360 likes | 376 Views
Ray Jones Director of Solutions Architecture and Field Enablement. Security Monitoring In Your Network. Strategies to Safeguard Your Network Using NetScout’s 3900 Series Packet Flow Switch. A BAD YEAR for Cyber Security. ENTERTAINMENT GOV’T & HEALTH CARE PLATFORM
E N D
Ray Jones Director of Solutions Architecture and Field Enablement Security Monitoring In Your Network Strategies to Safeguard Your Network Using NetScout’s 3900 Series Packet Flow Switch
A BAD YEAR for Cyber Security ENTERTAINMENT GOV’T & HEALTH CARE PLATFORM RETAIL FINANCIAL
Cyber Security Monitoring: Two Challenges • ObscurityProtagonist often intentionally averts detection • TransienceSequence of events may be difficult to reproduce
Scalable, flexible, feature rich. 3900 SERIES PACKET FLOW SWITCH INTRODUCTION
nGenius 3900 Series Packet Flow Switch Centralized Management 3903 Chassis Up to 144 Ports1/10 GbE + 12 Ports 40 GbE* 3901 Chassis Up to 48 Ports 1/10 GbE + 4 Ports 40 GbE* • Pay-as-you-grow modules & chassis • Supports > 4000 ports with PFS Management Software • Large site deployments needing >144 ports • 3RU modular switch • Medium to large single site or multi-site deployments needing >48 ports • 1RU modular switch • Small single site or multi-site deployments needing 16 to 48 ports * 100G Early Field Trial Available
nGenius 3900 Series Packet Flow Switch • Redundant Switch Controllers • Resides on each blade • Automatic failover Redundant Ethernet Management Ports Redundant AC/DC Power Supplies Serial Console Port • Interface Blade • FlexPorts supporting 1/10/40G • Up to 48 x 1/10G per RU • Up to 4 x 40G per RU • Built-in GUI Management or PFS Management System • 1U and 3U Base Chassis Options • Modular + Stackable Monitoring Fabric Growth • 1/10/40Gbps Native per Blade • Full Line Rate, All-Inclusive Blade Based Features • 100G Early Field Trial Available
nGenius 3900 Series Packet Flow Switch Full-Duplex 720GbpsLine-rate Processing * * * Advanced Switching Engine with Extensible Microcode Console 16x 1G/10G 4x 40G or 16x 1G/10G 16x 1G/10G
nGenius 3900 Series Packet Flow Switch Network Site A Site B
Ensuring rapid, reliable incident response. DYNAMIC TARGETING
Dynamic Targeting: Problem & Requirement • Problem:Security events may requirereactive changes to monitoring fabric. • Requirement:Implement dynamic, automated changes via secure management channel.
Use Case: Targeted packet capture for suspect flows Network ContinuousMonitoring TAPs PFS Escalation Analysis Site B Site A
Use Case: Targeted packet capture for suspect flows Network ContinuousMonitoring • Traffic flows throughTAPs to Sites A & B TAPs 1 PFS Escalation Analysis Site B Site A
Use Case: Targeted packet capture for suspect flows Network ContinuousMonitoring • Traffic flows throughTAPs to Sites A & B • PFS steers traffic fromTAPs to Monitoring tools TAPs 2 PFS Escalation Analysis Site B Site A
Use Case: Targeted packet capture for suspect flows ! ! ! Network ContinuousMonitoring • Traffic flows throughTAPs to Sites A & B • PFS steers traffic fromTAPs to Monitoring tools • Monitoring tool detectssuspicious activity TAPs 3 PFS Escalation Analysis Site B Site A
Use Case: Targeted packet capture for suspect flows Network ContinuousMonitoring • Traffic flows throughTAPs to Sites A & B • PFS steers traffic fromTAPs to Monitoring tools • Monitoring tool detectssuspicious activity • a) Script configurespacket flow switchto target IP addressb) Script activatesEscalation Analysis tool TAPs 4a PFS Escalation Analysis 4b Site B Site A
Use Case: Targeted packet capture for suspect flows Network ContinuousMonitoring • Traffic flows throughTAPs to Sites A & B • PFS steers traffic fromTAPs to Monitoring tools • Monitoring tool detectssuspicious activity • a) Script configurespacket flow switchto target IP addressb) Script activatesEscalation Analysis tool • PFS sends targeted traffic toEscalation Analysis tool TAPs PFS Escalation Analysis 5 Site B Site A
