia IPSO appliances are not supported for backup. Neighbor data support SNMP discovery Required credential parameters Connection protocols Not supported Matches NGX in SNMP sysdescr. Username Password Enable Password (expert mode) Telnet SSH Extreme Networks Security Risk Manager Adapter Configuration Guide 22
23 Supported adapters Table 7: Integration requirements for the Check Point SecurePlatform Appliances adapter (continued) Integration requirement Commands that the adapter requires to log in and collect data Files collected hostname dmidecode ver uptime dmesg route -n show users ifconfig -a echo $FWDIR rules.c objects.c implied_rules.c Standard.pf snmpd.com Check Point Security Management Server adapter You use the Check Point Security Management Server (CPSMS) adapter to discover and backup end nodes that are managed by the CPSMS. These end nodes are used to run the CheckPoint FireWall-1 and the VPN-1 product family. The CPSMS adapter is based on the CPMI OPSEC SDK API library. Forward compatibility for CPMI connections CPMI connections are compatible with later versions. For example, a CPMI application that uses an NG FP3 OPSEC SDK can communicate with VPN-1 NGX R60. Backward compatibility for CPMI connections CPMI connections are not compatible with an earlier version. For example, a CPMI application that uses OPSEC SDK 6.0 cannot communicate with any version of VPN-1 before NGX R60. Configuration requirements for CPSMS Two configuration requirements must be available for CPSMS. These requirements are available by default when CPSMS is installed; however, you must ensure that these requirements are retained. The CPSMS client application, cpsms_client, is in the CPSMS adapter. The cpsms_client application establishes an asymmetric authentication method through a Secure Internal Communication (SIC) channel with CPSMS. The asymmetric method is also known as the OPSEC_SSLCA method. Extreme Networks Security Risk Manager Adapter Configuration Guide 23
24 Supported adapters The asymmetric authentication method is translated into configuration requirements. You must configure and enable the Secure Internal Communication (SIC) on the firewall management server to allow the cpsms_client application to communicate with CPSMS. The following ports must be open on CPSMS: Port for the Check Point Management Interface service (or CPMI) Port for the Check Point Internal CA Pull Certificate Service (or FW1_ica_pull) If you cannot use as a listening port for CPMI, then the CPSMS adapter port number must be similar to the value listed in the $FWDIR/conf/fwopsec.conf file for CPMI on CPSMS. For example, cpmi_server auth_port To allow the cpsms_client to communicate with Check Point Management Server, the $CPDIR/conf/ sic_policy.conf on CPSMS must use the following line, at minimum: # OPSEC applications default ANY ; SAM_clients ; ANY ; sam ; sslca, local, sslca_comp # sam proxy ANY ; Modules, DN_Mgmt ; ANY; sam ; sslca ANY ; ELA_clients ; ANY ; ela ; sslca, local, sslca_comp ANY ; LEA_clients ; ANY ; lea ; sslca, local, sslca_comp ANY ; CPMI_clients; ANY ; cpmi ; sslca, local, sslca_comp Cisco CatOS Extreme Networks Security Risk Manager supports the Cisco Catalyst (CatOS)adapter. The Cisco CatOS adapter collects device configurations by backing up CatOS network devices that are viewable by Risk Manager. The following table describes the integration requirements for the Cisco CatOS adapter. Table 8: Integration requirements for the Cisco CatOS adapter Integration requirement Versions Neighbor data support SNMP discovery Catalyst 6500 series chassis devices. Restriction The adapter for CatOS backs up only the essential switching port structure. Multilayer Switch Feature Card (MSFC) CatOS adapters are backed up by Cisco IOS adapters. Firewall Services Module (FWSM) CatOS adapters are backed up by Cisco ASA adapters. Supported Required credential parameters Username Password Enable Password Matches CATOS or Catalyst Operating System in SNMP sysdescr. Extreme Networks Security Risk Manager Adapter Configuration Guide 24
25 Supported adapters Table 8: Integration requirements for the Cisco CatOS adapter (continued) Integration requirement Connection protocols Commands that the adapter requires to log in and collect data Telnet SSH show version whichboot show module show mod ver show system show flash devices show flash... show snmp ifalias show port ifindex show interface show port show spantree show ip route show vlan show vtp domain show arp show cdp show cam dynamic show port status show counters Cisco IOS Extreme Networks Security Risk Manager supports the Cisco Internet Operating System (IOS) adapter. The Cisco IOS adapter collects device configurations by backing up IOS-based network switches and routers. The following table describes the integration requirements for Cisco IOS. Table 9: integration requirements for Cisco IOS Integration requirement Versions Neighbor data support SNMP discovery Required credential parameters 10.1 and later for routers and switches Cisco Catalyst 6500 switches with MSFC. Use the Cisco IOS adapter to back up the configuration and state of the MSFC card services. If a Cisco IOS 7600 series router has an FWSM, use the Cisco ASA adapter to back up the FWSM. Supported Matches ISO or Cisco Internet Operation System in SNMP sysdescr. Username Password Enable Password Extreme Networks Security Risk Manager Adapter Configuration Guide 25
