TM Network Sensor Installation Guide Version 6.5 Internet Security Systems, Inc. 6303 Barfield Road Atlanta, Georgia 30328-4233 United States (404) 236-2600 http://www.iss.net © Internet Security Systems, Inc. 1998-2001. All rights reserved worldwide. Customers may make reasonable numbers of copies of this publication for internal use only. This publication may not otherwise be copied or reproduced, in whole or in part, by any other person or entity without the express prior written consent of Internet Security Systems, Inc. Patent pending. ActiveAlert, Database Scanner, FlexCheck, Internet Scanner, Internet Security Systems, Online Scanner, RealSecure, SAFElink, SecureLogic, System Scanner, X-Force, and X-Press Update are trademarks, and SAFEsuite a registered trademark, of Internet Security Systems, Inc. Acrobat and Adobe are registered trademarks of Adobe Systems Incorporated. Certicom is a trademark and Security Builder is a registered trademark of Certicom Corp. Check Point, FireWall-1, OPSEC, Provider-1, and VPN-1 are registered trademarks of Check Point Software Technologies Ltd. or its affiliates. Cisco and Cisco IOS are registered trademarks of Cisco Systems, Inc. HP-UX and OpenView are registered trademarks of Hewlett-Packard Company. IBM and AIX are registered trademarks of IBM Corporation. Intel and Pentium are registered trademarks of Intel. Lucent is a trademark of Lucent Technologies, Inc. ActiveX, Microsoft, Windows, and Windows NT are either registered trademarks or trademarks of Microsoft Corporation. Net8, Oracle, Oracle8, SQL*Loader, and SQL*Plus are trademarks or registered trademarks of Oracle Corporation. Seagate Crystal Reports, Seagate Info, Seagate, Seagate Software, and the Seagate logo are trademarks or registered trademarks of Seagate Software Holdings, Inc. and/or Seagate Technology, Inc. Secure Shell and SSH are trademarks or registered trademarks of SSH Communications Security. iplanet, Sun, Sun Microsystems, the Sun Logo, Netra, SHIELD, Solaris, SPARC, and UltraSPARC are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the United States and other countries. Adaptive Server, SQL, SQL Server, and Sybase are trademarks of Sybase, Inc., its affiliates and licensers. Tivoli is a registered trademark of Tivoli Systems Inc. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. All other trademarks are the property of their respective owners and are used here in an editorial context without intent of infringement. Specifications are subject to change without notice. Copyright © Sax Software (terminal emulation only). Disclaimer: The information contained in this document may change without notice, and may have been altered or changed if you have received it from a source other than ISS or the X-Force. Use of this information constitutes acceptance for use in an “AS IS” condition, without warranties of any kind, and any use of this information is at the user’s own risk. ISS and the X-Force disclaim all warranties, either expressed or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall ISS or the X-Force be liable for any damages whatsoever, including direct, indirect, incidental, consequential or special damages, arising from the use or dissemination hereof, even if ISS or the X-Force has been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by Internet Security Systems, Inc. The views and opinions of authors expressed herein do not necessarily state or reflect those of Internet Security Systems, Inc., and shall not be used for advertising or product endorsement purposes. Links and addresses to Internet resources are inspected thoroughly prior to release, but the ever-changing nature of the Internet prevents Internet Security Systems from guaranteeing the content or existence of the resource. When possible, the reference contains alternate sites or keywords that could be used to acquire the information by other methods. If you find a broken or inappropriate link, please send an email with the topic name, link, and its behavior to support@iss.net. January 2002 Internet Security Systems, Inc. Software License Agreement THIS SOFTWARE IS LICENSED, NOT SOLD. BY INSTALLING THIS SOFTWARE, YOU AGREE TO ALL OF THE PROVISIONS OF THIS SOFTWARE LICENSE AGREEMENT (“LICENSE”). IF YOU ARE NOT WILLING TO BE BOUND BY THIS LICENSE, RETURN ALL COPIES OF THE SOFTWARE AND LICENSE KEYS TO ISS WITHIN FIFTEEN (15) DAYS OF RECEIPT FOR A FULL REFUND OF ANY PAID LICENSE FEE. IF THE SOFTWARE WAS OBTAINED BY DOWNLOAD, YOU MAY CERTIFY DESTRUCTION OF ALL COPIES AND LICENSE KEYS IN LIEU OF RETURN. 1. License - Upon payment of the applicable fees, Internet Security Systems, Inc. (“ISS”) grants to you as the only end user (“Licensee”) a nonexclusive and nontransferable, limited license for the accompanying ISS software product in machine-readable form and the related documentation (“Software”) for use only on the specific network configuration, for the number of devices, and for the time period (“Term”) that are specified in Licensee’s purchase order, as accepted by ISS, and the invoice and license key furnished by ISS. ISS limits use of Software based upon the number and type of devices upon which it may be installed, used, gather data from, or report on, depending upon the specific Software licensed. A device includes any network addressable device connected to Licensee’s network, including remotely, including but not limited to personal computers, workstations, servers, routers, hubs and printers. Licensee may reproduce, install and use the Software on multiple devices, provided that the total number and type are authorized in Licensee’s purchase order, as accepted by ISS, and the invoice and license key furnished by ISS. Licensee may make a reasonable number of backup copies of the Software solely for archival and disaster recovery purposes. If Software is ISS’ SAFEsuite Decisions product, then it is delivered with Seagate Info, a third party software product of Seagate Software Information Management Group Holdings, Inc. Seagate Info is restricted to use with ISS SAFEsuite Decisions and no other application. A license of ISS SAFEsuite Decisions allows Licensee to implement up to three (3) copies of SAFEsuite Decisions of which one (1) of these copies may be for production use. Each Seagate Info license includes ten (10) “Client” licenses and one (1) Report/Query Add-In “Designer” license. Additional copies require additional licenses. Seagate Info is subject to the terms and conditions of the license agreement accompanying such software. ISS will provide to Licensee, upon request and in any event upon delivery of such software, copies of licensing documentation applicable to such software. Seagate Info is supplied by ISS “AS IS”, without any warranties of ISS whatsoever. 2. Covenants - ISS reserves all intellectual property rights in the Software. Licensee agrees: (a) the Software is owned by ISS and/or its licensors, is a valuable trade secret of ISS, and is protected by copyright laws and international treaty provisions; (b) to take all reasonable precautions to protect the Software from unauthorized access, disclosure, copying or use; (c) not to modify, adapt, translate, reverse engineer, decompile, disassemble, or otherwise attempt to discover the source code of the Software; (d) not to use ISS trademarks; (e) to reproduce all of ISS’ and its licensors’ copyright notices on any copies of the Software; (f) not to transfer, lease, assign, sublicense, or distribute the Software or make it available for timesharing, service bureau, or on-line use; and (g) not to disseminate performance information or analysis (including without limitation benchmarks) from any source relating to the Software. 3. Support and Maintenance - During the term for which Licensee has paid the applicable support and maintenance fees, ISS will, upon request, provide software maintenance and support services that it makes generally available under its then current Maintenance and Support Policy. Support and maintenance include telephone support and electronic delivery to Licensee of error corrections and updates to the Software (but NOT new releases or products that substantially increase functionality and are marketed separately) and documentation as described in ISS’ then current Maintenance & Support Policy. 4. Limited Warranty - The commencement date of this limited warranty is the date on which ISS furnishes to Licensee the license key for the Software. For a period of ninety (90) days after the commencement date or for the Term (whichever is less), ISS warrants that the Licensed Software will conform to material operational specifications described in its then current documentation. However, this limited warranty shall not apply unless (i) the Software is installed, implemented, and operated in accordance with all written instructions and documentation supplied by ISS, (ii) Licensee notifies ISS in writing of any nonconformity within the warranty period, and (iii) Licensee has promptly and properly installed all corrections, new versions, and updates made available by ISS to Licensee. Furthermore, this limited warranty shall not apply to nonconformities arising from any of the following: (i) misuse of the Software, (ii) modification of the Software, (iii) failure by Licensee to utilize compatible computer and networking hardware and software, or (iv) interaction with software or firmware not provided by ISS. If Licensee timely notifies ISS in writing of any such nonconformity, then ISS shall repair or replace the Software or, if ISS determines that repair or replacement is impractical, ISS may terminate the applicable licenses and refund the applicable license fees, as the sole and exclusive remedies of Licensee for such nonconformity. THIS WARRANTY GIVES LICENSEE SPECIFIC LEGAL RIGHTS, AND LICENSEE MAY ALSO HAVE OTHER RIGHTS THAT VARY FROM JURISDICTION TO JURISDICTION. ISS DOES NOT WARRANT THAT THE SOFTWARE WILL MEET LICENSEE’S REQUIREMENTS, THAT THE OPERATION OF THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE, OR THAT ALL SOFTWARE ERRORS WILL BE CORRECTED. LICENSEE UNDERSTANDS AND AGREES THAT LICENSED SOFTWARE IS NO GUARANTEE AGAINST INTRUSIONS, VIRUSES, TROJAN HORSES, WORMS, TIME BOMBS, CANCELBOTS OR OTHER SIMILAR HARMFUL OR DELETERIOUS PROGRAMMING ROUTINES AFFECTING LICENSEE’S NETWORK, OR THAT ALL SECURITY THREATS AND VULNERABILITIES WILL BE DETECTED OR THAT THE PERFORMANCE OF THE LICENSED SOFTWARE WILL RENDER LICENSEE’S SYSTEMS INVULNERABLE TO SECURITY BREACHES. THE REMEDIES SET OUT IN THIS SECTION 4 ARE THE SOLE AND EXCLUSIVE REMEDIES FOR BREACH OF THIS LIMITED WARRANTY. 5. Warranty Disclaimer - EXCEPT FOR THE LIMITED WARRANTY PROVIDED ABOVE, THE SOFTWARE IS PROVIDED “AS IS” AND ISS HEREBY DISCLAIMS ALL WARRANTIES, BOTH EXPRESS AND IMPLIED, INCLUDING IMPLIED WARRANTIES RESPECTING MERCHANTABILITY, TITLE, NONINFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE. SOME JURISDICTIONS DO NOT ALLOW DISCLAIMERS OF IMPLIED WARRANTIES, SO THE ABOVE LIMITATION MAY NOT APPLY TO LICENSEE. LICENSEE EXPRESSLY ACKNOWLEDGES THAT NO REPRESENTATIONS OTHER THAN THOSE CONTAINED IN THIS LICENSE HAVE BEEN MADE REGARDING THE GOODS OR SERVICES TO BE PROVIDED HEREUNDER, AND THAT LICENSEE HAS NOT RELIED ON ANY REPRESENTATION NOT EXPRESSLY SET OUT IN THIS LICENSE. 6. Proprietary Rights - ISS represents and warrants that ISS has the authority to license the rights to the Software that are granted herein. ISS shall defend and indemnify Licensee from any final award of costs and damages against Licensee for any actions based on infringement of any U.S. copyright, trade secret, or patent as a result of the use or distribution of a current, unmodified version of the Software; but only if ISS is promptly notified in writing of any such suit or claim, and only if Licensee permits ISS to defend, compromise, or settle same, and only if Licensee provides all available information and reasonable assistance. The foregoing is the exclusive remedy of Licensee and states the entire liability of ISS with respect to claims of infringement or misappropriation relating to the Software. 7. Limitation of Liability - Licensee acknowledges that some of the Software is designed to test the security of computer networks and may disclose or create problems in the operation of the systems tested. Licensee accepts the risk of such possibility and hereby waives all rights, remedies, and causes of action against ISS and releases ISS from all liabilities arising therefrom. ISS’ ENTIRE LIABILITY FOR MONETARY DAMAGES ARISING OUT OF THIS LICENSE SHALL BE LIMITED TO THE AMOUNT OF THE LICENSE FEES ACTUALLY PAID BY LICENSEE UNDER THIS LICENSE, PRORATED OVER A THREE-YEAR TERM FROM THE DATE LICENSEE RECEIVED THE SOFTWARE. IN NO EVENT SHALL ISS BE LIABLE TO LICENSEE UNDER ANY THEORY INCLUDING CONTRACT AND TORT (INCLUDING NEGLIGENCE AND STRICT PRODUCTS LIABILITY) FOR ANY SPECIAL, PUNITIVE, INDIRECT, INCIDENTAL OR CONSEQUENTIAL DAMAGES, INCLUDING, BUT NOT LIMITED TO, COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, DAMAGES FOR LOST PROFITS, LOSS OF DATA, LOSS OF USE, OR COMPUTER HARDWARE MALFUNCTION, EVEN IF ISS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 8. Termination - Licensee may terminate this License at any time by notifying ISS in writing. All rights granted under this License will terminate immediately, without prior written notice from ISS, at the end of the term of the license, if not perpetual. If Licensee fails to comply with any provisions of this License, ISS may immediately terminate this License if such default has not been cured within ten (10) days following written notice of default to Licensee. Upon termination or expiration of the License, Licensee shall cease all use of the Software and destroy all copies of the Software and associated documentation. Termination of this License shall not relieve Licensee of its obligation to pay all fees incurred prior to such termination and shall not limit either party from pursuing any other remedies available to it. 9. General Provisions - This License, together with the identification of the Software, pricing and payment terms stated in the applicable Licensee purchase order as accepted by ISS and ISS invoice and license key, constitute the entire agreement between the parties respecting its subject matter. Standard and other additional terms or conditions contained in any purchase order or similar document are hereby expressly rejected and shall have no force or effect. This License will be governed by the substantive laws of the State of Georgia, USA, excluding the application of its conflicts of law rules. This License will not be governed by the United Nations Convention on Contracts for the International Sale of Goods, the application of which is expressly excluded. If any part of this License is found void or unenforceable, it will not affect the validity of the balance of the License, which shall remain valid and enforceable according to its terms. This License may only be modified in writing signed by an authorized officer of ISS. 10. Notice to United States Government End Users - Licensee acknowledges that any Software furnished under this License is commercial computer software developed at private expense and is provided with RESTRICTED RIGHTS. Any use, modification, reproduction, display, release, duplication or disclosure of this commercial computer software by the United States Government or its agencies is subject to the terms, conditions and restrictions of this License in accordance with the United States Federal Acquisition Regulations at 48 C.F.R. Section 12.212 and Subsection 227.7202-3 or applicable subsequent regulations. Contractor/manufacturer is Internet Security Systems, Inc., 6303 Barfield Road, Atlanta, GA 30328, USA. 11. Export and Import Controls; Use Restrictions - Licensee will not transfer, export, or reexport the Software, any related technology, or any direct product of either except in full compliance with the export controls administered by the United States and other countries and any applicable import and use restrictions. Licensee agrees that it will not export or reexport such items to anyone on the U.S. Treasury Department’s list of Specially Designated Nationals or the U.S. Commerce Department’s Denied Persons List or Entity List, or to any country to which the United States has embargoed goods, or for use with chemical or biological weapons, sensitive nuclear end-uses, or missiles. Licensee represents and warrants that it is not located in, under control of, or a national or resident of any such country or on any such list. Many ISS software products include encryption and export outside of the United States or Canada is strictly controlled by U.S. laws and regulations. Please contact ISS’ Customer Operations for export classification information relating to the Software (customer_ops@iss.net). Licensee understands that the foregoing obligations are U.S. legal requirements and agrees that they shall survive any term or termination of this License. 12. Authority - Because the Software is designed to test or monitor the security of computer network systems and may disclose or create problems in the operation of the systems tested, Licensee and the persons acting for Licensee represent and warrant that: (a) they are fully authorized by the Licensee and the owners of the computer network for which the Software is licensed to enter into this License and to obtain and operate the Software in order to test and monitor that computer network; (b) the Licensee and the owners of that computer network understand and accept the risks involved; and (c) the Licensee shall procure and use the Software in accordance with all applicable laws, regulations and rules. 13. No High Risk Use - Licensee acknowledges that the Software is not fault tolerant and is not designed or intended for use in hazardous environments requiring fail-safe operation, including, but not limited to, aircraft navigation, air traffic control systems, weapon systems, life-support systems, nuclear facilities, or any other applications in which the failure of the Licensed Software could lead to death or personal injury, or severe physical or property damage. ISS disclaims any implied warranty of fitness for High Risk Use. Revised October 22, 2001 Contents Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Overview . . . . . . . . . . . . . . . . . . . . . How to Use RealSecure Documentation Conventions Used in this Guide . . . . . . Getting Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi . xi . xii . xiii . xv Chapter 1: Introduction to the Network Sensor. . . . . . . . . . . . . . . . . ......... ......... ......... ......... ......... Environment ......... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 . 1 . 2 . 4 . 6 . 7 . 9 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 11 12 15 16 17 18 ... Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Before Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Automatically Importing Authentication Keys . . . . . . . . . . . . . . . . Customizing Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Administering Public Authentication Keys and Master Status Rights Installing Multiple Sensors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . Support for Non-English Windows Versions and Characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 19 20 22 24 26 30 31 32 Overview . . . . . . . . . . . . . . . . . . . . . . About the RealSecure System . . . . . . . . Traffic Monitored by Network Sensors . . Installation Programs and Utilities . . . . . Network Sensor Deployment Suggestions Deploying Network Sensors in a Switched System Requirements Documentation. . . Chapter 2: Upgrading Sensors Overview . . . . . . . . . . . . . . . . . . Upgrading Sensors Remotely. . . . . Troubleshooting Remote Upgrades. Upgrading Sensors Manually . . . . . After Updating 5.x Sensors . . . . . . Upgrading Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 3: Before Installing a Network Sensor v Contents Chapter 4: Installing a Network Sensor on Windows . . . . . . . . . . . Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation Options on Windows. . . . . . . . . . . . . . . . . . . . . . . . . Installing a Typical Network Sensor on Windows. . . . . . . . . . . . . . Installing a Custom Network Sensor on Windows . . . . . . . . . . . . . Automating Installations on Windows . . . . . . . . . . . . . . . . . . . . . Customizing the Automated Installation Response File . . . . . . . . . . Using the Silent Installation Feature . . . . . . . . . . . . . . . . . . . . . . Automated Installation Frequently Asked Questions . . . . . . . . . . . . Working with Cryptographic Providers During Windows Installations Archiving Private Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 5: Installing a Network Sensor on Solaris . . . . . . . . . . . . . Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation Options on Solaris . . . . . . . . . . . . . . . Installing a Network Sensor on Solaris . . . . . . . . . Automating Network Sensor Installations on Solaris . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 6: Installing the Nokia Appliance. . . . . . . . . . . . . . . . . . . . . . Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Before Installing the Nokia Appliance . . . . . . . . . . . . Enabling Hostname Resolution . . . . . . . . . . . . . . . . . Enabling Logging . . . . . . . . . . . . . . . . . . . . . . . . . . Upgrading or Reinstalling RealSecure from a Package . Installing a Second Sensor Using Voyager . . . . . . . . . Working with Newly Configured Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 35 36 38 41 45 48 61 64 67 69 71 71 72 74 79 81 81 82 83 85 86 89 90 Chapter 7: Configuring a Network Sensor . . . . . . . . . . . . . . . . . . . . . Overview . . . . . . . . . . . . . . . . . . . . . . . . . . Configuring Authentication . . . . . . . . . . . . . . Configuring Authentication with the Deployment Configuring Authentication Manually . . . . . . . . Location of Authentication Keys . . . . . . . . . . . Restoring Archived Private Keys. . . . . . . . . . . Changing Encryption Settings. . . . . . . . . . . . . Uninstalling Components and Updates . . . . . . Adding Key Administrators . . . . . . . . . . . . . . Starting and Stopping Sensors. . . . . . . . . . . . Testing the Sensor . . . . . . . . . . . . . . . . . . . Network Sensor Stealth Configuration. . . . . . . Chapter 8: Troubleshooting ...... ...... Wizard. ...... ...... ...... ...... ...... ...... ...... ...... ...... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 . 91 . 93 . 94 . 97 100 102 104 105 110 111 112 113 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 vi Contents Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 ISS Daemons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 vii Contents viii Tables Table Table Table Table Table Table Table Table Table Table Table Table Table Table Table Table 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: Typographic conventions for procedures . . . . . . . . . . . Typographic conventions for commands . . . . . . . . . . . Hours for technical support . . . . . . . . . . . . . . . . . . . Contact information for technical support . . . . . . . . . . RealSecure installation files. . . . . . . . . . . . . . . . . . . . Policies that sensors can accept . . . . . . . . . . . . . . . . Prerequisites to installing RealSecure. . . . . . . . . . . . . Installation program default settings . . . . . . . . . . . . . Network sensor windows availability . . . . . . . . . . . . . . Default Log File Names for Autoinstall . . . . . . . . . . . . Autoinstall Response File Parameters . . . . . . . . . . . . Autoinstall Response File Parameters Provider Section . Silent mode return codes . . . . . . . . . . . . . . . . . . . . . Default parameters for network sensor for Solaris . . . . Solaris installation files for network sensor . . . . . . . . . Location of Keys directory for all sensors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii . . xiv . . xv . . xv .. 6 . 18 . 20 . 36 . 40 . 47 . 49 . 55 . 62 . 72 . 74 100 ix Tables x Preface Overview Purpose This guide describes the procedures and requirements for deploying, installing, and upgrading the RealSecure network sensor. Audience This guide is intended for system administrators who are installing or upgrading the network sensor. What’s new in this guide The RealSecure Network Sensor Installation Guide Version 6.5 includes new or revised information about the following topics: remotely upgrading sensors configuring authentication installing sensors xi Preface How to Use RealSecure Documentation Using this guide Read the entire guide before installing the network sensor. Related publications For additional information about sensors, the Workgroup Manager, or SiteProtector, see the following publications: xii RealSecure Workgroup Manager Installation Guide RealSecure Server Sensor Installation Guide RealSecure SiteProtector Strategy Guide RealSecure Workgroup Manager User Guide RealSecure Server Sensor Policy Guide RealSecure Network Sensor Policy Guide RealSecure Signatures Reference Guide RealSecure Help Conventions Used in this Guide Conventions Used in this Guide Introduction This topic explains the typographic conventions used in this guide to make information in procedures and commands easier to recognize. In procedures The typographic conventions used in procedures are shown in the following table: Convention What it Indicates Examples Bold An element on the graphical user interface. Type the computer’s address in the IP Address box. Select the Print check box. Click OK. SMALL CAPS A key on the keyboard. Press ENTER. Press the PLUS SIGN (+). Constant width A file name, folder name, path name, or other information that you must type exactly as shown. Save the User.txt file in the Addresses folder. Type IUSR__SMA in the Username box. Constant width italic A file name, folder name, path name, or other information that you must supply. Type Version number in the Identification information box. à A sequence of commands From the taskbar, select from the taskbar or menu bar. StartàRun. On the File menu, select UtilitiesàCompare Documents. Table 1: Typographic conventions for procedures xiii Preface Command conventions The typographic conventions used for command lines are shown in the following table: Convention What it Indicates Examples Constant width bold Information to type in exactly as shown. md ISS Italic Information that varies according to your circumstances. md your_folder_name [] Optional information. dir [drive:][path] [filename] [/P][/W] [/D] | Two mutually exclusive choices. verify [ON|OFF] {} A set of choices from which you must choose one. % chmod {u g o a}=[r][w][x] file Table 2: Typographic conventions for commands xiv Getting Technical Support Getting Technical Support Introduction ISS provides technical support through its Web site and by email or telephone. The ISS Web site The Internet Security Systems (ISS) Resource Center Web site (http:// www.iss.net/customer_care/resource_center/) provides direct access to much of the information you need. You can find frequently asked questions (FAQs), white papers, online documentation, current versions listings, detailed product literature, and the Technical Support Knowledgebase (http://www.iss.net/customer_care/ knowledgebase/). Hours of support The following table provides hours for Technical Support at the Americas and other locations: Location Hours Americas 24 hours a day All other locations Monday through Friday, 9:00 A.M. to 6:00 P.M. during their local time, excluding ISS published holidays Note: If your local support office is located outside the Americas, you may call or email the Americas office for help during off-hours. Table 3: Hours for technical support Contact information The following table provides email addresses and telephone numbers for technical support requests: Regional Office Email Address Telephone Number North America and Latin America support@iss.net (1) (888) 447-4861 (toll free) (1) (404) 236-2700 Europe, Middle East, and Africa support@iss.net (44) (118) 959-3900 Table 4: Contact information for technical support xv Preface Regional Office Email Address Telephone Number Asia-Pacific and Philippines asiasupport@iss.net (63) (2) 886-6014 Japan support@isskk.co.jp (81) (3) 5475-6456 Table 4: Contact information for technical support (Continued) xvi Chapter 1 Introduction to the Network Sensor Overview Introduction In this chapter This chapter describes the following: the RealSecure system and components traffic that the network sensor monitors where network sensor installation programs and utilities are located deployment recommendations where to find system requirements This chapter contains the following topics: Topic Page About the RealSecure System 2 Traffic Monitored by Network Sensors 4 Installation Programs and Utilities 6 Network Sensor Deployment Suggestions 7 Deploying Network Sensors in a Switched Environment 9 System Requirements Documentation 10 1 Chapter 1: Introduction to the Network Sensor About the RealSecure System Introduction The RealSecure system is an automated, real-time intrusion detection and response system that unobtrusively analyzes activity across your computer systems and networks. A RealSecure system contains two major components: Management components sensors management The management component serves the following purposes: visually monitors events (with a console) collects data from sensors (with one or more event collectors) stores data from sensors (in a database) You must choose one of the following two types of management software to manage and monitor sensors: Workgroup Manager SiteProtector This guide describes using the Workgroup Manager to configure and upgrade sensors. References: For information about using SiteProtector to configure and upgrade sensors, see the SiteProtector Strategy Guide or the SiteProtector Help. RealSecure sensors Sensors monitor network and system traffic for attacks and other security-related events. Sensors respond to and notify you about these events as they occur. RealSecure provides two types of sensors: 2 network server About the RealSecure System Network sensors Network sensors monitor network packets and look for events that could indicate an attack against your network. Network sensors monitor all the traffic on their network segments. A network segment is also called a “collision domain” because the network is shared among all of the devices on a single segment and because a station on this segment can see all of the traffic going to other stations. Network sensors provide the earliest possible warning of unauthorized activity and can often terminate the attack before damage is done. A network sensor is installed on a Solaris or Windows computer or on a Nokia appliance with a network adapter card that supports promiscuous mode. Promiscuous mode capable cards are required for network sensors only. Promiscuous mode Promiscuous mode allows the sensor to monitor all traffic on a segment, instead of traffic destined only to the computer running the network sensor. Server sensors For information about server sensors, see the RealSecure Server Sensor Installation Guide or the RealSecure Server Sensor Policy Guide. 3 Chapter 1: Introduction to the Network Sensor Traffic Monitored by Network Sensors Introduction This topic describes the following: the traffic that network sensors monitor collision domains using the network sensor in switched and hubbed networks where to find suggestions for deciding what to protect with network sensors What network sensors monitor A network sensor monitors all the traffic in its particular collision domain. A network segment is also called a “collision domain” because the network is shared among all of the devices on a single segment and because a station on this segment can see all of the traffic going to other stations. What creates a collision domain? Most networks have multiple collision domains (network segments). Devices like firewalls, routers, bridges, and switches divide a large collision domain into several smaller ones. These devices are usually installed to improve network performance and network security. Important: A network sensor operates only within its local collision domain. You must install a network sensor for each local collision domain you want to monitor. Environment types You can install network sensors in a hubbed or switched environment. Hubbed networks In a hubbed environment, network sensors require a network adapter card that supports promiscuous mode. Promiscuous mode enables the sensor to monitor traffic to and from all hosts, rather than traffic to and from the computer running the network sensor. The collision domain is any device attached to the same hub as the network sensor. Switched networks In a switched environment, network sensors must monitor traffic through a span port or tap at the switch. The collision domain is any network device attached to the switch. 4 Traffic Monitored by Network Sensors Reference: For information about configuring a network sensor to work in a switched environment, see “Deploying Network Sensors in a Switched Environment” on page 9. Identifying collision domains to protect You should deploy RealSecure network sensors on each network segment that contains a vital network or informational resource. References: For more information, see “Network Sensor Deployment Suggestions” on page 7. The SiteProtector Strategy Guide also contains useful information about developing IDS and sensor strategies. 5 Chapter 1: Introduction to the Network Sensor Installation Programs and Utilities Installation programs Utilities Location of installation files The network sensor has individual installation programs for each of the following operating systems: Windows NT/Windows 2000 Solaris (separate packages for each supported version) IPSO (Nokia appliance) The ISS CD also contains utilities that run like installation programs to serve the following purposes: Distribute public cryptographic keys Restore archived private cryptographic keys Table 5 lists the location of the installation files on the CD: For this component... install this file... network sensor for Windows NT/Windows 2000 cd-rom drive:\RealSecure\Retail\network_sensor\Win dows_ NT_x86_4.0-5.0\setup.exe network sensor for Solaris SPARC cd-rom mount point:/RealSecure/Retail/ network_sensor/Solaris_SPARC_2.6-7 {or 2.6}/rs6.5.2001.xxx-sparc-solarisxx-release network sensor for Nokia appliance cd-rom mount point:/RealSecure/Retail/ network_sensor/IPSO_x86_3.4.1 Public Key Distribution program cd-rom drive:\RealSecure\Retail\RS_Key_Utility\Win dows_NT_ x86_4.0-5.0\setup.exe Restore cryptographic private keys program cd-rom drive:\RealSecure\Retail\RS_Key_Utility\Win dows_NT_ x86_4.0-5.0\setup.exe Table 5: RealSecure installation files 6 Network Sensor Deployment Suggestions Network Sensor Deployment Suggestions Introduction In the DMZ Common places to install RealSecure network sensors are as follows: in the demilitarized zone (DMZ) just inside the firewall, on the intranet on key segments of the internal network By installing a network sensor in the DMZ of a network’s internet access point, you can protect the devices installed in the DMZ from attack. Protecting the firewall is important, because the firewall acts as the control point for data flowing into your internal network and is often the initial target of an attack. By adding a network sensor to your DMZ, you are dedicating an additional processor to the defense of your network perimeter. Every internet access point should include a firewall and a network sensor. Reference: For more information about configuring network sensors, see “Network Sensor Stealth Configuration” on page 113. Just inside the firewall, on the intranet By installing a network sensor inside the firewall, you can detect changes to firewall operation and monitor the traffic passing through the firewall. A network sensor installed inside the firewall ensures that the following occurs: The firewall is functioning properly, has not been compromised, and has not been misconfigured. The tunnels through the firewall are not being used to launch an attack against your internal network. You can also use this network sensor, in conjunction with a network sensor in the DMZ, to evaluate the effectiveness of your firewall. For example, you might choose to record the serious events at both network sensors and then generate a report of these events that compares the number of occurrences seen inside the firewall with the number seen outside. 7 Chapter 1: Introduction to the Network Sensor On key segments of the internal network Key segments of the internal network are associated with vital network resources. Most losses from network attacks are caused by attacks from inside an organization. Many companies are now taking steps to reduce this loss by deploying intrusion-detection systems on their intranet. Additional network sensor deployment possibilities The previous recommendations are the most common places for deploying a RealSecure network sensor. Your specific deployment strategy depends on your network and your security strategy. Other likely locations include the following: Deploying multiple sensors on the network backbone, so that interdepartmental traffic can be examined immediately behind a WAN router, WAP server, or a modem pool, to protect against unauthorized access from the telephone network in the wiring closet, where it can be connected to different segments as network activity dictates RealSecure supports multiple sensors on the same computer. You can install one or more network sensors to protect multiple parts of your network. You can also install server sensor on the same computer to provide additional protection and to concurrently monitor your network. There are several possible ways you can deploy multiple sensors on the same computer. Consider the following scenarios: 8 computer with one or more network sensors (one sensor per NIC/ subnet) computer with one server sensor without Network Monitoring and one or more network sensors (one sensor per NIC/subnet) Deploying Network Sensors in a Switched Environment Deploying Network Sensors in a Switched Environment Introduction This topic describes configuration issues that arise when you deploy a RealSecure network sensor in a switched environment. Switched network In a switched network, the traffic is separated at the switch, and routed based on the MAC address of the interface. This configuration controls the amount of traffic received by each interface. When used with other forms of traffic management, a switched network configuration results in an effective method of bandwidth control, allowing each device to communicate more effectively. Because the traffic is managed at the switch, placing a NIC in promiscuous mode has no effect on what traffic the network sensor can or cannot monitor, effectively blinding the sensor, a packet sniffer, or any other device that relies on promiscuous mode operation. Routing traffic to a selected port To eliminate the problem, you must use a tap or have a managed switch capable of routing all traffic to a selected port or ports. This is known as spanning or mirroring. Reference: For more information about routing traffic to ports, contact your switch manufacturer. Listed below are the addresses for several popular manufacturers’ Web sites: Reference http://support.3com.com/switches.htm http://support.intel.com/support/network/#Switches http://www.cisco.com/univercd/home/home.htm http://www130.nortelnetworks.com/cgi-bin/eserv/cs/ emodules/documentation/documentation_main.jsp For more information about configuring the network sensor to work in a switched environment, see the “Implementing a Network-Based Intrusion Detection System” how to guide (switched.zip) at: http://www.iss.net/customer_care/resource_center/ realsecure_tech_center/tips_tricks/ 9 Chapter 1: Introduction to the Network Sensor System Requirements Documentation Introduction The System Requirements document contains the most current information about memory, processor speed, hard drive space and many other hardware and software requirements for each RealSecure component. Document location The System Requirements document is located on the ISS Web site at: http://documents.iss.net/literature/RealSecure/ rs_sysreqs.pdf International system requirements International system requirements are described in the following topic, “Support for Non-English Windows Versions and Characters” on page 32. 10 Chapter 2 Upgrading Sensors Overview Introduction This chapter describes how to upgrade version 5.x and 6.0 RealSecure sensors and policies to 6.5. Upgrade requirement for Workgroup Manager components Version 6.0 Workgroup Manager components are not compatible with 6.5 sensors. Therefore, upgrade all necessary Workgroup Manager components before upgrading sensor components. Using SiteProtector management? SiteProtector 1.0 is compatible with both 6.0 and 6.5 sensors. Therefore, it is not necessary to upgrade the console before upgrading a 6.0 sensor to version 6.5. In this chapter This chapter contains the following topics: Topic Page Upgrading Sensors Remotely 12 Troubleshooting Remote Upgrades 15 Upgrading Sensors Manually 16 After Updating 5.x Sensors 17 Upgrading Policies 18 11 Chapter 2: Upgrading Sensors Upgrading Sensors Remotely Introduction This topic describes the following: prerequisites for upgrading all sensor versions specific prerequisites for upgrading 5.x sensors where to find upgrade packages why it is necessary to upgrade the Workgroup Manager before upgrading sensors how to remotely upgrade a sensor Upgrading with the Workgroup Manager If you have installed 5.x or later sensors, you can use the Workgroup Manager to remotely upgrade your sensors to 6.5. Upgrading with SiteProtector SiteProtector can remotely upgrade 6.0 sensors to 6.5. Reference: For information about remotely upgrading sensors with SiteProtector, see the SiteProtector Help. Prerequisites for all sensor versions Before remotely upgrading any 5.x or 6.0 sensor to 6.5, you must do the following: upgrade all Workgroup Manager components (consoles, event collectors and the database) to 6.5 Caution: If you upgrade a sensor from a 6.0 Workgroup Manager console, you will not be able to monitor or manage the sensor until you upgrade the Workgroup Manager (console, event collector and database) to 6.5. Reference: For more information, see the RealSecure Workgroup Manager Installation Guide. know the location of the upgrade package Upgrade packages are available in several locations: on the Web at https://www.iss.net/update/RealSecure on the Internet Security Systems CD in the /updates/RealSecure directory 12 Upgrading Sensors Remotely Prerequisites for 5.x sensors If upgrading from a 5.x sensor, do the following: Apply service release 1.1, and then apply micro-update 2.3 Reference: For step-by-step instructions, see “Installing X-Press Updates” in the RealSecure Help. synchronize the sensor log file with the console database Reference: For step-by-step instructions, see “Synchronizing 5.x log files with the Enterprise databases” in the RealSecure Help. Upgrading multiple sensors at a time You can use the remote upgrade process to upgrade more than one sensor at time. However, you must select sensors of a similar sensor type (server sensor or network sensor) and of the same operating system (like Windows or Solaris). If you have installed multiple network sensors on a single computer, you cannot update them as a group. You must update them individually. Procedure To remotely upgrade a sensor: 1. Open the Workgroup Manager console and manage the sensor (or sensors) you want to upgrade. Reference: For information about how to manage a sensor, look up “managing, sensors” in the Help. 2. Select the sensor or sensors you want to upgrade, and then right-click them. Important: You can update a group of sensors of the same type and operating system. You cannot update a group of sensors installed on the same computer. A pop-up menu lists possible command options. 3. Select X-Press Update or Program Update. The RealSecure Update Installer window appears. 4. Select the location of the upgrade package. 5. Select Upgrade or Service Release. 6. Click Next. The Available updates box shows the updates available for that sensor. 13 Chapter 2: Upgrading Sensors 7. Select the update you want, and then click Next. The Strong Encryption Export Agreement window appears. 