Q S G UICK
Transcription
Q S G UICK
High Availability QUICKSTART GUIDE IDP 3.1 V/N 3.1 P/N 093-1625-000 Revsion A For more assistance with Juniper Networks products, visit: www.juniper.net/support Juniper Networks occasionally provides maintenance releases (updates and upgrades) for ScreenOS firmware. To have access to these releases, you must register your NetScreen device with Juniper Networks at the above web address. Copyright © 2005 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, NetScreen, NetScreen Technologies, the NetScreen logo, NetScreen-Global Pro, ScreenOS, and GigaScreen are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The following are trademarks of Juniper Networks, Inc.: Deep Inspection, ERX, ESP, Instant Virtual Extranet, Internet Processor, J-Protect, JUNOS, JUNOScope, JUNOScript, JUNOSe, M5, M7i, M10, M10i, M20, M40, M40e, M160, M320, M-series, MMD, NetScreen-5GT, NetScreen-5XP, NetScreen-5XT, NetScreen-25, NetScreen-50, NetScreen-100, NetScreen-204, NetScreen-208, NetScreen-500, NetScreen-5200, NetScreen-5400, NetScreen-IDP 10, NetScreen-IDP 100, NetScreen-IDP 500, NetScreen-IDP 1000, IDP 50, IDP 200, IDP 600, IDP 1100, ISG 1000, ISG 2000, NetScreen-Global Pro Express, NetScreen-Remote Security Client, NetScreen-Remote VPN Client, NetScreen-SA 1000 Series, NetScreen-SA 3000 Series, NetScreen-SA 5000 Series, NetScreen-SA Central Manager, NetScreen Secure Access, NetScreen-SM 3000, NetScreen-Security Manager, GigaScreen ASIC, GigaScreen-II ASIC, NMC-RX, SDX, Stateful Signature, T320, T640, and T-series. All other trademarks and registered trademarks are the property of their respective companies. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without receiving written permission from: Juniper Networks, Inc. ATTN: General Counsel 1194 N. Mathilda Ave. Sunnyvale, CA 94089 U.S.A. www.juniper.net Enterprise Security Profiler Use of the Enterprise Security Profiler may subject users in certain countries to obligations under applicable laws and regulations, including data protection laws. Juniper Networks makes no representation or warranty that your use of this feature will comply with all applicable laws and regulations and you are encouraged to seek advice of counsel to understand your obligations, if any, under applicable laws and regulations. 2 | Juniper Networks, Inc. CONTENTS OVERVIEW ......................................................................................4 CHOOSE A DEPLOYMENT MODE ..........................................................6 INSTALL THE IDP MANAGEMENT SERVER ................................................14 CONNECT TO THE IDP APPLIANCE ......................................................16 CONFIGURE THE IDP SENSOR ............................................................18 CONNECT IDP TO YOUR NETWORK .....................................................20 CONFIGURE YOUR NETWORK SWITCH ..................................................22 INSTALL THE USER INTERFACE ..............................................................23 ADD NETWORK COMPONENTS ...........................................................25 INSTALL A SECURITY POLICY ...............................................................26 CREATE THE HA CLUSTER ..................................................................28 UPDATE YOUR ATTACK OBJECTS .........................................................31 IDP QUICKSHEET ............................................................................32 HA QuickStart Guide, Juniper Networks IDP 3.1 | 3 OVERVIEW This guide details how to install version 3.1 of the Juniper Networks Intrusion Detection and Prevention (IDP) system for high availability (HA) solutions that use IDP 100, 500, or 1000 appliances. For help with non-HA configurations, see the QuickStart Guide, IDP 3.1. For help with IDP upgrades, contact customer support. IDP Sensor Package Contents Each IDP Sensor package contains: • An IDP appliance • A bezel • An accessory box containing: – 1 North American power cable – 2 Ethernet cables (blue cables) – 2 LC-LC fiber cables (IDP 500 & 1000 only) – 2 Crossover Ethernet cables (orange cables) – 1 Null modem Serial cable (gray cable) • A documentation box containing: – Product data sheet – Release Notes IDP Management Package Contents Each IDP Management package contains: • Installation CD • Product Documentation CD • QuickStart Guide • High Availability QuickStart Guide • Release Notes The IDP Installation CD includes the software required to install or configure the IDP Management Server, the IDP Sensor, and the User Interface. 4 | Juniper Networks, Inc. The Installation Process Because all networks are different, Juniper Networks recommends that you install one IDP Sensor at a time. When you have successfully installed a Sensor and are receiving log records, you can configure and connect additional Sensors to your network. The installation process consists of the following 12 steps: 1. Choose a Deployment Mode. In this step, you choose a deployment mode for your IDP system and an HA solution. 2. Install the IDP Management Server. In this step, you install the Management Server software. 3. Connect to the IDP Appliance. In this step, you connect your system to the IDP appliance using a serial or network connection. 4. Configure the IDP Sensor. In this step, you configure the Sensor software that is pre-installed on the IDP appliance. 5. Connect IDP to Your Network. In this step, you connect the Sensor to your network. 6. Configure Your Network Switch (Standalone HA only). In this step, you configure your network switch to pass multicast or unicast MAC traffic to the Sensor. 7. Install the User Interface. In this step, you install the User Interface (UI). 8. Add Network Components. In this step, you add the IDP Sensor as a Network Object in the IDP system. 9. Install a Security Policy. In this step, you install a Security Policy on the Sensor. 10.Run the Profiler. In this step, you configure and run the Profiler. 11.Create the HA Cluster. In this step, you configure and add multiple Sensors to your network to create an HA Cluster. 