Solved

Network intrusion detection and prevention tools

Posted on 2014-11-13
3
169 Views
Last Modified: 2014-12-01
We are going thru an IRS audit and are being asked what network intrusion tools we use.  We currently have a hardware firwall Cisco ASA 5505.  Are there built in tools such as logging that we can use for network intrusion viewing?  Or is there another piece of hardware that we need.  I can poke around the firewall but I am not Cisco certified or CCNA by any means.
0
Comment
Question by:gebigler
3 Comments
 
LVL 17

Accepted Solution

by:
Garry-G earned 500 total points
ID: 40442026
ASA does not come with a real IDS/IPS as such. In order to get this feature on the 5505 (or any ASA, for that matter), you will need the IDS daughter card that installs into the ASA. Not sure about the prices, though, as we have stopped actively selling ASAs some time ago due to their software falling back behind the competition. Anyway, the IDS card will most likely work (we have one customer with a 5505 cluster and the IDS card, no problems to date, albeit the firewall is already configured rather restrictively, so dangers are already greatly minimized).

Depending on your throughput and feature demands, you could also look into devices from Fortinet. For very competitive prices (typically around 1/2 of what ASA devices with similar performance cost), you get a load of additional features without additional license cost. The base bundle already includes full IDS/IPS, content scan (AV/Malware) as well as webfiltering (with server categorization, etc.), SSL VPN (as well as IPSEC and PPTP), single sign on, web proxy, FW virtualization and much more ... also full HA capability without needing to pay for a license upgrade (as is the case for most smaller ASA models like 5505 or 5510). We've got multiple pairs deployed to protect our customers' webservers from attacks, which has reduced the number of successful attacks from something like 1 a day (don't ask ...) to less than one per quarter ...
0
 
LVL 61

Expert Comment

by:btan
ID: 40442082
Strictly speaking ASA is FW and not prime as intrusion detection. ASA does port and ip filtering as a baseline unless it is talking about ASA module add on such as the AIP-SSM provides intrusion detection system (IDS)/intrusion protection system (IPS) features, the CSC-SSM operates as a content scanning and filtering module or even the CX that is the contextual visbility for the NG-FW. But assuming the minimal base for ASA, it is doing as the traditional stuff FW is supposed to do and of course we are saying it has to be hardened with the baseline from Enterprise. The industry baseline from Cisco itself is reference and supplemented by CIS and NIST is commonly reference. Below

http://www.cisco.com/web/about/security/intelligence/firewall-best-practices.html

Intrusion detection is really not the FW role but if you are looking at ASA mgmt aspect in such attempt the audit trail do are important aspect as already in the hardening practices. Maybe good to know the threat protection for ASA in ver 8 above
Using basic threat detection, the security appliance monitors the rate of dropped packets and security events caused by the following:

Denial by access lists.
Bad packet format, such as invalid-ip-header or invalid-tcp-hdr-length).
Connection limits exceeded, both system-wide resource limits and limits set in the configuration.
DoS attack detected, such as an invalid stateful packet inspection or stateful firewall check failure.
Basic firewall checks failed. This option is a combined rate that includes all firewall-related packet drops in this bulleted list. It does not include non-firewall-related drops such as interface overload, packets failed at application inspection, and scanning attack detected.
Suspicious ICMP packets detected.
Packets failed application inspection.
Interface overload.
Scanning attack detected. This option monitors scanning attacks; for example, the first TCP packet is not a SYN packet or the TCP connection failed the three-way handshake. Full scanning threat detection takes this scanning attack rate information and acts on it by classifying hosts as attackers and automatically shunning them, for example. Refer to Configuring Scanning Threat Detection for more information.
Incomplete session detection, such as TCP SYN attack detected or no-data UDP session attack detected.
0
 

Author Comment

by:gebigler
ID: 40474689
Thanks
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Join & Write a Comment

This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
If you get continual lockouts after changing your Active Directory password, there are several possible reasons.  Two of the most common are using other devices to access your email and stored passwords in the credential manager of windows.
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include tâ€Ĥ

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now