8. Read the agreement, select YES, and then click OK. The update program downloads the update, and then prompts you to continue the installation. 9. Click Continue. A message informs you that the upgrade could take several minutes and warns you that the upgrade should be performed from a 6.5 console and event collector. 10. Click Yes. After a few seconds, the component status changes to Unknown. The control status shows several errors related to the daemon (not running, connection refused or closed, and restarting). When the upgrade is complete (which could take several minutes), the component status changes back to Active, and the installation is complete. Unix sensors: If you are upgrading a Solaris or Linux server sensor, the system is shut down and restarted before the installation is complete. 11. If upgrading from a 5.x sensor, you must configure it to work with the event collector. Reference: For a step-by-step procedure, see “After Updating 5.x Sensors” on page 17. 14 Troubleshooting Remote Upgrades Troubleshooting Remote Upgrades Introduction This topic describes some of the error messages that you may receive when you remotely upgrade a sensor and how to respond to the errors. Signature error messages The sensor cannot monitor new signatures in the update until you apply a policy with the new signatures. The sensor issues detector warnings to remind you that the current policy the sensor is using does not support the new signatures. Reference: To apply a policy, look up “applying policies” in the RealSecure Help or SiteProtector policy editor Help. Policy and control channel error messages If you receive the following error message after upgrading, you must stop managing the sensor, and then start managing the sensor, again, to correct the problem. Error message text: The sensors current policy file was not successfully transferred when the control channel was opened and therefore it is not available to the application. This is usually due to a problem reading the file from the sensor after opening the control channel. It can also be due to the fact that after a fresh install there is not current policy file until the sensor is started if this is the case then Start the sensor. [ID=0xc72c0026] 15 Chapter 2: Upgrading Sensors Upgrading Sensors Manually Introduction If you do not want to use the remote upgrade feature of RealSecure, you can upgrade a sensor manually. Upgrading Windows sensors You can run the 6.5 installation program to upgrade Windows sensors. You are do not have to uninstall the previous sensor. Reference: For installation instructions, see the Windows installation chapter in this guide. Upgrading Unix sensors To manually upgrade Unix sensors to 6.5, you must uninstall any previous versions of the sensor and then install the new version. References: For instructions on uninstalling a sensor on a Unix platform, see “Uninstalling Components and Updates” on page 105. For installation instructions, see one of the Unix installation chapter in this guide. 16 After Updating 5.x Sensors After Updating 5.x Sensors Introduction When you update your sensor from version 5.x, events no longer go directly to the console; they pass through the event collector first. Setting up a sensor You must configure the event collector to recognize the sensor as an event source and configure the sensor to accept authenticated communication from the event collector if you use authentication. Configuring the event source and authentication Use the Deployment Wizard to perform these tasks automatically or perform them manually. Using the Deployment Wizard If you want to use the Deployment Wizard, see “Configuring Authentication with the Deployment Wizard” on page 94. Manual configuration If you encounter errors using the Deployment Wizard, or you want to manually configure the sensor, use the following topics to guide you: Use the “Adding public keys” topic in the Help to copy the event collector keys to the updated sensor. Use the “Configuring event sources” topic in the Help to set up an event source for the updated sensor. 17 Chapter 2: Upgrading Sensors Upgrading Policies Introduction Policy compatibility This topic describes the following: policy versions that are compatible with network sensors policy upgrade issues Table 6 defines the policies that network sensors can use. Important: If you apply a policy to an earlier sensor version (a 6.5 policy to a 6.0 sensor, for example), the sensor cannot use the new signatures in the policy and generates sensor errors to inform you of the discrepancy. Sensor version... Accepts these policies... 2.5 2.5, 3.0 3.0 2.5, 3.0 3.1 3.1, 3.2, 4.5 3.2 3.1, 3.2, 4.5 4.5 3.1, 3.2, 4.5 5.0 5.0 6.0/6.5 5.0, 6.0, 6.5 Table 6: Policies that sensors can accept Upgrading from earlier versions To import the custom policies that you created in the earlier version, you must import them using the policy editor. Reference For information about importing sensor policies, see the following documentation: 18 To import policies using the Workgroup Manager, see “Importing Policies” in the RealSecure Workgroup Manager User Guide or RealSecure Workgroup Manager Help. To import policies using SiteProtector, see the SiteProtector policy editor Help. Chapter 3 Before Installing a Network Sensor Overview Introduction This chapter describes what you need to know before you install network sensors on Windows or Unix platforms. In this chapter This chapter contains the following topics: Topic Page Before Installation 20 Using Authentication 22 Automatically Importing Authentication Keys 24 Customizing Encryption 26 Administering Public Authentication Keys and Master Status Rights 30 Installing Multiple Sensors 31 Support for Non-English Windows Versions and Characters 32 19 Chapter 3: Before Installing a Network Sensor Before Installation Prerequisites After you have decided how to deploy your sensors, you must make sure you have met the following prerequisites: Task For more information, see... Create a naming convention for sensors “Sensor naming conventions” on this page Decide how the components are going to communicate. “Using Authentication,” page 22 Install new encryption software, if needed. “Customizing Encryption,” page 26 Determine public keys administrators “Administering Public Authentication Keys and Master Status Rights,” page 30 If you want to use non-English characters “Support for Non-English or a non-English Windows operating Windows Versions and system, configure the system appropriately. Characters” on page 32 If you want to install multiple sensors on a single computer, make sure you have met the multi-sensor prerequisites “Installing Multiple Sensors,” page 31 If you want to use stealth mode, install the right hardware and configure the computer to hide the interface. “Network Sensor Stealth Configuration,” page 113 Table 7: Prerequisites to installing RealSecure Sensor naming conventions A sensor naming convention helps you identify sensors in the console. For example, you may want your sensor name to indicate whether a sensor is inside or outside the firewall or in a specific department. Caution: Sensor names can contain only alphanumeric characters with underscores or dashes. As you install a sensor, the installation program allows you to assign a name to the sensor or accept the default name. You cannot rename a sensor after you install it. To rename a sensor, you must uninstall, and 20 Before Installation then reinstall the sensor. Therefore, it is important that you establish a logical sensor naming convention before deploying your sensors. Example: The following naming convention categorizes sensors by physical and geographical location and also identifies their host name: nyc_dmz_hostname1 nyc_int_hostname2 atl_dmz_hostname3 atl_int_hostname4 21 Chapter 3: Before Installing a Network Sensor Using Authentication Introduction Authentication is a way for a component to prove who it is to another component, such as an event collector or a sensor. Authentication occurs when communication connections are established, and it relies on a public/private key pair created by the cryptographic providers you selected when you set up the component. RealSecure authentication When you enable authentication, each sensor authenticates any component that attempts to connect to it, like the RealSecure console and event collector. Also, each event collector authenticates any console that attempts to connect to it. Therefore, event collectors must have the public authentication keys of consoles to authenticate them. Likewise, sensors must have the public authentication keys of consoles and event collectors, because both components connect to sensors. This method of authentication makes each console or event collector prove itself to the sensor (or event collector) before the sensor (or event collector) sends sensitive security data that it has been collecting. Changing cryptographic providers Once you have installed a component, changing the configured cryptographic providers is not easy. In Windows, you must uninstall and then reinstall the component with the new settings to change the providers. If multiple sensors or a combination of an event collector and a sensor exist on the computer, then you must uninstall, and then reinstall both (or all) components. You do not necessarily have to uninstall the console along with the sensors or event collector, unless you need to change the providers for it, too. In Unix, you must uninstall the sensor or event collector, and then reinstall it to change the providers no matter how many sensors are installed on the computer. Authentication and public/private keys 22 Authentication uses public and private keys to prove a console’s or event collector’s identity to each component. For authentication, each sensor or event collector monitored by the console must have a copy of the console’s public keys. The sensor must also have a copy of the event collector's public key. You must move the public keys to each Using Authentication component’s system by using the automatic key import option, copying them, or using the deployment wizard. The private keys are stored securely on the system where the key pairs were generated. Key names The installation program saves public keys in the Keys subdirectory for each component. Console keys start with rs_con. Sensor and event collector keys start with rs_eng. Reference: For a more detailed description of key pairs, encryption, and authentication, see the RealSecure Workgroup Manager User Guide. For more information about copying the console’s public keys to sensors, see “Configuring Authentication Manually” on page 97. For more information about key management, see “Administering Public Authentication Keys and Master Status Rights” on page 30. Authenticated connections When authentication is enabled, the sensors must have the console’s public keys and the event collector’s public keys before accepting traffic, and the event collectors must have the console’s public keys before accepting traffic. Public keys can be imported with the automatic key import option. If needed, you can manually copy keys to the sensor with the Workgroup Manager key administrator feature, remotely over the network, or locally from a disk. No reduction in performance occurs when authentication is enabled. Reference: For more information, see “Automatically Importing Authentication Keys” on page 24,“Administering Public Authentication Keys and Master Status Rights” on page 30, and “Configuring Authentication Manually” on page 97. Connections that are not authenticated When authentication is disabled, the sensor trusts any console or event collector and automatically accepts the public keys on a per session basis. The console or event collector uses the appropriate public/private key pair created when the console or event collector was installed. The console or event collector sends its public key to the component, which does not verify that the console or event collector appears to be who it says it is. When authentication is disabled, any device implementing the RealSecure protocol can monitor the component. Reference: For more information, see “Administering Public Authentication Keys and Master Status Rights” on page 30. 23 Chapter 3: Before Installing a Network Sensor Automatically Importing Authentication Keys Automatic authentication key import The RealSecure installation program includes an option to automatically import an authentication key from the console. When you select the autoimport option, the sensor receives the initial authentication key over a standard network connection initiated from the console. The installation program imports only the console’s public keys. You must manually copy the public keys of other components, such as event collectors, to the sensors, unless you use the deployment wizard to automatically distribute all necessary authentication keys. Reference: See “Configuring Authentication” on page 93. Caution: Using this feature can lead to potentially unknown users having access to the RealSecure sensor, if the sensor receives its first connection from such a user. Afterwards, when a known user tries to copy public keys to the sensor, a warning indicates that a key already exists. The known user's keys are not copied to the sensor. Automatic key import and SiteProtector If you are using SiteProtector for management and you want to use authentication, you must enable the automatic key import option during installation so that SiteProtector can configure and manage the sensors. Auto-import and multiple sensors When multiple sensors are installed on the same computer or when an event collector and a server sensor reside on the same computer, the autoimport feature is enabled for both components. For auto-import to work correctly, you must meet the following requirements: 1. Install the Workgroup Manager or SiteProtector Console and enable the Automatic Key Import option if you are installing the event collector on the same system. 2. Install all the sensors or event collectors on the computer and Enable the Automatic Key Import option during installation. 3. Do not attempt to connect to any of the sensors, event collectors, or daemons until you have finished installing all the components that will reside on a single computer. 24 Automatically Importing Authentication Keys 4. After installation is complete, connect to any sensor, daemon, or event collector on the computer using the deployment wizard. All authentication keys and key administrator privileges are configured on all the installed components. Installing components after first connection If you install a component with the auto-import option, connect to the component, and then later install a second component, you must manually copy the authentication keys to second component before you can manage or monitor it. Reference: For more information about manually copying keys, see “Configuring Authentication Manually” on page 97. Authentication key recommendation ISS recommends that you configure the RealSecure sensor on a network segment that is protected from unauthorized network access until the initial public key has been imported by the console. After connecting to the sensor for the first time, it is important to verify that only the appropriate users have access to the sensor. You can verify this by viewing the active public keys on that sensor using the Maintain Keys menu option in the RealSecure console. Reference: For step-by-step procedures on adding and deleting authentication keys, see “Managing public keys” in the RealSecure Help. 25 Chapter 3: Before Installing a Network Sensor Customizing Encryption Introduction Overview of encryption This topic provides the following information: an overview of cryptographic providers custom options encryption keys other rules about configuring encryption during installation a description of the built-in Certicom provider and the Microsoft RSA provider a brief description of US export laws regulating the use of encryption The RealSecure software uses an ISS proprietary communication protocol to secure the information passed among components (consoles, event collectors, and sensors). This protocol relies on encryption provided through one or more built-in providers or external Cryptographic Service Providers (CSPs), such as Microsoft RSA. During installation, you make several choices concerning cryptographic providers and how the encryption algorithms are configured. To make adjustments to these choices, you must uninstall and then reinstall one or more components with the new settings. Reference: For more information, see “Changing Encryption Settings” on page 104. Encryption custom options During installation, you can customize the encryption settings in the following ways: Choose (from a list of available providers on your system, including the ISS ECNRA Built-In provider) one or more providers that you want the particular component to use. Nokia sensors: If you are managing Nokia sensors, you must use the Certicom ECNRA default algorithms. 26 Arrange the providers in order of preference, which determines the provider that the component (sensor or event collector) attempts to use first. Customizing Encryption Customize any default encryption algorithms or key strengths. Important: You must select common encryption algorithms and keys for the console and for each sensor and event collector. If you do not, the components will not be able to communicate with each other. If you make a change in the default settings, make a note of it so that you can apply the same algorithms or keys to the other components. Encryption keys At the end of the installation, the program generates a public/private encryption key pair for each provider you selected. These keys are used to encrypt and decrypt a symmetric encryption key passed between components and to let another component authenticate the one you just installed, if you choose to use authentication. Reference: For more information about setting up authentication using these public keys, see “Using Authentication” on page 22. Other rules about configuring encryption during installation Built-in Certicom encryption The following rules apply to configuring cryptographic providers during installation: Custom sensor installation programs prompt you to select cryptographic providers. The option to configure cryptographic providers is always available during the RealSecure console installation. If you install the console and event collector together, you will receive one prompt to add and remove cryptographic providers. Your choices apply to both components unless a sensor is already installed on this computer. The first time you install a network sensor, server sensor, or event collector, options for selecting cryptographic providers, selecting authentication strength, and enabling auto import are available. After you install the first sensor or event collector, all other sensors or event collectors have the authentication strength, cryptographic providers, and auto import setting from the first sensor or event collector installation. Certicom public/private key encryption is built into the RealSecure software, providing key strengths of at least 113, 163, and 239 bits (default). The built-in Certicom provider also provides symmetric encryption using the DES, the DESX, or the Triple DES encryption 27 Chapter 3: Before Installing a Network Sensor algorithms with SHA1 integrity hash (checksum). Certicom encryption works for all platforms. Microsoft RSA encryption On Windows platforms, you can use the Microsoft RSA Base, Strong, or Enhanced Cryptographic Providers to encrypt communication between Windows components. The providers typically offer RSA public/private key encryption at 512, 1024, or 2048 bit strengths. These providers may also offer symmetric encryption using DES, DESX, 2-key Triple DES, Triple DES, RC2, and RC4 algorithms. The RC2 and RC4 algorithms typically support 40, 56, or 128 bit key strengths. Cryptographic hash algorithms typically include MD2, MD4, MD5, and SHA-1. The exact choices that appear depend on your operating system level, service pack, and browser installation. Reference: For more information about provider availability and capability, see the Microsoft Web site. Any provider upgrades or installations must be completed before starting to install the RealSecure software. Important: If you also have, or plan to have, Unix components, you must select Certicom in addition to Microsoft RSA during installation. Service Packs: To download and install the latest Service Pack, see the Microsoft Web site at: http://support.microsoft.com/support/downloads You may have to register with Microsoft before you can read this page. On current Internet Explorer browser levels, you can also choose “Tools/ Windows Update” to access options for your platform. How the RealSecure software configures encryption 28 The RealSecure software configures encryption in the following ways: Designating (from a list of available providers on your system, including the ISS ECNRA Built-In provider) one or more providers that you want the particular component to use. Arranging the providers in order of preference, which determines the provider that the component (sensor or event collector) attempts to use first. Customizing Encryption Customizing any default encryption algorithms or key strengths. Important: You must select common encryption algorithms and keys for the console and for each sensor or event collector. If you do not, the components will not be able to communicate with each other. If you make a change in the default settings, make a note of it so that you can apply the same algorithms or keys to the other components. At the end of the installation, the program generates a public/private encryption key pair for each provider you selected. These keys are used to encrypt and decrypt a symmetric encryption key passed between components and to let another component authenticate the one you just installed, if you choose to use authentication. Reference: For more information about setting up authentication using these public keys, see “Using Authentication” on page 22. Caution: If you install a new provider