12.Update Your Attack Objects. In this step, you update your Attack Object database to ensure that you are fully protected from the latest attacks. IDP Appliance Placement You can place the IDP appliances in your HA cluster in front of your firewall, behind your firewall (recommended), or anywhere on your network. You should choose a location for your IDP appliances based on your existing network hardware and the networks you want to protect. The examples provided in this guide place the IDP appliances behind the firewall or router. HA QuickStart Guide, Juniper Networks IDP 3.1 | 5 Step 1 CHOOSE A DEPLOYMENT MODE The first step in setting up the IDP system on your network is to determine where you want to install the IDP appliance and which high availability deployment mode you want to use for failure protection or load balancing. Choosing a High Availability Deployment Mode You must deploy the IDP appliances in bridge, router, transparent, or proxy-ARP mode to enable a high availability solution. The network diagrams on pages 9-13 illustrate example configurations for each deployment mode. Examine the examples to determine which deployment mode works best with your network: • To use a forwarding interface as a management interface, you can assign the interface an IP address. However, because of security risks, Juniper Networks does not recommend this option. Instead, use a dedicated interface for management—this option decreases the risk that an attacker might be able to communicate directly with the IDP Sensor. • You can use any interface on the IDP appliance as a forwarding interface. However, to increase performance, Juniper Networks recommends that you assign forwarding interfaces to those interfaces that share a network driver. Use eth0 and eth1, or use eth2 and eth3 as forwarding interfaces. • The diagrams provided in this guide are examples only; you can choose to use different interfaces for forwarding, management, and state-sync depending on your IDP appliance (100/500/1000) and your existing network configuration. Note: The IDP system defaults to sniffer mode. You must configure the IDP appliance to use bridge, router, transparent, or proxy-ARP mode to enable high availability. Choosing a High Availability Solution Each deployment mode supports one or more HA solutions (standalone or external). For more details on deployment modes and HA solutions, see the “High Availability Solutions” chapter in the Intrusion Detection and Prevention Concepts & Examples Guide. 6 | Juniper Networks, Inc. In proxy-ARP and router modes, if you are using multiple subnets in your protected network, you must configure static routes on the IDP appliance to these subnets. Without static routes, incoming traffic to those subnets can be lost. Alternatively, you can create a static route from the IDP appliance to an internal gateway that contains inbound routes to the protected subnets. Standalone High Availability (Proxy-ARP & Router Modes) This HA solution can support 2 to 16 IDP appliances in a load-sharing or hot standby configuration with no additional hardware. You can configure standalone HA solutions using the Appliance Configuration Manager (ACM) in Step 4. For maximum failover protection, you can deploy an HA cluster of IDP appliances in proxy-ARP mode behind Juniper Networks FW/VPN devices that use an active/ active configuration. When using Juniper Networks FW/VPN devices with IDP appliances: • Your Juniper Networks FW/VPN devices must support NSRP (NS-50 firewalls and higher models) and run ScreenOS 4.0.0 or higher. NS-5XT, NS5XP, and NS-25 firewalls do not support NSRP and cannot be used for IDP high availability. Juniper Networks recommends that you use NS-208 or higher models for an active/active configuration with an IDP HA cluster. • You must configure NSRP for your Juniper Networks FW/VPN devices as active/active, and configure two virtual security devices (vsd) for each Juniper Networks firewall (master and primary backup). • For each physical interface (including trust zone and untrust zone), you must assign a unique IP address to each vsd. This interface is the virtual security interface (vsi). Each Juniper Networks firewall must use the same settings for each vsi; however, you can use different manage IP addresses. • When you configure the Sensor using the ACM in Step 4: – The gateway for node 1 is the trusted vsi of the first vsd. – The gateway for node 2 is the trusted vsi of the second vsd. – The gateway for hosts on the protected network can be the trusted vsi of the first or second vsd. External High Availability (Bridge, Transparent, & Router Modes) This HA solution can support 2 to 16 IDP appliances in load-balancing or hot standby configuration but requires external hardware. You can configure external HA solutions using the ACM in Step 4. When using bridge or transparent mode for external IDP high availability: HA QuickStart Guide, Juniper Networks IDP 3.1 | 7 • Your Juniper Networks FW/VPN devices must support NSRP (see above), and you must configure NSRP for your Juniper Networks FW/VPN devices as active/passive. • You must assign the management interface an IP address: – If you are using a forwarding interface as a management interface, you must use a stealth interface for the forwarding interface that does not connect to the IDP Management Server. – If you are not using a forwarding interface as a management interface (the management interface is a dedicated interface), you can use a stealth interface for all forwarding interfaces on the IDP appliance. Multicast or Unicast Forwarding [Standalone HA only] The Standalone HA solution can use two different forwarding options to send and receive traffic: unicast or multicast. You choose one of these forwarding options based on your existing network hardware and configuration. To use a standalone HA solution, review your existing network hardware and use the table below to determine the best forwarding method to use. You are prompted to specify the forwarding