Scripting for Dynamic Targeting • OptimizedManagement forMonitoring Tools nGeniusONE
Scripting for Dynamic Targeting • OptimizedManagement forMonitoring Tools • PFS Managerfor PFS PFSManager nGeniusONE
Scripting for Dynamic Targeting nGenius PFSManagement SoftwareAdministrator Guide • SSH fromClient to PFS,Monitoring Tools PFSManager SSH SSH SSH SSH Client
Sample PFS SSH/CLI Script def main(): client = paramiko.SSHClient() client.load_system_host_keys() client.set_missing_host_key_policy(paramiko.AutoAddPolicy()) prompt = '=> ' hostname = '10.88.39.192' #Replace with actual IP address of PFS or PFS Mgmt Server username = 'administrator' #Replace if you need to use a different user; normally "administrator" is correct password = 'netscout1' #Replace with actual password client.connect(hostname,int(22022),username,password) #Presumes that PFS CLI SSH uses default port 22022 interact = SSHClientInteraction(client,timeout=10,display=True) interact.expect(prompt) # raw_input('Press Enter to continue') interact.send("Add Rule 'Dynamic Target' 'permit ip && ip.addr==192.168.0.171'") interact.expect(prompt) cmd_output = interact.current_output_clean interact.send("Add Rule 'Dynamic Target' 'permit ip && ip.addr==192.168.0.171'")
What should the system do? Upon trigger detection: • Create Rule(s) based upon trigger, e.g., IP address • Create Filter(s) and assign Rule(s) to it • Connect Source Ports(s) via Filter(s) to Destination Port(s) • Prepare Escalation Analysis platform. Following “All Clear”: • Restore original configuration
Components of Dynamic Targeting • PreparationDefine/configure interfaces to PFS, Tools • IdentificationEstablish triggers for response • ResponseInitiate changes to monitoring infrastructure
Everything you need, and nothing you don’t. FILTERING TOOLS
Filtering: Problem & Requirement • Problem:Cyber tools may become congested by high traffic volumes • Requirement:Filter for traffic of interest, expect to make changes later. Total Network Activity Traffic of Interest Threat
Use Case: Limit traffic to necessary content Link Utilization Packet Rate Network Network Network CyberSecurity Monitoring !
Filtering Techniques • Criteria • Layer 2: MAC, VLAN ID & Priority, Ethertype • Layer 3: IP address, Payload type • Layer 4: TCP/UDP Port, Protocol • DPI: Custom Mask & Offset • Dimension • Direction: Side A v. Side B, Source v. Destination • Criteria: Permit v. Deny per Criterion • Range: Efficient Address Masking • Types: Connection v. Destination
Filtering Structure – Building Blocks • Criteria • Rules • Filter • Topology
Flexible Filtering: Connection v. Destination Filter on Connection Filter at Destination
Dynamic Targeting: On-demand Filter creation Network ContinuousMonitoring • Both Connectionand Destination Filterswork for Dynamic Targeting • Filtering occurs inhardware at line-rate • Filter changes are non-disruptive(except adding a Connection Filterinto a Connection - obviously) TAPs Escalation Analysis PFS Site B Site A
Traffic Conditioning: Problem & Requirement • Problem:Cyber Monitoring tool may be unable to parsesome packet headers, rendering payload analysisimpossible. • Requirement:Condition Traffic within the monitoring switch.
Summary • DYNAMIC TARGETING Expedite incident response, especially after hours • FILTERING TOOLS Optimize monitoring tool performance • ADVANCED TIPS & TRICKSTraffic Conditioning, Metrics, Load-Balancing, Baselining
Summary • 3900 SERIES PFS OVERVIEWImprove visibility while controlling scale • DYNAMIC TARGETING Expedite incident response, especially after hours • FILTERING TOOLS Optimize monitoring tool performance
THANK YOU