Cisco SIEM Deployment Guide
Cisco SIEM Deployment Guide
Cisco SIEM Deployment Guide
Revision: H2CY10
The Purpose of
this Document
Related Documents
This guide focuses on Cisco products and discusses how those products
integrate with any third party SIEM product. It does not cover third party
SIEM product configuration details. For third party SIEM product details,
refer to the Secure Borderless Networks Technology Partners page:
http://www.cisco.com/go/securitypartners
Related Reading
BN Design Overview
Deployment Guides
Design Guides
Design Overview
Supplemental Guides
Foundation Deployment
Guides
SIEM Deployment
Guide
Internet Edge
Deployment Guide
Internet Edge
Configuration Guide
Network Management
Guides
Table of Contents
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Using this Cisco SIEM Deployment Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Business Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Configuration Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Cisco Security Information and Event Solution Configuration. . . . . . . . . . . . 5
Technoloogy Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Security Information and Event Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLECTIVELY, "DESIGNS") IN THIS MANUAL ARE PRESENTED "AS IS," WITH ALL FAULTS. CISCO AND ITS SUPPLIERS
DISCLAIM ALL WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THE DESIGNS, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. THE DESIGNS ARE SUBJECT TO CHANGE WITHOUT NOTICE. USERS ARE SOLELY RESPONSIBLE FOR THEIR APPLICATION OF THE DESIGNS. THE DESIGNS DO NOT CONSTITUTE THE TECHNICAL
OR OTHER PROFESSIONAL ADVICE OF CISCO, ITS SUPPLIERS OR PARTNERS. USERS SHOULD CONSULT THEIR OWN TECHNICAL ADVISORS BEFORE IMPLEMENTING THE DESIGNS. RESULTS MAY VARY
DEPENDING ON FACTORS NOT TESTED BY CISCO.
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes
only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Cisco Unified Communications SRND (Based on Cisco Unified Communications Manager 7.x)
2010 Cisco Systems, Inc. All rights reserved.
Table of Contents
Introduction
The Smart Business Architecture Borderless Networks for Enterprise
Organizations incorporates many parts, including firewalls, routers, intrusion
detection systems (IDS), intrusion prevention systems (IPS), and other devices
whose proper operation is essential to the security of the network. These devices
may produce significant amounts of event logs and other security-relevant
information. Security information and event management (SIEM) products are
designed to make the task of collecting, correlating, and acting on this information easier. This guide is a supplement to the Smart Business Architecture
Borderless Networks for Enterprise Organizations architecture, and should be
read together with the LAN, WAN, and Internet Edge Deployment Guides; Figure
1 shows how a SIEM integrates into the overall architecture.
application integration, and a wide variety of networked devices. As the environment becomes more complex, organizations face growing security challenges
with complex regulatory requirements that force them to effectively monitor and
report security incidents. Organizations face business challenges in the area of
compliance, enhanced network security, IT and security operations.
Figure 1. SIEM Placement in the Smart Business Architecture Borderless
Networks for Enterprise Organizations
Business Overview
Increasing employee mobility, use of video, and globalization are changing
the IT environment. Traditional enterprises that once viewed themselves as
distinct entities with a clearly defined perimeter are now shifting to a borderless
model. The borderless model allows cloud-based services, workplace mobility,
The first challenge for the organization is to comply with regulatory requirements, as well as its own internal policies. Customers need the ability to log,
monitor, and report on security incidents in their data infrastructure, and to
log, store, and report on large volumes of security event logs. Organizations
find themselves having to deal with massive amounts of data being generated by their infrastructure every day.
The second challenge involves enhancing network security of the organization. With threats constantly coming from outside and inside the organization, it is increasingly difficult to weed through the noise of routine security
events and determine which threats warrant investigation. Economic pressures to do more with less staff only compound the problem.
Finally, gathering logs from devices and applications throughout the enterprise can be very costly. Managing the sheer volume of raw logs and events,
both in real time and from for long term archive storage is a major effort.
Security investigations can require searching many different networked
systems and piecing together fragmented bits of information stored in a
variety of incompatible formats. Organizations need a unified view of the
state of network security in a single dashboard.
Introduction
Technology Overview
Security Information and Event Management
Normalization
Correlation
Aggregation
Reporting
SIEM combines the essential functions of SIM and SEM products to provide a
comprehensive view of the enterprise network using the following functions:
Log collection of event records from sources throughout the organization provides important forensic tools and helps to address compliance
reporting requirements.
Normalization maps log messages from different systems into a common
data model, enabling the organization to connect and analyze related
events, even if they are initially logged in different source formats.
Correlation links logs and events from disparate systems or applications,
speeding detection of and reaction to security threats.
Aggregation reduces the volume of event data by consolidating duplicate event records.
Reporting presents the correlated, aggregated event data in real-time
monitoring and long-term summaries.
Technology Overview
Cisco SIEM
Solution Overview
Organizations have a major investment in Cisco technology, and rely on
Cisco to provide secure, robust, scalable, and interoperable solutions.