method for the standalone HA solution during the Sensor configuration process described in “Configure the IDP Sensor” on page 18. IF YOUR NETWORK SWITCH SUPPORTS... IN ROUTER MODE IN PROXY-ARP MODE Layer 3 devices (routers, servers) Layer-3 devices (routers, servers) ...can learn ...cannot learn multicast ARP multicast ARP Unicast traffic to YES YES (Best) multiple ports aNot Multicast traffic YES to multiple ports Recommended ...can learn ...cannot learn multicast ARP multicast ARP YES YES (Best) YES aNot Recommended a.To use a network switch that supports only multicast (and not unicast) with network devices that cannot pass multicast ARPs, you must manually configure static ARP entries for devices that cannot pass multicast ARPs. You can use the mcasttest utility (available from the Juniper Networks customer Support Web site) to automatically determine which devices on your network do not support multicast ARP traffic. From the Sensor command line, type mcasttest -h for a list of options, or see the mcasttest man page for more details. When you have chosen a deployment mode, HA solution, and forwarding method (if necessary) proceed to “Install the IDP Management Server” on page 14. 8 | Juniper Networks, Inc. Proxy-ARP Mode, Standalone HA with Multicast Firewall 10.0.113.254 External Network 10.0.113.0/24 Cluster IP 10.0.113.4 Cluster MAC 01:00:00:00:00:10 Eth0 10.0.113.1 GW 10.0.113.254 Node 1 idpHA1 Eth2 192.168.0.1 Eth1 10.0.113.17 Eth0 10.0.113.2 GW 10.0.113.254 State Sync 192.168.0.0/24 Node 2 idpHA2 Eth2 192.168.0.2 Eth1 10.0.113.18 Eth0 10.0.113.3 GW 10.0.113.254 Node 3 idpHA3 Eth2 192.168.0.3 Eth1 10.0.113.19 Cluster IP 10.0.113.20 Cluster MAC 01:00:00:00:00:11 Protected Network 10.0.113.0/24 Server1 IP 10.0.113.21 GW 10.0.113.254 Advantages Server2 IP 10.0.113.22 GW 10.0.113.254 Server3 IP 10.0.113.23 GW 10.0.113.254 Server4 IP 10.0.113.24 GW 10.0.113.254 Disadvantages • Supports standalone HA solutions • Network nodes may need to update cached ARP entries • Reliably responds to and prevents attacks • Simple, transparent deployment HA QuickStart Guide, Juniper Networks IDP 3.1 | 9 Router Mode, Standalone HA with Multicast Firewall 10.0.113.14 External Network 10.0.113.0/28 Cluster IP 10.0.113.4 Cluster MAC 01:00:00:00:01:00 Eth0 10.0.113.1 GW 10.0.113.14 Node 1 idpHA1 Eth2 192.168.0.1 Eth1 10.0.113.17 Eth0 10.0.113.2 GW 10.0.113.14 Node 2 idpHA2 Eth2 192.168.0.2 Eth1 10.0.113.18 State Sync 192.168.0.0/24 Eth0 10.0.113.3 GW 10.0.113.14 Node 3 idpHA3 Eth2 192.168.0.3 Eth1 10.0.113.19 Cluster IP 10.0.113.20 Cluster MAC 01:00:00:00:01:01 Protected Network 10.0.113.16/28 Server1 IP 10.0.113.21 GW 10.0.113.20 Advantages Server2 IP 10.0.113.22 GW 10.0.113.20 Server3 IP 10.0.113.23 GW 10.0.113.20 Server4 IP 10.0.113.24 GW 10.0.113.20 Disadvantages • Supports standalone HA solutions • Requires re-subnetting one or more networks • Reliably responds to and prevents attacks • Connects IP networks with different address spaces 10 | Juniper Networks, Inc. Proxy-ARP Mode, Standalone HA with Juniper Networks FW/ VPN Devices (Active/Active) Router GW 10.156.113.254 External Network 10.156.113.0/24 Untrusted GW 10.156.113.254 Eth3 10.156.113.204 Eth3:1 10.156.113.205 Manage IP 10.156.113.201 Untrusted GW 10.156.113.254 Eth3 10.156.113.204 Eth3:1 10.156.113.205 Manage IP 10.156.113.202 Hub HA active/active Trusted Eth1 10.2.1.9 Eth1:1 10.2.1.10 Manage IP 10.2.1.11 Trusted Eth1 10.2.1.9 Eth1:1 10.2.1.10 Manage IP 10.2.1.12 Node 1 Eth1 10.2.1.2 GW 10.2.1.9 Node 2 Cluster IP 10.2.1.1 Cluster MAC 01:00:00:02:00:00 idpHA1 Eth2 192.168.0.1 State Sync 192.168.0.0/24 idpHA2 Eth2 192.168.0.2 Eth0 10.2.1.17 Eth1 10.2.1.4 GW 10.2.1.10 Eth0 10.2.1.19 Cluster IP 10.2.1.15 Cluster MAC 01:00:00:01:00:00 Hub Protected Network 10.2.1.0/24 Server1 IP 10.2.1.20 GW 10.2.1.10 or GW 10.2.1.9 Server2 IP 10.2.1.21 GW 10.2.1.10 or GW 10.2.1.9 Server3 IP 10.2.1.22 GW 10.2.1.10 or GW 10.2.1.9 Server4 IP 10.2.1.23 GW 10.2.1.10 or GW 10.2.1.9 HA QuickStart Guide, Juniper Networks IDP 3.1 | 11 Bridge or Transparent Mode, External HA with Juniper Networks FW/VPN Devices (Active/Passive) Router 10.2.0.254 External Network 10.2.0.0/24 Untrusted 10.2.0.2 GW 10.2.0.254 HA active/passive Untrusted 10.2.0.2 GW 10.2.0.254 NetScreen Firewall Trusted 10.2.1.12 Trusted 10.2.1.12 IDP Node 1 Eth0 Stealth GW 10.2.1.12 State Sync 192.168.0.0/24 Eth0 Stealth GW 10.2.1.12 IDP Node 2 idpHA2 idpHA1 Eth3 10.2.1.22 Management NetScreen Firewall Eth1 Stealth Eth2 192.168.0.1 Eth2 192.168.0.2 Eth1 Stealth Eth3 10.2.1.23 Management Protected Network 10.2.1.0/24 Server1 IP 10.2.1.2 GW 10.2.1.12 Server2 IP 10.2.1.3 GW 10.2.1.12 Server3 IP 10.2.1.4 GW 10.2.1.12 Management Server IP 10.2.1.5 GW 10.2.1.12 This diagram displays a dedicated management interface with IP address for each IDP appliance. In bridge mode, both forwarding interfaces for each IDP appliance are stealth interfaces, indicating that they do not have an assigned IP address. Advantages Disadvantages • Reliably responds to and prevents attacks • Simple, transparent deployment • No changes to routing tables or network equipment • Hot standby mode only • Must use NS-50 or higher 12 | Juniper Networks, Inc. Router Mode, External with Load Balancers Firewall 10.0.113.254 External Network 10.0.10.0/24 10.2.10.1 10.2.0.1 10.2.0.2 Load Balancer State Sync 192.168.0.0/24 IDP Node 1 idpHA1 Eth0 10.2.0.12 Eth0 10.2.0.11 Eth1 10.2.1.11 Eth2 192.168.0.2 Eth2 192.168.0.1 Eth1 10.2.1.12 IDP Node 2 idpHA2 Load Balancer 10.2.1.1 10.2.1.2 10.2.20.1 Protected Network 10.2.20.0/24 Server1 IP 10.2.20.2 GW 10.2.20.1 Server2 IP 10.2.20.3 GW 10.2.20.1 Advantages Server3 IP 10.2.20.4 GW 10.2.20.1 Management Server IP 10.2.20.5 GW 10.2.20.1 Disadvantages • Reliably responds to and prevents attacks When you have chosen a deployment mode for your IDP system, proceed to “Install the IDP Management Server” on page 14. HA QuickStart Guide, Juniper Networks IDP 3.1 | 13 Step 2 INSTALL THE IDP MANAGEMENT SERVER In this step, you can install the IDP Management Server software that controls your IDP