Tuesday, October 09, 2007

MARS AAA with Microsoft IAS

I was going to do a write up on configuring the new MARS 4.3.1 AAA authentication feature with Cisco ACS.

But to be honest, there is a great write up in the official MARS documentation on doing just that, so in this article i`ll show you how to configure AAA with Microsoft IAS Server, for those of you who dont own an ACS Box.

We'll use Microsoft IAS, and if you dont know, this is the Microsoft implementation of a Remote Authentication Dial-in User Service (RADIUS) server, which comes built into Windows 2000 Server and Windows Server 2003.

I`m not going to go through installing IAS, but theres plenty of guides to doing this on the web.

Lets start by adding a new RADIUS Client...


Now Click Next, and select Cisco for the Client-Vendor, and enter a shared key that the two devices will share for the authentication process.

Next, we need to create a remote access policy. For ease, we will create a new one, and delete any existing predefined entries.

1. In the Internet Authentication Service window, click Remote Access Policies in the left pane.
2. In the right pane, right-click the default policy, and select Delete.
3. Right-click, and select New Remote Access Policy.
4. In the Remote Access Policy Wizard, click Next.
5. Click Set Up A Custom Policy, name it Cisco MARS, and click Next.
6. Click Add, select Windows-Groups, and click Add


Specifiy a Windows group, and click OK. This takes you to the Policy Conditions screen of the New Remote Access Policy Wizard



1. Click Next, select Grant Remote Access Permission, and click Next.
2. Click Edit Profile, and select the Authentication tab.
3. Only select the Unencrypted Authentication (PAP/SPAP) check box



  1. Next, select the Advanced tab.
  2. Select Service-Type, and click Edit.
  3. In the Enumerable Attribute Information dialog box, select Login from the Attribute Value drop-down list.

Back on the Advanced tab, select Framed-Protocol, and click Remove.


Click OK, and its done!
Oh, and one point, make sure you have allowed Dial-In rights, on the User, under AD Users and Computers.

Now the MARS Bit....

Now the first thing i would do is create user accounts in MARS, for the users you want AAA access. I know this seems weird, but you will see why later! Also make sure you create these case perfect to your windows accounts.

Once done, you can configure the MS IAS Server in MARS...

This is quite simple, go to Admin/Authentication Configuration...


Now under AAA Server Configuration select ADD...


And, Add AAA Server on a new host..


Fill in the IP`s etc, then click Next. Now click, ADD again for a Generic AAA Server..


Now specify the name, and Shared Key we specified earlier in the IAS Config, along with the Radius Server ports. I used, 1812 and 1813.

Now Click Test Connectivity, which will result, in either a Failure, if any of the parameters are wrong (especially the shared key), or success...


If Success, enter a windows user name and password to test the authentication process.

Once done, we can then set MARS to use AAA for logins...

Under Admin/Authentication Configuration, specify the IAS Server as the authentication method, and optionally set a lock out.

Once you click Submit, MARS will delete all the local User passwords you created earlier (except Admins).....


This will create an incident...


And thats it, all the MARS configuration done.

Now there are a couple of bits of note, to tell you about. To remove the IAS Server, you cannot do this via the normal Security and Monitor devices. If you try you will get this error...


Instead, delete the IAS Server, via the Authentication Configuration screen.

Logging on the Microsoft IAS is pretty poor...

And these will be obviously stored on the Windows Box, and not MARS! Obviously with ACS and the agent, you can get the logs back into MARS, but Windows does not have a native Syslog engine.

So you could run a query with the PNMARS device, for account logins...

Also a bug you should be aware about in the GUI when using AAA services, is that your user accounts may appear "locked", even if you do not use a Lock Out policy...


And err....


This does not effect the AAA function in anyway, and should be fixed in the next release.

Now this method worked fine in the lab, if you make a complete hash of the above dont blame me! :-)

In the next article i show you some CLI commands, to unlock user accounts.

Tuesday, October 02, 2007

642-544 cisco MARS Exam

I get a lot of visitors to the Blog via the keyword 642-544, so I thought i`d give the new MARS exam another mention.

The MARS exam is part of the Cisco CCSP Certification Track, and there are a couple of training courses available in the official Instructor Led Course or 3rd Party Hands On Real World Training Course by Priveon.

