cc/td/doc/product/iaabu/csids
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Release Notes for
NetRanger 2.1.1

Release Notes for
NetRanger 2.1.1

These release notes discuss installation and configuration information for NetRanger version 2.1.1. This information supersedes the information in the NetRanger User's Guide (Version 2.1.1).

Caution This 2.1.1 release of NetRanger uses an appliance-based Sensor, which requires a different installation process than a software-based Sensor. Failure to read and follow the instructions in this Release Note will cause problems with Sensor installation and configuration.

Contents

These release notes summarize the following topics:

Installing and Configuring Sensors and Directors

This section either supersedes or supplements the configuration and installation information in Chapter 3 of the 2.1.1 NetRanger User's Guide, and consists of the following sections:

Configuring the Sensor Appliance

To configure a Sensor, follow these steps:

    1. Assemble the Sensor

    2. Change the Sensor's Passwords

    3. Configure the UNIX Configuration Files

    4. Configure the Sensor with nrconfig

Assemble the Sensor

Step 1 Position the Sensor workstation on a subnet. (For more information on Sensor placement on a network, please refer to Chapter 2 of the 2.1.1 NetRanger User's Guide.)

Step 2 Attach the necessary power cables to the Sensor.

Step 3 Connect the keyboard and monitor to the Sensor.

Step 4 Attach the necessary communication cables according to your network configuration, as illustrated in Figure 1.

Step 5 Power on the Sensor.


Figure 1: Network Configuration

Change the Sensor's Passwords

To change the Sensor's passwords, follow these steps:

Step 1 Log on as user root.

The default root password is attack.

Step 2 The Sensor should prompt you to enter and reenter a new password for user root.

If the Sensor does not prompt you to change the root password, type passwd root and change the password.

Step 3 Log out and log back on as user netrangr.

The default netrangr password is attack.

Step 4 The Sensor should prompt you to enter and reenter a new password for user netrangr.

If the Sensor does not prompt you to change the netrangr password, type passwd netrangr and change the password.

Step 5 If necessary, write down the new passwords and store them in a secure location.

Warning Failure to change the passwords for users root and netrangr may lead to compromise of the Sensor.

Configure the UNIX Configuration Files

To configure the UNIX configuration files, follow these steps:

Step 1 Log on as user root.

Step 2 Type:

sysconfig-sensor
 

The following menu appears:

NetRanger Sensor Host Configuration Version 2.0.1
 
1 - Configure Sensor IP Address
2 - Configure Sensor IP Netmask
3 - Configure Default Route
4 - Configure Sensor Hostname
5 - Configure COM1 Port
6 - Configure Modem
7 - Configure Network Access Control
8 - Exit
 
Selection: 
 

Step 3 To configure the Sensor, select each number and enter the appropriate information. Use Table 1 to help you set the Sensor's parameters.


Table 1: Sensor Installation Parameters
Parameter Menu
Option
Definition Example

IP Address

1

Use this option to set the Sensor's IP address.

10.1.9.201

IP Netmask

2

Use this option to set the Sensor's netmask.

255.255.255.0

Default Route

3

Use this option to enter the IP address of the primary router on the LAN with the Sensor. (This is the default router to which the Sensor's command and control interface is attached, not the router being managed by the Sensor.)

10.1.1.101

IP Hostname

4

Use this option to set the Sensor's hostname.

sensor-one

COM1 Port

5

Use this option to set the COM1 port to "serial." This allows tty access to the Sensor through the serial port. Selecting "device" allows the user to connect a serial cable to the serial port and "tip" into a network device.

serial

Modem

6

It is unnecessary to configure the modem. No modem is included in the 2.1.1 appliance.

Network Access Control

7

Use this option to add or remove IP addresses of hosts and networks that can access the Sensor via telnet, ftp, and tftp. The Director must be able to access the Sensor, so make sure that its address is in the list.

10.5.3.2

10.6.1.

Step 4 If sysconfig-sensor has not rebooted the Sensor, type:

sync;sync;reboot
 

Step 5 Log on as user root.

Step 6 To ensure a network connection to the Director, type:

ping director_ip_address
 

Where director_ip_address is the IP address of the Director.

Configure the Sensor with nrconfig

To configure the Sensor's configuration files with nrconfig, follow these steps:

Step 1 Log on as user netrangr.

Step 2 Type /usr/nr/bin/nrconfig at the command prompt.

Refer to the "Working with the nrconfig Utility" section of these Release Notes for information on using nrconfig.

Step 3 After running nrconfig, stop any NetRanger daemons that might be running by typing:

nrstop
 

Step 4 Restart the NetRanger daemons by typing:

nrstart
 

Step 5 To ensure communication between the Sensor and Director, type:

nrconns

Installing and Configuring the Director

To install and configure the Director, follow these steps:

    1. Prepare the Director for Installation

    2. Install the Director Software

    3. Change the NetRanger Password on the Director

    4. Configure the Director with nrconfig

    5. Upgrade the Director's Signatures

    6. Upgrade the Director's NSDB Files

Prepare the Director for Installation

Refer to the "Installing a New Director" section of Chapter 3, "Configuration and Installation", of the 2.1.1 NetRanger User's Guide.

