Solida systems SL-2000 User Manual

Security appliances
Table of Contents

Advertisement

Quick Links

USER MANUAL
SL-2000 / SL-4000 / SL-6000 Security Appliances
Version 2.1
October 2017
WWW.SOLIDASYSTEMS.COM

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SL-2000 and is the answer not in the manual?

Questions and answers

Summary of Contents for Solida systems SL-2000

  • Page 1 USER MANUAL SL-2000 / SL-4000 / SL-6000 Security Appliances Version 2.1 October 2017 WWW.SOLIDASYSTEMS.COM...
  • Page 2: Table Of Contents

    Table of Contents 1. Introduction ............................ 4 1.1 Reputation Based Detection and Prevention .................. 4 1.2 Intrusion Detection and Prevention .................... 4 1.3 Monitoring and Logging .......................... 4 2. Hardware Installation ........................ 5 2.1 Physical Installation .......................... 5 2.2 Port Location .............................. 6 2.3 Management Port ............................ 7 2.4 Required Open Network Ports ...................... 8 Threat Intelligence Updates ............................ 8 Solida Monitor ................................... 8 Solida Multi .................................. 9 Solida Notify and Email Notifications ........................ 9 2.5 Powering On The Appliance ........................ 9 2.6 Powering Off The Appliance .
  • Page 3 9.2.3 Critical severity (colored red in the GUI) ....................27 9.3 Source and Destination IP Addresses ..................... 27 10. Responding To Critical Events ....................28 11. Remote Monitoring ........................29 11.1 Multi Appliance Remote Monitoring ..................... 29 11.2 Mobile Phone Application Remote Monitoring ................. 30 11.3 Netflow Logging ............................ 30 11.3 Remote Logging To Syslog Server ....................30 12. Single Appliance High Availability ..................32 12.1 Configuration ............................32 13. Multi Appliance High Availability ..................33 13.1. Master Slave Configuration ......................33 14. Email Notification ........................34 14.1 Setting Up Email Notification ......................34 14.1.1 Email Notification ............................34 14.1.2 Instant Critical ..............................34 14.1.3 Current Email Address ..........................34 14.1.4 New Email Address ............................35 14.2 Event Notification Emails ........................35 15. Data Logging ..........................36 15.1 Packet Logging ............................36 15.2 Dropped Packet Logging ........................36 15.3 Event Logging .
  • Page 4: Introduction

    1. Introduction This manual contains instructions for how to configure and use the following Solida Systems network security appliances: SL-2000 Dual 1 Gigabit Ethernet ports SL-4000 Quad 1 Gigabit Ethernet ports SL-6000 Dual 10 Gigabit Ethernet ports The SL-2000, SL-4000 and SL-6000 appliances represent the latest in network security technology. They combine functionality that would otherwise require several different devices. These intrusion detection and prevention systems offer reputation based detection, intrusion detection and prevention, network traffic monitoring and packet logging. The next sections will describe what some of these features mean for your network. 1.1 Reputation Based Detection and Prevention Solida Systems provides reputational threat intelligence in the form of a data feed hosted in the cloud. This threat feed is updated hourly and includes malicious URLs, domain names and IP addresses. These are harvested from various international threat intelligence sources. The threat feed includes information about current threats such as ransomware, phishing sites, trojans and many other threat categories. 1.2 Intrusion Detection and Prevention Intrusion detection and prevention is implemented through a rule engine and deep packet inspection (DPI). Solida Systems provides pre-defined rules and rule sets through the cloud based threat feed. A simple and intuitive configuration page is provided for users interested in writing custom rules. 1.3 Monitoring and Logging Tools are available to facilitate monitoring and evidence collection. Logs and evidence files are written in PCAP format and are compatible with most industry standard analysis tools. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 5: Hardware Installation

    2. Hardware Installation 2.1 Physical Installation For the appliance to work as designed it must be installed immediately after the Internet router and in front of any firewall. It is very important that the appliance is installed IN FRONT of any firewall. This way the appliance will be able to see all incoming and outgoing packets on the Internet and gain full exposure to the threat environment.
  • Page 6: Port Location

    2.2 Port Location The appliances include two different sets of Ethernet ports. One set is located on the server motherboard. The other set on a high-speed network interface adapter. Management Port High-speed ports Port1 Port0 Figure 2.1 SL-2000 back view. Management Port High-speed ports Port3 Port2 Port1 Port0 Figure 2.2 SL-4000 back view. Management Port High-speed ports Port0 Port1 Figure 2.3 SL-6000 back view. Located in the upper row of the Ethernet ports are the ports used for high-speed network traffic. The bottom left Ethernet port on the SL-2000 and SL-4000 is used for device management. The bottom right port is currently unused. The bottom left port on the SL-6000...
  • Page 7: Management Port