26 Supported adapters Table 9: integration requirements for Cisco IOS (continued) Integration requirement Connection protocols Commands that the adapter requires to log in and collect data show ip commands that the adapter requires to log in and collect data Telnet SSH + SCP TFTP show access lists show cdp neighbors detail show eigrp neighbors show diagbus show diag show install running show interfaces show inventory show file systems show mac-address-table dynamic show module show mod version show power show startup-config show object-group show running-config show snmp show glbp show spanning-tree show standby set terminal length show vlan show vtp status show version show vrrp show ip arp show ip bgp neighbors show ip eigrp interface show ip eigrp neighbors show ip eigrp topology show ip ospf show ip ospf neighbor show ip protocols show ipv6 neighbors show ip ospf interface show ip route eigrp Cisco Nexus To integrate Extreme Networks Security Risk Manager with your network devices, ensure that you review the requirements for the Cisco Nexus adapter. The following table describes the integration requirements for the Cisco Nexus adapter. Extreme Networks Security Risk Manager Adapter Configuration Guide 26
27 Supported adapters Table 10: Integration requirements for the Cisco Nexus adapter Integration requirement Versions Neighbor data support SNMP discovery No version restrictions Supported Matches Cisco NX-OS and an optional qualification string that ends with Software in the SNMP sysdescr. Example (Cisco NX\-OS.* Software) Required credential parameters Connection protocols Username Password Enable Password If you add virtual device contexts (VDCs) as individual devices, ensure that the required credentials can do the following actions: Access the account that is enabled for the VDCs. Use the required commands in that virtual context. Telnet SSH Extreme Networks Security Risk Manager Adapter Configuration Guide 27
28 Supported adapters Table 10: Integration requirements for the Cisco Nexus adapter (continued) Integration requirement Required thirdparty files Commands that the adapter requires to log in and collect data adapters-common _ noarch.rpm perl-net-cidr-set noarch.rpm perl-xml-twig noarch.rpm terminal length 0 show version show hostname show vdc snow snmp show module dir fs(fs is file systems on the device) show interface brief show interface snmp-ifindex show interface if (if is all of the interfaces from show interface brief with configuration sections) show running-config show startup-config show static-route show ip access-lists show object-group show vlan show vtp status show hsrp show vrrp show vtp show glbp show ip arp show mac address-table show ip route show ipv6 route show ipv6 ndp show cdp entry all switchto vdc (for all supported virtual device contexts) Methods for adding VDCs for Cisco Nexus devices Use Configuration Source Management to add Nexus network devices and Virtual Device Contexts (VDC) to Extreme SIEM. There are two ways to add multiple VDCs to Extreme Networks Security Risk Manager. You can add VDCs as sub-devices of the Nexus device or as individual devices. View Virtual Device Contexts If VDCs are added as individual devices, then each VDC is displayed as a device in the topology. If VDCs are added as a sub-device, they are not displayed in the topology. Instead, you can view the VDCs in Configuration Monitor. Extreme Networks Security Risk Manager Adapter Configuration Guide 28
29 Supported adapters Adding VDCs as sub-devices of your Cisco Nexus device Use Configuration Source Manager to add VDCs as sub-devices of your Cisco Nexus device. 1 Use Configuration Source Manager to add the admin IP address of each VDC. For more information, see Adding a network device on page Use Configuration Source Manager to obtain the configuration information for your Nexus device. For information about getting device configuration, see the Extreme Networks Security Risk Manager User Guide. 3 Enable the following commands for the user that is specified in the credentials: show vdc (at admin context) switchto vdc x, where x is the VDCs that are supported. In Configuration Monitor, you can view the Nexus device in the topology and the VDC sub-devices. For information about viewing devices, see the Extreme Networks Security Risk Manager User Guide. Adding VDCs as individual devices Use Configuration Source Manager to add each VDC as a separate device. When you use this method, the Nexus device and the VDCs are displayed in the topology When you view your Cisco Nexus device and VDCs in the topology, the chassis containment is represented separately. 