Install the Director Software

To install the Director software, follow these steps:

Step 1 Log on as user root.

Step 2 Insert the CD in the drive.

Step 3 Mount the CD-ROM drive with one of the following commands:

Step 4 Change directories to the mount point. For example:

cd /mnt
 

Or, if the CD-ROM is automatically mounted:

cd /cdrom/cdrom0
 

Step 5 Type:

./install
 

Change the NetRanger Password on the Director

To change user netrangr's password on the Director, follow these steps:

Step 1 Log on as user root.

Step 2 Type:

passwd netrangr
 

Step 3 Enter and reenter a new password for user netrangr.

Step 4 If necessary, write down the new passwords and store them in a secure location.

Warning Failure to change the password for user netrangr may lead to compromise of the Director.

Configure the Director with nrconfig

To configure the Director's configuration files with nrconfig, follow these steps:

Step 1 Log on as user netrangr.

Step 2 Type /usr/nr/bin/nrconfig at the command prompt.

Refer to the "Working with the nrconfig Utility" section of these Release Notes for information on using nrconfig.

Step 3 After running nrconfig, stop any NetRanger daemons that might be running by typing:

nrstop
 

Step 4 Restart the NetRanger daemons by typing:

nrstart
 

Step 5 To ensure communication between the Sensor and Director, type:

nrconns

Upgrade the Director's Signatures

The Sensor contains a more recent update of the signatures file than the Director. You will need to copy this file from the Sensor to the Director in order to alarm on activity triggered by the new signatures.

To copy the Sensor's signatures file to the Director, follow these steps:

Step 1 Log on to the Director as user netrangr.

Step 2 FTP to the Sensor by typing:

ftp sensor_ip_address
 

Where sensor_ip_address is the Sensor's IP address.

Step 3 Log on to the Sensor as user netrangr.

Step 4 Type pwd to confirm your current directory. You should be in the /usr/nr directory on the Sensor.

Step 5 Change directories to the Sensor's /usr/nr/etc directory by typing:

cd etc
 

Step 6 Type dir to get a directory listing of /usr/nr/etc. The directory listing should look like Example 1.


Example 1: Sample Directory Listing of Sensor's /usr/nr/etc
-rwx------   1 netrangr netrangr     654 Oct  1 14:44 auths
drwxr-xr-x   2 netrangr netrangr     512 Aug 31 14:04 backups
-rw-r-----   1 netrangr netrangr     353 Aug 31 14:07 configd.conf
-rwx------   1 netrangr netrangr     972 Aug 31 14:26 daemons
-rwx------   1 netrangr netrangr    1001 Sep 30 09:22 destinations
-rw-r-----   1 netrangr netrangr     445 Aug 31 14:07 eventd.conf
-rwx------   1 netrangr netrangr      99 Oct  1 14:44 hosts
drwxr-x---   2 netrangr netrangr     512 Aug 31 14:04 licenses
-rw-r-----   1 netrangr netrangr     508 Aug 31 14:07 loggerd.conf
-rwx------   1 netrangr netrangr     913 Aug 31 14:26 managed.conf
drwxr-x---   3 netrangr netrangr     512 Aug 31 14:00 nsc
drwxr-x---   3 netrangr netrangr     512 Aug 31 14:00 oem
-rwx------   1 netrangr netrangr     470 Aug 31 14:26 organizations
-rwx------   1 netrangr netrangr   26671 Aug 31 14:26 packetd.conf
-rwx------   1 netrangr netrangr     516 Aug 31 14:26 postofficed.conf
-rwx------   1 netrangr netrangr     766 Oct  1 14:44 routes
-rw-r-----   1 netrangr netrangr    1761 Aug 31 14:07 sapd.conf
-rwx------   1 netrangr netrangr    1011 Aug 31 14:26 services
-rwx------   1 netrangr netrangr    4165 Aug 31 14:26 signatures
drwxr-x---   3 netrangr netrangr     512 Aug 31 14:00 wgc
 

Step 7 Set the Director's local directory (the directory you want files transferred to) by typing:

lcd /usr/nr/etc
 

Step 8 Transfer the signatures file from the Sensor to the Director by typing:

get signatures
 

Step 9 Terminate the FTP session by typing:

bye
 

Step 10 Confirm that the signatures file resides on the Director by typing:

ls /usr/nr/etc/sig*
 

Step 11 Copy the signatures file to the /usr/nr/etc/templates directory by typing:

cp /usr/nr/etc/signatures /usr/nr/etc/templates

Upgrade the Director's NSDB Files

After transferring the Sensor's signatures file to the Director, you will need to copy the HTML files associated with the Network Security Database (NSDB) from the Sensor to the Director. After this transfer, the Director will have a complete updated set of NSDB HTML files.