    The high-speed Ethernet ports are named Port 0 and Port 1 on the SL-2000 and SL-6000 and Port 0 to Port 3 on the SL-4000. The default factory configuration for the high-speed Ethernet ports is: Port 0 WAN side Internet connected router Port 1 LAN side Port 2 Unused (for the SL-4000 only) Port 3 Unused (for the SL-4000 only) The default factory settings can be changed through the web configuration utility that is accessed through a browser. The most common setup is using the Solida appliance as an endpoint device. This allows for all incoming and outgoing data packets to be inspected. This offers the best protection against any type of malicious traffic For larger networks it might be necessary to protect multiple sections of the network with dedicated security appliances. For those installations make sure that the WAN port is connected upwards (towards the Internet router side). Conversely make sure the LAN side is connected to the sub-partitioned network. 2.3 Management Port The management port is used for two purposes: Accessing the configuration utility and the monitoring utility is done through this port. The management port is also used for updating the threat list data and for communicating with other appliances in a high availability configuration. It is very important that the management port always has Internet access. This is typically accomplished by connecting the management port to a switch in the LAN side of the network being protected. The default IP address for the management port is 192.168.1.250. Please refer to the following chapter on how to change this IP address. The management port IP settings configuration window includes a button labeled “Test Connection”. Pressing this button will generate a ping to an IP address on the Internet. If this ping receives a response it can be assumed the management port has proper access to the Internet. If no response to this ping is detected, the management port does not have the required access to the Internet. In this case it will be necessary to troubleshoot the installation and retry this test until a proper connection is made. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 8: Required Open Network Ports

    2.4 Required Open Network Ports The appliance needs to be able to connect with Solida Systems cloud server to retrieve threat intelligence updates and occasional software updates. It is very important that this connection is working correctly. Without a proper connection, the appliance will still function, but the threat intelligence will not be updated and the remote monitoring tools will not be functional. The domain name for this cloud server is cloudhost.solidasystems.com. The server is set up with a fixed IP address. This IP address can be obtained by using nslookup (windows) or the dig tool (Linux), if it needs to be provided to a firewall. In case a firewall is deployed in the network, it is not required to open up any ports for incoming traffic from the Internet. All communication is initiated from within the appliance. The only exception to this would be if the user elects to access the GUI applications from outside the network over the Internet without the use of a VPN connection. This is possible but not recommended. When several ports are opened up in the firewall it might result in a security weakness. The “reputation threat list updates” configuration window includes a button labeled “Test Connection”. When pressing this button, the appliance will try to connect with Solida’s cloud server the exact same way it would do for an update of the threat intelligence. If this test fails, the installation must be checked to identify the cause of the failure. This test must complete successfully for the appliance to be able to download the threat intelligence data and function as designed. Threat Intelligence Updates The threat intelligence updates are performed as follows: If port 22 (SSH port) is opened in the network for outgoing traffic towards the Internet, all threat intelligence data will be downloaded over this port. If outgoing traffic over port 22 is blocked by a firewall, then the appliance will default to using port 443 (HTTPS) port for its threat intelligence download. It is VERY IMPORTANT that one of these two paths are opened. Otherwise the appliance will not be able to perform its hourly threat feed updates. Solida Monitor Solida Monitor GUI application is using port 443 for its communication with the appliance. It supports an option that performs a WhoIs lookup of a selected IP address. These WhoIs accesses are initiated from within the appliance and take place over port 43. Port 43 must be opened for outgoing requests to the Internet for the WhoIs feature to work properly. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 9: Solida Multi

    Solida Multi The multi appliance remote monitoring tool, Solida Multi, also requires either port 22 or port 443 to be opened for outgoing communication towards the Internet. The appliance will also use one of these ports when it pushes event data and log files to the server that is hosting Solida Multi. Solida Notify and Email Notifications The mobile phone application, Solida Notify, uses either outgoing port 22 or port 443 for its event data push needs. If email notification is enabled, this communication also takes place on either outgoing port 22 or port 443 towards the Internet. 2.5 Powering On The Appliance The appliance is powered on by pushing the button at the front of the appliance. To do this it is necessary to first remove the security bezel. Once powered on it will take up to 4 minutes or more for the appliance to become fully operational. 2.6 Powering Off The Appliance To power off the appliance, remove the security bezel and push the power button once. This will initiate the shut-down procedure inside the appliance. It will take about 30 seconds for the appliance to properly shut itself down. It is not advised to pull out the power cord as a way to shut down an appliance. This could result in log data loss. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 10: Accessing The Web Applications