1 Use Configuration Source Manager to add the admin IP address of each VDC. For more information, see Adding a network device on page Use Configuration Source Manager to obtain the configuration information for your VDCs. 3 On the Cisco Nexus device, use the Cisco Nexus CLI to disable the switchto vdc command for the user name that is associated with the adapter. Example If the user name for a Cisco Nexus device is qrmuser, type the following commands: NexusDevice(config)# role name qrmuser NexusDevice(config-role)# rule 1 deny command switchto vdc NexusDevice(config-role)# rule 2 permit command show NexusDevice(config-role)# rule 2 permit command terminal NexusDevice(config-role)# rule 2 permit command dir Cisco Security Appliances To integrate Extreme Networks Security Risk Manager with your network devices, ensure that you review the requirements for the Cisco Security Appliances adapter. The Cisco Security Appliances adapter collects device configurations by backing up Cisco family devices. The following list describes examples of the Cisco firewalls that the adapter for the Cisco Security Appliances supports: Extreme Networks Security Risk Manager Adapter Configuration Guide 29
30 Supported adapters Stand-alone Adaptive Security Appliance Firewall Service Module (FWSM) A module in a Catalyst chassis Established Private Internet Exchange (PIX) device. The following table describes the integration requirements for the Cisco Security Appliances adapter. Table 11: Integration requirements for the Cisco Security Appliances adapter Integration requirement Versions Neighbor data support SNMP discovery Required credential parameters Connection protocols Adaptive Security Appliances (ASA) that use a Private Internet Exchange operating system (PIX-OS) ASA routers or switches that use FWSM Cisco IOS 7600 series routers that use FWSM. Use the ASA adapter to back up the configuration and state of the FWSM card services. Supported Matches PIX or Adaptive Security Appliance or Firewall Service Module in SNMP sysdescr. Username Password Enable Password Telnet SSH + SCP Extreme Networks Security Risk Manager Adapter Configuration Guide 30
31 Supported adapters Table 11: Integration requirements for the Cisco Security Appliances adapter (continued) Integration requirement Commands that the adapter requires to log in and collect data Commands that the adapter requires to log in and collect data (Continued) change context change context admin-context change context context change system get startup-config show arp show context show interface show interface detail show ipv6 interface show ipv6 neighbor show mac-address-table show names show ospf neighbor show pager show route show running-config show shun show version terminal pager 0 terminal pager 24 Where The show pager command must be enabled to access accounts that use Risk Manager. The change context context command is used for each context on the ASA device. The change system command detects whether the system has multicontext configurations and determines the admin-context. The change context command is required if the change system command has a multi-context configuration or admin configuration context. The terminal pager commands are used to set and reset paging behavior. Fortinet FortiOS Extreme Networks Security Risk Manager adapter for Fortinet FortiOS supports Fortinet FortiGate appliances that run the Fortinet operating system (FortiOS). The Fortinet FortiOS adapter interacts with FortiOS over Telnet or SSH. Geography-based addresses and referenced policies are not supported by Risk Manager. Identity-based, VPN and Internet Protocol Security policies are not supported by Risk Manager. Policies that use Unified Threat Management (UTM ) profiles are not supported by the Fortinet FortiOS adapter. Currently, only Layer 3 firewall policies are supported. Extreme Networks Security Risk Manager Adapter Configuration Guide 31
32 Supported adapters The integration requirements for the Fortinet FortiOS adapter are described in table below: Integration Requirement Version Neighbor data support SNMP discovery Required credential parameters Connection protocols Commands that the adapter requires to log in and collect data 4.0 MR3 No No Username Password Telnet SSH config system console - set output standard Note The config system console and set output standard commands require a user with read/write access to System Configuration. If you use a read-only user with pagination enabled when you back up a Fortigate device, performance is impaired significantly. show system interface get hardware nic <variable> get system status get system performance status show full-configuration get router info routing-table static show firewall address get test dnsproxy 6 show firewall addrgrp get firewall service predefined <variable> show firewall service custom show firewall service group get system snmp sysinfo show system snmp community show firewall policy show system zone show firewall vip show firewall vipgrp show firewall ippool show firewall central-nat HP Networking ProVision Extreme Networks Security Risk Manager supports the HP Networking ProVision adapter. The following table describes the integration requirements for the HP Networking ProVision adapter. Extreme Networks Security Risk Manager Adapter Configuration Guide 32