Note To learn more about using the NSDB, refer to the "Using the NSDB" section of these Release Notes.

To copy the Sensor's HTML files to the Director, follow these steps:

Step 1 Log on to the Director as user netrangr.

Step 2 FTP to the Sensor by typing:

ftp sensor_ip_address
 

Where sensor_ip_address is the Sensor's IP address.

Step 3 Log on to the Sensor as user netrangr.

Step 4 Type pwd to confirm your current directory. You should be in the /usr/nr directory on the Sensor.

Step 5 Change directories to the Sensor's /usr/wgc/nsdb/html directory by typing:

cd /usr/wgc/nsdb/html
 

Step 6 Type dir to get a directory listing of /usr/wgc/nsdb/html. The directory should contain files with the following naming conventions:

expsig_*.html
note_*.html
sig_note_*.html
vul_*.html
*.gif
 

Step 7 Set the Director's local directory (the directory you want files transferred to) by typing:

lcd /usr/wgc/nsdb/html
 

Step 8 To transfer the GIF files, set the mode to binary by typing:

bin
 

Step 9 Transfer the GIF files from the Sensor to the Director by typing:

mget *.gif
 

Step 10 To transfer the HTML files, set the mode to ASCII by typing:

ascii
 

Step 11 Transfer the HTML files from the Sensor to the Director by typing:

mget *.html
 

Step 12 Terminate the FTP session by typing:

bye
 

Step 13 Confirm that the HTML and GIF files reside on the Director by typing:

ls /usr/wgc/nsdb/html

Upgrading to NetRanger 2.1.1

If you have a previous version of NetRanger, and are upgrading to NetRanger 2.1.1, follow these steps:

    1. Upgrade the Software

    2. Upgrade Configuration Files and Signatures

Upgrade the Software

To upgrade a Sensor or Director to 2.1.1, follow these steps:

Step 1 Log on as user root.

Step 2 Insert the CD in the drive.

Step 3 Mount the CD-ROM drive with one of the following commands:

Step 4 Change directories to the mount point. For example:

cd /mnt
 

Or, if the CD-ROM is automatically mounted:

cd /cdrom/cdrom0
 

Step 5 Type:

./install

Upgrade Configuration Files and Signatures

After upgrading the Sensor or Director to 2.1.1, you must upgrade the configuration files and signatures. You can do this in any of the following ways, in order of preference:

    1. You can download the latest NetRanger Sensor patch from CCO to upgrade signatures and configuration files. See the note below for downloading instructions.

    2. You can run nrconfig, which deletes the old configuration files and replaces them with new ones. Refer to the "Working with the nrconfig Utility" section of these Release Notes.

    3. You can make the changes to the existing configuration files manually.

Using the NSDB

The Network Security Database (NSDB) is Cisco's HTML-based compendium of network vulnerability information. NSDB entries provide background information on vulnerabilities and link to other resources where you can gather additional information.

Set HTML Browser Preference

Before you can view the NSDB from the Director interface, you must set your HTML browser preference.

To set you HTML browser preference, follow these steps:

Step 1 Log on as user netrangr.

Step 2 Type:

vi /usr/nr/etc/nrConfigure.conf
 

Step 3 Edit the following line:

Browser=browser_location
 

Where browser_location is the path to your HTML browser.

Step 4 Save the file and exit the editing session by typing:

:wq

Accessing the NSDB from the Director Interface

To access the NSDB from the Director interface, click an Alarm symbol and choose Show>NSDB from the Security menu.

It is not necessary to click an Alarm to view the NSDB; not clicking an alarm before accessing the NSDB opens the main index page.


Figure 2: The Network Security Database

Accessing the NSDB from your HTML Browser

To access the NSDB directly from your HTML browser, type the following URL into the browser's Location field:

/usr/wgc/nsdb/html/all_sigs_index.html

Working with the nrconfig Utility

The Director and Sensor are configured with a utility called nrconfig. nrconfig consists of a number of menus that allow you to enter data that enable NetRanger Sensors, Directors, and associated network devices to start communicating and securing a network.

In addition to running this utility at installation, you can run this utility at any time to change an existing configuration. This section includes worksheets to help you gather the information (such as IP addresses, passwords, and names of network components) you need before you run nrconfig.


Note nrconfig does not retain changes manually made to the files in the /usr/nr/etc directory because presently it is an installation tool and not intended to be an ongoing configuration interface for NetRanger Configuration Files.

Before You Begin

Before you run nrconfig, you must have installed one or more of the following NetRanger components:

Sensors are shipped as an appliance (with packages installed) so you only need to install the packages on Director systems or on Sensors that you are upgrading.

You must also gather the following information about your network:


Note You must run nrconfig as user netrangr. nrconfig can be run on an active Sensor or Director system without having to shut down any of the NetRanger daemon services. However, after you run nrconfig, you must stop and restart all NetRanger daemons (using nrstart and nrstop) in order for configuration changes to take effect.