There are also two books available, Security Threat Mitigation and Response: Understanding Cisco Security MARS and Security Monitoring with Cisco Security MARS.

The Cisco Press website, only recommends the first book though.

Another useful resource is the Cisco MARS User Group, where there are now over 430 members.

Exam Topics

The following topics are general guidelines for the content likely to be included on the Remote Access exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

Install and configure the Cisco Security MARS product

  • Identify the components, features and functions of the Cisco Security MARS product
  • Describe the process of installing the Cisco Security MARS appliance
  • Add Cisco reporting devices into the Cisco Security MARS appliance
  • Add non-Cisco reporting devices into the Cisco Security MARS appliance
  • Investigate events that the Cisco Security MARS appliance collects from configured security devices
  • Configure the Cisco Security MARS appliance to send alerts
  • Create and view a long-duration query on the Cisco Security MARS appliance
  • Configure rules to detect interesting patterns of network activity and other anomalous network behavior
  • Use the management features in the Cisco Security MARS appliance to assign event, addressing, service, and user information
  • Configure the Cisco Security MARS appliance hardware maintenance activities
  • Utilize the Global Controller to manage multiple Cisco Security MARS appliances
Good luck with the Exam!

Monday, October 01, 2007

UK Email and Web Security Seminars

For readers in the UK, there are still some limited spaces available, this week and next, at a Cisco/Ironport Email and Web Security event.

"Satisnet in conjunction with Cisco invite you to a seminar aimed at educating you on the Ironport solutions and how they can save you time and money in terms of managing your messaging and web environment and enabling sophisticated secure business messaging and document delivery."

Flyers, and registration details are available below....

London, Cisco, Bedfont Lakes, Wednesday 3rd October 2007

Manchester, Cisco, Didsbury Offices, Tuedday 9th October 2007

There will also be a chance to see Cisco MARS in action on both days at these events.

Thursday, September 27, 2007

Cisco MARS 4.3.1 Now Available

Cisco MARS 4.3.1 is now available (and 5.3.1 for Gen2).

There are some great new features, briefly mentioned below...

Data Migration Support

Beginning with this release, you can migrate configuration and event data from a MARS Appliance running 4.x to a newer model running 5.x.

Centralized Password Management—External AAA Server Support

External Authentication, Authorization, and Auditing (AAA) servers can now act as the authentication mechanism for MARS Appliance GUI logins (username and password). Previously, each MARS Appliance authenticated login name/password combinations with the appliance's local user database. Release 4.3.1 supports the following external RADIUS AAA servers:

Cisco Secure Access Control Server (ACS)

Microsoft Internet Authentication Service (IAS) Server

Juniper Networks Steel belted RADIUS

Account Locking—Login Security

Previously, MARS Appliances permitted an unlimited number of login attempts. With Release 4.3.1, the adminstrator can configure the GUI to lock after a specified number of failed login attempts, or can configure the GUI to never lock.

Monitoring Global Controller Connection Status from the Local Controller

Previously, the connection status between a Local Controller and a Global Controller was reported on the Global Controller's Zone Controller Information page

(Admin > System Setup > Local Controller Management).

With Release 4.3.1, the Local Controller now generates syslogs to record communication problems caused by the following events:

Local Controller cannot connect to the Global Controller

Local Controller certificate is not on the Global Controller or vice versa

Local Controller and Global Controller are operating with incompatible MARS release versions

Release 4.3.1 defines seven new events, three new system rules, and two new system reports on the Local Controller to monitor the connection status with the Global Controller.

GUI and CLI Timeout Interval

Previously, the GUI would timeout after 30 minutes of inactivity. With Release 4.3.1, the timeout interval for the GUI can be set at 15, 30 (default), 45, and 60 minutes, or as Never (never will timeout). Different GUI timeout intervals can be set for the Administrator, Security Analyst. and Operator roles. The Administrator parameter also sets the CLI timeout.


Miscellaneous Changes and Enhancements

The following changes and enhancements exist in 4.3.1:

Global Controller-to-Local Controller Communication Enhancements. Enhancements include more efficient data batches, reduced transfer times, and a prioritization on recent data. If a data backlog occurs due to a Global Controller-to-Local Controller disconnect, the Local Controller sends recent data first and stays in sync with new data coming in. The Local Controller catches up with older data over time.