appliances. Because you are using multiple IDP appliances, you must install the Management Server software on a secure and trusted Red Hat Linux 7.2 or 8, RHEL AS/ES/WS 3, or Solaris 8 or 9 computer. Juniper Networks recommends using a system with a minimum of 1 GB RAM. An example Management Server system uses following specifications: • CPU: Quad Intel(R) Xeon(TM), 2.40GHz • Cache size: 512 KB • MemTotal: 2GB • Hard Disk: 32.5 GB Before installing the Management Server, ensure that the following are installed on the computer: • gzip compression software — This is installed by default on RedHat systems. For Solaris systems, you can download the gzip package for your processor and OS version from http://www.sunfreeware.com. Once you have downloaded the gzip package (do not download the source code file), install the software with the pkgadd command; for example, pkgadd -d gzip-1.3.5-sol8-sparc-local. • uudecode to decode the payloads contained in the installation file — This is installed by default on Solaris systems. For RedHat systems, you can install this utility from the Management Server CD by entering the following command: rpm -Uvh sharutils-4.2.1-8.7.x.i386.rpm. Installing the IDP Management Server 1. Ensure that the computer you are installing the Management Server on is: – Plugged in to a power source and powered on – Connected to a serial console or monitor and keyboard – A secure and trusted Red Hat Linux 7.2 or 8, RHEL AS/ES/WS 3, or Solaris 8 or 9 computer. 2. Insert the IDP Installation CD into the drive on the Management Server. 14 | Juniper Networks, Inc. 3. Log in to the computer as root. If you are already logged in as a user other than root, become root by typing: su -. At the password prompt, enter the root password for the computer. Note: The Management Server installation process is case-sensitive. You must follow the menu selections exactly as shown in the script help text. 4. Create an idp group with the user idp as the only member. For Linux, type the command: useradd idp For Solaris, type the commands: groupadd idp useradd -g idp idp 5. Mount the IDP Installation CD following the system manufacturer’s instructions. 6. Change to the Management Server directory using the cd command. For Linux: cd /mnt/cdrom/Mgt-Svr/Linux For Solaris: cd /cdrom/cdrom0/Mgt-Svr/Solaris 7. Run the Management Server install script by entering the appropriate command. For Linux: ./mgtsvr_linux_3_1.sh For Solaris: ./mgtsvr_solaris_3_1.sh The installation automatically begins. 8. When prompted, specify the directory that IDP uses to store the Management Server data files. 9. When prompted, specify a password for the IDP Management Server admin account. Confirm password. Note: The admin account authenticates communication between the Management Server and the User Interface (UI). You are asked for this password again when you log in to the UI in “Install the User Interface” on page 23. The installation proceeds automatically. Several messages display. After the installation is complete, the Management Server processes automatically start. Management Server IP Address During the Sensor configuration process, establishcommunication between the Management Server and the Sensor using IP address of the Management Server. When you have successfully installed the Management Server, proceed to “Connect to the IDP Appliance” on page 16. HA QuickStart Guide, Juniper Networks IDP 3.1 | 15 Step 3 CONNECT TO THE IDP APPLIANCE In this step, you connect to the IDP appliance and prepare to configure the preinstalled Sensor software. You can connect using one of these methods: • Connect a standalone computer to IDP appliance eth2 (management) port. In this method, you change the IP address of a standalone computer to an IP address that is on the 192.168.1.0/24 network. Then, you connect the standalone computer to the IDP appliance and use the default settings for Ethernet access to configure the Sensor software. • Connect a serial console or keyboard/monitor to IDP appliance. In this method, you assign the IDP appliance an IP address that is on your network. Then, you connect a serial console or keyboard and monitor to the IDP appliance and configure Ethernet access by choosing an Ethernet port, IP address, and default route. After you have configured Ethernet access, you connect the IDP appliance to your network and configure the Sensor software from a computer on your network. Choose a method and follow the appropriate instructions below. When you have established Ethernet access to the IDP appliance, you can configure the Sensor software using the Appliance Configuration Manager (ACM), the Web-based IDP configuration tool. The configuration process is described in “Configure the IDP Sensor” on page 18. Use the illustrations provided on the back cover of this guide to locate the Ethernet, fiber, and serial ports for the IDP appliance. Using a Standalone Computer 1. Connect a standalone computer, such as a laptop, to the IDP appliance eth2 port. To connect directly to the appliance, use a cross-over cable. To connect to the appliance over a hub or switch, use a straight-through cable. 2. Change the IP address of the standalone computer to 192.168.1.2. To change an IP address, see your computer’s operating system documentation. 3. On the connected computer, open a Web browser. Enter the URL of the ACM wizard as https://192.168.1.1. Because the ACM uses a secure form of HTTP, you MUST enter https:// before the IP address. 4. Enter the default user name and password: username: root password: abc123 16 | Juniper Networks, Inc. The ACM wizard automatically displays. Proceed to “Configure the IDP Sensor” on page 18. Using a Serial Console or Keyboard/Monitor 1. Connect to the IDP appliance. – For serial console connections, connect a serial console to the IDP appliance Serial port and configure the terminal software to use parameters 8-N-1, 9600. For Windows, use HyperTerminal. For Linux, use minicom. – For keyboard and monitor connections, connect a keyboard and monitor to the IDP appliance. 