    3. Accessing The Web Applications The appliances contain two different software applications. One application is used for system configuration and another for monitoring. Both applications are password protected to prevent unauthorized use. These applications are both accessed through the appliance management port. Both applications are accessed over HTTPS. This makes it secure in case a user wants to monitor an application from outside the LAN or over the Internet. 3.1 Management Ethernet Port To access the configuration and monitoring applications, connect the management port to a switch on the LAN side of the network. Open a browser on a computer connected to the same network. Enter the MGNT port IP address in the browser as follows: https://192.168.1.250/config for the configuration application https://192.168.1.250 for the monitoring application If everything is configured correctly, a login page will appear in the browser window. Enter the supplied user name and password to log in. Some networks might use another IP address range other than 192.168.x.x, for example 10.32.x.x. If this is the case it will be required to change the management port's IP address before the appliance is connected to the LAN side switch. To change the default IP address, directly connect a computer with the appliance through an Ethernet cable. Make sure the computer's IP address is set manually since direct connecting bypasses any DHCP server. Start the configuration utility by entering the default IP address into the browser followed by /config (https://192.168.1.250/config). Log into the application and then navigate to the page named “Configuration”. Locate the box labeled “Change Management Port IP Settings”. Change the IP address, netmask and gateway fields to match the ones used in the network. In some networks it might be required to use a local corporate DNS server rather than a public one. In these cases, enter the IP address for the local DNS server in the DNS server field. The appliance will use this IP address for resolving the domain for the cloud based threat intelligence data feed. Once the “Activate” button is pressed, the appliance will be reconfigured with this new address information. Note that it will take up to a minute for this reconfiguration to complete. A countdown timer pop-up window will appear and show a 60 second countdown after a change is activated. An example is shown below: SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 11: Managing Users

    Figure 3.1 Change management port IP setting box. Once the configuration of the new IP addresses is complete, remove the directly connected computer and connect the appliance to the LAN side switch. The configuration window includes a button labeled “Test Connection”. Pressing this button will generate a ping to an IP address on the Internet. If this ping receives a response it can be assumed the management port has proper access to the Internet. If no response to this ping is detected, the management port does not have the required access to the Internet. In this case it will be necessary to troubleshoot the installation and retry this test until a proper connection is made. 3.2 Managing Users The first time the user logs into either Web application, a default factory username and password will be used. After the first login it is recommended to create new users that will be allowed to log in to the applications. Creating and managing the user credentials is done through the configuration application. First navigate to the “Configuration” page and then locate the box named “Manage Users”.. Figure 3.2 Add new user box. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 12 To create a new user, press the button labeled “Add User” and enter the new credentials in the indicated fields. The drop down menu at the top of the “Add New User” window contains two options: “Monitoring Only” and “Configuration & Monitoring”. Select “Monitoring Only” for users that are only allowed to log into the monitoring application. The monitoring application does not allow for changing any configuration parameters or modifying the detection rules. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 13: Reputation Based Detection

    4. Reputation Based Detection 4.1 Overview The most basic form of intrusion and malware detection goes under the category of reputation- based detection. This type of detection is performed by attempting to identify communication with unfriendly hosts on the Internet. These are ones that are believed to be malicious, based upon a reputation for previous or ongoing malicious activities. Reputation based detection is performed by comparing requested IP addresses or domain names, against a reputation list of hosts with negative reputations. Solida appliances allow for downloading lists based on domain names and IP addresses. The data in these lists are processed and stored in hash tables, so that fast lookups can be performed against them in real time. These lists are automatically downloaded from a cloud-based service provided by Solida Systems. Both DNS queries and HTTP requests are monitored and compared against the reputation list. If a hit is detected, the request can be either flagged as suspicious or completely dropped. It is important to recognize that a hit in a reputation blacklist doesn’t always mean a host is malicious. Hosts that were previously infected might have been cleaned up, and the maintainers of the reputation lists might not yet have registered this. 4.2 DGA List The most important data in the threat feed is the list of Domain Generation Algorithm (DGA) generated domain names. Many ransomware and other serious malware, use DGAs to generate a large number of domain names. These domain names are used to try and connect with their command and control servers (C2). The large number of auto generated domain names makes it difficult to track and shut down these C2 servers. Most DGA engines use time as the deciding factor for what domain name to generate. Using this method, a hacker will be able to predict what domain names their malware will generate, so they can be ready when the malware attempts to connect to it at any given time. When the hacker decides it is time to provide C2 access to his malware, the hacker simply registers a domain name with a commercial DNS service, for a domain that the malware DGA will generate in the near future. When the malware tries this specific DGA generated domain, a connection will suddenly be made. At that point the malware knows it has found its C2 server. The Solida threat list contains a very large amount of DGA domain names. These domain names are generated from actual DGA engines, harvested from malwares collected from the Internet. These DGA engines are running in a server, generating their time based domain names. This SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 14: List Updates

    way it is possible to know in advance what domain names similar malwares will generate in the wild at any given point in time. The threat feed contains on average 750,000 domain names, covering a time window of UTC – 48 hours to UTC + 24 hours. This gives a 72-hour sliding window that covers all time zones worldwide. These domain names are written to a blacklist in the security appliances. All outgoing DNS queries and URLs are verified against this list and dropped if a match is found. 4.3 List Updates The reputation lists are constantly being updated through a cloud based threat feed offered by Solida. The appliance automatically connects with this cloud service once every hour, to download new updated versions of the lists. This guarantees that the appliance always contains information about the latest threats seen in the wild. To monitor the list update process and the list sizes, start the configuration application and navigate to “Threat Intelligence – Threat Lists”. A similar page is available at the same location in the monitoring application. The page looks as follows: Figure 4.1 Threat lists overview. In the top field named “Reputation List Control Center” the following information is provided: Next cloud update – Shows the time at which the next list update will be performed. DGA Ransomware Entries – The number of DGA generated domain names in this list. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 15 Domain Reputation Entries – The number of domain names in this list. IP Reputation Entries – The number of IP addresses (both IPv4 and IPv6) in this list. TOR endpoints – The number of Tor endpoints provided in this list is included. The above threat lists are not user modifiable. The window titled “My Domain Name Blacklist Entries” contains a button called Upload File. This button allows for uploading user created lists to the blacklist engine. Currently it is only possible to upload a file containing a VoIP style telephone number, which is being used for the VoIP caller-blocking feature. Please refer to the appendix in this document for further information about VoIP caller blocking. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 16: Reputation Threat List Updates

    5. Reputation Threat List Updates The Solida appliances obtain their threat information by downloading proprietary threat lists from a cloud-based server. There are three categories of lists, which are domain reputation blacklist, IP reputation blacklist and Tor exit node list. The factory default is to allow for all these lists to be included in the cloud updates. Changing this factory default should only be done in very special cases. Disabling a list results in the possibility of malicious packets being able to penetrate the network and cause escalating damage. To change the factory default setting, start the configuration utility and navigate to “Configuration”. Locate the block titled “Reputation Threat List Updates”. It will look as shown in the picture below. Figure 5.1 Reputation threat list updates window. The following settings are available: Domain Reputation Blacklist Enabled – update once per hour (default) Disabled IP Reputation Blacklist Enabled – update once per hour (default) Disabled Tor Exit Nodes Enabled – update once per hour (default) Disabled The “reputation threat list” updates configuration window includes a button labeled “Test Connection”. When pressing this button, the appliance will try to connect with Solida’s cloud server the exact same way it would do for an update of the threat intelligence. If this test fails, the installation must be checked to identify the cause of the failure. This test must complete successfully for the appliance to be able to download the threat intelligence data and function as designed. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 17: About Tor Exit Nodes

    5.1 About Tor Exit Nodes The Tor exit nodes list contains IP addresses of known Tor network end point IP addresses. It is common for hackers to use Tor exit nodes for their attack traffic to mask its origin. In some rare cases, the use of the Tor network is valid. Examples would be in countries that censor their citizens' Internet traffic. In those circumstances the Tor network can be used to circumvent such censorship. Then it is recommended to disable the inclusion of Tor endpoints in the IP blacklist. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 18: Deep Packet Inspection Configuration

    6. Deep Packet Inspection Configuration Deep packet inspection (DPI) refers to the process that inspects all incoming and outgoing network packets. The factory default setting applies DPI on all packets, including incoming and outgoing packets. Only under very special circumstances should the factory default be changed. Changing the factory default will prohibit the appliance from detecting all possible malwares and other threats. To change the factory default setting, start the configuration utility and navigate to “Configuration”. Locate the block titled “Deep Packet Inspection Configuration”. It will look as shown in the picture below. Figure 6.1 Deep packet inspection configuration window. The following settings are available: Packets from the Internet Inspect all packets (Factory default) Disable Inspection Packets from the LAN Inspect all packets (Factory default) Disable Inspection Malformed Packets Drop all malformed packets (Factory default) Do not drop malformed packets Hackers sometimes intentionally generate network packets that are malformed. The reason might be to try and confuse, or even crash the system stacks in the computers connected to the network. Letting the appliances drop these packets guarantees that they will not cause any damage in the protected LAN. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 19: User Black And White Listing

    7. User Black and White Listing 7.1 Overview The configuration application allows for a user to enter additional blacklist and whitelist IP addresses and domain names. These addresses will be appended to the internal threat lists and all network packets will be checked against these user-entered addresses. NOTE! NEVER whitelist an IP address for a Domain Name Server (DNS server). Doing so will cause the blacklist engine to skip checking DNS lookup packets. Checking DNS queries against the blacklists is an essential part of the scanning process. Bypassing this will allow malicious packets to flow freely in and out of the appliance without being noticed or blocked. 7.2 Blacklisting Domain Names The user can enter any domain name into the user managed blacklist entry table. The picture below shows three different domain names having been blacklisted by a user. Figure 7.1 User managed black and white lists. To blacklist a domain, press the button labeled “+ Add Domain Name”. Enter the domain name and select the action and severity level. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 20: Blacklisting Ip Addresses

    Testing that the new entry is blacklisted can be done by entering the domain in a web browser and confirming that an event is generated for the domain. 7.3 Blacklisting IP Addresses IP addresses can be entered into an IP address blacklist in a similar way a domain name is blacklisted. To add an IP address to the user blacklist, press the button labeled “+ Add IP Address”. Enter the IP address, IPv4 or IPv6. Select the desired action and severity level and press the “Save” button. The new IP address will be added to the user blacklist. 7.4 Whitelisting IP Addresses It is possible to add an IP address to a whitelist. If this is done, the security engine will ignore all packets containing this IP address. NOTE! NEVER whitelist an IP address for a Domain Name Server (DNS server). Doing so will cause the blacklist engine to skip checking DNS lookup packets. Checking DNS queries against the blacklists is an essential part of the scanning process. Bypassing this will allow malicious packets to flow freely in and out of the appliance without being noticed or blocked. Whitelisting of IP addresses should only be done in very specific situations. Solida Systems strongly suggests never whitelisting any IP addresses. The unwanted side effect might be that the LAN side is left unprotected or only performs a limited amount of protection. 7.5 Uploading a Blacklist File The window titled “My Domain Name Blacklist Entries” contains a button called Upload File. This button allows for uploading user created lists to the blacklist engine. Currently it is only possible to upload a file containing a VoIP style telephone number, which is being used for the VoIP caller-blocking feature. Please refer to the appendix in this document for further information about VoIP caller blocking. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 21: Intrusion Detection And Prevention Rules

    8. Intrusion Detection and Prevention Rules 8.1 Rule Overview To protect against intrusion attacks, Solida appliances rely on a rule engine that can perform deep packet inspection (DPI) of Ethernet packets flowing through the appliance. The DPI engine can inspect all packets and look for signatures and any combination of data patterns, such as port scans, OS finger printing and vulnerability scans. The DPI engine is controlled by detection rules. These rules instruct the DPI engine what to look for in the packets and what action to take if a pattern match is detected. Solida provides a set of system rules that includes protection from many types of penetration attempts. An expert user can also create custom rules. Writing custom rules requires detailed knowledge of rule writing, and the different types of packets flowing over a network. Such custom rules can be created using the rule editor in the Solida configuration application. In most cases it is recommended to use the system rules provided by Solida through the threat feed. 8.2 Rule List Detection rules can be created and edited trough the configuration application. Start the application and navigate to “Rule List”. This will show a list over all available rules in the appliance. Figure 8.1 Rule list in the configuration utility. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 22: Export Rule File

    The column named “Category” shows what rules are Solida system rules and which rules have been created by the user. 8.3 Export Rule File (This feature is for advanced users only) The button labeled “Export rule file” allows for exporting a text file containing all the rules in the appliance. This text file is written in JSON format and can be opened and reviewed in a text editor. 8.4 Import Rule File (This feature is for advanced users only) The button labeled “Import rule file” allows for importing a JSON formatted text file containing one or more rules. Note that it is not possible to import system rules. System rules are those rules with the category field showing “system” and the rule id in the 1xxyyyzzz range. If system rules are part of the imported rules they will be overwritten by the current system rules received by the regular threat intelligence downloads from the cloud host. 8.5 Rule Sets A rule set is a collection of rules. Multiple rule sets can be created, each containing a different set of rules. The appliance can be activated with one single rule set. Once a rule set has been activated, the appliance will start its packet scanning using all the rules included in the rule set. To display and create rule sets, start the configuration utility and navigate to “Rule Sets”. This will show a list of all available rule sets. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 23: Activating A Rule Set

    Figure 8.2 Rule set list in the GUI configuration utility. 8.6 Activating a Rule Set To activate a rule set, select the rule set by clicking on its row in the GUI. Then click the “Activate Rule Set” button. This will perform an implicit sanity check of all the included rules, and then upload these rules to the appliance. Once this activation completes, the appliance will start using the new rules immediately. 8.7 Operating Mode When trialing a new rule set, it is possible to set the appliance to “monitor mode”. The rule set page contains a drop down menu where the desired operating mode can be selected. In monitor mode all network packets are scanned using the rules as well as the reputation detection lists, but no packets will be dropped. Alerts will still be generated the same way as in normal operation mode. This allows the user to check a new rule set to make sure it behaves as expected. Once the user is satisfied with the new rule set, set the operating mode back to “Normal Mode”. 8.8 Creating Custom Rules It is beyond this manual to explain in detail how to write custom rules. Please refer to the many SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 24: Rule Id

    tutorials and documentation available on the Internet on how to write detection rules. A rule is created using the configuration application. Start the application and navigate to the “Rule List” page. This page will display a list of all rules currently available in the appliance. At the top left side of this page a blue button labeled “+ Add rule” is located. To create a new custom rule, simply click this button. A new window will pop up called “Create Custom Rule”. Figure 8.3 Create a custom rule pop-up window. This window contains five tabs. Each tab contains different optional rule parameters. These parameters can be filled in to define the new rules behavior. For a detailed description of each rule option, please press the help button located in the lower left corner of the pop-up window. 8.9 Rule Id The most important parameter of each rule is the “Rule Id”. Each rule must have a unique rule id that identifies the rule. The rule id consists of 9 numbers. It is common practice to group rules into categories. As an example, the first three numbers identify the general type of rule. For example UDP rules, TCP rules, ICMP rules. The next three digits identify the type of threat the rule concerns. The last three digits could be a general identifier that is incremented by one for each rule in the category. A rule id starting with a 1, for example 100001002, is reserved for system rules. All system rules have a rule id starting with a 1. It is not possible to make modifications to the system rules. They can however be copied and turned into a new custom rule. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 25: Events And Event Severity

    9. Events and Event Severity 9.1 Event Overview Each time a network packet registers a hit with a blacklist entry or a detection rule, an “event” is generated. An event contains information that describes what caused the event to be generated. The IP address of the offending packet is included, as well as a short description of the meaning of the event and a timestamp. Events are stored in a database in the appliance to allow for tracking and statistics gathering. Events are also written to log files that can easily be downloaded from the appliance through the GUI. These event files can then be correlated with other downloadable packet log files, so that a security analyst can investigate the root cause of the event. Events can be monitored using the built-in monitoring application. Figure 9.1 Event summary view in the GUI monitoring application. Located in the right side of the Packet Events bar is a drop down list. This list shows available event files in the appliance. Events are written into files that are rotated to avoid them growing too large. Event files are rotated on a daily basis (at midnight) or once an event file reaches 10 Mbytes in size. A rotated event file will have a time stamp appended to its file name. An example would look as follows: SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 26: Event Severity

    Figure 9.2 List of event files. In this example, the file named rune14.log is the current active event log file. The remaining files are files that have been rotated. The appended time stamp indicates the time at which the event file was rotated. 9.2 Event Severity Events are grouped into three categories depending on their severity, which are low, medium and critical. Clicking on an event in the table will pop up a new window containing a further explanation of the cause of the event. 9.2.1 Low severity (colored green in the GUI) These events are typically generated by trying to visit known phishing sites, or sites containing various types of malware. The appliance will automatically drop these network packets. This will prevent malware from infecting the protected network. These events require no further action from the user. 9.2.2 Medium severity (colored orange in the GUI) Events with a medium severity rating include known C2 domains, domains with severe drive-by malware, Trojans and more. Network packets destined to these domains will be automatically dropped, in an effort to maintain network integrity. These events require no further action from the user. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 27: Critical Severity (Colored Red In The Gui)

    9.2.3 Critical severity (colored red in the GUI) Critical events will be generated if the appliance detects malicious activities occurring inside the network. This would indicate the network has been compromised. Where malware is already present, it requires user intervention to remove it. Examples of such events are DNS queries generated by a ransomware DGA engine, or malwares trying to connect with a C2 server. All network packets resulting in critical events will be automatically dropped to mitigate further infection to the network. The event includes the source and destination IP addresses of the offending packets, which allows for prompt identification of the infected computer on the network. The user will be required to remove the malware from the infected computer using a suitable removal tool. All events can be viewed using the monitor application included with the appliances. Optionally, emails containing the event count and severity can be automatically generated and sent out. A mobile phone application is also available that allows the user to monitor events in real time. 9.3 Source and Destination IP Addresses Each rule event includes the source and destination IP addresses of the packet that generated the rule hit. Logging these IP addresses allows for a more detailed examination of the source of the threat. The Internet offers many “WhoIs” services where an IP address can be entered for analysis. This information also includes geographical information regarding an IP address. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 28: Responding To Critical Events