in Windows, you must reinstall the component and select this new provider during installation to use it. Only one provider, the built-in provider, is available for Unix sensors. Encryption and US laws Encryption technologies are restricted by U.S. export laws. These technologies cannot be exported or re-exported to certain countries. Reference: For more information about U.S. export laws, see the Commercial Encryption section of the Bureau of Export Administration’s Web site at: http://www.bxa.doc.gov/Default.htm 29 Chapter 3: Before Installing a Network Sensor Administering Public Authentication Keys and Master Status Rights Introduction Key management provides a method for managing and distributing public authentication keys. Using key management, you can specify one or more users as key administrators. A key administrator can manage public authentication keys remotely from the RealSecure console. Key administrators and master status roles A key administrator also has rights to maintain daemon roles, which is an access list of users with special privileges maintained by the issDaemon. Users are identified in the list as computername_username, such as computername_administrator. Daemon roles include Master Status Manager and key administrator. Assigning administrator rights during installation During the initial installation of a Windows component, you must set up at least one key administrator to use the deployment wizard or the key administrator features if you do not plan to also select the automatic key import option (which configures the first connecting user as the key administrator). For Unix components, you can add an initial key administrator at a later time or use the automatic key import option to set up a key administrator. Reference: For more information about using the automatic key import option, see “Automatically Importing Authentication Keys” on page 24. Assigning administrator rights after installation Other key administrators can added or deleted from the key administrator directory by anyone who has key administrator rights. After installation, key administrator rights can be granted by modifying the daemon roles. If you are already a key administrator, you can add additional key administrators using the Command Line Interface (CLI) or the console. public key administrator rights are granted to a user by adding the user’s computer name and user name to the key administrator list. Reference 30 For more information about modifying key administrator rights, see the RealSecure Workgroup Manager User Guide. Installing Multiple Sensors Installing Multiple Sensors Introduction Installing several sensors on a single computer requires additional prerequisites. You can install the following combinations: server sensor and network sensor multiple network sensors Server sensor and network sensor You should install server sensor on all your important servers, including computers running network sensors. To install these sensors on the same computer, you must disable the Network Monitoring Component of the server sensor during installation. Instructions for disabling this component are described in the server sensor custom installation procedure in the RealSecure Server Sensor Installation Guide. Multiple network sensors You can install multiple network sensors on the same computer to monitor multiple, low-bandwidth segments. Although you can install three or more network sensors on a single computer, ISS does not recommend installing more than two. Before installing two network sensors Before installing two network sensors on the same computer, follow these steps: 1. Read the system requirements to determine if the computer has enough memory for two network sensors. Reference: The system requirements are located on the ISS Web site at the following location: http://documents.iss.net/literature/RealSecure/ rs_sysreq.pdf 2. Install two network interface cards (NICs) in the computer. 3. Connect the NICs to the two network segments that you want to monitor with the sensors. 4. Run the custom network sensor installation to choose the NIC you want each sensor to monitor. 31 Chapter 3: Before Installing a Network Sensor Support for Non-English Windows Versions and Characters Non-English versions of Windows The RealSecure software has been tested on non-English versions of Windows, including French, Japanese, and Spanish. However, the RealSecure software is most thoroughly tested on English versions of Windows, and ISS recommends that you use the English version of Windows when possible. Foreign characters for other programs If you need to use foreign characters for other applications on the computer running the RealSecure software, you can configure Windows to support your location and language instead of installing the nonEnglish version of Windows. Foreign characters If you change your locale settings, sensor names, directories, user names, and any other character-based name must use English characters or numbers. Caution: Using foreign characters can cause sensors or other components to malfunction. Reference For more information on system locales, see the Microsoft Web site at: http://www.microsoft.com/globaldev/FAQs/Locales.asp#ques7. Localizing the US English version of Windows NT 4.0 To configure the US English version of Windows NT 4.0 to support your system locale: 1. From the taskbar, select Start→Settings→Control Panel. The Control Panel window appears. 2. Double-click the Regional Settings icon. The Regional Settings Properties window appears. 3. From the Regional Settings tab, select a language from the list. 4. Select the Set as system default locale check box, and then click Apply. 32 Support for Non-English Windows Versions and Characters 5. Click OK. The system applies the language’s default code page and associated fonts to your system. 6. Do the display settings need to be adjusted? If yes, go to step 7. If no, go to the step 10. 7. From the Control Panel window, double-click the Display icon to display the Display Properties window. 8. Select the Appearance tab. Select a font size from the list. Click Apply. 9. Click OK to exit the Display Properties window. 10. From the Regional Setting Properties window, select the Input Locales tab. 11. Click Add. The Add Input Locale window appears. 12. Select the language from the list, and then click OK. The Input Locales tab appears. 13. In the Default input locale field, click Set as Default to make the language the default input locale. 14. In the Switch Locales field, select the desired shortcut key combinations for switching between input locales. 15. Select the Enable indicator on taskbar check box, and then click OK. 16. Click Apply to exit the Regional Properties window. 17. Restart your system for the system locale changes to take effect. Localizing the US English version of Windows 2000 To configure the US English version of Windows 2000 to support your system locale: 1. From the taskbar, select Start→Settings→Control Panel. The Control Panel window appears. 2. Double-click the Regional Options icon. The Regional Options Properties window appears. 3. From the Regional Options tab, select a language from the list. 33 Chapter 3: Before Installing a Network Sensor 4. Select the Set default check box. The Select System Locale window appears. 5. Click OK, and then click Apply. 6. Click OK. The system applies the language’s default code page and associated fonts to your system. 7. Do the display settings need to be adjusted? If yes, go to Step 8. If no, go to Step 11. 8. From the Control Panel window, double-click the Display icon to display the Display Properties window. 9. Select the Appearance tab. Select a font size from the list. Click Apply. 10. Click OK to exit the Display Properties window. 11. From the Regional Setting Properties window, select the Input Locales tab. 12. Click Add. The Add Input Locale window appears. 13. Select the language from the list, and then click OK. The Input Locales tab appears. 14. In the Installed input locales field, click Set as Default to make the language the default input locale. 15. In the Hot keys for input locales field, select the desired shortcut key combinations for switching between input locales. 16. Select the Enable indicator on taskbar check box, and then click OK. 17. Click Apply to exit the Regional Properties window. 18. For the system locale changes to take effect, restart your system. 34 Chapter 4 Installing a Network Sensor on Windows Overview Introduction This chapter describes the RealSecure network sensor installation programs and installation procedures for Windows environments. In this chapter This chapter contains the following topics: Topic Page Installation Options on Windows 36 Installing a Typical Network Sensor on Windows 38 Installing a Custom Network Sensor on Windows 41 Automating Installations on Windows 45 Customizing the Automated Installation Response File 48 Using the Silent Installation Feature 61 Automated Installation Frequently Asked Questions 64 Working with Cryptographic Providers During Windows Installations 67 Archiving Private Keys 69 35 Chapter 4: Installing a Network Sensor on Windows Installation Options on Windows Installation methods You can install the network sensor for Windows using one of several methods: typical (simple) installation custom (advanced) installation automated installation SiteProtector Users: If using SiteProtector management and authentication, you must install sensors using the custom installation so that you can enable the automatic key import option. Typical installation To install a network sensor with the default options (skipping advanced configuration), choose the typical installation option during the installation process. The typical installation program uses these default settings: Option Default Setting Select components All available components are installed. Select network card Selects the first network card. You must select “custom” to install more than one network sensor on a computer. Choose sensor name For one network sensor: network_sensor_1 For multiple network sensors on one computer: network_sensor_1 (first installation) network_sensor_2 (second installation) Choose folder for ISSDaemon C:\Program Files\ISS\issDaemon Choose folder for network sensor C:\Program Files\ISS\issSensors Select program folder ISS Enable Authentication Enabled Table 8: Installation program default settings 36 Installation Options on Windows Option Default Setting Automatic key import Disabled Harden security Enabled Table 8: Installation program default settings (Continued) Reference: For more information, see “Installing a Typical Network Sensor on Windows” on page 38. Custom installation If you need to customize the settings described in Table 8, “Installation program default settings” on page 36, choose the custom installation option during the install process. Reference: For more information, see “Installing a Custom Network Sensor on Windows” on page 41. Automated installation If you intend to install several network sensors using the same settings, you can use the automated installation process. With this feature, you install a network sensor once, save the settings you choose during that installation, and then use those settings to install the same configuration on other computers without having to monitor the entire installation process. Reference: For more information, see “Automating Installations on Windows” on page 45. 37 Chapter 4: Installing a Network Sensor on Windows Installing a Typical Network Sensor on Windows Introduction Select the typical installation option to install all RealSecure network sensor components using default settings. Reference: For a list of the default settings, see Table 8, “Installation program default settings” on page 36. Procedure To install a network sensor using a typical configuration: Note: Depending on the components you select and your network configuration, some of the steps in the procedure may not be required, and certain windows may not appear. For more information, see Table 9, “Network sensor windows availability” on page 40. 1. Insert the Internet Security Systems CD into the CD_ROM drive, and then locate the following folder to access the setup program: cd-rom drive:\RealSecure\Retail\network_sensor\Windows_NT_ x86_4.0-5.0\setup.exe 2. Run setup.exe. The Welcome window appears. 3. Click Next. The License Agreement window appears. 4. Read the Software License Agreement, and then click Yes to accept its terms. The Readme window appears. 5. Read the text, and then click Next. The Setup Types window appears. 6. Click Typical. The Automatic Key Import window appears. 7. Select or clear the Allow Auto Import check box, and then click Next. When you select the auto-import option, the sensor receives the initial authentication key over a standard network connection initiated from the console. SiteProtector users must select this option if using authentication. 38 Installing a Typical Network Sensor on Windows Reference: For more information, see “Automatically Importing Authentication Keys” on page 24. The Select Public Key Administrators window appears. 8. Type the Public Key Administrators name, using the format computername_username Important: You should add at least one key administrator. If you do not add at least one administrator, you will have to reinstall the component to set up a key administrator. 9. Click Add. Tip: To delete an administrator’s name, click Remove; to delete all names from the list, click Clear All. 10. Click Next. The Start Copying Files window appears. 11. Do the settings (components and destination locations) need to be adjusted? If yes, click Back and adjust the settings as needed. If no, click Next, and then go to Step 12. 12. Did the Archive Private Keys window appear? If yes, go to Step 13. If no, go to Step 15. 13. Select or clear the Archive the private keys check box. 14. Select a folder and passphrase, and then click Next. Reference: For more information, see “Archiving Private Keys” on page 69. 15. Click Finish. RealSecure completes the installation. 39 Chapter 4: Installing a Network Sensor on Windows Installation windows Table 9 lists windows that may appear during installation and the system configuration that causes them to appear: Window System Configuration Select Network Card Only if you have two or more network cards installed on your computer. Choose Folder for ISSDaemon Only if another daemon component (event collector or sensor) has not been previously installed Enable Authentication Only if another daemon component (event collector or sensor) has not been previously installed Automatic Key Import Only if another daemon component (event collector or sensor) has not been previously installed Sensor Cryptographic Setup Only if another daemon component (event collector or sensor) has not been previously installed Table 9: Network sensor windows availability 40 Installing a Custom Network Sensor on Windows Installing a Custom Network Sensor on Windows Introduction Use the custom option to install specific components and to change default settings. Procedure To install a custom network sensor: Note: Depending on the components you select and your network configuration, some of the steps in the procedure may not be required, and certain windows may not appear. For more information, see Table 9, “Network sensor windows availability” on page 40. 1. Insert the Internet Security Systems CD into the CD_ROM drive, and then locate the following folder to access the setup program: cd-rom drive:\RealSecure\Retail\network_sensor\Windows_NT_ x86_5.0-6.0\setup.exe 2. Run setup.exe. The Welcome window appears. 3. Click Next. The License Agreement window appears. 4. Read the Software License Agreement, and then click Yes to accept its terms. The Readme window appears. 5. Read the text, and then click Next. The Setup Types window appears. 6. Click Custom. The Select Components window appears. 7. Select RealSecure Network Sensor. 8. Click Next. The Select Network Card window appears. Note: This window appears only if you have two or more network cards installed on your computer. 9. Select the network card that you want the sensor to use to monitor your network. 41 Chapter 4: Installing a Network Sensor on Windows 10. Click Next. The Choose a Sensor Name window appears. 11. Type the sensor name. Caution: Sensor names can contain only alphanumeric characters with underscores or dashes. Reference: For more information, see “Sensor naming conventions” on page 20. 12. Click Next. The Choose Folder for The Network Sensor window appears. 13. Select an installation folder. Important: ISS recommends that you accept the default destination location so that Setup can locate important files that may have been previously installed. The default location is C:\Program Files\ISS\issSensors\network_sensor_name. 14. Click Next. The Choose Folder for the ISSDaemon window appears. 15. Select an installation folder for the daemon. Important: ISS recommends that you accept the default destination location so that Setup can install the daemon in the appropriate location. The default location is C:\Program Files\ISS\issDaemon 16. Click Next. The Enable Authentication window appears. 17. Do you want to use authentication to secure sensor and console communication? Important: ISS recommends that you configure the sensor to use authentication to prevent unauthorized users from controlling and potentially hiding attacker activity. Reference: For information about authentication, see “Using Authentication” on page 22. If yes, click Next. If no, select Disable All Authentication, and then click Next. The Automatic Key Import window appears. 42 Installing a Custom Network Sensor on Windows 18. Do you want to automatically import an authentication key? When you select the auto-import option, the sensor receives the initial authentication key over a standard network connection initiated from the console. SiteProtector users must select this option if using authentication. Reference: For more information, see “Automatically Importing Authentication Keys” on page 24. If yes, select Allow Auto-Import, and then click Next. If no, click Next. The Harden Security for the RealSecure Network Sensor? window appears. 19. Do you want to make the network sensor installation more secure by locking down file and registry entry permissions so that only an administrator of this computer can make changes to them? Important: ISS recommends that you harden security to secure the application from unauthorized use. If yes, click Next. If no, select Do Not Lock Down, and then click Next. The Select Public Key Administrators window appears. 20. Type the Public Key Administrators name, using the format computer_username Important: If you are not using the automatic key import option, you must add at least one key administrator. If you do not add at least one administrator, you will have to reinstall the component to set up a key administrator. Reference: For more information, see “Adding Key Administrators” on page 110. 21. Click Add. Note: To delete an administrator’s name, click Remove; to delete all names form the list, click Clear All. 22. Click Next. The Network Sensor Cryptographic Setup window appears. 43 Chapter 4: Installing a Network Sensor on Windows 23. Add, change, or delete cryptographic providers. References: For more information, see “Customizing Encryption” on page 26 and “Working with Cryptographic Providers During Windows Installations” on page 67. 24. When you have finished working with cryptographic providers, click Next. The Start Copying Files window appears. 25. Do the settings (adapters, sensors, and destination locations) need to be adjusted? If yes, click Back and adjust the settings as needed. If no, click Next. 26. Did the Archive Private Keys window appear? If yes, go to Step 27. If no, the Setup Complete window appears. Go to Step 29. 27. Select or clear Archive the private keys. 28. Select a folder and passphrase, and then click Next. Reference: For more information, see “Archiving Private Keys” on page 69. The Setup Complete window appears. 29. Click Finish. RealSecure completes the installation. 44 Automating Installations on Windows Automating Installations on Windows Introduction You can use the Autorecord and Autoinstall features to automatically install Workgroup Manager components or sensors. Note: The option to archive private keys is not available in the automated installation. Benefits Autorecord and Autoinstall are useful when you want to install RealSecure on multiple systems. Autorecord Using Autorecord mode, you can save your responses to Setup prompts in a response file as you install RealSecure on a system. You can edit the response file as desired for use on systems configured differently from the original system. You can also manually create a response file with the desired responses. Some specialized, installation options (response file parameters) are not recorded during autorecord. Specifically, the Upgrade, Trace, and AbortIfNoHotFix settings are not recorded. You can customize the response file if you want to add them. Reference: For more information, see “Customizing the Automated Installation Response File” on page 48. Autoinstall Using Autoinstall mode, you can use the response file you created with Autorecord to install RealSecure on other systems. Setup reads your choices from the response file instead of requiring you to manually respond to Setup prompts. Setup also generates a log file in the WINNT directory which you can use to verify successful installation. The log file name varies depending on the RealSecure module you install: Workgroup Manager Autoinstall generates workgroup_manager_install.log Network sensor Autoinstall generates network_sensor_install.log Server sensor Autoinstall generates server_sensor_install.log 45 Chapter 4: Installing a Network Sensor on Windows Autorecording an installation To autorecord your installation: 1. From the Start menu, select Start→Run. 2. Click Browse, and the locate the setup.exe for the RealSecure module you want to install. 3. In the Open box in the Run window, change the command to full path to file\setup.exe -pfull path to file\response file_name Example: d:\RealSecure\Retail\Windows_NT_x86\ workgroup_manager\6.5\setup.exe -pc:\temp\autoinst.rsp 4. Click OK. The Installation Wizard appears. 