Support for Cisco IPS 6.0 Dynamic Signature Updates. Download new signatures from CCO and correctly process and categorize received events that match those signatures, which includes them in inspection rules and reports. These updates provides event normalization and event group mapping, and they enable your MARS Appliance to parse Day Zero signatures from the IPS devices

Syslog Forwarding. Designate a syslog collector and forward syslog messages received from one or more IP addresses to that collector.

Password Management Enhancement. Non-administrative users can change the password associated with their account. Previously, editing a MARS user was considered an administrative task and limited to those accounts with the admin role.

Raw Message Log Enhancement.To view and delete queries in the local cache, click the View Cache button on the Retrieve Raw Messages page accessed from Admin > System Maintenance > Retrieve Raw Messages.Previously, queries were purged automatically every two weeks; this feature helps avoid disk space shortages that could occur before that period elapsed.

GC2R Support. The 4.3.1 and 5.3.1 releases are interoperable, allowing the GC2R to manage Local Controllers running 4.3.1 on the following models: MARS 20R, MARS 20, and MARS 50.

Enhanced Cisco Device Support:

IPS 6.0

PIX / ASA 7.2

CSA 5.0, 5.1, and 5.2

Cisco IOS P1-5

FWSM 3.1.5

Enhanced 3rd-Party Device Support.

ISS Site Protector 2.0

CheckPoint R61, R62, and R65.

Update to intrusion prevention, and intrusion detection, and vulnerability assessment signature sets.

Bug fixes.

New Vendor Signatures

Release notes for the new version are available HERE.

Look out on the Blog over the next few days, for details on the new features.


Wednesday, September 26, 2007

Guard & Detector Custom Parser

As promised an example Custom Parser for the impressive Cisco Guard & Detector.


Like any Cisco device, these appliances or Catalyst 6500 Modules can produce syslog. And since these devices are not on the MARS supported Device list, a Custom Parser was needed for MARS to understand the incoming syslog, to convert to Events.

I created a few Log Parser Templates for a section of Guard Events, including system added Dynamic Filters, User Pending Dynamic Filters, Attack Started etc....

NB: To receive events about the addition and removal of dynamic filters, the trap level must be changed to informational, on the Guard/Detector.

With simple String matching in the RAW syslog, with some events containing more "useful" information than others...


Once done, MARS can then interpret the incoming Syslog from an Inline Catalyst 6500 Guard in the example below.


And it can Sessionize this information where possible..

In this case, I did not define the new log templates to already defined MARS Event Types, so I created Rules, to fire Incidents.....



And more importantly a reporting back-end over time.....


For more information on the DDOS Mitigation Guard & Detector, visit HERE for Cisco.com website info, or speak to Satisnet or your local Cisco Account Rep.

Monday, September 24, 2007

Cisco Guard and Detector

Appologies for the lack of updates, i`ve been working away on a DDOS project utilizing the Cisco Guard and Detector.

These appliances (or Cat 6500 Modules) are based upon the patented Multi-Verification Process (MVP) architecture.


This MVP architecture enables the Cisco Guard and Cisco Traffic Anomaly Detector to leverage the latest analysis and attack recognition techniques to detect and remove network attack traffic while scrubbing and reinjecting valid network traffic to its proper destination.

The Traffic Anomaly Detector learns what is a normal traffic pattern for a protected network area, or zone. DDoS mitigation policies are constructed and thresholds are tuned in order to react to various DDoS attack scenarios.

This DDoS attack diversion is typically implemented by updating the Border Gateway Protocol (BGP) routing table or by other mechanisms including static routes (manual IP routes) and policy-based routes (specific traffic forwarding based upon parameters including application and packet size).

The Guard's ability to update routing tables in the event of an attack (or always run inline with the Cat6500 Modules) allows the Guard to automatically scrub the DDoS attack traffic, while still forwarding or tunneling valid network traffic to the destination zone.

So less about the Guard itself on this blog (more soon on network-response), but look out tomorrow for an example MARS custom parser for the Guard & Detector.

Sunday, September 02, 2007

MARS 4.2.8 Released

Sorry for no new posts over the last 2 weeks, (and appologies if you have emailed, and had no reply) i`ve been on Hols to Greece and Turkey.

Old news now, but MARS 4.2.8 was released whilst I was away.


Release notes for Cisco Security MARS Appliance 4.2.8 are available Here.