Starting nrconfig

To run nrconfig, log on as user netrangr and type:

nrconfig 
 

nrconfig initially displays the following prompt:

Are you ready to continue with configuration of your NetRanger? (y/n)> 
 

If you have gathered the required information and are ready to configure the NetRanger software, type y and press Enter to continue.

This opens the Feature Selection Menu, shown below in Example 2, which prompts you to select the features you want this installation to support.


Example 2: Feature Selection Menu
The following daemons will be run to support the ENABLED features
      eventd loggerd postofficed smid
      
FEATURE SELECTION MENU
Choose what features you want ENABLED on this host.
(Choosing an `ENABLED' feature will disable it.)
 
      1 - Sensor
      2 - Director
      3 - Logging
      4 - Database Reporting
      5 - File Management
      6 - Event Paging
      7 - Postoffice Routing
      8 - Configuration Control
      
    Enter - Continue
    
Feature # >
 

For a standard Sensor installation, select features 1 and 5; for a standard Director installation, select features 2, 5, 6, and 8. If you have installed the optional database/file management software and will be configuring NetRanger to load information into a database, then select 4.

To continue with NetRanger Configuration, press Enter at the menu prompt. This opens the Main Menu (Example 3).


Example 3: Main Menu
Choose what Section you want to configure.
 
      1 - Select Features
      2 - Host Address Configuration
      3 - N/A (Sensor Configuration)
      4 - N/A (Database Configuration)
      5 - Source Configuration
      6 - Destination Configuration
      7 - Postoffice Router Configuration
      8 - N/A (Sleeve Configuration)
       
      9 - Clear Temporary Configuration Files
      10- Generate Temporary Configuration Files
      11- Edit/Review Temporary Configuration Files
      12- Review Temporary Configuration Files
      13- Commit Temporary Configuration Files
       
      14- License Request Information
      15- Generate License Certificate Request(s)
      16- License Certificate Manual Entry
      
    Enter- Exit
     
    
Section # >
 

nrconfig's Menu Hierarchy

nrconfig's Main Menu provides access to a hierarchy of submenus. Example 4 maps out this menu hierarchy. Each nested item in the list indicates a submenu to the parent menu above it. For example, the Sensor Class Selection Menu has three submenus:

Each of these in turn have submenus of their own, and so on. Use the map below to help you navigate the series of submenus for configuration.


Example 4: nrconfig's Menu Hierarchy
1 - Select Features
2 - Host Address Information (Required for all Installations)
3 - Sensor Configuration (Required for Sensor)
    Stand-Alone Sensor Configuration Menu
      Internal Networks Entry Menu
Cisco Type Menu
    Cisco Sensor Configuration Menu Internal Networks Entry Menu
BorderGuard Type Menu
    LAN Interfaces Entry Menu WAN Interfaces Entry Menu BorderGuard Configuration Menu (Router) OR BorderGuard Configuration Menu (Bridge) Static Routes Entry Menu Security Policy Configuration Menu Internal Networks Entry Menu
4 - Database Configuration (Required for Database)
5 - Source Configuration (Required for Director)
6 - Destination Configuration (Required for Sensor/Optional for the Director)
7 - Postoffice Router Configuration (Required for Postoffice Routing)
8 - Sleeve Configuration (Optional for Sensor)
9 - Clear Temporary Configuration Files
10 - Generate Temporary Configuration Files
11 - Edit/Review Temporary Configuration Files
12 - Review Temporary Configuration Files
13 - Commit Temporary Configuration Files
14 - License Request Information
15 - Generate License Certificate Request(s)
16 - License Certificate Manual Entry
Enter - EXIT

1 - Select Features

Typing 1 at the Main Menu returns you to the Feature Selection Menu.

2 - Host Address Information (Required for all Installations)

Typing 2 at the Main Menu opens the Local Host Address Menu. Use this menu to enter the Organization names and IDs, and Host names and IDs for the NetRanger you are configuring.


Table 2: Local Host Address Menu
Field Name Description Your Entry

Organization Name

This is the symbolic name for the Organization ID. The organization name must be identical on all NetRanger systems (Sensors and Directors) within an organization.

Organization ID

This is the organization ID for the NetRanger you are configuring. You must enter a value between 1-65535 in this field. This ID must be identical on all NetRanger systems (Sensors and Directors) within an organization. To obtain a globally unique organization ID, contact the Technical Assistance Center (800-553-2447).

Host Name

A symbolic name for the NetRanger component you are configuring.

Host ID

A unique ID for the NetRanger you are configuring. You must enter a value between 1-65535 in this field.

3 - Sensor Configuration (Required for Sensor)

Typing 3 at the Main Menu opens the Sensor Class Selection Menu. Use this menu to choose the type of network device that will interact with the Sensor.