33 Supported adapters Table 12: Integration requirements for the HP Networking ProVision adapter Integration requirement Versions HP Networking ProVision Switches K/KA.11.XX and later. Restriction HP switches that are on a Comware operating system are not supported by this adapter. Neighbor data support SNMP discovery Required credential parameters Connection protocols Backup operation commands that are issued by the adapter to the device Supported Matches version numbers with the format HP(.*)Switch(.*)(revision [A-Z]{1,2}\.(\d+)\.(\d+)) in sysdescr. Username Password Enable Password SSH dmesgshow system power-supply getmib show access-list vlan <vlan id> show access-list show access-list <name or number> show access-list ports <port number> show config show filter show filter <id> show running-config show interfaces brief show interfaces <interface id> For each interface. show jumbos show trunks show lacp show module show snmp-server show spanning-tree show spanning-tree config show spanning-tree instance <id or list> - for each spanning tree configured on the device show spanning-tree mst-config show system information show version show vlans show vlans <id> For each vlan. show vrrp walkmib Extreme Networks Security Risk Manager Adapter Configuration Guide 33
34 Supported adapters Table 12: Integration requirements for the HP Networking ProVision adapter (continued) Integration requirement show ip backup operation commands that are issued by the adapter to the device Telemetry and neighbor data commands show ip show ip route show ip odpf show ip odpf redistribute show ip rip show ip rip redistribute getmib show arp show cdp neighbors show cdp neighbors detail <port number> show interfaces brief show interface show ip route show lldp info remote-device show lldp info remote-device <port number> show mac-address or show mac address show system information show vlans show vlans custom id state ipaddr ipmask walkmib Juniper Networks JUNOS To integrate Extreme Networks Security Risk Manager with your network devices, ensure that you review the requirements for the Juniper Networks JUNOS adapter. The following table describes the integration requirements for the Juniper Networks JUNOS adapter. Table 13: Integration requirements for the Juniper Networks JUNOS adapter Integration requirement Versions Neighbor data support Versions 9 and later. Supported SNMP discovery Matches SNMP sysoid: Required credential parameters Username Password Extreme Networks Security Risk Manager Adapter Configuration Guide 34
35 Supported adapters Table 13: Integration requirements for the Juniper Networks JUNOS adapter (continued) Integration requirement Connection protocols Commands that the adapter requires to log in and collect data Telnet SSH + SCP show version show system uptime show chassis hardware show chassis firmware show chassis mac-address show chassis routing-engine show configuration snmp show snmp mib walk system configure show configuration firewall show configuration firewall family inet6 show configuration security show configuration security zones show interfaces show interfaces filters show ospf interface detail show bgp neighbor show configuration routing-option show arp no-resolve show ospf neighbor show rip neighbor show bgp neighbor show ipv6 neighbors Juniper Networks NSM Extreme Networks Security Risk Manager adapter supports Juniper Networks NSM. You can use the Risk Manager to back up a single Juniper Networks device or obtain device information from a Juniper Networks NSM console. The Juniper Networks NSM console contains the configuration and device information for Juniper Networks routers and switches that are managed by the Juniper Networks NSM console. The following table describes the supported environments for Juniper Networks NSM. Table 14: Risk Manager adapter supported environments for Juniper Networks NSM Supported environment Versions IDP appliances that are managed by NSM Neighbor data support Not supported SNMP discovery Not supported Extreme Networks Security Risk Manager Adapter Configuration Guide 35
36 Supported adapters Table 14: Risk Manager adapter supported environments for Juniper Networks NSM (continued) Supported environment Required credential parameters Username Password Connection protocols SOAP HTTP Juniper Networks ScreenOS To integrate Extreme Networks Security Risk Manager with your network devices, ensure that you review the requirements for the Juniper Networks ScreenOS adapter. The following table describes the integration requirements for the Juniper Networks ScreenOS adapter. Table 15: integration requirements for the Juniper Networks ScreenOS adapter Integration requirement Versions Neighbor data support SNMP discovery Required credential parameters Connection protocols Firewalls that use a ScreenOS operating system Supported Matches netscreen or SSG in SNMP sysdescr. Username Password Telnet SSH Extreme Networks Security Risk Manager Adapter Configuration Guide 36