Cisco is partnering with leading companies through the Cisco Developer
Network (CDN) to deliver a SIEM solution that meets the diverse security
and reporting needs of organizations. This integration enables customers
to select the SIEM tools best suited to their own environments and
requirements, and take full advantage of the capabilities of their Cisco
network infrastructure.
The SIEM partners products complement the Cisco Security Management
Suite, including Cisco Security Manager and Cisco Security MARS, to
provide support for enhanced operational use cases.
The SIEM solution is part of the Cisco Smart Business Architecture
Borderless Networks for Enterprise Organizations design, which offers
partners and customers valuable network design and deployment best
practices, and helps organizations deliver superior end-user experiences
on their networks.
Configuration Details
Cisco Security Information and Event Solution Configuration
Logging Method
Protocol Details
Cisco IOS-based
router
syslog
syslog
SDEE
HTTP or HTTPS
SFTP or NFS
SCP or FTP
SCP or FTP
Tech Ti p
Tech Tip: Use TCP-based syslog where possible, because TCP delivery
is reliable, and data forwarding will stop if the device cannot write to log
servers.
Configuration Details
Severity Keyword
Meaning
Default Behavior
emergencies
System is
unusable
logged
alerts
Immediate action
needed
logged
critical
Critical conditions
logged
errors
Error conditions
logged
warnings
Warning
conditions
logged
notifications
Normal but
significant
conditions
logged
informational
Informational
messages
logged
debugging
Debugging
messages
not logged
0
1
4
5
6
7
Logging Archives
Log management solutions need to have a substantial amount of storage to
hold all of the log messages. Some regulations may require organizations to
keep logs for a certain number of days or months or years.
Rate of Log Generation
The volume of traffic flowing through your network, the complexity of your
policy rules, and the logging configuration of your devices will affect the
amount of security information that is logged. Excessive logging can cause
performance problems, increase network load, and make it harder to extract
useful information from the SIEM product. Log levels should be set according to the importance of the assets being protected, and will vary according
to each organizations environment and requirements. For example, a
database administrator might enable extensive auditing and logging on a
critical financial application, and lower levels for most other applications. To
help understand the actual volume of logs generated, it can be helpful to set
up a syslog receiver on a separate system, and monitor the rate of incoming
messages. Also keep in mind that the amount of information logged during
an attack may increase significantly compared to normal levels.
Configuration Details
For more aggressive tuning, you may also consider disabling the following
messages:
302014: A TCP connection between two hosts was deleted
302016: A UDP connection slot between two hosts was deleted
Process
Procedure 1
Cisco ASA 5500 series appliances provide full security information with
logging set to level 6 Informational. This can still generate a large number
of messages. As an alternative to changing the log level for the entire device,
disabling selected syslog messages of limited interest can help to reduce
message load while still retaining as much security information as possible.
On Cisco ASA 5500 appliances, log messages include a six-digit numeric
code that identifies the event. The first three digits indicate the class of
event. For example, codes beginning with 611 are associated with VPN client
operations, and a message prefixed with %ASA-6-611102 is a user authentication failure. Refer to the Cisco ASA 5500 Series System Log Messages
documentation for your software version for details.
Cisco IPS systems use SDEE to provide XML-based security event records
to clients, such as a SIEM collector, over HTTP or HTTPS. In this case, unlike
with syslog, the SIEM is acting as a client, and contacts the IPS to request
the information. In order to do this, the SIEM must be configured with the IP
address or host name of the IPS, and a username and password to authenticate its requests.
Procedure 1
bad1.example.com
(10.67.22.34)
11
Botnet
bad2.example.com
(209.165.200.225)
Virus
IPS sensor events can be tuned in different ways, depending on requirements. Here are some techniques that can be used in certain environments
to reduce the number of messages being sent to the SIEM.
bad1.cisco.
example(10.131.36.158)
Virus
bad2.cisco.
example(209.165.201.1)
Trojan
horrible.example.
net(10.232.224.2)
Botnet
nono.example.
org(209.165.202.130)
Virus
Process
Disabling Signatures
Signatures that are not being used in an organization can be retired. Retired
signatures will not be used to generate alerts, but can be reactivated later
if requirements change. Retiring unused signatures can help to improve
sensor performance. For more information about signature tuning, please
see the following case study of Ciscos own Computer Security Incident
Response Team (CSIRT):
http://www.cisco.com/web/about/ciscoitatwork/downloads/ciscoitatwork/pdf/CSIRT_Network-Based_Intrusion_Prevention_System_Case_
Study.pdf
Cisco routers can also use a local log buffer to store log messages. Buffered
logging is often preferable to sending log messages to the console or to
a monitor session. Console logging in particular can increase the routers
CPU load. Buffered log messages can also be useful for troubleshooting, if
the SIEM is unreachable when the log message is generated. The following
configuration example creates a 16KB logging buffer and specifies message severity level 6 Informational. The example also shows how to disable
logging to the console and to terminal monitor sessions.