Table 3: Sensor Class Selection Menu
Field Name Description Your Entry

1 - Stand-Alone

Choose this option (1) if you will not be connecting a network device to the Sensor.

2 - Cisco

Choose this option (2) if you have a Cisco 1600, 2500, 3600, 4500, 7200, or 7500 series router.

3 - StorageTek

Choose this option (3) if you have a Nortel Passport or StorageTek device (DXE, BorderGuard 1000, or BorderGuard 2000).

Stand-Alone Sensor Configuration

Typing 1 at the Sensor Class Selection Menu opens the Stand-Alone Sensor Configuration Menu. Use this menu to enter configuration information for a stand-alone Sensor.


Table 4: Stand-Alone Sensor Configuration Menu
Field Name Description Your Entry

Minutes to log on an event

This is the number of minutes to log IP traffic after a serious event occurs. The recommended value is 15 minutes.

Minutes to shun on an event

This is the length of time in minutes that traffic should be blocked when a serious event occurs. The recommended value is 1440, which equals one day. Set this value to "0" for a stand-alone Sensor.

Sensor IP Address

This is the IP address used by the Sensor for command and control.

After you have entered the information in the Stand-Alone Sensor Configuration Menu, use the Internal Networks Entry Menu to establish the IP addresses and Netmasks for the Internal Protected Networks.


Table 5: Internal Networks Entry Menu
Field Name Description Your Entry(ies)

Internal Network's IP Address

This is the IP address for the subnet(s) within the network being monitored by NetRanger.

Internal Network's Netmask

This is the netmask(s) for the subnet(s).

Cisco Configuration

Typing 2 at the Sensor Class Selection Menu opens the Cisco Type Menu. Use this menu to enter Cisco router configuration data in the fields.


Table 6: Cisco Type Menu
Field Name Description Your Entry

Cisco's Network Host Name

This is the network host name for the Cisco router used in /etc/hosts on the Sensor or in DNS.

Cisco's PASSWORD

This is the password used to log into the Cisco.

DO NOT WRITE YOUR PASSWORD HERE!

Cisco's Enable PASSWORD

This is the password required by the Cisco enable mode.

DO NOT WRITE YOUR PASSWORD HERE!

After you have entered the information in the Cisco Type Menu, use the Cisco Sensor Configuration Menu to enter configuration information for the Cisco.


Table 7: Cisco Sensor Configuration Menu
Field Name Description Your Entry

Minutes to log on an event

This is the number of minutes to log IP traffic after a serious event occurs. The recommended value is 15 minutes.

Minutes to shun on an event

This is the length of time in minutes that traffic should be blocked when a serious event occurs. The recommended value is 1440, which equals one day.

Sensor IP Address

This is the IP address used by the Sensor for command and control.

Cisco's NAT IP Address

This is the network-translated IP address used by the Cisco router connected to the Sensor. (Use only if NAT is being used on your network.)

Cisco's IP Address connected to Sensor

This is the IP address of the Cisco router connected to the Sensor.

Cisco's External IP Address

The Sensor uses the External IP address as a reference to the untrusted networks.

After you have entered the information in the Cisco Sensor Configuration Menu, use the Internal Networks Entry Menu to establish the IP addresses and Netmasks for the Internal Protected Networks.


Table 8: Internal Networks Entry Menu
Field Name Description Your Entry(ies)

Internal Network's IP Address

This is the IP address for the subnet(s) within the network being monitored by NetRanger.

Internal Network's Netmask

This is the netmask(s) for the subnet(s).

BorderGuard Configuration

Typing 3 at the Sensor Class Selection Menu opens the BorderGuard Type Menu. Use this menu to enter BorderGuard configuration data in the fields.


Table 9: BorderGuard Type Menu
Field Name Description Your Entry

BorderGuard's Network Host Name

This is the network host name for the BorderGuard used in /etc/hosts on the Sensor or in DNS.

BorderGuard's PASSWORD

This is the password used to log into the BorderGuard.

DO NOT WRITE YOUR PASSWORD HERE!

BorderGuard's Version ID/Mode

This is the BorderGuard's Version ID and Configuration Mode. Enter one of the following: V3, DXE, V4Router, V4Bridge.

Note Versions 3 and 4 apply to BorderGuard 1000 and 2000 models. Version 3 software supports Router mode only. The BorderGuard Version 4 NetSentry software supports either Router or Bridge mode.

Based on the BorderGuard's Version ID/Mode, the following configuration menus refer either to Router Mode or Bridge Mode Configuration.

For router mode configuration, you need to establish the IP addresses and netmasks for each of the BorderGuard's network interfaces (the BorderGuard should separate your internal protected networks from outside untrusted networks).

The LAN Interfaces Entry menu is the first example of a configuration menu that allows you to list multiple entries. You can add as many entries to the list as you can see on your screen. Each Entry menu allows you to add, edit, or delete entries in the list.