2. Log in to the IDP appliance: login: root password: abc123 The Ethernet configuration script automatically runs. Follow the instructions in the script’s help text to configure Ethernet access to the IDP appliance. 3. When prompted, select the network card you want to configure. The default configuration for that network card appears. – To accept the default configuration, type n and press Enter to continue. – To reconfigure the network card, type y. Assign an IP address and netmask to the network card. Be sure to use an IP address that is reachable by the computer you will use to configure the Sensor software. Press Enter to continue. 4. When prompted, set a default route by pressing y. Enter the default route for the computer that you will use to configure the Sensor software. Press Enter. 5. Use the Ethernet port you just configured to connect the IDP appliance to your network. To connect directly to another computer, use a cross-over cable. To connect to a hub or switch, use a straight-through cable. 6. Using the computer that is on your network, open a Web browser. Enter the IP address you chose in the configuration script. Because the ACM uses a secure form of HTTP, you MUST enter https:// before the IP address. 7. Enter the default user name and password: username: root password: abc123 The ACM wizard automatically displays. Proceed to “Configure the IDP Sensor” on page 18. HA QuickStart Guide, Juniper Networks IDP 3.1 | 17 Step 4 CONFIGURE THE IDP SENSOR In this step, you configure the IDP Sensor software that is pre-installed on the IDP appliance to work with your network. Using the Appliance Configuration Manager (ACM), a Web-based software tool, you follow the on-screen instructions as the ACM wizard leads you through the eight-section configuration process. To view the ACM online help, click the icon in the upper right corner. Note: The ACM supports Mozilla 1.0.1 and IE 6.0 Web browsers. If the font size is too small or difficult to read in your Mozilla Web browser, increase the font size to 150%. The table below summarizes the information you should have available: Note: During the configuration process, you choose a One-Time Password (OTP) and are given a VIN for your Sensor. Because you are prompted for this information again in “Add Network Components” on page 25, you might want to record the VIN. Section Configuration Information Setup • IDP Sensor host and domain name • IDP Sensor root and admin passwords (default is abc123) • Management Server password for the User Interface Mode • Deployment mode: router, bridge, transparent, or proxy-ARP (no sniffer mode) • Enable/choose high availability (standalone or external) Networking • • • • • • High Availability Because you are using a high availability solution, you must: • Choose and configure the state-sync interface on the appliance • Configure external or standalone high availability Speed and duplex settings for IDP appliance interfaces Enable/configure VLAN interfaces Enable/configure virtual routers Management interface Forwarding interfaces Routing table (In proxy-ARP and router mode, if you are using multiple subnets in your protected network, you must configure static routes on the IDP appliance to these subnets. Without these static routes, incoming traffic to those subnets can be lost. Alternatively, you can create a static route from the IDP appliance to an internal gateway that contains inbound routes to the protected subnets.) 18 | Juniper Networks, Inc. Section Configuration Information System • • • • • • Management • IP address of the Management Server for this Sensor and OTP • Sensor VIN __________________________________ (case sensitive) • Enable/configure ACM access Confirm and Exit View the current configuration and then: • Save all changes • Apply the configuration to the IDP appliance • Reboot the IDP appliance Enable/configure DNS Set Time and Time Zone Enable/configure NTP Enable/configure RADIUS Enable/configure SNMP Enable/configure SSH access Download Download the Sensor configuration file (idpconf.cfg) to a specified Configuration File location. After you save and apply a configuration to the IDP Sensor, you can download the current configuration file to a separate location. When you configure additional IDP appliances for your HA cluster, you can upload the saved configuration file to quickly configure each Sensor. To download the configuration file: 1. From the ACM main menu, select File Download Manager. The File Download Manager page appears. 2. Select idpconf.cfg in the file pull-down menu. 3. Specify the download location on the local computer and then click OK. Exit the ACM by closing the Web browser window. You can now disconnect the serial console, keyboard and monitor, or other standalone computer from the IDP appliance. If you changed the IP address of a standalone computer to access the ACM, be sure to change it back to its original IP address. Proceed to “Connect IDP to Your Network” on page 20. Note: Because all networks are different, Juniper Networks recommends that you install one IDP Sensor at a time. When you have successfully installed a Sensor and are receiving log records, you can configure and connect additional Sensors to your network. HA QuickStart Guide, Juniper Networks IDP 3.1 | 19 Step 5 CONNECT IDP TO YOUR NETWORK In this step, you connect the IDP appliance to your network using the provided cables and the Ethernet ports (interfaces) on the IDP appliance. To connect to a switch or hub, use the straight-through Ethernet cable. To connect to a firewall or router, use the crossover Ethernet cable. The necessary cables are included with the IDP system. An example configuration, showing Ethernet ports and their intended connections, is shown below (your configuration may differ): Can also be management interface to protected network to protected network Forwarding Interface eth2 Forwarding Interface eth3 Optional IDP 100 eth0 Forwarding Interface eth1 Forwarding Interface to external network to external network to protected network to protected network Forwarding