37 Supported adapters Table 15: integration requirements for the Juniper Networks ScreenOS adapter (continued) Integration requirement Commands that the adapter requires to log in and collect data Commands that the adapter requires to log in and collect data (continued). set console page 0 get system get config get snmp get memory get file info get file get service get group address zone group get address get service group get service group variable get interface get interface variable get policy all get policy id variable get admin user get route get arp get mac-learn get counter statistics interface variable Where zone is the zone data that is returned from the get config command. group is the group data that is returned from the get config command. variable is a list of returned data from a get service group, get interface, or get policy id command. Palo Alto Extreme Networks Security Risk Manager supports the Palo Alto adapter. The Palo Alto adapter uses the PAN-OS XML-based Rest application programming interface (API) to communicate with devices. You use an HTTPS request to a URL to send a command to a device. The command format for the request is Where command is a set of XML tags or XPath. The following example is for a set of XML tags. <show><system><info></info></system></show> The following example is an XPath: Extreme Networks Security Risk Manager Adapter Configuration Guide 37
38 Supported adapters /config/predefined/service The following table describes the integration requirements for the Palo Alto adapter. Table 16: Integration requirements for the Palo Alto adapter Integration requirement Versions Neighbor data support SNMP discovery Required credential parameters Connection protocols Commands that are used for backup operation Commands that are used for telemetry and neighbor data Commands that are used for GetApplication PAN-OS version and later. Supported SysDescr matches 'Palo Alto Networks(.*)series firewall' or sysoid matches 'panpa' Username Password Use SuperReader access for credentials. HTTPS <show><system><info></info></system>/show> <show><config><running></running></config></show> <show><routing><route></route></routing></show> <show><virtual-wire>all</virtual-wire></show> <show><vlan>all</vlan></show> <show><interface>all</interface></show> <show><system><disk-space></disk-space></system></ show> <show><system><resources></resources></system></ show> /config/predefined/service <show><system><info></info></system></show> <show><interface>all</interface></show> <show><routing><interface></interface></routing></ show> <show><counter><interface>all</interface></ counter></show> <show><arp>all</arp></show></p><p><show><mac>all</ mac></show> <show><routing><route></route></routing></show> <show><config><running></running></config></show> /config/predefined/application Sourcefire 3D Sensor To integrate Extreme Networks Security Risk Manager with your network devices, ensure that you review the requirements for the Sourcefire 3D Sensor adapter. The following table describes the integration requirements for the Sourcefire 3D Sensor adapter. Limitations Intrusion policies attached to individual access control rules are not used by Risk Manager. Only the default intrusion policy is supported. Extreme Networks Security Risk Manager Adapter Configuration Guide 38
39 Supported adapters NAT and VPN are not supported. Table 17: integration requirements for the Sourcefire 3D Sensor adapter Integration requirement Versions 5.2 Neighbor data support SNMP discovery Required credential parameters Connection protocols Commands that the adapter requires to log in and collect data No No Username Password SSH show version show memory show network show interfaces expert sudo su df hostname ip addr route cat find head mysql Extreme Networks Security Risk Manager Adapter Configuration Guide 39
40 Index A adapters configuration overview 8 types 8 adaptersinstalling on Risk Manager 10 B BIG-IP 8, 20 C Check Point SecurePlatform 8 Check Point SecurePlatform Appliances integration requirements 22 Check Point Security Management Server 8, 23 Cisco Catalyst 8 Cisco CatOS supported environments 24 Cisco Internet Operating System 8 Cisco IOS integration requirements 25 Cisco Nexus adding VDCs 28 integration requirements 26 Cisco Security Appliance 8 Cisco security appliances integration requirements 29 Configuration Source Management adding network devices 12 adding network devices managed by Juniper Networks 14 connection protocols adapters support 19 conventions, guide notice icons 4 text 5 CPSMS 23 customer support contact information 4 D documentation 4 F files collected adapters support 19 Fortinet FortiOS 8 H HP Networking ProVision 8, 32 I installing adapters 10 J Juniper Networks JunOS 8 Juniper Networks JUNOS integration requirements 34 Juniper Networks NSM supported environments 35 Juniper Networks ScreenOS integration requirements 36 N neighbor data definition 19 network administrator description 4 network devices adding and configuring 12 adding devices managed by Juniper networks to Risk Manager 14 adding to Risk Manager 12 Nexus device adding VDCs as sub-devices 29 Nexus devices adding VDC as individual devices 29 P Palo Alto 8, 37 R required commands adapters support 19 required credentials adapters 19 S SiteProtector discovery 17 SNMP discovery adapters 19 Sourcefire 3D Sensor 8 Sourcefire IPS integration requirements 38 supported adapters overview 19 T technical library 4 Extreme Networks Security Risk Manager Adapter Configuration Guide 40