Use the LAN Interfaces Entry Menu to enter BorderGuard configuration information for a LAN interface.

It is important to list the outside untrusted network interface first!


Table 10: LAN Interfaces Entry Menu
Field Name Description Your Entry(ies)

Interface's IP Address

This is the IP address used by the BorderGuard on each interface.

Netmask

This is the IP mask used on each interface.


Note The first entry will be configured for the en01 interface, the second for en02, and so on.

Use the WAN Interfaces Entry Menu to enter BorderGuard configuration information for a WAN interface.


Table 11: WAN Interfaces Entry Menu
Field Name Description Your Entry(ies)

Interface's IP Address

This is the IP address used by the BorderGuard for the PPP interface.

Remote PPP IP Address

This is the Destination IP address used by the BorderGuard for the PPP interface.

Use the BorderGuard Configuration Menu (Router) to enter configuration data for a BorderGuard that will be acting as a router.


Table 12: BorderGuard Configuration Menu (Router)
Field Name Description Your Entry

BorderGuard's Primary IP Address*

This is the IP address that connects the BorderGuard to the network.

BorderGuard's default gateway

This is the IP address that the BorderGuard uses for its default gateway.

Minutes to log on an event

This is the number of minutes to log IP traffic after a serious event occurs. The recommended value is 15 minutes.

Minutes to shun on an event

This is the length of time in minutes that traffic should be blocked when a serious event occurs. The recommended value is 1440, which equals one day.

Sensor IP Address

This is the Sensor's IP address.

BorderGuard's NAT IP Address

This is the network-translated IP address used by the BorderGuard connected to the Sensor. (Use only if NAT is being used on your network.)

BorderGuard's IP Address connected to Sensor

This is the IP address used by the BorderGuard's interface that is connected tot the Sensor.

BorderGuard's External IP Address

The Sensor uses the External IP Address as a reference to the untrusted networks.


Note *If you are using encrypted sleeves over the Internet, this should be a routeable Internet address.

Use the Static Routes Entry Menu to enter the IP addresses, Netmasks, and Gateway IP addresses for the static routes to be implemented by the BorderGuard.


Table 13: Static Routes Entry Menu
Field Name Description Your Entry(ies)

Static Route's Network IP Address

This is the IP address for the static route.

Static Route's Network Netmask

This is the netmask for the subnet.

Static Route's Network Gateway IP Address

This is the IP address that acts as a gateway to the static route.

For bridge mode configuration, use the BorderGuard Configuration Menu (Bridge) to enter configuration data for a BorderGuard that will be acting as a bridge.


Table 14: BorderGuard Configuration Menu (Bridge)
Field Name Description Your Entry

BorderGuard's IP Address*

This is the IP address that connects the BorderGuard to the network.

BorderGuard's default gateway

This is the IP address that the BorderGuard uses for its default gateway.

Minutes to log on an event

This is the number of minutes to log IP traffic after a serious event occurs. The recommended value is 15 minutes.

Minutes to shun on an event

This is the length of time in minutes that traffic should be blocked when a serious event occurs. The recommended value is 1440, which equals one day.

Sensor IP Address

This is the Sensor's IP address.

BorderGuard's NAT IP Address

This is the network-translated IP address used by the BorderGuard connected to the Sensor. (Use only if NAT is being used on your network.)


Note *If you are using encrypted sleeves over the Internet, this should be a routeable Internet address.

Use the Security Policy Configuration Menu to establish which incoming services to allow on your interface. You also use this menu to specify the servers to which this traffic will be allowed to pass.


Note The Security Policy Configuration Menu applies to both Router Mode and Bridge Mode configuration.

Table 15: Security Policy Configuration Menu
Field Name Description Your Entry(ies)

Interface's IP Address*

This is the IP address of the server that is allowed to service requests coming in through the BorderGuard's External IP address.

Port

This is the port on the server for the allowed service.


*The Interface's IP Address field supports the definition of multiple IP addresses using any combination of the following formats:

  • ipAddr---a single IP address.

  • ipAddr,ipAddr---multiple IP addresses.

  • ipAddr..ipAddr---an inclusive range of IP addresses.

Examples: 10.1.6.1, 10.1.6.20, 10.1.6.31, and 10.1.6.35 define 10.1.6.10, 10.1.6.20, and the IP addresses from 10.1.6.31 through 10.1.6.35.

Use the Internal Networks Entry Menu to establish the IP addresses and Netmasks for the Internal Protected Networks.


Table 16: Internal Networks Entry Menu
Field Name Description Your Entry(ies)

Internal Network's IP Address

This is the IP address for the subnet(s) within the network being monitored by NetRanger.

Internal Network's Netmask

This is the netmask(s) for the subnet(s).

4 - Database Configuration (Required for Database)

Typing 4 at the Main Menu opens the Database Configuration Menu. Use this menu to enter the Database User ID, the Database Password, and the person to be notified for NetRanger events.