Interface eth2 Forwarding Interface eth3 Can also be management interface Optional Optional IDP 500 IDP 1000 eth0 Forwarding Interface to external network 20 | Juniper Networks, Inc. eth1 Forwarding Interface to external network Optional The State-Sync Interface The State-Sync interface is used to share state information between IDP Sensors in an HA Cluster. When you install the first IDP appliance in the HA cluster, you do not need to use the state-sync interface. As you configure and connect additional IDP appliances to your network, however, you connect their state-sync interfaces to each other. This process is described in “Create the HA Cluster” on page 28. After you have successfully connected the IDP appliance to your network: • If you are using standalone high availability, proceed to “Configure Your Network Switch” on page 22. • If you are using external high availability, proceed to “Install the User Interface” on page 23. HA QuickStart Guide, Juniper Networks IDP 3.1 | 21 Step 6 CONFIGURE YOUR NETWORK SWITCH [STANDALONE HA ONLY] In this step, you configure your network switches to pass multicast or unicast MAC packets and heartbeats to the HA Cluster, as specified in the IDP Sensor configuration. For instructions on configuring your switches, please see the “High Availability Solutions” chapter in the Intrusion Detection and Prevention Concepts & Examples Guide or consult your switch manufacturer’s operating manual. Cluster IPs and MACs The nodes in an HA Cluster receive incoming packets via a Cluster IP address, which is mapped to a multicast or unicast Cluster MAC address to enable all Sensors to receive a copy of all network traffic. You must manually configure your network switches to pass multicast or unicast MAC traffic to the IDP appliances in the HA cluster. Note: Switches that cannot pass multicast or unicast MAC traffic cannot be used for a standalone HA configuration and are not supported. Heartbeats The nodes in an HA Cluster communicate with each other using a heartbeat protocol, which uses a multicast IP address. Switches can automatically “learn” about the heartbeat protocol using the Internet Group Management Protocol (IGMP). You must enable IGMP on your network switch to pass heartbeats between IDP appliances in the HA cluster. Note: Switches that do not support IGMP cannot be used for a standalone HA configuration and are not supported. When you have successfully configured your network switches to pass multicast or unicast packets and heartbeats, proceed to “Install the User Interface” on page 23. 22 | Juniper Networks, Inc. Step 7 INSTALL THE USER INTERFACE In this step, you install the IDP User Interface (UI). The IDP Installation CD includes two versions of the UI installation: Windows and Red Hat Linux. You must install the UI on a system with a minimum of 512 MB of RAM; the UI does not run on systems with less than 512 MB RAM. Note: The User Interface installation cannot be canceled from the initial install screen. You must click OK to reach the Introduction screen, then click Cancel to exit. Installing on a Windows Host You can install the UI on a computer running Windows 2000, NT, or XP. 1. Ensure that you are an Administrator user for the computer on which you are installing the UI. For instructions on adding users to the Administrator group, please see your OS manual. 2. Insert the IDP Installation CD into the CD drive of the client machine. If Autoplay is enabled, the installation starts automatically. If Autoplay is disabled, run the install application install.exe from your CD-ROM drive. 3. Follow the directions in the dialog boxes to install the UI. Installing on a Red Hat Linux Host You can install the UI on a computer running Red Hat Linux 7.2 or 8 or RHEL AS/ ES/WS 3: 1. Insert the IDP Installation CD into the CD drive of the client machine and mount the CD following the manufacturer’s instructions. 2. In a command shell, run ./install.bin from the /mnt/cdrom/UI/Linux directory of your CD-ROM drive. 3. Follow the directions in the dialog boxes to install the UI. When prompted for a Web browser, you can change the default location of your Web browser. Click Choose to display the Web browser dialog box. HA QuickStart Guide, Juniper Networks IDP 3.1 | 23 4. In the Enter patch or folder name field, enter the full path to the Web browser application and then click Update. A list of directories and files for the specified location appears. Specify your Web browser using one of the following methods: – Choose your Web browser from the list and then click OK, or – In the Enter file name field, enter the name of the Web browser and then click OK. Opening the User Interface When you open the User Interface, specify the following information to log in: • Host Name. Use the name of your IDP Management Server. • User Name. Use the default user name admin. • Password. Use the password you specified when you installed the Management Server. When you have installed the UI, proceed to “Add Network Components” on page 25. 24 | Juniper Networks, Inc. Step 8 ADD NETWORK COMPONENTS Network Objects represent the components of your network, such as individual host machines, servers, and subnets. You must add the IDP Sensor as a Network Object before the IDP system is functional. You can also create Network Objects for the network components you want to protect. Adding the IDP Sensor as a Network Object 1. In the Navigation tree, select Objects > Network Objects. 2. Choose File > New Object from the menu bar and then click OK. 3. Select Sensor and then click OK to display the Sensor Editor. Enter the information about the Sensor, including a unique name. Use the VIN and OneTime Password from “Configure the IDP Sensor” on page 18. Click the Interfaces tab to specify which IDP interfaces are external. You can also add anti-spoofing information using the Anti Spoof tab. 4. Click OK. A confirmation dialog box appears, prompting you to register your new Sensor with the Juniper Networks customer support Web site. Click the registration link to register the Sensor (registration is required for Attack Object updates). 