41 Index U uninstalling adapters 11 V VDC methods for adding to Cisco Nexus devices 28 Virtual Device Contexts, see VDC Extreme Networks Security Risk Manager Adapter Configuration Guide 41
IBM Security QRadar Risk Manager Version 7.2.1. Adapter Configuration Guide
IBM Security QRadar Risk Manager Version 7.2.1 Adapter Configuration Guide Note Before using this information and the product that it supports, read the information in Notices on page 27. Copyright IBM
Extreme Networks Security Upgrade Guide
Extreme Networks Security Upgrade Guide 9034868 Published July 2015 Copyright 2012 2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make changes in specifications and
Extreme Networks Security Hardware Guide
Extreme Networks Security Hardware Guide 9034856 Published July 2015 Copyright 2014 2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make changes in specifications and
Extreme Networks Security Vulnerability Manager User Guide
Extreme Networks Security Vulnerability Manager User Guide 9034870 Published September 2015 Copyright 2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make changes in
Extreme Networks Security Risk Manager Getting Started Guide
Extreme Networks Security Risk Manager Getting Started Guide 9034864 Published July 2015 Copyright 2011 2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make changes
Extreme Networks Security Vulnerability Assessment Configuration Guide
Extreme Networks Security Vulnerability Assessment Configuration Guide 9034869 Published July 2015 Copyright 2007 2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make
Extreme Networks Security WinCollect User Guide
Extreme Networks Security WinCollect User Guide 9034872 Published July 2015 Copyright 2011 2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make changes in specifications
Extreme Networks Security Log Manager Administration Guide
Extreme Networks Security Log Manager Administration Guide 9034859 Published July 2015 Copyright 2007 2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make changes in
IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks
Extreme Networks Security Risk Manager Installation Guide
Extreme Networks Security Risk Manager Installation Guide 9034865 Published May 2015 Copyright 2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make changes in specifications
Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide
Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide 9034968 Published April 2016 Copyright 2016 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to
IBM Security QRadar Risk Manager Version 7.2.6. Getting Started Guide IBM
IBM Security QRadar Risk Manager Version 7.2.6 Getting Started Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 31. Product information
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
Common Services Platform Collector 2.5 Quick Start Guide
Common Services Platform Collector 2.5 Quick Start Guide September 18, 2015 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com CSP-C Quick
Remote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC.
VYATTA, INC. Vyatta System Remote Management REFERENCE GUIDE SSH Telnet Web GUI Access SNMP Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada)
NMS300 Network Management System Application
NMS300 Network Management System Application Quick Start Guide December 2014 202-11288-04 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing
IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM
IBM Security QRadar Version 7.2.5 Vulnerability Assessment Configuration Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 93. Product
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Brocade to Cisco Comparisons
1 2 3 Console cables - The console cables are not interchangeable between Brocade and Cisco. Each vendor provides their console cable with each manageable unit it sells. Passwords - Neither Cisco or Brocade
Network Simulator Lab Study Plan
The CCNA 640-802 Network Simulator has 300 lab exercises, organized both by type (Skill Builder, Configuration Scenario, Troubleshooting Scenario, and Subnetting Exercise) and by major topic within each
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage
TIBCO LogLogic SOX and COBIT Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.