Table 17: Database Configuration Menu
Field Name Description Your Entry

Database USER ID

This is the user ID used to log into the database.

Database PASSWORD

This is the password used to log into the database.

DO NOT WRITE YOUR PASSWORD HERE!

Notify Person*

This is the person the NetRanger system notifies. Notification is based on criteria you will configure in the sapd.conf file during installation and configuration of NetRanger's sapd component. Please refer to Chapter 5 in this User's Guide for additional information.


Note *This entry must be a valid e-mail or pager address.

5 - Source Configuration (Required for Director)

Typing 5 at the Main Menu opens the Source Entry Menu. Use this menu to enter the Organization and Host names, Organization and Host IDs, and IP routing addresses for the sources of NetRanger events. Enter this information for each Sensor that will be sending events to the Director.


Table 18: Source Entry Menu
Field Name Description Your Entry(ies)

Source NetRanger Org Name

This is the source's organization name.

Source NetRanger Org ID

This is the source's organization ID. This ID must be identical on all NetRanger systems (Sensors and Directors) within an organization. You must enter a value between 1-65535 in this field.

Source NetRanger Host Name

This is the source's NetRanger host name.

Source NetRanger Host ID

This is the source's host ID. You must enter a value between 1-65535 in this field. This is NOT the IP address.

IP Address of next NetRanger Postoffice in path to Src

This is the IP address of the NetRanger postoffice that can route NetRanger packets from the source. (If the network does not require an intermediary postoffice, this should be the IP address of the source.)

6 - Destination Configuration (Required for Sensor/Optional for the Director)

Typing 6 at the Main Menu opens the Destination Entry Menu. Use this menu to enter the Organization and Host names, Organization and Host IDs, IP routing addresses, Destination Services, and Event Logging Levels for the destinations of NetRanger events.


Table 19: Destination Entry Menu
Field Name Description Your Entry(ies)

Destination NetRanger Org Name

This is the destination's organization name.

Destination NetRanger Org ID

This is the destination's organization ID. This ID must be identical on all NetRanger systems (Sensors and Directors) within an organization. You must enter a value between 1-65535 in this field.

Destination NetRanger Host Name

This is the destination's host name.

Destination NetRanger Host ID

This is the destination's host ID. You must enter a value between 1-65535 in this field.

IP Addr of next NetRanger Postoffice in path to Dest

This is the IP address of the NetRanger postoffice that can route NetRanger packets to the destination. (If the network does not require an intermediary postoffice, this should be the IP address of the destination.)

Service to send events to

This is the name of the service NetRanger events will be sent to. You must enter loggerd, smid, or eventd in this field.

Lowest Level Alarm/Event to send

This is the lowest level of NetRanger alarm/event to send to the service (loggerd, smid, or eventd) you chose in the previous field. You must enter a value between 1-255 in this field. (The recommended level for alarms sent to smid is 2 and 1 for alarms sent to loggerd.)


Note On a Sensor, you should add the Director machine as a smid destination and you should add the Sensor machine as a loggerd destination so that you can log level 1 alarms/events on the Sensor.

7 - Postoffice Router Configuration (Required for Postoffice Routing)

Typing 7 at the Main Menu opens the Router Entry Menu. Use this menu to enter the Organization and Host names, Organization and Host IDs, and IP Routing Addresses for remote NetRanger nodes that are not being used as a source or destination.


Table 20: Router Entry Menu
Field Name Description Your Entry

Remote NetRanger Org Name

This is the organization name of the remote NetRanger node.

Remote NetRanger Org ID

This is the remote NetRanger node's organization ID. This ID must be identical on all NetRanger systems (Sensors and Directors) within an organization. You must enter a value between 1-65535 in this field.

Remote NetRanger Host Name

This is the remote NetRanger node's host name.

Remote NetRanger Host ID

This is the remote NetRanger node's host ID. You must enter a value between 1-65535 in this field.

IP Addr of next Postoffice in path to Remote NetRanger

This is the IP address of the NetRanger postoffice that can route NetRanger packets to the remote node. (If the network does not require an intermediary postoffice, this should be the IP address of the remote node.)

8 - Sleeve Configuration (Optional for Sensor)

Typing 8 at the Main Menu opens the Sleeved Networks Entry Menu. Use this menu to enter the Remote Organization ID, Remote IP routing addresses, and Remote Network Netmasks for Sleeved Networks.


Table 21: Sleeved Networks Entry Menu
Field Name Description Your Entry(ies)

Sleeve's Remote Organization ID

This is the organization ID for the remote end of the sleeve.

Sleeve's Remote Network IP Address

This is the IP address for the remote end of the sleeve.

Sleeve's Remote Network Netmask

This is the subnet netmask for the remote end of the sleeve.

9 - Clear Temporary Configuration Files

Typing 9 at the Main Menu prompts you to ensure that you want to clear the temporary configuration files for the NetRanger software.