5. Record the installation steps. Reference: For more information about completing the installation steps, see the typical and custom installation topics in this chapter. Autoinstalling RealSecure To autoinstall a component: 1. From the Start menu, select Start→Run. 2. Locate setup.exe for the RealSecure module you want to install. 3. In the Open box in the Run window, change the command line to full path to file\setup.exe -gfull path to file\response file_name Example: d:\RealSecure\Retail\Windows_NT_x86\ workgroup_manager\6.5\setup.exe -gc:\temp\autoinst.rsp 4. Click OK. 5. Be sure the installation was successful by checking the autoinstall log. Autoinstall log file 46 When running in Autoinstall mode, Setup generates a log file in the Windows (WINNT) directory containing error and other messages. Always check this file for error messages after you run Setup in Autoinstall mode. Automating Installations on Windows Setup uses default names for the different modules as follows: Module Default Autoinstall log file name Workgroup Manager workgroup_manager_install.log Network Sensor network_sensor_install.log Server Sensor server_sensor_install.log Table 10: Default Log File Names for Autoinstall 47 Chapter 4: Installing a Network Sensor on Windows Customizing the Automated Installation Response File Overview The autorecord features automatically generates a response file that you can use to install components unattended. However, you can further customize the installation by customizing the response file. When to customize a response file For example, some options in the response file are not available during installation. Also, you may want to use wildcards in the cryptographic providers section during an unattended installation. Specifying cryptographic providers If you are creating a response file from scratch, use care when specifying cryptographic providers. Consider the following: Using wildcards for provider parameters The response file must contain at least one Provider section, beginning with [Provider0]. Setup requires the first provider in the response file be installed and configured on the target system. If the first provider is not already installed, Setup terminates. If the response file includes additional providers, Setup attempts to configure them; however, if Setup is unable to configure these additional providers, it does not terminate. The order of the providers in the response file determines the order RealSecure uses them when attempting to establish connections between consoles and sensors. In the response file, you can use wildcards in a limited way in the Provider sections for more flexibility in the automated installation. With wildcards, Setup can search all the installed providers and find one that matches the specified parameters. The following example shows a Provider section that utilizes wildcards: [Provider0] ProviderType=* ProviderName=* ExchangeName=* ExchangeID=44032 ExchangeLen=191 SecretName=* SecretID=26115 48 Customizing the Automated Installation Response File SecretLen=168 HashName=* HashID=32772 HashLen=160 Setup first checks for the wildcard character in the ProviderName field. If it finds a wildcard, Setup then searches through the installed providers for a match on ExchangeID, ExchangeLen, SecretID, SecretLength, HashID, and HashName. If Setup finds a provider that matches all six parameters, Setup then configures the provider. If Setup does not find a provider that matches, it continues or terminates depending on whether it is processing the first provider in the response file. The first provider is required, but subsequent providers are not. Important: Although wildcards may appear in parameters other than ProviderName, Setup checks only for the wildcard in ProviderName. Also, ExchangeID, ExchangeLen, SecretID, SecretLength, HashID, and HashLen are required entries. Setup fails if there are no matching installed providers. Response file parameters Required Key(s) The automated installation capability is provided in part by the parameters of a response file. The response file is created in the Windows initialization file (.INI) format, with sections and key-value pairs. You can generate this file by running Setup in automated record mode or by populating it manually. The parameters and possible values are provided in Table 11 and Table 12. Possible Values Applies To Default Setting Comments Workgroup Manager, network sensor, server sensor 6.5 Do not change. Used by script to see if generated with current release. [RealSecure Response File] section Version 6.5 Table 11: Autoinstall Response File Parameters 49 Chapter 4: Installing a Network Sensor on Windows Required Key(s) Possible Values Applies To Default Setting Comments Workgroup Manager, network sensor, server sensor None Any combination of values. Workgroup Manager C:\Program Files\ISS\ RealSecure 6.5 Console None [SelectedComponents] section Component_1, Component_2, Component_3, Component_4 Workgroup Manager Targets\RealSecure Workgroup Manager\ RealSecure Event Collector\Event Database Targets\RealSecure Workgroup Manager\ RealSecure Event Collector\Event Collector Services Targets\RealSecure Workgroup Manager\ RealSecure Console\Asset Database Targets\RealSecure Workgroup Manager\ RealSecure Console\ Console Services Network Sensor Targets\RealSecure Network Sensor Server Sensor Targets\RealSecure Server Sensor Host Targets\RealSecure Server Sensor\Server Sensor without Network Monitoring [Console Destination] section Destination valid path Table 11: Autoinstall Response File Parameters (Continued) 50 Customizing the Automated Installation Response File Required Key(s) Possible Values Applies To Default Setting Comments Workgroup Manager C:\Program Files\ISS\ RealSecure 6.5 Event Collector None Workgroup Manager, network sensor, server sensor C:\Program Files\ISS\ issDaemon None server sensor C:\Program Files\ISS\ issSensors\ server_sensor_1 None network sensor C:\Program None Files\ISS\issSens ors\network_sens or_1 server sensor server_sensor_1 Does not allow spaces within the names. Any valid name (no spaces) network sensor network_sensor_ 1 Does not allow spaces within the names. 0,1, 2, ... network sensor 0 Indicates which network card to monitor. [Event Collector Destination] section Destination valid path [Daemon Destination] section Destination valid path [Server Sensor Destination] section Destination valid path [Network Sensor Destination] section Destination valid path [Server Sensor Name] Name Any valid name (no spaces) [Network Sensor Name] Name [Adapter Number] AdapterNumber [Program Folder] Table 11: Autoinstall Response File Parameters (Continued) 51 Chapter 4: Installing a Network Sensor on Windows Required Key(s) Possible Values Applies To Default Setting Comments Folder Any folder name Workgroup Manager Internet Security Systems None Workgroup Manager, network sensor, server sensor 1 Authentication strength means that the sensor verifies that it knows who the peer is (usually a console) and that there is no party in the middle proxying the data stream. Workgroup Manager Yes Restricts related registry keys and directories to having only administrator privileges. Workgroup Manager Yes Restricts related registry keys and directories to having only administrator privileges. [Authentication Strength] AuthenticationStre 1, 0 ngth [Console Harden Security] LockDownSystem Yes, No [Event Collector Harden Security] LockDownSystem Yes, No [Engine Harden Security] LockDownSystem Yes, No network sensor [Allow Auto Key Import] Table 11: Autoinstall Response File Parameters (Continued) 52 Restricts related registry keys and directories to having only administrator privileges. Customizing the Automated Installation Response File Required Key(s) Possible Values Applies To Default Setting Comments AllowAutoKeyImp ort 1, 0 network sensor, server sensor 0 When you select the “Automatically import initial key” option, the sensor receives the initial authentication key over a standard network connection initiated from the console. Using this feature can lead to potentially unknown users having access to the RealSecure sensor, if the sensor receives its first connection from such a user. Afterwards, when a known user tries to copy public keys to the sensor, a warning indicates that a key already exists. The known user's keys are not copied to the sensor. Workgroup Manager, network sensor, server sensor None Failure to add at least one key administrator prevents key pushing to sensors on this computer. This is the only optional section in the response file. All other sections are required. [Key Administrators] (optional) computername_ KeyAdministrator_ username 1, KeyAdministrator_ 2,... [Asset DB Remote Location] Table 11: Autoinstall Response File Parameters (Continued) 53 Chapter 4: Installing a Network Sensor on Windows Required Key(s) Possible Values Applies To Default Setting Comments ServerName any valid computer name Workgroup Manager None Server name where asset database is installed; does not have to be remote. Workgroup Manager None Server name where event/enterprise database is installed; does not have to be remote. Workgroup Manager a number between 5 and 100, for example 5 would be 5% SQL Server or MSDE can be configured to set an upper limit on memory usage. It is recommended that this upper limit for memory usage be roughly 25% of the physical memory installed on the system. If SQL Server or MSDE is configured to have an upper limit of memory usage that is roughly equivalent to the amount of physical memory on the system then other applications such as the RealSecure console may not have enough memory to operate properly. Workgroup Manager 0 Allows migration of asset database data. [EventCollector DB Remote Location] ServerName any valid computer name [SQL Server Maximum Memory Size] SQLMaxMem 5% to 100% of total physical memory [Migrate Asset Database] MigrateAssetDB 1, 0 [Migrate Event Database] Table 11: Autoinstall Response File Parameters (Continued) 54 Customizing the Automated Installation Response File Required Key(s) Possible Values Applies To Default Setting Comments MigrateEventDB 1, 0 Workgroup Manager 0 Allows migration of event database data. 1, 0 Workgroup Manager 1 The RealSecure event collector requires SQL Server Authentication. If setup is not authorized to enable SQL Server Authentication, then the install ends. Yes, No network sensor, server sensor None Depending on the state of the system, Setup may need to restart to shut down a service or delete a file. [Enable SQL Server Authentication] EnableSQLAuth [Reboot System] RebootSystemIfN eeded Yes allows the restart, and you must run the Setup again to complete the installation. No causes Setup to end. Table 11: Autoinstall Response File Parameters (Continued) Parameter Possible Values Applies To Default Setting Comments [Providerx] section(s) ProviderType Depends upon provider network sensor, console, server sensor none Optional if ProviderName is wildcard. ProviderName Depends upon provider network sensor, console, server sensor none Must be either a valid provider name or “*” (wildcard) Table 12: Autoinstall Response File Parameters Provider Section 55 Chapter 4: Installing a Network Sensor on Windows Parameter Possible Values Applies To Default Setting Comments Exchange Name Depends upon provider network sensor, console, server sensor none Optional if ProviderName is wildcard. ExchangeID Depends upon provider network sensor, console, server sensor none Required ExchangeLen Depends upon provider network sensor, console, server sensor none Required SecretName Depends upon provider network sensor, console, server sensor none Optional if ProviderName is wildcard. SecretID Depends upon provider network sensor, console, server sensor none Required SecretLen Depends upon provider network sensor, console, server sensor none Required HashName Depends upon provider network sensor, console, server sensor none Optional if ProviderName is wildcard. HashID Depends upon provider network sensor, console, server sensor none Required HashLen Depends upon provider network sensor, console, server sensor none Required Table 12: Autoinstall Response File Parameters Provider Section (Continued) Example workgroup manager response file 56 This is an example Workgroup Manager response file: [RealSecure Response File] Version=6.5 [SelectedComponents] Component_1=Targets\RealSecure Workgroup Manager\ RealSecure Event Collector\Event Database Customizing the Automated Installation Response File Component_2=Targets\RealSecure Workgroup Manager\ RealSecure Event Collector\Event Collector Services Component_3=Targets\RealSecure Workgroup Manager\ RealSecure Console\Asset Database Component_4=Targets\RealSecure Workgroup Manager\ RealSecure Console\Console Services [Console Destination] Destination=C:\Program Files\ISS\RealSecure 6.5 Console [Event Collector Destination] Destination=C:\Program Files\ISS\RealSecure 6.5 Event Collector [Daemon Destination] Destination=C:\Program Files\ISS\issDaemon [MSDE Destination] Destination=C:\MSSQL7 [Program Folder] Folder=ISS [Authentication Strength] AuthenticationStrength=1 [Console Harden Security] LockDownSystem=Yes [Event Collector Harden Security] LockDownSystem=Yes [Key Administrators] KeyAdministrator_1=computer_username KeyAdministrator_2=computer_username KeyAdministrator_3=computer_username [Asset DB Remote Location] ServerName=USERNAME [EventCollector DB Remote Location] ServerName=USERNAME [SQL Server Maximum Memory Size] SQLMaxMem=32 [Migrate Asset Database] MigrateAssetDB=0 [Migrate Event Database] MigrateEventDB=0 [Enable SQL Server Authentication] EnableSQLAuth=1 [Provider0] ProviderType=998 ProviderName=ISS ECNRA Built-In Provider, Strong Encryption Version ExchangeName=EC_KEYX EC239A01 57 Chapter 4: Installing a Network Sensor on Windows ExchangeID=44032 ExchangeLen=239 SecretName=DESX SecretID=26116 SecretLen=168 HashName=SHA1 HashID=32772 HashLen=160 [Provider1] ProviderType=1 ProviderName=Microsoft Enhanced Cryptographic Provider v1.0 ExchangeName=RSA_KEYX (1024 bit) ExchangeID=41984 ExchangeLen=1024 SecretName=RC4 (128 bit) SecretID=26625 SecretLen=128 HashName=SHA-1 HashID=32772 HashLen=160 Example network This is an example network sensor response file: sensor response file [RealSecure Response File] Version=6.5 [SelectedComponents] Component_1=Targets\RealSecure Network Sensor [Adapter Number] AdapterNumber=0 [Network Sensor Name] Name=network_sensor_1 [Network Sensor Destination] Destination=C:\Program Files\ISS\issSensors\network_sensor_1 [Daemon Destination] Destination=C:\Program Files\ISS\issDaemon [Authentication Strength] AuthenticationStrength=1 [Allow Auto Key Import] AllowAutoKeyImport=1 [Engine Harden Security] LockDownSystem=Yes [Key Administrators] KeyAdministrator_1=computer_username 58 Customizing the Automated Installation Response File KeyAdministrator_2=computer_username [Provider0] ProviderType=998 ProviderName=ISS ECNRA Built-In Provider, Strong Encryption Version ExchangeName=EC_KEYX EC239A01 ExchangeID=44032 ExchangeLen=239 SecretName=DESX SecretID=26116 SecretLen=168 HashName=SHA1 HashID=32772 HashLen=160 [Provider1] ProviderType=1 ProviderName=Microsoft Enhanced Cryptographic Provider v1.0 ExchangeName=RSA_KEYX (1024 bit) ExchangeID=41984 ExchangeLen=1024 SecretName=RC4 (128 bit) SecretID=26625 SecretLen=128 HashName=SHA-1 HashID=32772 HashLen=160 Example server An example server sensor response file appears below: sensor response file [RealSecure Response File] Version=6.5 [SelectedComponents] Component_1=Targets\RealSecure Server Sensor\Server Sensor Host Component Component_2=Targets\RealSecure Server Sensor\Server Sensor without Network Monitoring [Server Sensor Name] Name=server_sensor_1 [Server Sensor Destination] Destination=C:\Program Files\ISS\issSensors\server_sensor_1 [Daemon Destination] Destination=C:\Program Files\ISS\issDaemon [Authentication Strength] AuthenticationStrength=1 59 Chapter 4: Installing a Network Sensor on Windows [Allow Auto Key Import] AllowAutoKeyImport=1 [Key Administrators] KeyAdministrator_1=computer_username KeyAdministrator_2=computer_username [Provider0] ProviderType=998 ProviderName=ISS ECNRA Built-In Provider, Strong Encryption Version ExchangeName=EC_KEYX EC239A01 ExchangeID=44032 ExchangeLen=239 SecretName=DESX SecretID=26116 SecretLen=168 HashName=SHA1 HashID=32772 HashLen=160 [Provider1] ProviderType=1 ProviderName=Microsoft Enhanced Cryptographic Provider v1.0 ExchangeName=RSA_KEYX (1024 bit) ExchangeID=41984 ExchangeLen=1024 SecretName=RC4 (128 bit) SecretID=26625 SecretLen=128 HashName=SHA-1 HashID=32772 HashLen=160 60 Using the Silent Installation Feature Using the Silent Installation Feature Running automated install in silent mode The automated installation feature can be used with InstallShield’s Silent Install feature to suppress the display of the RealSecure Setup window. Caution: If you install the event collector, the installation is not completely silent. The install program requires that you enter passwords for certain windows. Syntax InstallShield Silent requires the /s parameter and the Silent Install response file (by default, this response file is called setup.iss). The syntax for using the automated and silent installation together is as follows: setup.exe -gfull path to automated install response file\response file name -s -f1 path\Silent Install ResponseFile The -f1 switch specifies an alternate location and name of the response file (.iss file). Note: The order of the switches in the command line is important. When running an automated install in silent mode, be sure to specify the -g switch before the -s switch. Example response file An example InstallShield Silent response file appears below: [InstallShield Silent] Version=v6.50.000 File=Response File [File Transfer] OverwrittenReadOnly=NoToAll [Application] Name=RealSecure Version=1.00.000 Company=ISS Lang=0009 RealSecure ships with a setup.iss file that allows Setup to run in Silent mode. 61 Chapter 4: Installing a Network Sensor on Windows Silent install log file When running Setup in Silent mode, you automatically generate a log file called setup.log in the same directory as that of the setup.ins (the compiled setup script file). You can specify an alternate silent install log file location using the -f2 switch. The Setup.log file for a successful silent setup of InstallShield is shown below. [InstallShield Silent] Version=v6.50.000 File=Log File [ResponseResult] ResultCode=0 [Application] Name=RealSecure Workgroup Manager 6.5 Version=1.00.000 Company=ISS Lang=0009 Note: The Setup.log file is the same for network sensors and server sensors, except for the Name parameter. Silent install log file result codes After running Setup in Silent mode, check the silent install log file setup.log to see if the setup succeeded. Table 13 lists the possible result codes and their meanings: Result Code Meaning 0 Success -1 General error -2 Invalid mode -3 Required data not found in the Setup.iss file -4 Not enough memory available -5 File does not exist -6 Cannot write to the response file -7 Unable to write to the log file -8 Invalid path to the InstallShield Silent response file Table 13: Silent mode return codes 62 Using the Silent Installation Feature Result Code Meaning -9 Not a valid list type (string or number) -10 Data type is invalid -11 Unknown error during setup -12 Dialog boxes are out of order -51 Cannot create the specified folder -52 Cannot access the specified file or folder -53 Invalid option selected Table 13: Silent mode return codes (Continued) 63 Chapter 4: Installing a Network Sensor on Windows Automated Installation Frequently Asked Questions Introduction This topic answers some of the most frequently asked questions about automatically installing Windows components. How do I generate an automatic install response file? To generate a response file: 1. Run Setup using the -p switch and a response file name, like this: setup.exe –pc:\temp\autoinst.rsp (This command assumes that you call the response file autoinst.rsp and want it placed in C:\TEMP.) 2. Answer the user prompts just as you would with a normal installation. 3. At the conclusion of the installation, the response file will be located in the folder specified. How do I run an automated installation? To run an automated installation: 1. Create a response file either manually or by running Setup in Autorecord mode (see one of the following sections: “Automating Installations on Windows” on page 45, “Customizing the Automated Installation Response File” on page 48, or “Automating Network Sensor Installations on Solaris” on page 79). 2. Modify the response file manually as needed depending on the configuration of the target system. 3. Run Setup on the target system using the -g option, like this: setup.exe –gc:\temp\autoinst.rsp (This assumes that the response file is named autoinst.rsp and that it is located in the C:\TEMP directory.) How do I know if the automatic install completed successfully? 64 To ensure the install completed successfully: 1. In the WINNT directory, locate the log file pertaining to the module you installed. Module Log file Workgroup Manager workgroup_manager_install.log Automated Installation Frequently Asked Questions Module Log file Network Sensor network_sensor_install.log Server Sensor server_sensor_install.log 2. Open the log file using any text editor, such as Notepad. 3. Scroll to the bottom of the log file. 4. If the setup was successful, you see a message like this: Setup completed successfully. Return code=0 If the setup was not successful, you see a message like this: Setup terminating.... Return code=-1 What do I do if the automatic install failed? If the automatic installation failed: 1. Scroll upward from the bottom of the log file until you find the error message. 2. Correct the cause of the error and run the Setup again. How do I use a different name for the automatic install log file? If you want to use a different name, such as autoinst.log in this procedure: 1. Locate the SETUP.INI file in the same directory as setup.exe. 2. Open the file using any text editor, such as Notepad. 