5. From the toolbar, click to save the new IDP Sensor object. The IDP Sensor Network Object is added to the Network Object database. 6. Choose File > New Cluster from the menu bar to display the Cluster Editor. Enter a unique name for the cluster. In the Members box, select the IDP Sensor you want in the HA cluster. Click OK. Note: As you configure and connect additional IDP Sensors (described in “Create the HA Cluster” on page 28), you can add them to the HA cluster. HA QuickStart Guide, Juniper Networks IDP 3.1 | 25 Step 9 INSTALL A SECURITY POLICY Before the IDP system can begin protecting your network, you must install a Security Policy on the Sensor. You should also verify that the Sensor is correctly connected to your network by sending other types of traffic through the IDP appliance. You can either use the default Security Policy created by Juniper Networks, or you can create a new, custom Security Policy for your network. Installing a Security Policy Using a Template 1. Select the Security Policy component in the navigation tree and choose File > New Policy from the menu bar. 2. In the New Security Policy dialog box, select Use Template and choose a template from the menu. You can use the inline_template created by Juniper Networks, create a new, custom Security Policy template for your network, or use the getting_started template, which is designed to help you fine-tune your IDP system (see the “Fine-Tuning” chapter in the Intrusion Detection and Prevention Concepts & Examples Guide for help with customizing this template to your network). 3. Click OK to display the Security Policy template. Customize the template to your network and specify the Sensor on which to install the Security Policy. 4. Choose Policy > Install from the menu bar to install the new Security Policy on your Sensor. The Security Policy begins generating log records for security events immediately. Open the Log Viewer to ensure that you are receiving logs. Note: As you configure and connect additional IDP Sensors (described in “Create the HA Cluster” on page 28), you add them to the Cluster and push the Security Policy again to verify the new Sensor. Verifying Sensor Connectivity Perform these connectivity tests for each Sensor you add to the HA Cluster: • Test connectivity to the IDP Management Server: From a computer on the protected network, ping the Management Server IP address. • Test connectivity to external networks: Use a computer on the protected network to browse the Internet or send/receive email. When you have verified that the Sensor is operating normally, proceed to “Run the Profiler” on page 27. 26 | Juniper Networks, Inc. Step 10 RUN THE PROFILER Configure and run the Profiler to create a snapshot of the devices and activity on your network. To configure and run the Profiler: 1. Select the Profiler component in the Navigation Tree. Click Click here to configure profiler in the main display area of the UI. 2. Select your Sensor from the Device pull-down menu in the Profile Configuration dialog box. 3. Configure the Profiler: – On the Tracked Hosts tab, select the network objects you want the Profiler to collect detailed information about. These should be the objects representing your internal network. – On the Exclusion tab, select any individual objects you want the Profiler to exclude from the groups you selected on the Internal Hosts tab. – On the Profiles tab, select Context Objects to profile all contexts. – Leave the settings on the Alert and Miscellaneous tabs as-is. 4. Click OK. A dialog box appears asking if you want to start or restart the Profiler. Click Yes. The Profile Action window appears. 5. Select Start and the Sensor you want to start profiling, then click Go. After the Profiler is running, click Close. 6. Click Click here to synchronize profiler data. The Profile Action window appears. 7. Select Sync and the check box next to the name of your Sensor and then click Go. After the synchronization is complete, click Close. 8. Click Click here to view profiler data to verify that you are collecting Profiler information about your network. When you have configured the Profiler, proceed to the final configuration step, “Create the HA Cluster” on page 28. HA QuickStart Guide, Juniper Networks IDP 3.1 | 27 Step 11 CREATE THE HA CLUSTER The HA cluster is a group of 2 to 16 IDP Sensors that provides failover protection. In this step, you create the HA cluster by configuring additional IDP appliances for HA and then connecting them to your network. For each appliance you want to include in your existing HA Cluster: 1. Connect to the IDP appliance and prepare to configure the Sensor software (repeat “Connect to the IDP Appliance” on page 16). 2. Configure the Sensor software using the saved configuration file. From the ACM main menu, select Upload and replace ACM configuration file to display the File Upload Manager page. Then, specify the location of the saved configuration file on the local computer (idpconf.cfg) and click OK to upload. The ACM loads the saved configuration information to help you configure the current Sensor. Using the ACM wizard, repeat the steps in “Configure the IDP Sensor” on page 18. The ACM fills in each data field with information from the uploaded configuration file; however, you must specify the following information: – Sensor host and domain name – Sensor root and admin passwords – Sensor fully qualified domain name (FQDN) – One-time password (OTP) You do not need to change the VIN; the ACM automatically overwrites the VIN number of the saved configuration with the VIN number of the current Sensor. 3. Connect the IDP appliance to your network (repeat “Connect IDP to Your Network” on page 20). 4. Connect the appliance to other appliances via the state-sync interface. Using the state-sync interfaces that you selected when you configured the Sensor, connect the IDP appliances to each other to form the HA cluster: – To deploy two IDP appliances, use a crossover cable to connect the appliances via the state-sync interface. – To deploy more than two IDP appliances, use straight-through cables and a switch to connect the state-sync interfaces of all appliances. As you add Sensors to the HA Cluster, remember to verify that each node is operating normally. 