no logging console
no logging monitor
logging buffered 16384 6
The following example shows how to configure logging level
6 Informational for syslog:
logging trap 6
To ensure that all log messages sent by the router appear to come from
the same interface address, in this case the Ethernet0 interface, configure
the following:
logging source-interface interface Ethernet0
Process
Cisco Routers
Procedure 1
Procedure 2
ACLs that include access control entries (ACEs) with the log or log-input
keyword are called log-enabled ACLs. They provide detailed information
when a permit or deny ACL is triggered and can be useful for troubleshooting, but they can be CPU intensive and should be used with care. The
following example shows a log-enabled ACL.
access-lists 101 deny tcp any any eq 12345 log
access-lists 101 deny tcp any any eq 12345 log-input
We recommend configuring log time stamps to include the date and time
with millisecond precision, and the time zone. Use the following global
10
Process
Cisco IronPort Web Security Appliances can generate log files for monitoring web traffic. These files are controlled by Log Subscription configuration
options under System Administration in the management interface.
Log Types
There are many types of log files that can be produced; two types of log files
are of particular interest for security operations:
Access logs record web proxy activities
Traffic logs record Layer 4 Traffic Monitoring (L4TM) activities
These logs can be stored in the commonly used Apache, Squid, or Squid
Detail formats.
Log Retrieval Methods
SIEM products can receive appliance logs through SCP or FTP file transfer,
or syslog. Syslog has a greater impact on performance, and is not supported
for all log types; Cisco recommends using SCP, or FTP if SCP is unavailable.
11
Step 5: Choose one of the common predefined formats for recording the
access logs, or use the Custom Fields field to create your own format. In the
example shown in Figure 4, we select Squid.
Step 6: Choose how to transfer the log file from the appliance by selecting a
Retrieval Method. In the example in Figure 4, FTP is selected. When choosing this method, the following information must be entered:
Process
Log Types
Tech Ti p
FTP log transfers only support passive mode FTP.
The appliance rolls over log files based on settings configured on the Log
Subscription global settings page. Log files can also be sent on demand by
clicking the Rollover Now button.
Most logs on the appliance are recorded as plain text, except for mail
delivery logs, which are stored as binary files for efficiency. There are many
types of logs supported on the appliance: delivery logs, bounce logs, status
logs, anti-spam logs, anti-virus logs, reporting logs, and tracking logs.
Log Format
Mail delivery logs can be stored in text format or in Qmail format.
Log Retrieval Methods:
SIEM products can receive appliance logs through SCP or FTP file transfer,
or syslog. Syslog has a greater impact on performance, and is not supported
for all log types, so using one of the file transfer methods is recommended.
Procedure 1
12
Step 5: Choose how to transfer the log file from the appliance by selecting
a Retrieval Method. In the example, FTP is selected. When choosing this
method, the following information must be entered:
Process
Tech Ti p
FTP log transfers only support passive mode FTP.
Figure 5. Log Configuration Example for Cisco IronPort Email Security Appliance
Heterogeneous
Network
Procedure 1
MARS (already
deployed)
Third Party SIEM
Solutions
Heterogeneous
Network
Third Party SIEM
Solutions
Cisco Security MARS can archive data using the Secure FTP (SFTP) or
Network File System (NFS) protocols. For security deployments, we recommend using SFTP. A MARS archive process runs nightly at 2:00 a.m., and
creates a directory on the receiving system to contain that days data. Raw
event records are exported from MARS every ten minutes. The archive time
parameters are not configurable.
The following steps are shown in Figure 6:
Step 1: In the Cisco Security MARS web management interface, navigate to
Admin > System Maintenance > Data Archiving
Step 2: Select SFTP as the Archiving Protocol.
Step 3: Enter the IP address of the remote host that will receive the archives.
Step 6: Submit and commit the changes.
Step 4: Enter the path to be used for file storage on the receiving system.
13
Partner products have been verified with Cisco Smart Business Architecture
using the following software versions:
http://www.cisco.com/en/US/products/ps5739/Products_Sub_
Category_Home.html
Security Monitoring: Proven Methods for Incident Detection on
Enterprise Networks
http://oreilly.com/catalog/9780596518165
14
Appendix A:
SBA for Enterprise Organizations Document System
Deployment Guides
Design Guides
Design Overview
IPv6 Addressing
Guide
Supplemental Guides
Foundation Deployment
Guides
Wireless CleanAir
Deployment Guide
LAN Deployment
Guide
Nexus 7000
Deployment Guide
SIEM Deployment
Guide
LAN
Configuration Guide
WAN Deployment
Guide
ArcSight SIEM
Partner Guide
LogLogic SIEM
Partner Guide
WAN
Configuration Guide
Internet Edge
Deployment Guide
nFx SIEM
Partner Guide
Internet Edge
Configuration Guide
Network Management
Guides
SolarWinds
Deployment Guide
RSA SIEM
Partner Guide
Splunk SIEM
Partner Guide
Data Security
Deployment Guide
15
Americas Headquarters
Cisco Systems, Inc.
San Jose, CA
Europe Headquarters
Cisco Systems International BV
Amsterdam, The Netherlands
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word
partner does not imply a partnership relationship between Cisco and any other company. (1005R)
C07-608970-01 10/10
16