3. Add this line to the [Startup] section: AutoLogFileName=autoinst.log 4. Run the setup in autoinstall mode. How do I run a silent automated install? Silent install requires a silent install response file. An example response file named setup.iss ships with RealSecure in the same directory as setup.exe. Use this file along with the autoinstall and the silent install switches as follows: setup.exe –gc:\temp\autoinst.rsp –s 65 Chapter 4: Installing a Network Sensor on Windows By default, Setup looks in its current directory for the silent install response file. If you need to specify a different location for the silent install response file, use the -f1 switch as follows: setup.exe –gc:\temp\autoinst.rsp –s -f1c:\temp\setup.iss How do I know if the silent automated install succeeded? Check both the automated install log file and the silent install log file for errors. Setup creates the silent install log file in the same directory as the setup.ins file. By default, this file is called setup.log. To specify an alternate location and name for the silent install log file by using the -f2 switch, type: setup.exe –gc:\temp\autoinst.rsp –s -f2c:\temp\silent.log or setup.exe –gc:\temp\autoinst.rsp –s -f1c:\temp\setup.iss – f2c:\temp\silent.log 66 Working with Cryptographic Providers During Windows Installations Working with Cryptographic Providers During Windows Installations Introduction Cryptographic providers encrypt communications between the console and sensors, console and event collector, and event collector and sensors. Encrypting communications secures the information that is passed between components. Reference For more information about setting up encryption, see “Customizing Encryption” on page 26. Adding a provider To add a provider during a Windows installation: 1. Click Add. 2. Select a provider from the list of providers installed on your system. 3. Click OK. Important: If this console is going to communicate with any Unix sensors, a Certicom provider such as the ISS ECNRA Built-In provider must be listed in this window. If you do not see the ISS ECNRA provider, click Add to add it to the list. Changing default algorithms for the provider To change the default algorithms during a Windows installation: 1. Click Add to add the provider to customize. 2. Clear the Use algorithm defaults box. The Configure Algorithms window appears. 3. Choose an algorithm for each of the three categories. 4. Click OK. Important: You must use the same algorithm for the console and each of the sensors. If you do not, the components will not be able to communicate with each other. 67 Chapter 4: Installing a Network Sensor on Windows Deleting a provider To delete a cryptographic provider during a Windows installation: 1. Select the provider that you do not want the console to use. 2. Click Delete. Note: If you delete a provider by mistake, click Add to add it back to the list. Deleting a provider does not delete the public/private key pair associated with that provider configuration. If you later add the provider back to your configuration, the existing key pair is used rather than generating a new key pair. 68 Archiving Private Keys Archiving Private Keys Introduction Use the Archive Private keys window to archive a copy of the cryptographic provider’s private key that was created during installation. If you archive a copy of the private key, you can recover the private key if it becomes damaged or destroyed. The archived copy of the private key is encrypted and passphrase protected. Important: The Setup program can only archive private keys when it creates them; it cannot archive existing private keys. Benefits If the cryptographic provider's private key becomes damaged or destroyed and you have an archived copy, you can retrieve the archived copy by using the Restore Cryptographic Private Keys utility. Since the cryptographic provider's public key will already exist on other components, no additional steps are necessary. If the private key becomes damaged or destroyed and you do not have an archived copy of the key, you must reinstall the component whose key is damaged to create a new private/public key pair. Then you must copy the new public key to other components before authenticated communication can occur. Reference: For more information, see “Restoring Archived Private Keys” on page 102. Archiving the private key To archive the private key during installation: 1. Select the Archive the private keys check box. 2. Use the default location, or type a location in the Save the key files in this folder field. 3. Type a passphrase in the Passphrase field. 4. Type the passphrase in the Confirm field. 5. Click Next. 69 Chapter 4: Installing a Network Sensor on Windows Bypass archiving To bypass archiving during installation: 1. Clear the Archive the private keys check box. 2. Click Next. 3. Click Next. The Start Copying Files window appears. 4. Do the settings need to be adjusted? If yes, click Back and adjust the settings as needed. If no, click Next. The installation program reviews the bindings settings and displays a message that the bindings review is complete. 5. Click OK. RealSecure completes the installation. 70 Chapter 5 Installing a Network Sensor on Solaris Overview Introduction This chapter describes the RealSecure network sensor installation programs and installation procedures for Solaris environments. In this chapter This chapter contains the following topics: Topic Page Installation Options on Solaris 72 Installing a Network Sensor on Solaris 74 Automating Network Sensor Installations on Solaris 79 71 Chapter 5: Installing a Network Sensor on Solaris Installation Options on Solaris Installation methods Typical installation You can install the network sensor for Solaris using one of several methods: typical (simple) installation custom (advanced) installation automated installation To install a network sensor with the default options (skipping advanced configuration), choose the option to accept the default settings during the installation process. Table 14 lists the default settings in a network sensor for Solaris installation. Option Setting Auto import of keys (daemon only) No Install path (daemon only) /opt/ISS Network sensor directory (sensor only) network_sensor_1 Key management (sensor only) Key Administrators: No Cryptographic provider (daemon only) ISS ECNRA Built-In Provider, Strong Encryption Version Table 14: Default parameters for network sensor for Solaris Custom installation If you need to customize the settings described in Table 14, then you can choose the option to customize the sensor settings during the install process. Automated installation If you intend to install several network sensors using the same settings, you can use the automated installation process. With this feature, you install a network sensor once, save the settings you choose during that 72 Installation Options on Solaris installation, and then use those settings to install the same configuration on other computers without having to monitor the entire installation process. Reference: For more information, see “Automating Network Sensor Installations on Solaris” on page 79. 73 Chapter 5: Installing a Network Sensor on Solaris Installing a Network Sensor on Solaris Introduction Prerequisite This topic describes the following: prerequisite to installing a network sensor on a Solaris system installing a network sensor installing additional sensors The files needed for installation are stored in a tar file. Before installing a network sensor, open this file using the tar -xvf rsns6.5.2001.xxxsparc-solaris.multi.tar command. Installation Opening the file generates two packages and one installation script packages and script needed for installation. Use these packages to install daemons and sensors: This file... is used to... pkgISSXdmn install the daemon manually pkgISSXrsns install the sensor manually pkgISSXnsinstall.sh install daemons and sensors by running a script Table 15: Solaris installation files for network sensor Installing a network sensor To install a network sensor on Solaris: Caution: If you have already installed a sensor on this computer, use the procedure in “Installing additional network sensors” on page 77. 1. Log on using a superuser account, such as root. 2. Type the .pkgISSXnsinstall.sh all command to start the installation. 3. Press ENTER to install all the packages that are in the file. The installation program begins to install the file. Next, it prompts you to accept the terms of the ISS license agreement and the default installation parameters. 74 Installing a Network Sensor on Solaris 4. Do you accept all of the terms of the ISS RealSecure License Agreement, and do you want to install RealSecure with the default parameters? If yes, type y to install with default parameters (recommended), and then go to step 10. Reference: For a list of default settings, see Table 14, “Default parameters for network sensor for Solaris” on page 72. If no, type n. The installation asks you if you want to read the entire license agreement. 5. Type y to read the agreement. The installation prompts you to accept the terms of the agreement. 6. Type y to accept the terms of the ISS RealSecure License Agreement. The installation program prompts you for the installation directory of the daemon component. 7. Press ENTER to accept the default directory of /opt/ISS. The installation program prompts you to choose an auto-import option. 8. Do you want to automatically import an authentication key? When you select the auto-import option, the sensor receives the initial authentication key over a standard network connection initiated from the console. SiteProtector users must select this option if using authentication. Reference: For more information, see “Automatically Importing Authentication Keys” on page 24. If yes, type y. If no, type n. The installation program displays the default cryptographic provider configuration. 9. Set up as many cryptographic providers as you need. References: For more information, see “Customizing Encryption” on page 26. The installation prompts you to allow it to create the opt/ISS directory. 75 Chapter 5: Installing a Network Sensor on Solaris 10. Type y to have the installation create the directory. The installation program informs you that it must execute several scripts with the superuser account. 11. Type y to allow the installation to continue. The installation installs the daemon portion of the network sensor, and then prompts you to select a sensor package (there should only be one package named ISSXns1). 12. Press ENTER to install all the packages that are in the file. The installation program begins to install the file. Next, it prompts you to accept the terms of the ISS license agreement and the default installation parameters. 13. Do you accept all of the terms of the ISS RealSecure License Agreement, and do you want to install RealSecure with the default parameters? If yes, type y to install with default parameters (recommended), and then go to the last step. Reference: For a list of default settings, see Table 14, “Default parameters for network sensor for Solaris” on page 72. If no, type n. The installation asks you if you want to read the entire license agreement. 14. Type y to read the agreement. The installation prompts you to accept the terms of the agreement. 15. Type y to accept the terms of the ISS RealSecure License Agreement. The installation program prompts you for a name and directory for the network sensor. 16. Do you want to use network_sensor_1 as your network sensor name and installation directory? Reference: For more information, see “Sensor naming conventions” on page 3. If yes, type y to accept the default name of network_sensor_1. If no, type n, and then type the new name. Caution: Sensor names can contain only alphanumeric characters with underscores or dashes. 76 Installing a Network Sensor on Solaris 17. Do you want to set up one or more key administrators for this sensor? Reference: If you selected the automatic key import option, the first person to connect to this sensor will obtain key administrator rights. For more information, see “Automatically Importing Authentication Keys” on page 24. If yes, type y (recommended), and then set up each administrator using the format computer_username. If no, type n. The installation program informs you that it must execute several scripts with the superuser account. 18. Type y to allow the installation to continue. The program finishes the network sensor installation and removes all temporary files created during installation. Installing additional network sensors If you are installing a second or third network sensor or if you have previously installed server sensor on this computer, you must use the following procedure to install an additional sensor: 1. Log on using a superuser account, such as root. 2. Type the .pkgISSXnsinstall.sh netsensor command to start the installation. The installation prompts you to select a sensor package (there should only be one package named ISSXns1). 3. Press ENTER to install all the packages that are in the file. The installation program begins to install the file. Next, it prompts you to accept the terms of the ISS license agreement and the default installation parameters. 4. Do you accept all of the terms of the ISS RealSecure License Agreement, and do you want to install RealSecure with the default parameters? If yes, type y to install with default parameters (recommended). The program completes the installation. Reference: For a list of default settings, see Table 14, “Default parameters for network sensor for Solaris” on page 72. If no, type n. The installation asks you if you want to read the entire license agreement. 77 Chapter 5: Installing a Network Sensor on Solaris 5. Type y to read the agreement. The installation prompts you to accept the terms of the agreement. 6. Type y to accept the terms of the ISS RealSecure License Agreement. The installation program prompts you for a name and directory for the network sensor. 7. Do you want to use network_sensor_1 as your network sensor name and installation directory? Reference: For more information, see “Sensor naming conventions” on page 3. If yes, type y to accept the default name of network_sensor_1. If no, type n, and then type the new name. Caution: Sensor names can contain only alphanumeric characters with underscores or dashes. 8. Do you want to set up one or more key administrators for this sensor? Reference: If you selected the automatic key import option, the first person to connect to this sensor will obtain key administrator rights. For more information, see “Automatically Importing Authentication Keys” on page 24. If yes, type y (recommended), and then set up each administrator using the format computer_username. If no, type n. The installation program informs you that it must execute several scripts with the superuser account. 9. Type y to allow the installation to continue. The program finishes the network sensor installation and removes all temporary files created during installation. 78 Automating Network Sensor Installations on Solaris Automating Network Sensor Installations on Solaris Introduction The RealSecure network sensor can be automatically installed on Solaris by using pkgask to generate a response file and by using an admin file to suppress pkgadd from asking for confirmation to run the package setup scripts. Note: You must run the automated installation for the daemon before you install the sensor. Prerequisites About response files If you are installing daemons and sensors for the first time, you must complete the following prerequisites: Open the pkg ISSXdmn package that contains the installation files for the daemon. Open the pkg ISSXrsns package that contains the installation files for the network sensor. The pkgask command runs the request script for a package and stores the information necessary to install the package. Using the request script is similar to using pkgadd to install the package, but no files are installed. Note: Separate response files are required for the daemon and the sensor. About admin files An admin file contains installation parameters for the Solaris package administration commands. Use an admin file to install RealSecure, because the RealSecure package contains shell scripts that are run with superuser (or root) permissions. To run pkgadd non-interactively for a package with installation scripts, you must specify an admin file and turn off these checks. The admin file should contain, at a minimum, the following lines: action=nocheck conflict=nocheck instance=overwrite 79 Chapter 5: Installing a Network Sensor on Solaris Installing the daemon Install the daemon before you install the sensor. To automatically install the daemon: 1. Type the following command to generate the response file: pkgask -r response -d ./pkgISSXdmnns 2. Type the following command to create an admin file: echo “action=nocheck” > admin echo "conflict=nocheck" >> admin echo "instance=overwrite" >> admin 3. Type the following command to install the daemon package: pkgadd -n -r response file name -a admin -d ./pkgISSXdmn all Installing the sensor Install the sensor after you install the daemon. An installed daemon is required for network sensor autoinstallations. To automatically install the sensor: 1. Install the temporary sensor data by typing the following command: pkgadd -n -a admin -d ./pkgISSXrsns The temporary package pkg ISSXns is created in the /tmp directory. 2. Remove the temporary sensor data by typing the following command: pkgrm ISSXrsns 3. Create the response file by typing the following command: pkgask -r response -d /tmp/pkgISSXns 4. Install the sensor package by typing the following command: pkgadd -n -r response file name -a admin -d /tmp/pkg/ ISSXns all 80 Chapter 6 Installing the Nokia Appliance Overview Introduction This chapter describes the configuration steps necessary for proper operation of RealSecure on the Nokia appliance. It also contains instructions for upgrading or reinstalling RealSecure. In this chapter This chapter contains the following topics: Topic Page Before Installing the Nokia Appliance 82 Enabling Hostname Resolution 83 Enabling Logging 85 Upgrading or Reinstalling RealSecure from a Package 86 Installing a Second Sensor Using Voyager 89 Working with Newly Configured Interfaces 90 81 Chapter 6: Installing the Nokia Appliance Before Installing the Nokia Appliance Prerequisites 82 You must perform the following tasks in Nokia Network Voyager before you run RealSecure on your Nokia appliance: enable hostname resolution enable RealSecure logging Enabling Hostname Resolution Enabling Hostname Resolution Introduction You must enable hostname resolution so that your network appliance can communicate with the workstation that runs the console. Use one of the following methods to enable hostname resolution: select DNS servers to resolve hostnames add static hosts Important: You must add an IP address to the Host Assignment. This address must match the host name as it appears in the upper left corner of the Static Host Entries window. Selecting DNS servers Ensure that there is at least one active DNS server on your network. To select DNS servers: 1. Log in to the appliance using Nokia Network Voyager. The Voyager window appears. 2. Click Config. 3. Click DNS in the System Configuration section. 4. Type the domain name in the Domain name edit box. 5. Type the IP address of the primary DNS server in the Primary name. 6. (Optional) Type the IP address of a secondary DNS server in the Secondary name server box. 7. (Optional) Type the IP address of a tertiary DNS server in the Tertiary name server box. 8. Click Apply. 9. Click Save. 83 Chapter 6: Installing the Nokia Appliance Adding static hosts If you choose not to select a DNS server, follow this procedure to add static host entries. To add static host entries: 1. Log in to the appliance using Nokia Network Voyager. The Voyager window appears. 2. Click Config. 3. Click the Host Address Assignment link in the System Configuration section. 4. Type the hostname of this appliance in the Add new hostname edit box. 5. Click Apply. 6. Type the IP address of this appliance in the IP address edit box. 7. Click Apply. 8. Repeat Steps 4-7 to add any additional static hosts. Examples: SMTP server if email is enabled, SNMP manager if SNMP is enabled, and firewalls if OPSEC is enabled. 9. Click Save. 84 Enabling Logging Enabling Logging Introduction RealSecure should be configured to log informational messages that can help with troubleshooting. (Error and warning messages are logged by default.) Procedure To enable logging: 1. Log in to RealSecure using the console or telnet. 2. Type the following command at the command line prompt: dbsetsyslog:action:file:/var/log/messages: selector:daemon.info t 3. Type the following command at the command line prompt: dbset:save 85 Chapter 6: Installing the Nokia Appliance Upgrading or Reinstalling RealSecure from a Package Introduction If RealSecure is not already installed on your network application platform or if you want to upgrade RealSecure, you can run the newpkg command (at a command prompt) or use Nokia Network Voyager to perform the installation or upgrade. Before you upgrade a 5.x sensor, you should synchronize the sensor log with the console’s database. See the RealSecure Workgroup Manager User Guide for information about how to do this. Upgrading sensors remotely There are certain prerequisites and procedures that you must follow before you remotely upgrade 5.x sensors to 6.x. These prerequisites and procedures are described in Chapter 2, "Upgrading Sensors". Reference: For information and complete instructions for upgrading sensors remotely, see “Upgrading Sensors Remotely” on page 12. newpkg procedure The following is an example of what you will see when you execute the newpkg command. (This example assumes that the RealSecure package is on your local file system.) To install RealSecure from a package: 1. Log in to RealSecure for Nokia using the console or telnet. 2. Type the following command at the command line prompt: newpkg The following text appears: 1. Install from CD-ROM. 2. Install from anonymous FTP server. 3. Install from FTP server with user and password. 4. Install from local filesystem. Choose an installation method (1-4): 3. Type 4. The following text appears: Enter pathname to the packages [none]: 86 Upgrading or Reinstalling RealSecure from a Package 4. Type the path to the directory where the package is stored. The following text appears: Loading Packages...done Found packages: RSNS_NokiaRelease_6_5_200x_xxx.tgz Package Description: RealSecure network intrusion detection system Would you like to: 1. Install this as a new package 2. Skip this package Choose (1-2): 5. Type 1. The following text appears: Installing RSNS_NokiaRelease_6_5_200x_xxx.tgz Extracting Package Done installing ISS cleaning up..done Reboot System to activate packages 6. Type the following command at the command line prompt: reboot RealSecure starts automatically after the appliance reboots. Voyager procedure The following procedure assumes that your RealSecure for Nokia package is in the /opt directory on your Nokia appliance. To install using Voyager: 1. Log in to the appliance using Nokia Network Voyager. The Voyager window appears. 2. Click Config on the home page. 3. Click Manage Installed Packages in the System Configuration section. 87 Chapter 6: Installing the Nokia Appliance 4. Click FTP and Install Packages. Your RealSecure for Nokia package should be listed in the Select package for unpack field. 5. Select the appropriate package. 6. Click Apply. The package appears in a table called Information of selected package. 7. Click Click here to install/upgrade. The Package Selected for Installation or Upgrade page appears. 8. Select Yes in Install or Upgrade, as appropriate. 9. If you are upgrading, click the name of the current package under Choose one of the following packages to upgrade from. 10. Click Apply. A message indicates that the application was successful. 11. Click Save. 12. Click Home. 13. Click Config. 14. Click Reboot, Shut Down System (at the bottom of the page). RealSecure starts automatically after the appliance reboots. 15. Click Reboot. 88 Installing a Second Sensor Using Voyager Installing a Second Sensor Using Voyager Introduction This topic describes how to install a second network sensor using Voyager. Second sensor procedure To install the second network sensor using Voyager: 1. Log in to the appliance using Nokia Network Voyager. The Voyager window appears. 2. Click Security & Access Configuration on the home page. 3. Click RealSecure for Nokia. 4. Click Install network sensor two. Voyager begins installing the second network sensor. The installation program may take a few moments. The following message appears when the installation is complete: Network_sensor_2 is successfully installed 5. Once the installation is complete, run the Deployment Wizard to configure authentication for the sensor. Reference: For more information about running the Deployment Wizard, see “Configuring Authentication with the Deployment Wizard” on page 94. 89 Chapter 6: Installing the Nokia Appliance Working with Newly Configured Interfaces Introduction The console will not necessarily recognize changes made to the interfaces of your Nokia appliance. In particular, the console may not recognize a newly configured interface. Procedure After you make interface configuration changes, you can force the console to recognize the changes. To recognize interface configuration changes: 1. Start the console. 2. In the Sensors window, right-click the object that represents the Nokia appliance installation. 3. Select Properties. 4. In the Network Sensor Properties window, click the General tab. 5. Select the Adapter of Monitored Network menu. Note: If the newly configured interface appears, you do not need to force the console to recognize it and can stop. The status Stealth displays next to the interface, rather than an IP address. If the status is Inactive, it means that there is no physical connection between the hub and the switch. Finish this procedure. 6. Click Cancel. 7. In the Sensors window, right-click the object that represents the Nokia appliance installation. 8. Select Shutdown. 9. Click Yes. 10. Right-click the object that represents the Nokia appliance installation. 11. Select Start. Note: After you restart the sensor, the sensor is aware of the interface change. The console, however, may take a few moments (depending on the poll interval) to establish a connection with the sensor. To see changes immediately, stop and then manage the sensor, again. 12. Return to the Adapter of Monitored Network menu, and then verify that the newly configured interface is available. 90 Chapter 7 Configuring a Network Sensor Overview Introduction The chapter describes required and maintenance tasks you can do to configure a RealSecure network sensor. After installation requirements After installing a network sensor, you must configure your management console to communicate with the sensor. Reference: For general information about setting up sensors to work with your management console, see the RealSecure Help (for the Workgroup Manager) or the RealSecure SiteProtector Strategy Guide (for SiteProtector management). After installation requirements for Workgroup Manager only Sensor maintenance If using the Workgroup Manager, you may need do the following: if using authentication, configure the sensors to accept authenticated communication from SiteProtector or Workgroup Manager if using stealth mode, configure the console and sensor to hide the monitoring interface After installing a network sensor, you may need to do the following: test the sensor start or stop the sensor add new key administrators restore an archived private key uninstall the sensor change encryption or authentication settings 91 Chapter 7: Configuring a Network Sensor In this chapter This chapter contains the following topics: Topic 92 Page Configuring Authentication 93 Configuring Authentication with the Deployment Wizard 94 Configuring Authentication Manually 97 Location of Authentication Keys 100 Restoring Archived Private Keys 102 Changing Encryption Settings 104 Uninstalling Components and Updates 105 Adding Key Administrators 110 Starting and Stopping Sensors 111 Testing the Sensor 112 Network Sensor Stealth Configuration 113 Configuring Authentication Configuring Authentication Purpose If you installed RealSecure components with the authentication option, then you must configure the sensors to accept authenticated communication from Workgroup Manager or SiteProtector before you can monitor and manage them. Automatically configuring authentication If you selected the auto-import option during installation and are using the Workgroup Manager for management, you can use the RealSecure Deployment Wizard to automatically configure authentication for you. Reference: For more information, see “Configuring Authentication with the Deployment Wizard” on page 94. If using SiteProtector, you must select auto-import when you install sensors. Authentication is automatically configured when you set up SiteProtector to monitor the sensor. Reference: For more information, see the RealSecure SiteProtector Strategy Guide. Manually configuring authentication If you did not select the auto-import option, you can set up the authentication manually. Reference: For more information, see “Configuring Authentication Manually” on page 97. 93 Chapter 7: Configuring a Network Sensor Configuring Authentication with the Deployment Wizard Introduction The Deployment Wizard is a program that automatically configures authenticated communication between the Workgroup Manager components and RealSecure sensors. Prerequisites Before running the RealSecure Deployment Wizard, you must complete the following prerequisites: Install the 6.5 Workgroup Manager. Enable the Automatic key import option in the Workgroup Manager installation program and in the sensor installation programs. Note: If you did not enable this option when you installed each component, you must configure authentication manually. Reference: See “Configuring Authentication Manually” on page 97. Give the Workgroup Manager from which you plan to run the Deployment Manager Key Administrator status over any sensors that you have previously installed (fresh sensor installations using the auto-import option will automatically give your Workgroup Manager Key Administrator status when you run the Wizard). Reference: See “Adding Key Administrators” on page 110. Obtain a valid ISS license key. Reference: See Chapter 7, “License Keys,” in the RealSecure Workgroup Manager Installation Guide. Starting the Deployment Wizard 94 You can start the Deployment Wizard from the Workgroup Manager console in any of the following ways: From the File menu, select Run Deployment Wizard. When the console starts, it displays a window entitled Run Deployment Wizard. If you select the check box Show at Startup, the window appears whenever the console starts. From the View menu, select Options. On the General tab, select the Deployment Wizard Prompt to turn on or off the Run Deployment Wizard window that displays when the console starts. Configuring Authentication with the Deployment Wizard Procedure To use the Deployment Wizard to configure authentication: 1. Start the Deployment Wizard. The License Key Configuration window appears. 2. Type the path to your ISS license key, or click Browse to search for the folder where the key is located. Default: The default location of the license key is as follows: \Program Files\ISS\iss.key 3. Click Next. The Event Collector Location window appears. 4. Click Assets. The Choose Asset windows appears. 5. Select Network Assets. 6. Click Add, and then select Daemon. The Add New Daemon Asset window appears. 7. Type the daemon name. 8. Type the host name (DNS) or IP address. 9. Select the Add All Daemon Components check box. 10. Click Add Asset. 11. Click Close. 12. Select the event collector. 13. Click OK. The Event Collector Location window appears. 14. Click Next. The Event Collector Verification window appears. 15. Did the event collector verification process complete? If yes, click Next. The Sensor Configuration window appears. If no, click Back to return to the Event Collector Location window and add an asset. Repeat Steps 4-10. 95 Chapter 7: Configuring a Network Sensor 16. Select a sensor from the list of available assets. The wizard verifies that the event collector can connect to a sensor. Note: Green indicates a configured asset. Blue means that the asset has not yet been configured. You must have at least one blue asset to continue the configuration. If all assets have been configured, click Assets. 17. Click Next. The Encryption Key Configuration window appears. To monitor a sensor, the Workgroup Manager’s rs_con key and the event collector’s rs_eng key must exist on the sensor. The event collector keys should already appear in the list. 18. Select the keys to push to the sensors, or click Browse to search for the folder where the key is located. 19. Click Next. The Event Collector Configuration window appears. 20. Click Finish. The wizard configures the event collector and the blue (unconfigured) sensors. 21. Click Close. Reference 96 If you encounter errors, see “Error Messages” on page 122 for possible causes and solutions. Configuring Authentication Manually Configuring Authentication Manually Introduction Purpose This topic describes the following: purpose of configuring authentication when to manually configure authentication which authentication keys go where After you install a sensor or event collector on a remote system, the component must have one or more of the console’s public authentication keys and one or more of the event collector’s authentication keys before the component and console can communicate. Copying the authentication keys configures authentication between the components. Reference: For more information about how authentication works, see “Using Authentication” on page 22. When to manually configure authentication If you did not enable the automatic authentication key import option for all your RealSecure components, or you do not want to use the Deployment Wizard to distribute authentication keys, then you must copy the authentication keys manually. About the Keys directory Each component has its own Keys directory. This directory contains the component’s public authentication keys after installation and must contain the public authentication key of any component that is authenticated. Which keys go where You must copy the public authentication keys of the following components: Location of console authentication keys copy console keys to the event collector and to the sensors copy event collector keys to the sensors The default location of the console’s public key directory is: \Program Files\ISS\RealSecure 6.5 Console\Keys\ 97 Chapter 7: Configuring a Network Sensor Default subdirectories Usually, there are two subdirectories under the Keys directory: CerticomNRA—Public console keys used by Windows and Unix components RSA—Public console keys used only by Windows components Depending on the cryptographic options you choose during installation, each directory could contain one or more console keys using the following naming format: rs_con_machine name_user name_length.PubKey Copying console public keys Copy these rs_con_machine name_user name_length.PubKey files to the corresponding CerticomNRA or RSA subdirectories on each event collector and sensor. Unix sensors: Because Unix sensors do not use RSA encryption, you only have to copy the keys in the CerticomNRA directory. Reference: For the exact location of the keys directories on the event collector and sensors, see “Location of Authentication Keys” on page 100. Event collector authentication keys The default location of the event collector’s public key directory is: \Program Files\ISS\RealSecure 6.5 Event Collector\Keys\ Usually, there are two subdirectories under the Keys directory: CerticomNRA—Public keys used by Windows and Unix components RSA—Public keys used only by Windows components Depending on the cryptographic options you choose during installation, each directory could contain one or more event collector keys using the following naming format: rs_eng_machine name_length.PubKey 98 Configuring Authentication Manually Copying event Copy these rs_eng_machine name_length.PubKey files to the collector public keys corresponding CerticomNRA or RSA subdirectories on each sensor. Unix sensors: Because Unix sensors do not use RSA encryption, you only have to copy the keys in the CerticomNRA directory. Reference: For the exact location of the keys directories on the event collector and sensors, see “Location of Authentication Keys” on page 100. 99 Chapter 7: Configuring a Network Sensor Location of Authentication Keys Location of console keys The console’s public keys are located in the following directories by default: \Program Files\ISS\RealSecure 6.5 Console\Keys\CerticomNRA\rs_con_machine name_user name_length.PubKey and \Program Files\ISS\RealSecure 6.5 Console\Keys\RSA\rs_con_machine name_user name_length.PubKey Location of event collector keys The event collector’s public keys are located in the following directories by default: \Program Files\ISS\RealSecure 6.5 Event Collector\Keys\CerticomNRA\rs_eng_machine name_length.PubKey and \Program Files\ISS\RealSecure 6.5 Event Collector\Keys\RSA\rs_eng_machine name_length.PubKey Location of sensor keys The location of the sensor’s Keys directory depends on the operating system on which it runs. Operating system Sensor’s public keys Windows \Program Files\ISS\issSensors\sensor name\ Keys\CerticomNRA\rs_eng_machine name_length.PubKey —and— \Program Files\ISS\issSensors\sensor name\Keys\RSA\rs_eng_machine name_length.PubKey Table 16: Location of Keys directory for all sensors 100 Location of Authentication Keys Operating system Sensor’s public keys Unix (Solaris, HPUX, or IBM AIX) /opt/ISS/issSensors/sensor name/Keys/ CerticomNRA/rs_eng_machine name_length.PubKey IPSO (Nokia appliance) /opt/ISS/RealSecure6_5/Keys/CerticomNRA/ rs_eng_machine name_length.PubKey Table 16: Location of Keys directory for all sensors (Continued) RSA keys and Unix Unix sensors cannot use RSA keys. Therefore, you do not have to copy the RSA keys to Unix sensors, even if an RSA directory exists under the Keys directory on the sensor. 101 Chapter 7: Configuring a Network Sensor Restoring Archived Private Keys Introduction If you installed a RealSecure component for Windows, you had the option of archiving your private keys at the end of the installation process. Unix installations do not provide this option. Purpose Under ordinary circumstances, you should not have to restore your cryptographic private keys. You may have to restore the keys under the following circumstances: Prerequisites The hardware on which RealSecure is installed is damaged and you need to load RealSecure onto a new computer. The Windows Registry is corrupted and your private keys are inaccessible. Before restoring the archived private keys: Locate a copy of the archived keys. Install the same providers the previous console used. Important: The archived copy of the private key is encrypted and protected with a passphrase. You must have the passphrase to restore the archived private key. Procedure Restore the private keys using the Restore Cryptographic Private Keys utility. To restore archived private keys: 1. Insert the Internet Security Systems CD into the CD-ROM drive, and then locate the following folder to access the Utilities setup program: cd-rom drive:\RealSecure\Retail\Windows_NT_ x86\RS_Key_Utility\6.5\setup.exe The Welcome window appears. 2. Select Restore cryptographic private keys. The Restoring the Archived Private Key window appears. 102 Restoring Archived Private Keys 3. Type the path of the folder where the archived key is stored in the Get the key files from the directory field, or click Browse to search for the folder. 4. Type the passphrase in the Passphrase field. 5. Type the passphrase in the Confirm field. 6. Click Next. After the restore process completes, Setup terminates. If Setup was unsuccessful in restoring the keys, it reports an error. Possible causes of failure include corrupted private key archives, incorrect passphrase, or different key names. Unable to restore archived private keys If you are unable to restore your private keys from their archives, you must reinstall the RealSecure console and generate new public/private keys. Important: Reinstalling the console generates cryptographic keys different from the old ones. You must distribute the new public keys to all sensors that you manage from this console. 103 Chapter 7: Configuring a Network Sensor Changing Encryption Settings Introduction To change the encryption settings of one or several components, you must completely uninstall one or more components, and then reinstall the components with the new encryption settings. Changing encryption on Windows On a Windows system, you must uninstall, and then reinstall a sensor to change the encryption settings. If you have multiple sensors on the computer, you must uninstall, and then reinstall all of them. When you reinstall the first daemon component (the sensor), you can reconfigure the cryptographic settings. Changing encryption on Unix 104 On a Unix system, you are only required to uninstall the daemon component to change the encryption settings. Uninstalling Components and Updates Uninstalling Components and Updates Introduction If you need to remove a RealSecure component from a computer, you can uninstall it. If you have upgraded a sensor through the remote upgrade process, you can uninstall the sensor upgrade (downgrade) to return the sensor to the last version, if necessary. Reference: For more information about using the remote upgrade process to “Upgrading Sensors Remotely” on page 12. This topic describes the following: Uninstalling remote upgrades how to uninstall remote network sensor upgrades how to uninstall components on Windows how to uninstall components on Solaris how to uninstall components on a Nokia appliance If you upgraded a network sensor using the remote upgrade process, you can uninstall the remote upgrade from the console. You cannot uninstall a full remote upgrade from a server sensor from the console. Instead, you must uninstall the sensor, and then reinstall the correct sensor version. To uninstall a network sensor remote upgrade: 1. Manage each sensor that you want to downgrade. 2. Select one or more sensors, and then right-click them. Important: You can downgrade a group of network sensors only if they are installed on the same operating system, but are not installed on the same computer. Network sensor upgrades installed on a single computer must be uninstalled individually. A pop-up menu lists possible command options. 3. Select Uninstall Update. A message informs you that the program will uninstall the last upgrade you applied. 105 Chapter 7: Configuring a Network Sensor 4. Click Yes to continue. After several seconds, the component status of the sensor changes to unknown. The control status displays several errors while the program uninstalls the upgrade. The process could take several minutes. If you have other sensors on this system, the daemon version remains at 6.5 to accommodate them. Otherwise, the daemon is uninstalled with the sensor. Uninstalling a Windows component To remove RealSecure from a Windows system: 1. Select Start→Settings→Control Panel. 2. Double-click Add/Remove Programs. The Add/Remove Programs Properties window appears. 3. Select a RealSecure component: RealSecure Workgroup Manager 6.5 RealSecure Console 6.5 RealSecure Event Collector 6.5 RealSecure Network Sensor 6.5 RealSecure Server Sensor 6.5 4. Click Add/Remove. The InstallShield Wizard window appears. 5. Select the component you want to remove. 6. Click OK. A Confirmation window to uninstall the RealSecure component appears. 7. Click Yes. The Backup Configuration window appears. 8. Do you want to backup the components and save any files you have created? If yes, click Yes. If no, click No. 106 Uninstalling Components and Updates Note: If you choose to save these files, RealSecure creates backups of the log event database, enterprise database, and asset database. If you choose not to save these files, they are deleted. 9. Click Finish. 10. After you remove RealSecure, restart the system. Uninstalling Solaris sensors To remove a RealSecure sensor from a Solaris system, you must first remove all sensors before removing the daemon. To remove RealSecure from a Solaris system: 1. Log on using a superuser account, such as root. 2. Type the command applicable to the type of sensor: pkgrm ISSXnsx (network sensor, where x is the sensor number) pkgrm ISSXss (server sensor) The uninstallation program asks you to confirm the removal. 3. Type y to confirm. 4. Do you need to remove any other sensors from this computer? If yes, repeat steps 2 and 3 for each sensor that you want to remove. If no, go to the next step. 5. Are you planning to keep any other sensors on this computer? If yes, you do not need to uninstall the daemon. The uninstallation is complete. If no, go to the next step to remove the daemon. 6. Remove the daemon by typing the following command: pkgrm ISSXdmn 7. Type y to confirm the removal. 8. After the RealSecure components are removed, restart the Solaris system. Removing directories After you uninstall Solaris network or server sensors, you must remove the /opt/ISS directory from your computer. 107 Chapter 7: Configuring a Network Sensor To remove the directories: 1. Log in using a superuser account, such as root. 2. Type the following command: rm -rf /opt/ISS Uninstalling a sensor from a Nokia appliance To remove RealSecure from a Nokia appliance: 1. Log in to the appliance using Nokia Network Voyager. The Voyager window appears. 2. Click Config. 3. Click the Manage Installed Packages link in the System Configuration section. 4. Select Off in the RealSecure network intrusion detection system field. 5. Click Apply. 6. Click Save. 7. Click Delete Packages (on the same page). 8. Select Delete in the RealSecure network intrusion detection system field. 9. Click Apply. 10. Click Save. 11. Click Home. 12. Click Config. 13. Click Reboot, Shut Down System (at the bottom of the page). 14. Click Reboot. Note: It is not necessary to press Halt after removing a sensor. Pressing Halt stops the system but does not turn the power off. If you accidentally press the button, manually turn the power off and on. 108 Uninstalling Components and Updates Uninstalling a second sensor from a Nokia appliance To remove a second network sensor from a Nokia appliance: 1. Log in to the appliance using Nokia Network Voyager. The Voyager window appears. 2. Click Security & Access Configuration on the home page. 3. Click RealSecure for Nokia. 4. Click Remove network sensor two. Voyager begins uninstalling the second network sensor. The following message appears: Network_sensor_2 is successfully removed 109 Chapter 7: Configuring a Network Sensor Adding Key Administrators Introduction If you need to allow a user to transfer authentication keys or other files to and from sensors, the user must have key administrator status. General procedure You can add a key administrator to any sensor from the console if you select at least one key administrator during the initial installation of the sensor. Key administrators and multiple sensors If you have installed multiple sensors on the same computer or a server sensor and an event collector together, key administrator status applies to all components installed on that computer. In other words, when you set up a key administrator for one component, that person is automatically a key administrator for the other component. Reference For information about using the console to add a key administrator, see the RealSecure Help. Windows For Windows sensors, you must set up at least one key administrator during installation or enable auto-import during installation (the first person to connect to the sensor gains key administrator rights). Solaris For Solaris sensors, you can use the console to add a key administrator if you set up at least one key administrator during installation. If you did not configure a key administrator during installation, you can add an administrator after installation from the command line by using a script. Using the Solaris script If you selected the option to install the sensor using the defaults, the installation program did not set up a key administrator. If you need to set up a key administrator after the install is complete, run the keyadmin_setup.sh command in the /opt/ISS/issDaemon/ keyadmin.sh directory. 110 Starting and Stopping Sensors Starting and Stopping Sensors Introduction You can start and stop sensors from the console or locally from the computer running the sensor. This topic describes how to start the sensors manually from the sensor’s computer. Reference: For information about starting or stopping the sensor using the console, see the RealSecure Help or the SiteProtector Help. Starting and stopping a sensor on Windows To start or stop a sensor running in Windows: 1. Open the Services window. Windows 2000: From the Start menu, select Control PanelàAdministrative ToolsàComponent ServicesàServices. Windows NT: From the Start menu, select Control PanelàServices. 2. Double-click the issDaemon service. 3. Click Start to start it or Stop to stop it. Starting a Solaris sensor Start a Solaris sensor by either one of the following methods: Restarting the system. The sensor will start when the system starts. Typing the following command: /etc/init.d/realsecure start Stopping a Solaris sensor To stop a Solaris sensor, type the following command: /etc/init.d/realsecure stop 111 Chapter 7: Configuring a Network Sensor Testing the Sensor Introduction After applying policies to sensors, you should be able to monitor network activity through the console. Depending on the behavior of the network, data may not appear on the console immediately. Testing the sensor If you have applied policies and started sensors, but no information appears in any of the console windows, a network sensor can be tested by telnetting to an SMTP server at port 25 that is on the collision domain being monitored. When connected, type WIZ on a line by itself. Press ENTER. A server sensor may be tested by logging in or by changing the audit policies. Running a network scan If ISS Internet Scanner is available, run a scan on the collision domain where the sensor is located. Alerts appear in the Priority windows, and entries in the Activity Tree window. Reference: For more information about sensor settings, see the RealSecure Workgroup Manager User Guide for the sensor you are installing. 112 Network Sensor Stealth Configuration Network Sensor Stealth Configuration Introduction This topic describes the following: definition of stealth mode using the kill response with stealth mode how to set up stealth mode Definition: stealth mode RealSecure allows you to configure a network sensor so that it monitors events with one network interface card (NIC) in promiscuous mode and communicates with the private network through another NIC. This is called stealth mode because the promiscuous NIC does not have a protocol stack bound to it and is therefore relatively invisible on the monitored network. Kill responses and stealth mode RealSecure kills (TCP resets) must originate from the NIC that monitors network traffic (NIC 1). If you use the kill response, attackers may be able to guess that the network sensor exists. Tasks to set up stealth mode Setting up a network sensor to use stealth mode involves three major tasks that are described in detail in this topic: 1. Install at least two NICs on the network sensor computer. (All Nokia appliances have at least three NICs.) Reference: See “NIC card requirements” on page 114 for more information. 2. Configure one of the NICs (the NIC to monitor network traffic) to use stealth mode. Reference: See one of the following procedures for more information: “Installing stealth NIC on Windows NT” on page 115 “Installing Stealth NIC on Windows 2000” on page 117 “Configuring the stealth network sensor on Unix” on page 118 “Configuring the stealth NIC on the Nokia appliance” on page 118 3. Configure the network sensor to use stealth mode. Reference: See “Configuring a network sensor to use stealth mode” on page 114. 113 Chapter 7: Configuring a Network Sensor NIC card requirements A stealth configuration is implemented using two network interface cards on the network sensor. Windows and Solaris sensors For Windows and Solaris sensors, you should configure the first NIC to be the reporting NIC. This NIC is connected to an internal, secured network and has a full TCP/IP protocol stack with an IP address and IP services. This channel is used by the network sensors to communicate with the console. The console could be several network hops away, or you could create a small network segment just for the network sensors and console by using a hub or crossover cable. The second NIC is connected to the monitored network segment. It does not have a protocol stack bound to it; therefore, it does not have an IP address or any IP services available. This configuration makes it more difficult for an external attacker to attack the network sensor itself through this interface. Nokia (IPSO) sensors For sensors running on a Nokia appliance, the first NIC should monitor the network segment, and the second NIC should connect to the console. (The reverse of the configuration described above.) Email and SNMP To use the EMAIL response and SNMP traps, the Email gateway and SNMP collector must be accessible from the safer NIC (NIC 2 for Solaris and Windows, NIC 1 for Nokia). Safe DMZ configuration A common configuration is to connect NIC 1 to the DMZ segment outside the firewall and to connect NIC 2 to an internal segment inside the firewall. Since no protocol stack is attached to NIC 1, there is no danger of routing packets past the firewall on the network sensor computer. Configuring a network sensor to use stealth mode To configure stealth mode for network sensor on Windows NT or Windows 2000: 1. Install the console. 2. Copy the keys to the network sensor. Reference: For more information, see “Configuring Authentication Manually” on page 97. 3. From the console system, start the RealSecure console. 114 Network Sensor Stealth Configuration 4. From the Managed Assets menu, select Manage→Asset. The Choose Asset window appears. 5. Start the network sensor for which the stealth NIC has been configured. 6. After the sensor has been started and the event channel established, right-click the sensor, and then click Properties. 7. Click the General tab. 8. For Sensor Port, accept the default. Important: If you have multiple sensors installed on your system, the port number changes incrementally by three for each additional sensor. For example, 901 is the default port for sensor 1. For the next installed sensor (sensor 2), the default port is 904. For sensor 3, the default port is 907. 9. For Adapter of Monitored Network, select the NIC of the interface the sensor uses to monitor the segment. 10. Click OK. 11. Stop the sensor from the GUI. 12. Restart the sensor. 13. From the console, begin monitoring the sensor again. Installing stealth Before setting up a stealth configuration, you must first install the stealth NIC on Windows NT NIC (NIC1) and the private network NIC (NIC2). To install the stealth NIC on Windows NT: 1. Install both NICs and their drivers. 2. After installation, select Control PanelàNetwork. The Network window appears. 3. Select the Adapters tab. 4. Select the adapter, and then click Properties. 5. Click the Bindings tab. You will see the bindings being set. If you receive any errors, click OK. 6. In the Show Bindings For box, click All Adapters. 7. For NIC2, click the “+” beside the NIC. 115 Chapter 7: Configuring a Network Sensor 8. Highlight each binding one–by–one, and then click Disable. Verify that NIC2 and all the bindings listed below are disabled. For RealSecure to watch the network, it does not need the NIC to bind to TCP/IP because the Raw Packet Driver installed during the Setup places the NIC into promiscuous mode and reads the raw data from the NIC. NIC1 will have no IP address. 9. Click the Protocols tab. 10. Highlight TCP/IP Protocol. 11. Click Properties to display the Microsoft TCP/IP Properties window. 12. Verify that the Adapter list only contains NIC1. If it contains NIC2, you have not properly disabled the TCP/IP Protocol for that NIC. 13. Select NIC1. 14. Enter all the appropriate TCP/IP information for this network segment. 15. When finished, click Apply. 16. Click OK to exit the window. 17. Restart your system. 116 Network Sensor Stealth Configuration Installing Stealth NIC on Windows 2000 Before setting up a stealth configuration, you must first install the stealth NIC (NIC1) and the private network NIC (NIC2). To install the stealth NIC on Windows 2000: 1. Install both NICs and their drivers. 2. After installation, select Start→Settings→Network and Dial Up Connection. The Network window appears. 3. Select the second NIC. 4. Right-click and select Properties. 5. The Properties window appears. 6. Clear all the component check boxes, including Internet Protocol (TCP/IP). For RealSecure to watch the network, it does not need the NIC2 to bind to TCP/IP because the Raw Packet Driver installed during the Setup places the NIC into promiscuous mode and reads the raw data from the NIC. 7. Click OK. 8. Select the first NIC. The system uses this NIC to communicate with the RealSecure event collector or RealSecure Workgroup Manager. 9. Right-click NIC1, and select Properties. 10. Select TCP/IP and select Properties. The Local Area Connections Properties window appears. 11. Enter all the appropriate TCP/IP information for this network segment. 12. When finished, click OK. 13. Click OK to exit the window. 117 Chapter 7: Configuring a Network Sensor Bidirectional communication If the RealSecure network sensor is installed on the management port of a switch, the “kill connection” action will not work, unless the management port supports bidirectional communications. The TCP reset packet that kills the connection must be sent from the monitoring interface. However, all other actions are initiated from NIC2 and function normally. Configuring the stealth network sensor on Unix The system is configured so that the stealth interface is not enabled at system boot. In the RealSecure startup script, bring up the stealth interface with the following command: /usr/sbin/ifconfig nf0 plumb -arp up Running ifconfig -a shows the following for the device: nf0: flags=8c3<UP,BROADCAST,RUNNING,NOARP,MULTICAST> mtu 4352 inet 0.0.0.0 netmask 0 ether 8:0:20:f0:0:ba Configuring the stealth NIC on the Nokia appliance You can configure the stealth NIC on the Nokia appliance using Nokia Network Voyager. This procedure includes selecting a link for the logical and physical interfaces you will use for monitoring. Note: This procedure is required only if the Active option is selected or an IP address is defined for the interface. To configure a second interface for monitoring: 1. Log in to the appliance using Nokia Network Voyager. The Voyager window appears. 2. Click Config. The Configuration window appears. 3. Click Interfaces. 4. Click the link for the logical interface that you will use for monitoring (for example, eth-s1p2c0). Note: The interface will vary according to the Nokia appliance. 5. Select Off for the Active option. 118 Network Sensor Stealth Configuration 6. Select the Delete check box. 7. Click Save. 8. Click Apply. 9. Click Up. 10. Verify that the Active option is Off and that there is no IP address or destination address. 11. Close the Web browser. 12. Open the RealSecure Workgroup Manager and select the interface from the Adapter of Monitored Network list. Reference: See “Working with Newly Configured Interfaces” on page 90. 119 Chapter 7: Configuring a Network Sensor 120 Chapter 8 Troubleshooting Overview Introduction The chapter describes several techniques for troubleshooting problems. In this chapter This chapter contains the following topics: Topic Page Error Messages 122 ISS Daemons 123 121 Chapter 8: Troubleshooting Error Messages Introduction This topic describes error messages you may encounter and what to do to resolve them. Deployment Wizard errors If you encounter errors as you run the Deployment Wizard, you cannot click Finish to close the wizard process. Read the error text and either fix the error or click Cancel. All settings and changes you make are saved. Sensor All sensors should have a single management address that is used by all management errors consoles and event collectors. If a sensor is managed at multiple IP addresses, an error message may occur that says the sensor is not being managed by the event collector. This error will occur when the IP address used by the event collector for a sensor is different from the IP address used by the console to manage that same sensor. 122 ISS Daemons ISS Daemons Introduction For troubleshooting purposes, you may need to manually start or stop the ISS daemon. Definition: ISS daemon The ISS daemon is a component that is installed on computers running an event collector or one or more sensors. The daemon manages commands from the console and the connection between the components, such as the communication between an event collector and a sensor. Managing daemons in Windows On a Windows system, you can manage the daemon through the Windows Services Control Panel. Reference: For a detailed procedure, see “Starting and Stopping Sensors” on page 111. Managing daemons in Unix On a Unix system, you can manage the daemon using these commands: /etc/init.d/realsecure start /etc/init.d/realsecure stop Troubleshooting: If you manually installed the ISSED Maintenance Utility software, or if you do not have a Start menu shortcut (some installations do not install shortcuts), locate and run the TN-SQL1.exe file. It is located in the C:\Program Files\ISS\ folder. 123 Chapter 8: Troubleshooting 124 Index a c adding key administrators 110 static hosts 84 administering public keys 30 algorithms (encryption) 26–27 alphanumeric characters 20 archiving private keys 69, 102 authentication 22–23 changing 104 keys 30 public/private keys 22–23, 97 automated installation Solaris 79–80 Windows 45–66 automatic key import 23–24 Certicom 27, 67 See Also ECNRA 67 characters, foreign 32 collision domain 4 collision domains 3 configuring authentication 93–101 event collectors 93 console authentication keys 100 conventions, typographical in commands xiv in procedures xiii in this manual xiii cryptographic keys 6 cryptographic providers 26–27, 44, 67 changing 104 CSPs, See cryptographic providers customizing encryption 26 b built-in Certicom provider, See ECNRA Bureau of Export Administration’s Web page 29 d daemons cryptographic providers 27 roles 30 starting and stopping 123 troubleshooting 123 dashes 20 125 Index default settings Solaris 72 Windows 36 demilitarized zone 7 deploying sensors 7–9 deployment sensors 21 wizard 93–95, 122 DES 27 DESX 27 distributing public keys 6 DMZ 7 domestic countries, as defined by the US government 29 e ECNRA Built-in CSP 26–28, 67 Enabling 85 enabling hostname resolution 83 enabling logging 85 encryption 26 algorithms 26–27, 29 changing 104 customizing 26 export laws 29 Nokia 26 public/private keys 29 See Also Certicom and RSA 28 event collector authentication keys 100 error messages 122 export laws 29 126 f firewalls 7 foreign characters 32 French Windows 32 full remote upgrades 105 h Halt button 108 hardware requirements hash (checksum) 28 hubs 4 10 i importing policies 18 installation automated Solaris 79–80 Windows 45–66 choosing installation directory 41 default settings 36 Solaris 72 location of files 6 network sensor IPSO (Nokia) 86–87 Solaris 71–80 windows 35–70 packages 6 prerequisites for Nokia appliance 82–85 stealth mode 115, 117 international versions of Windows 32 Index Internet Security Systems technical support xv Web site xv IPSO 114 ISS ECNRA, See ECNRA ISS CD 6 j Japanese Windows 32 k keyadmin_setup.sh 110 keys administering 110 Keys directory 97 See Also authentication keys or license keys l locales 32 location of installation files 6 logging informational messages on Nokia appliances 85 m master status 30 mirror port 4, 9 modems 8 MSDE 6 multiple sensors 8, 31 n naming sensors 20 network monitoring component 31 network segments 3–4 scanning 112 network sensor network segments 4 stealth mode, description 113 newpkg command 86 NICs stealth 115, 117 Nokia 114 appliance 118 encryption 26 installation prerequisites 82–85 Nokia Network Voyager 82, 87, 89, 108– 109, 118 o operating systems 10 127 Index p s packages for installation 6 passphrase 102 perimeter protection 7 pkgrm 107 policies importing 18 ports mirror or span 4, 9 private keys 6 archiving 69 restoring 102 promiscuous mode 3–4, 117 protocol (ISS) 26 providers, See cryptographic providers public keys 6, 23–24 administering 30 copying to daemon components 97 location of 97, 101 SAFEsuite CD, See ISS CD 6 scanning a network segment 112 selecting DNS servers 83 sensors authentication keys 100 error messages 122 installing multiple 31 multiple 8 naming 20 scanning a network segment 112 starting and stopping 111 testing 112 troubleshooting 122 upgrading 86 where to install 7–9, 21 setup files 6 Silent mode return codes 62 software requirements 10 span port 4, 9 Spanish Windows 32 starting daemons 123 sensors 111 stealth mode description of 113 installing stealth NIC 115, 117 stopping daemons 123 sensors 111 strong encryption and export laws 29 switches 4, 9 synchronizing the sensor log 86 system locales 32 system requirements 10 r recording Windows installations 45 remote upgrades 105 requirements 10 response file 45, 49 restoring archived private keys 102 restoring cryptographic keys 6 RSA encryption 28 running the newpkg command 86 128 Index t Web site, Internet Security Systems xv Windows, international versions of 32 taps 4 technical support, Internet Security Systems testing sensors 112 Triple DES 27 troubleshooting daemons 123 Deployment Wizard 122 event collector error messages 122 ISSED Maintenance Utility 123 sensor error messages 122 sensors 112 typographical conventions xiii–xiv xv u U.S. export laws 29 underscores 20 uninstalling network sensor for the Nokia appliance remote upgrades 105 Solaris components 107 Windows components 106 upgrading policies 18 requirements 11 sensors 86 108 w WAN routers WAP servers 8 8 129 Index 130