01-20-2018 10:00 PM - edited 02-21-2020 07:10 AM
Hi Gents,
I required your support in one of the query which is we are using CISCO ASA 5545 Firewall and its inbuilt AIP-SSM module in IDS fail-open mode.
Because its in IDS mode its detecting attacks but the requirement is to know we want packet capture and storage facility of those detecting attacks with server response so that we can correlate whether that particular attack based on http response was successful or not. How can I achieve that? Need your help guys.
Thanks.
01-21-2018 12:02 AM
You need a management-Software for this. The free Cisco offering is the (near) EOL "IPS Manager Express (IME)" to manage the (near) EOL legacy IPS/IDS that you are running.
In my opinion it's not worth spending any time on this system. It's outdated, doesn't get any development any more and is soon end of life/support.
Better plan to migrate to Cisco Firepower managed by Cisco Firepower Management Center. That is the actual supported solution.
01-21-2018 12:43 AM
Karsten is giving good advice.
The old IPS type will only get signature updates (assuming a current subscription) until April 2018. It is well past its viable lifetime.
If your organization is serious about security, they won't continue to use it.
01-21-2018 12:48 AM
Agree and thanks for response.
01-21-2018 12:53 AM
Hi Karsten,
Thanks for your reply.
Quick query on this, in case we are going for Firepower series of ASAs with inbuilt module of IPS engine, then does that provide functionality of packet capture of detecting attacks including server replies? and can we configured that Firepower to send those packet captures to remote location for avoiding space limitation of physical device.
So basically a full requirement will be like typical IPS solution e.g McAfee NSM, Suricata.
01-21-2018 01:03 AM
Firepower NGIPS, when using Firepower Management Center (FMC), can capture the packets of attack attempts. It only saves them locally though. You can download a given one on an ad hoc basis.
If the server replied, it would mean that the attack wasn't detected blocked in the first place and we would thus have no criteria (on FMC) for selecting that particular conversation for capture among the many that are coming from the server.
If you wanted to monitor all server conversations to look for suspect flows, you would use something like Cisco Stealthwatch. It collects and analyzes Netflow data.
01-21-2018 01:17 AM
01-21-2018 01:29 AM
Ok, that makes sense.
If the flow from the server is identified as an intrusion event, FMC can capture it. However I'm not positive that it would correlate it with the incoming flow which was the initial indication of compromise.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide