Professional Documents
Culture Documents
Implementation Guide
Version 9
IMPORTANT NOTICE
Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without
warranty of any kind, expressed or implied. Users must take full responsibility for their application of any products. Elitecore
assumes no responsibility for any errors that may appear in this document. Elitecore reserves the right, without notice to make
changes in product design or specifications. Information is subject to change without notice.
USERS LICENSE
The Appliance described in this document is furnished under the terms of Elitecores End User license agreement. Please
read these terms and conditions carefully before using the Appliance. By using this Appliance, you agree to be bound by the
terms and conditions of this license. If you do not agree with the terms of this license, promptly return the unused Appliance
and manual (with proof of payment) to the place of purchase for a full refund.
LIMITED WARRANTY
Software: Elitecore warrants for a period of ninety (90) days from the date of shipment from Elitecore: (1) the media on which
the Software is furnished will be free of defects in materials and workmanship under normal use; and (2) the Software
substantially conforms to its published specifications except for the foregoing, the software is provided AS IS. This limited
warranty extends only to the customer as the original licenses. Customers exclusive remedy and the entire liability of Elitecore
and its suppliers under this warranty will be, at Elitecore or its service centers option, repair, replacement, or refund of the
software if reported (or, upon, request, returned) to the party supplying the software to the customer. In no event does Elitecore
warrant that the Software is error free, or that the customer will be able to operate the software without problems or
interruptions. Elitecore hereby declares that the anti virus and anti spam modules are powered by Kaspersky Labs and
Commtouch respectively and the performance thereof is under warranty provided by Kaspersky Labs and by Commtouch. It is
specified that Kaspersky Lab does not warrant that the Software identifies all known viruses, nor that the Software will not
occasionally erroneously report a virus in a title not infected by that virus.
Hardware: Elitecore warrants that the Hardware portion of the Elitecore Products excluding power supplies, fans and electrical
components will be free from material defects in workmanship and materials for a period of One (1) year. Elitecore's sole
obligation shall be to repair or replace the defective Hardware at no charge to the original owner. The replacement Hardware
need not be new or of an identical make, model or part; Elitecore may, in its discretion, replace the defective Hardware (or any
part thereof) with any reconditioned product that Elitecore reasonably determines is substantially equivalent (or superior) in all
material respects to the defective Hardware.
DISCLAIMER OF WARRANTY
Except as specified in this warranty, all expressed or implied conditions, representations, and warranties including, without
limitation, any implied warranty or merchantability, fitness for a particular purpose, non-infringement or arising from a course of
dealing, usage, or trade practice, and hereby excluded to the extent allowed by applicable law.
In no event will Elitecore or its supplier be liable for any lost revenue, profit, or data, or for special, indirect, consequential,
incidental, or punitive damages however caused and regardless of the theory of liability arising out of the use of or inability to
use the product even if Elitecore or its suppliers have been advised of the possibility of such damages. In the event shall
Elitecores or its suppliers liability to the customer, whether in contract, tort (including negligence) or otherwise, exceed the
price paid by the customer. The foregoing limitations shall apply even if the above stated warranty fails of its essential purpose.
In no event shall Elitecore or its supplier be liable for any indirect, special, consequential, or incidental damages, including,
without limitation, lost profits or loss or damage to data arising out of the use or inability to use this manual, even if Elitecore or
its suppliers have been advised of the possibility of such damages.
RESTRICTED RIGHTS
Copyright 1999-2008 Elitecore Technologies Ltd. All rights reserved. Cyberoam, Cyberoam logo are trademark of Elitecore
Technologies Ltd.
CORPORATE HEADQUARTERS
Elitecore Technologies Ltd.
904 Silicon Tower,
Off. C.G. Road,
Ahmedabad 380015, INDIA
Phone: +91-79-26405600
Fax: +91-79-26407640
Web site: www.elitecore.com , www.cyberoam.com
Technical Support
You may direct all questions, comments, or requests concerning the software you purchased, your
registration status, or similar issues to Customer care/service department at the following address:
Corporate Office
eLitecore Technologies Ltd.
904, Silicon Tower
Off C.G. Road
Ahmedabad 380015
Gujarat, India.
Phone: +91-79-66065606
Fax: +91-79-26407640
Web site: www.elitecore.com
Cyberoam contact:
Technical support (Corporate Office): +91-79-26400707
Email: support@cyberoam.com
Web site: www.cyberoam.com
Typographic Conventions
Material in this manual is presented in text, screen displays, or command-line notation.
Item
Convention
Server
Client
User
Username
Part titles
Topic titles
Example
Bold and
shaded font
typefaces
Shaded font
typefaces
Report
Introduction
Subtitles
Navigation link
Bold typeface
Name of a
particular
parameter /
field / command
button text
Cross
references
Lowercase
italic type
Bold typeface
between the
black borders
Bold typefaces
between the
black borders
Prerequisites
Hyperlink in
different color
Notation conventions
Note
Prerequisite
Prerequisite details
Overview ................................................................................................................ 6
IPS .......................................................................................................................... 6
Cyberoam IPS ........................................................................................................ 8
Create IPS Policy ............................................................................................................. 9
Enable/Disable Category................................................................................................ 11
Signature Configuration.................................................................................................. 12
Update IPS policy........................................................................................................... 14
Delete IPS policy ............................................................................................................ 15
Search IPS Signature ..................................................................................................... 16
Create Custom Signature ............................................................................................... 17
Update Custom Signature .............................................................................................. 19
Delete Custom Signature ............................................................................................... 21
Custom Signature syntax ............................................................................................... 22
Monitoring IPS ................................................................................................................ 27
Manage IPS.................................................................................................................... 28
Overview
Welcome to Cyberoams IPS Implementation guide.
Cyberoam is an Identity-based UTM Appliance. Cyberoams solution is purpose-built to meet the
security needs of corporates, government organizations, and educational institutions.
Cyberoams perfect blend of best-of-breed solutions includes user based Firewall, Content filtering,
Anti Virus, Anti Spam, Intrusion Detection and Prevention (IPS), and VPN.
Cyberoam provides increased LAN security by providing separate port for connecting to the
publicly accessible servers like Web server, Mail server, FTP server etc. hosted in DMZ which are
visible the external world and still have firewall protection.
Cyberoam is a real time intrusion detection and prevention system that protects your network from
known and unknown attacks by worms and viruses, hackers and other internet risks.
Cyberoam appliance at the perimeter of your network analyzes all traffic and prevents attacks from
reaching your network. Whether it is a worm, a suspicious web request, a hacker targeting your
mail server or any other attack - it simply does not get through.
IPS module is an subscription module, which needs to be subscribed before use.
From version 9.5.8, Cyberoams Intrusion Detection & Prevention (IDP) feature has been
renamed as Cyberoam Intrusion Prevention System (IPS) to better reflect the
comprehensive capabilities of addressing intrusions. The change in name is a step forward
to communicate our robust intrusion prevention capabilities in an industry-standard
language.
To reflect the change, Web Admin Console menus, submenus and screens are also
replaced with "IPS". Please read IDP as IPS in the screen shots and images included in
the guide.
IPS
An IPS system is a type of security management system that gathers and analyzes information
from a network to identify possible security breaches, which include both intrusions - attacks from
outside the organization and misuse - attacks from within the organization.
IPS detects and/or prevents malicious activity such as denial of service attacks, port-scans or even
attempts to crack into computers by monitoring network traffic.
To detect such activity, IPSs use Signatures. Whenever the matching traffic pattern to Signature is
found, IPS triggers the alarm and blocks the traffic in reaching its destination.
Standard IPS allows defining a global policy that can be applied to source-destination
networks/hosts/ports combination. This global policy can be modified or tuned as per the
requirement but cannot be tailored per network or per host.
As global policy is a general policy for all, standard IPSs generate high amount of false positives
and this makes it difficult to pinpoint the host generating malicious traffic or vice verse.
Fine tuning global policy means disabling set of signatures for all the networks/hosts. However,
this may not be a fit-for-all policy, hence might reduce false positives from one network while
increase from another and may not even detect certain obvious malicious activity.
Cyberoam IPS
Cyberoam IPS also uses Signatures to identify the malicious activity on the network but instead of
providing only one policy (global) for managing multiple networks/hosts, allows to tailor the policy
per network/host i.e. allows to defining multiple policies for managing multiple networks/hosts.
Cyberoam IPS consists of a signature engine with a predefined database of signatures. Predefined signatures are not editable.
As per your network requirements, Cyberoam allows you to define multiple policies instead of one
global policy, to decrease packet latency and reduce false positives.
Policy allows you to view Cyberoam predefined signatures and customize the intrusion prevention
configuration at the category as well as individual signature level. Categories are signatures
grouped together based on the application and protocol vulnerabilities.
Each IPS policy contains a set of signatures that the Cyberoam searches for, and log and block
and allows to:
Enable or disable category from IPS protection
Enable or disable individual signature in a category to tailor IPS protection based on your
network environment
Define the action to be taken when the matching traffic pattern is found. Cyberoam can either
detect or drop the connection. In either of the case, Cyberoam generates the log and alerts
the Network Administrator.
To enable the intrusion detection and prevention functionality, apply the policy using firewall rule.
You can create rule to apply
single policy for all the user/networks
different policies for different users/networks or hosts
As firewall rules control all traffic passing through the Cyberoam and decides whether to allow or
drop the connection, IPS policy will be applied to only that traffic/packet which firewall passes.
Screen Elements
Create IPS policy
Name
Policy Description
Create button
Description
Specify policy name. Choose a name that best describes the policy
Specify full description of the policy
Creates policy. On successful creation of policy, define what action
is to be taken when traffic matches with any of the signatures.
By default, all the categories are enabled but individual signatures
within the category are set to Detect or Drop mode.
Cancel button
10
Enable/Disable Category
Select IPS Policy Manage to view the list of policies created
Click the policy for which you want to enable/disable category
Click Edit mark
Green check mark
Red Cross
Screen Elements
Description
Save button
Cancel button
11
Signature Configuration
Select IPS Policy Manage to view the list of policies created
Click the policy for which you want to configure signature
next to the Category name for which the Signature is to be configured. It displays the list
Click
of signatures. It displays the list of signatures included in the category and what action Cyberoam
will take if the signature is identified.
Click Signature Name to view the details of the Signature
Green check mark indicates that the Signature is enabled
Red Cross indicates that the Signature is disabled
Click Edit mark against the Signature to be configured to configure the signature
Screen Elements
Configure Signature
Signature
Policy
Enabled
Description
Displays Signature name
Displays Policy name
To perform Intrusion prevention and detection i.e. to take action if
signature is detected, you need to enable Signature.
Select ON to include the Signature for detection and prevention
Select OFF to exclude the Signature from detection and prevention
process
12
IPS mode
(Only if Enabled is
ON)
Set the IPS mode (detect and drop) for the signature to suit your
needs.
Drop mode
If the matching traffic pattern is detected, Cyberoam logs the
details, gives the alert to the Administrator and drops the packets
that triggered the IPS, resets the connection and prevents the traffic
to reach its destination.
Detect mode
If the matching traffic pattern is detected, Cyberoam logs the details
and gives alert to the Administrator, but does not take any action
against the traffic and the connection proceeds to its intended
destination.
Save button
Cancel button
13
Screen Elements
Edit IPS policy
Name
Policy Description
Description
Displays policy name
Displays full description of the policy, modify if required.
Displays list enabled and disabled Categories for the policy
Refer to Enable/Disable Category for details. If the category is disabled,
it will not be included in prevention and detection of Intrusions.
next to the Category name for which the Signature is to be
Click
configured. It displays the list of signatures in the Category.
Save button
Cancel button
14
Screen Elements
Description
Del
Select All
Delete button
15
16
17
Screen Elements
Description
Custom Signature
Custom Signature
Name
Protocol
Custom Rule
Severity
Format: Keyword:value;
E.g. content:USER JOHN;
If traffic with the content USER JOHN is detected, action defined in
the policy will be taken.
Specify severity level of the signature. Severity levels can be: Severity
level can be Warning, Minor, Moderate, Major, or Critical
Note
Custom signatures are an advanced feature that required through Networking knowledge and
previous experience creating intrusion detection signatures.
18
Screen Elements
Custom Signature
Custom Signature
Name
Protocol
Custom Rule
Description
Displays signature name, modify if required
Displays protocol for which signature is created, modify if required
Displays signature, modify if required
19
Severity
20
Screen Elements
Description
Del
Select All
21
Keyword
Value
Usage
srcaddr/dst
addr
srcport/dst
port
content
<ipaddress>;
<Number>;
nocase
NULL
Can
be
used with
content
keyword
only
rawbytes
NULL
<number>;
e.g. depth:5;
<number>;
Can
be
used with
content
keyword
only
depth
Can
be
used with
content
keyword
only
offset
Can
be
used with
content
keyword
only
distance
e.g. content:cgibin/phf;offset:4;depth:20;
Can
be
used with
content
keyword
only
within
For example
Can
be
used with
content
keyword
only
For example
<number>;
content :"ABC";content:"DEF";
distance:1;
<number>;
content:"ABC";content:"DEF";within:10;
22
uricontent
uricontent:<content string>;
isdataat
For example
uricontent:"%3F";
<value> [,relative];
pcre
For example
content:"PASS";isdataat:50,relative;
pcre:[!]"(/<regex>/|m/<regex>/)[ismxAE
GRUB]";
For example
pcre:"/BLAH/i";
byte_test
23
byte_jump
<bytes_to_convert>, <offset>
[,relative] [,multiplier <multiplier value>]
[,big]
[,little][,string]
[,hex] [,dec] [,oct]
[,align] [,from_beginning];
24
ttl
tos
<number>;
><number>;
<<number>;
<number>;
id
<number>;
ipopts
fragoffset
<number>;
fragbits
[+*!]<[MDR]>;
dsize
flags
[!|*|+]<FSRPAU120>[,<FSRP
AU120>];
25
For example
Flags:SF,12
flow
to_client|to_server|from_client
| from_server ];
established;
bi_direction;
[no_stream|only_stream];
seq
<number>;
ack
<number>;
window
<number>;
itype
icode
icmp_id
icmp_seq
[<|>]<number>[<>number];
[<|>]<number>[<>number];
<number>;
<number>;
rpc
<application number>,
[<version number>|*],
[<procedure number>|*>;
ip_proto
<number>;
[!]<number>;
><number>;
<<number>;
NULL
samip
26
Monitoring IPS
Once the policies and rules are in place, IPS examines all incoming and outgoing packets, looking
for matching signatures. All the detected signatures are logged and identified as IPS alerts.
Administrator can view the most recent alerts (if any) from the Dashboard.
Alert displays date and time of intrusion, IP address of source and destination of the intrusion,
signature name and the severity of the intrusion.
Note
To access Dashboard,
press F10 from any of the Cyberoam screens OR
press F2 for Home page and click Dashboard
27
Manage IPS
Select IPS Manage IPS to open the page to display the status of the IPS engine.
Click Start to start the IPS engine. If you have logged on to the Cyberoam for the first time after
IPS module is registered, the status will be Stopped and you will need to start the IPS engine.
Page also displays the version number and release date of IPS engine used along with the update
information like date of last attempt for updating IPS engine and whether the update was
successful or not.
IPS Engine is updated automatically.
IPS signatures database is updated automatically once in a day.
28