    10. Responding To Critical Events A majority of all events will require no further action by the user. These events are marked with a low or medium severity. Critical events require immediate user intervention. Examples of such events are DGA events. They will be generated if ransomware infects a computer in the network. In this case it is extremely important to remove the infected computer from the rest of the network. Some advanced ransomware are capable of propagating through the network and infecting additional computers. The critical events will be listed with the source and destination IP addresses visible. Use the destination IP address from the event and match it with a computer in the LAN that uses this IP address. This is the computer that has become infected. Disconnect this computer from the rest of the network. Once the infected computer has been removed from the network, use Google to search for any available removal tools. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 29: Remote Monitoring

    11. Remote Monitoring All Solida appliances support remote monitoring. There are three categories of remote monitoring supported. The picture below shows the setup options in the Remote Monitoring window. Figure 11.1 Remote Monitoring Window. 11.1 Multi Appliance Remote Monitoring Solida Systems offers a software tool called Solida Multi. This tool can be installed in the cloud or on a physical server in the user's office. Solida Multi allows for the security appliances to connect with it and share security events and log files. For an appliance to connect with a Solida Multi server, enter the domain name (or IP address) of the server followed by a login name and password. Once the monitoring is activated, the appliance will automatically connect with the Solida Multi server and start sharing its security events and log files. The button labeled “Test Connection” will make a connection attempt with the Solida Multi server. Use this test to confirm the appliance is able to connect with Solida Multi. If this test fails, check any firewall setting and make sure it is possible to connect with Solida Multi over port 22 or 443. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 30: Mobile Phone Application Remote Monitoring

    11.2 Mobile Phone Application Remote Monitoring The appliances can be remotely monitored by a mobile phone application called Solida Notify. Two versions are available: one for iPhones and another for Android phones. The Solida Notify application is supported on the following phone models: 1. Apple – iPhone 5, iPhone 5S or later. 2. Android – Most Android based mobile phones. Solida Notify is not supported on Apple’s iPad. The Solida Notify application connects to the cloud server where it downloads security event data. This data is continuously uploaded to the cloud server by the appliance once this feature is enabled. 11.3 Netflow Logging Some of Solida’s appliances have support for Netflow 9. Netflow is a standard that describes how to track packet flow data and how to send this data out to a logging server. The logging server would run software, typically some type of SIEM tool that collects Netflow data from the appliances and presents it in a graphical way. The Netflow collector server expects UDP packets to be passed to it. To enable the Solida appliance to perform Netflow logging, enter the connection information for the collector server and activate the feature. Collector IP address – This is the IP address of the computer that runs the collector software. Collector port – This is the port number to use when sending out the Netflow UDP packets to the collector computer. The default port number to use for Netflow packets is 2055. Flow Format – This selects the version of the Netflow data. Currently only Netflow version 9 is supported. Sensor ID – Multiple appliances can send Netflow data to a single collector. Each one of these appliances must be set up with a unique ID number to allow the collector to differentiate between the appliances. 11.3 Remote Logging To Syslog Server This feature, when activated, will send the appliance syslog file to a syslog server on the SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 31 selected IP address. Any new entries in the syslog file will immediately show up in the syslog server to make sure the two sides are in sync. For more information about this feature, please contact Solida Systems for further information. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 32: Single Appliance High Availability

    12. Single Appliance High Availability Single Appliance High Availability is an option that allows for pairing two Internet connections together as a fault tolerant pair. One Internet connection is considered the primary or master connection. The other Internet connection is a standby, or slave connection. 12.1 Configuration To configure the appliance to operate in this high availability mode, navigate to the Configuration window. This window includes a configuration area named Ethernet Port Configuration. This area looks as follows: Figure 12.1 High Availability Port Configuration. The top pull-down menu labeled Operating Mode contains three options. To enable this HA mode select the option labeled Single LAN/Multiple WAN (HA). The second step is to select the WAN ports that will connect to the two Internet routers. A WAN port is assigned to be either the primary or the secondary WAN port. The primary WAN port will become the master WAN port and will handle all Internet traffic as long as its Internet connection is up and fully functional. Select one port to be Prim.WAN and another port to be Sec.WAN. Select one port to be the single LAN port. At this point the configuration window should look similar to the picture above. Press the Activate button. The appliance will now start operating in this mode. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 33: Multi Appliance High Availability