28 | Juniper Networks, Inc. 5. Add the Sensor as a Network Object using the UI and include in the Cluster Object (repeat “Add Network Components” on page 25). Verifying HA Cluster Connectivity You can verify the status of the HA cluster using the sctop command line utility or the Device Monitor in the UI. HA Status from the Command Line You can verify HA Cluster connectivity using sctop commands at the Sensor command line. Perform the following connectivity test after you have added the second Sensor to the HA Cluster and repeat for each subsequent Sensor added: 1. From the Sensor command line, type: sctop. The sctop menu appears. 2. Type w to select HA status. Node and Cluster statistics for the Sensor appear. – An UP status indicates that the node is functioning normally. – A DOWN status can indicate that the node is not sending heartbeats, not receiving heartbeats, or that there is a switch problem. Note: Test all nodes in the HA cluster. Each node should report the same status information. HA Status in the UI You can also verify HA cluster connectivity in the Device Monitor component of the UI. In the UI navigation tree, select the Device Monitor and locate the IDP Sensors using the HA configuration. The icon in the Cluster column for each Sensor indicates the status of the HA cluster: • The icon indicates the cluster is functioning normally. • The icon indicates the cluster is experiencing problems.This can indicate that one or more Sensors in the cluster are not functional, or that one or more processes on the Sensor are overloaded. • The icon indicates that the cluster is non-functional. Reconfiguring Standalone HA Clusters To reconfigure your Standalone HA configuration using the ACM: 1. For all cluster nodes except the first node, stop the IDP processes. From the Sensor command line, type: service idp stop You must also stop sctop processes, if running. From the Sensor command line, type: quit sctop HA QuickStart Guide, Juniper Networks IDP 3.1 | 29 2. Use the ACM on the first cluster node to change the Standalone HA configuration as desired, then save and apply the configuration. 3. Use the ACM on all other cluster nodes to change the Standalone HA configuration to match the configuration on the first node, then save and apply the configuration. All cluster nodes should now be running the IDP processes. To verify the status of the cluster, see “Verifying HA Cluster Connectivity” on page 29. 30 | Juniper Networks, Inc. Step 12 UPDATE YOUR ATTACK OBJECTS Remember to update your Attack Objects frequently. Juniper Networks provides new signature and protocol anomaly Attack Objects each week. Updates can include: • Additional signature and protocol anomaly Attack Objects • Modification of descriptions or severities for existing Attack Objects • Removal of obsolete Attack Objects To update your Attack Object database, use the automated Attack Update Client. The Attack Update Client searches your existing Attack Object database and automatically downloads new or modified Attack Objects. From the menu bar of the User Interface, select Tools > Update Attacks and follow the instructions in the Attack Update Client wizard to update your Attack Object database. Congratulations! You have successfully installed the IDP system on your network. Additional Resources • For further instructions on using your IDP system, use the Online Help in the User Interface. • For details on Standalone and external HA configurations, see the “High Availability Solutions” chapter in the Intrusion Detection and Prevention Concepts & Examples Guide. This chapter also includes information on switch compatibility and configuration. • For detailed, step-by-step instructions on fine-tuning your IDP system, see the “Fine-Tuning” chapter in the Intrusion Detection and Prevention Concepts & Examples Guide. Problems? You can contact Juniper Networks customer support, as well as accessing general information about known issues, IDP versions, and the IDP FAQ, by visiting the Juniper Networks Support Web site at www.juniper.net/support/. HA QuickStart Guide, Juniper Networks IDP 3.1 | 31 IDP QUICKSHEET eth2 Serial Port eth0 Power eth3 IDP 100 1 DB-15 Video Interface Keyboard Mouse eth1 Connector Connector Serial Port eth2 IDP 500 IDP 1000 Usernames & Passwords eth0 1 DB-15 Video Interface 2 USB Connector eth3 Power 2 Keyboard Mouse eth1 Connector Connector USB Connector Sensor Login & Configure username: root password: abc123 Management Server Login username: admin password: you set this password during the Management Server configuration process URL https://192.168.1.1; this is also the default IP address of eth2, the management interface. Because the ACM uses HTTPS, you MUST enter https:// before the IP address. Accessing To configure the Sensor, you must use a computer that is on the same network as the IDP appliance. Management Server IDP 100, 500, 1000 Required: install on a separate computer running Red Hat Linux 7 or 8, RHEL AS/ES/WS 3, or Solaris 8 or 9. Interfaces & IPs Management interface: default is eth2; cannot use stealth. IP address: must be unique Forwarding interface: any interface; can use multiple interfaces. Use crossover cable to connect to a firewall or router; use straight-through cable to connect to a hub or switch. IP address: must be unique. If using Juniper Networks FW/VPN devices, must use a stealth interface. State-Sync interface: any unused interface; must use one interface IP address: must be unique Cluster MAC Forwarding interfaces on each Sensor use a MAC multicast or unicast address so each Sensor receives a copy of the traffic. Cluster IP Forwarding interfaces on each Sensor use an IP multicast or unicast address so each Sensor can send heartbeats. Appliance Configuration Manager HA 32 | Juniper Networks, Inc.