Are you sure you want to CLEAR the Temporary Configuration Files? (y/n)> 
 

Type y to clear and reinitialize the temporary NetRanger configuration files in /usr/nr/etc/wgc and the temporary BorderGuard configuration files in /usr/nr/etc/nsc to their default values. This will not discard any configuration information you entered in the current nrconfig session.

10 - Generate Temporary Configuration Files

Typing 10 at the Main Menu prompts you to insure that you want to generate the temporary configuration files for the NetRanger software.

Are you sure you want to GENERATE the Temporary Configuration Files? (y/n)> 
 

Type y to write the temporary NetRanger configuration files containing all the modifications made in the current nrconfig session to /usr/nr/etc/wgc and the temporary BorderGuard configuration files to /usr/nr/etc/nsc.


Note You should review the temporary NetRanger configuration files located in the /usr/nr/etc/wgc directory and the BorderGuard configuration files located in the /usr/nr/etc/nsc directory after nrconfig has generated the temporary configuration data. The temporary NetRanger configuration files must be committed to /usr/nr/etc and the temporary BorderGuard configuration files to /tmp after review or after any manual changes. The BorderGuard files must then be loaded onto the NSG BorderGuard via a TFTP session initiated by the BorderGuard.

11 - Edit/Review Temporary Configuration Files

Typing 11 at the Main Menu starts a vi editing session on the temporary NetRanger configuration files in /usr/nr/etc/wgc and the temporary BorderGuard configuration files to /usr/nr/etc/nsc.

12 - Review Temporary Configuration Files

Typing 12 at the Main Menu starts a more command on the temporary NetRanger configuration files in /usr/nr/etc/wgc and the temporary BorderGuard configuration files in /usr/nr/etc/nsc.

13 - Commit Temporary Configuration Files

Typing 13 at the Main Menu prompts you to ensure that you want to commit the temporary configuration files for the NetRanger software to the NetRanger Configuration File Directory.

Are you sure you want to COMMIT the Temporary Configuration Files to the NetRanger Configuration File Directory `/usr/nr/etc' and to the BorderGuard Configuration File Directory `/tmp'? (y/n)> 
 

Type y to write the configuration temporary NetRanger configuration files to the /usr/nr/etc and /tmp directories.


Note This overwrites working NetRanger configuration files.

14 - License Request Information


Note This functionality has been disabled.

15 - Generate License Certificate Request(s)


Note This functionality has been disabled.

16 - License Certificate Manual Entry


Note This functionality has been disabled.

Enter - EXIT

Pressing Enter at the Main Menu prompts you to ensure that you are ready to exit nrconfig:

Are you sure you want to EXIT? (y/n)> 
 

Type y to exit nrconfig.


Note You can exit and restart nrconfig without losing any of the configuration information you have input.

NetRanger network configuration is complete.


Note The NetRanger processes must be set using the nrstop and nrstart commands before the committed NetRanger configuration files will take effect.

Note The BorderGuard Configuration Files must be uploaded to the BorderGuard and the BorderGuard must be restarted before any changes to the configuration files take effect.

If you are using a BorderGuard 2000 with Version 4.0 of the NetSentry software, then you may not have enough file space on the BorderGuard boot diskette to load the new BorderGuard configuration files. After you make backup copies of the files on the diskette, then you may delete the readme, firewall.def, and firewall.set files which are not needed for normal operation.

Related Documentation

Use these release notes in conjunction with the following document:

Cisco Documentation CD-ROM

Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM, a member of the Cisco Connection Family, is updated monthly. Therefore, it might be more current than printed documentation. To order additional copies of the Documentation CD-ROM, contact your local sales representative or call customer service. The CD-ROM package is available as a single package or as an annual subscription. You can also access Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

Cisco Connection Online

Cisco Connection Online (CCO) is Cisco Systems' primary, real-time support channel. Maintenance customers and partners can self-register on CCO to obtain additional information and services.

Available 24 hours a day, 7 days a week, CCO provides a wealth of standard and value-added services to Cisco's customers and business partners. CCO services include product information, product documentation, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.

CCO services a wide variety of users through two interfaces that are updated and enhanced simultaneously: a character-based version and a multimedia version that resides on the World Wide Web (WWW). The character-based CCO supports Zmodem, Kermit, Xmodem, FTP, and Internet e-mail, and it is excellent for quick access to information over lower bandwiths. The WWW version of CCO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.

You can access CCO in the following ways:

For a copy of CCO's Frequently Asked Questions (FAQ), contact cco-help@cisco.com. For additional information, contact cco-team@cisco.com.


Note If you are a network administrator and need personal technical assistance with a Cisco product that is under warranty or covered by a maintenance contract, contact Cisco's Technical Assistance Center (TAC) at 800 553-2447, 408 526-7209, or tac@cisco.com. To obtain general information about Cisco Systems, Cisco products, or upgrades, contact 800 553-6387, 408 526-7208, or cs-rep@cisco.com.





hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Jul 27 12:07:31 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.