IBM Security QRadar SIEM Version 7.1.0 MR1. Log Sources User Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Log Sources User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 108. Copyright
Extreme Networks Security Managing Log Sources Guide
Extreme Networks Security Managing Log Sources Guide 9034861 Published July 2015 Copyright 2011 2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make changes in specifications
IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide
IBM Security QRadar SIEM Version 7..0 MR Administration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 07. Copyright
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3
Firewall FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook Firewall v3 24 January 2012 01-432-148222-20120124 Copyright 2012 Fortinet, Inc. All rights reserved. Contents and terms are subject to
IBM Security QRadar SIEM Version 7.2.6. High Availability Guide IBM
IBM Security QRadar SIEM Version 7.2.6 High Availability Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 35. Product information This
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide
Providing Credentials
ManageEngine DeviceExpert Tutorial Providing Credentials (With Explanatory Screenshots for Each Device Type) Overview After adding the devices to the DeviceExpert inventory, you need to provide device
Configuring the Transparent or Routed Firewall
5 CHAPTER This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. This chapter also includes information about customizing
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage
TIBCO LogLogic HIPAA Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE
Configuring Global Protect SSL VPN with a user-defined port
Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos [email protected] Global Protect SSL VPN Overview This document gives you an overview on how to configure
IBM Tivoli Network Manager 3.8
IBM Tivoli Network Manager 3.8 Configuring initial discovery 2010 IBM Corporation Welcome to this module for IBM Tivoli Network Manager 3.8 Configuring initial discovery. configuring_discovery.ppt Page
HA OVERVIEW. FortiGate FortiOS v3.0 MR5. www.fortinet.com
HA OVERVIEW FortiGate FortiOS v3.0 MR5 www.fortinet.com FortiGate HA Overview FortiOS v3.0 MR5 1 October 2007 01-30005-0351-20071001 Copyright 2007 Fortinet, Inc. All rights reserved. No part of this publication
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
Juniper Secure Analytics
Juniper Secure Analytics Vulnerability Manager User Guide Release 2014.2 Published: 2014-12-08 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual
Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides
Course Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
Managing Vulnerability Assessment
Security Threat Response Manager Release 2012.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-03-12 Copyright Notice Copyright 2013
QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance
1 0 0 0 1 1 QUICK START GUIDE Web Security Appliance Web Security Appliance Cisco S170 303417 Cisco S170 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation
IBM Security QRadar Version 7.2.2. WinCollect User Guide V7.2.2
IBM Security QRadar Version 7.2.2 WinCollect User Guide V7.2.2 Note Before using this information and the product that it supports, read the information in Notices on page 47. Product information This
How To Configure The Fortigate Cluster Protocol In A Cluster Of Three (Fcfc) On A Microsoft Ipo (For A Powerpoint) On An Ipo 2.5 (For An Ipos 2.2.5)
FortiGate High Availability Guide FortiGate High Availability Guide Document Version: 5 Publication Date: March 10, 2005 Description: This document describes FortiGate FortiOS v2.80 High Availability.
NetBrain Workstation Professional Edition 2.3 Release notes
NetBrain Workstation Professional Edition 2.3 Release notes Major Features...1 Known Issues*...5 NetBrain Workstation Support Site...7 Recommended System Requirements...7 Installation Notes...7 Major Features
FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3
FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER
ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook
ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access Integration Handbook Document Version 1.1 Released July 16, 2012 ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access
Administrator s Guide
Administrator s Guide Citrix Network Manager for MetaFrame XPe Version 1.0 Citrix Systems, Inc. Information in this document is subject to change without notice. Companies, names, and data used in examples
High Availability. FortiOS Handbook v3 for FortiOS 4.0 MR3
High Availability FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook High Availability v3 2 May 2014 01-431-99686-20140502 Copyright 2014 Fortinet, Inc. All rights reserved. Fortinet, FortiGate,
Connecting to the Firewall Services Module and Managing the Configuration
CHAPTER 3 Connecting to the Firewall Services Module and This chapter describes how to access the command-line interface and work with the configuration. This chapter includes the following sections: Connecting
SonicOS Enhanced 5.7.0.2 Release Notes
SonicOS Contents Platform Compatibility... 1 Key Features... 2 Known Issues... 3 Resolved Issues... 4 Upgrading SonicOS Enhanced Image Procedures... 6 Related Technical Documentation... 11 Platform Compatibility
Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
NAC Guest. Lab Exercises
NAC Guest Lab Exercises November 25 th, 2008 2 Table of Contents Introduction... 3 Logical Topology... 4 Exercise 1 Verify Initial Connectivity... 6 Exercise 2 Provision Contractor VPN Access... 7 Exercise
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 59. Copyright
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
NSM Plug-In Users Guide
Juniper Secure Analytics Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-03-14 Copyright Notice Copyright 2014 Juniper
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
HP Load Balancing Module
HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-2685 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P.
Managing Multi-Hypervisor Environments with vcenter Server
Managing Multi-Hypervisor Environments with vcenter Server vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.0 This document supports the version of each product listed and supports all subsequent
Introducing the BIG-IP and SharePoint Portal Server 2003 configuration
Deployment Guide Deploying Microsoft SharePoint Portal Server 2003 and the F5 BIG-IP System Introducing the BIG-IP and SharePoint Portal Server 2003 configuration F5 and Microsoft have collaborated on
Read Me First for the HP ProCurve Routing Switch 9304M and Routing Switch 9308M
Read Me First for the HP ProCurve Routing Switch 9304M and Routing Switch 9308M Contents: Software Updates Are Free! New Software Release 05.0.84 Module Installation Getting Started Your Free Ticket to
Using Cisco UC320W with Windows Small Business Server
Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following
ECView Pro Network Management System. Installation Guide. www.edge-core.com
ECView Pro Network Management System Installation Guide www.edge-core.com INSTALLATION GUIDE ECVIEW PRO NETWORK MANAGEMENT SYSTEM SNMP-Based Network Management Software for Windows SW6102 E102010-CS-R01
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Basic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC.
VYATTA, INC. Vyatta System Basic System REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
NetBrain Discovery Appliance Manual
NetBrain Discovery Appliance Manual NetBrain Technologies, Inc. 2009-07-20-1 - Table of Contents 1. Overview... 4 2. Installation... 5 2.1 Installation Software... 5 2.1.1 Install ActivePerl... 5 2.1.2
Juniper Networks Management Pack Documentation
Juniper Networks Management Pack Documentation Juniper Networks Data Center Switching Management Pack for VMware vrealize Operations (vrops) Release 2.5 Modified: 2015-10-12 Juniper Networks, Inc. 1133
Lab 3.10.2 Use Network Inspector to Observe STP Behavior
Lab 3.10.2 Use Network Inspector to Observe STP Behavior Objective The purpose of this lab is to observe STP behavior with the Network Inspector switch trace feature. Scenario A new switched network has
Smart Business Architecture for Midsize Networks Network Management Deployment Guide
Smart Business Architecture for Midsize Networks Network Management Deployment Guide Introduction: Smart Business Architecture for Mid-sized Networks, Network Management Deployment Guide With the Smart
STRM Log Manager Administration Guide
Security Threat Response Manager Release 2013.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-03-15 Copyright Notice Copyright 2013
FortiGate High Availability Overview Technical Note
FortiGate High Availability Overview Technical Note FortiGate High Availability Overview Technical Note Document Version: 2 Publication Date: 21 October, 2005 Description: This document provides an overview
Integrate Check Point Firewall
Integrate Check Point Firewall EventTracker Enterprise Publication Date: Oct.26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Cisco ASA, PIX, and FWSM Firewall Handbook
Cisco ASA, PIX, and FWSM Firewall Handbook David Hucaby, CCIE No. 4594 Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA Contents Foreword Introduction xxii xxiii Chapter 1 Firewall
Juniper Secure Analytics
Juniper Secure Analytics Log Sources Users Guide Release 2014.1 Modified: 2015-11-30 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved.
Hosting more than one FortiOS instance on. VLANs. 1. Network topology
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
Integrated Citrix Servers
Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights
Juniper Secure Analytics
Juniper Secure Analytics Managing Vulnerability Assessment Release 2014.4 Published: 2015-02-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All
Juniper Secure Analytics
Juniper Secure Analytics Managing Vulnerability Assessment Release 2014.2 Published: 2014-07-15 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
CounterACT 7.0 Single CounterACT Appliance
CounterACT 7.0 Single CounterACT Appliance Quick Installation Guide Table of Contents Welcome to CounterACT Version 7.0....3 Included in your CounterACT Package....3 Overview...4 1. Create a Deployment
Extreme Networks Security Troubleshooting System Notifications Guide
Extreme Networks Security Troubleshooting System Notifications Guide 9034867 Published July 2015 Copyright 2012 2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make
How To Backup In Cisco Uk Central And Cisco Cusd (Cisco) Cusm (Custodian) (Cusd) (Uk) (Usd).Com) (Ucs) (Cyse
This chapter includes the following sections: Backup and Import in Cisco UCS Central, page 1 Backing up and Restoring Cisco UCS Central, page 4 Backing up and Restoring Cisco UCS Domains, page 8 Import
Using WhatsUp IP Address Manager 1.0
Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address
Juniper Secure Analytics
Juniper Secure Analytics Big Data Management Guide Release 2014.2 Published: 2014-08-12 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All
Cisco S380 and Cisco S680 Web Security Appliance
QUICK START GUIDE Cisco S380 and Cisco S680 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance in a Rack 6 Plug In the Appliance
LifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services
DEPLOYMENT GUIDE Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the BIG-IP
IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM
IBM Security QRadar Vulnerability Manager Version 7.2.6 User Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 91. Product information
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