    13. Multi Appliance High Availability Multi appliance high availability is an option where two security appliances are configured as a fault tolerant pair. One appliance is configured to be the master appliance and the second to be the slave appliance. 13.1. Master Slave Configuration To configure multi appliance high availability, navigate to the window named High Availability. This window will present the following configuration view: Figure 13.1 High availability configuration window. HA Mode - Primary Unit. Handles network traffic in a normal fault free situation. - Backup Unit. Standby unit activated only if the primary unit fails. Pair IP Address - The IP address of the other unit’s management port. Both appliances must be able to communicate with the other appliance management port to determine the status of the unit. HA Poll Freq - How often a unit checks the other unit’s functional status. Three seconds is the default value and should be appropriate for most installs. Activation Delay - Determines the wait period after a power-on until HA is activated. This is needed to avoid incorrect failovers after a system start. Failover Threshold - Number of required consecutive missed heartbeats the master must experience before a failover to the passive device occurs. Failback Threshold - Number of required good heartbeats the secondary appliance must receive before it fails back to normal operation mode. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 34: Email Notification

    14. Email Notification The appliances have support for sending regular emails containing information about the number of events in the system and their severity. This is a useful feature since it will not be required to constantly monitor the appliance through the monitoring application. 14.1 Setting Up Email Notification To set up email notification, login to the configuration application and navigate to Admin – Configuration. Locate the box called “Email Notifications”. The box will look as follows: Figure 14.1 Email notification setup box. 14.1.1 Email Notification This dropdown box contains four options: Disabled - Email notification disabled. Enabled, once per day - Generates one email per day with event information. Enabled, once per 6 hours - Generates four emails per day with event information. Enabled, once per hour - Generates one email per hour with event information. 14.1.2 Instant Critical This option, if enabled, will send out one email each time a critical event is generated. These critical events require user intervention. Therefore it is important that such events are forwarded to the user with minimum delay. 14.1.3 Current Email Address SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 35: New Email Address

    This text box shows the current email address in use, assuming this feature is enabled. This address will be the recipient for the event status emails. 14.1.4 New Email Address Enter a valid email address into this box. This is the new address that will be used to receive these emails. Once the above fields have been filled in, press the “Activate” button. This will activate the new configuration. 14.2 Event Notification Emails The event notification emails are short but contain vital information a user will need. Figure 14.2 Example of an event notification email. The most recent events for the past hour and the past 6 hours are shown separately to give a clearer overview of the current status. Critical events require immediate user intervention and are therefore marked clearly as critical for easy identification. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 36: Data Logging

    15. Data Logging The appliances have a wide selection of logging options. The factory default is to log all rule events as well as all dropped network packets but the user has the option to enable further logging, including full packet capture. Network packet data is written to the log files in the industry standard PCAP format. This makes it possible to use tools such as Wireshark to open these files, and perform analysis on the packet content. All log files can be downloaded by clicking on them in the Log File management window. 15.1 Packet Logging Packet logging will log every single packet passing through the appliance. This mode is typically only used during troubleshooting of the network. The resulting log files can become very large so it is important to select an appropriate rollover option to avoid filling up the disk space in the appliance. Packet logging should be disabled during normal usage. The configuration window for packet logging looks as follows: Figure 15.1 Packet Logging Configuration Window 15.2 Dropped Packet Logging This option will log all network packets that are dropped by the appliance. Packets will be dropped by the rule engine as well as by the reputation detection engine. This logging option is enabled by default. These log files can be used during forensic analysis to determine the exact reason a packet was dropped. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 37: Event Logging

    Figure 15.2 Dropped Packets Logging 15.3 Event Logging Event logging is enabled by default and it is strongly recommended to always keep it enabled. The resulting log files contain information about all events occurring in the appliance. The default settings are as shown in the picture below: Figure 15.3 Event logging configuration window. 15.4 IP Address Logging This option is currently not supported. 15.5 HTTP Logging This option allows for logging all domain names that are being accessed through browsers in the network. Each domain entry is tagged with a time stamp and the IP address that requested the domain name. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 38: Downloading Log Files

    15.6 Downloading Log Files Log files can be downloaded using either the configuration application or the monitoring application. To download a log file, navigate to the “Log File Management” menu option. This will open up a file management interface as shown in the picture below: Figure 15.4 Log file management window. Each category of log file will be stored in its own dedicated directory. Open the directory containing the desired log file to download. Double click on the log file. A popup window will ask for a final confirmation before the file download starts. 15.7 Deleting Log Files The log files can easily be deleted if needed. Navigate into a log file directory. To delete a file within the directory, right-click on the file and select ‘Delete’. The file will be permanently deleted from the appliance. It is also possible to rename a log file. Right-click on the file to rename it. Even though possible, never delete a log file directory. Please note that some log files become very large. The appliance has limited space for log files, therefore always download important log files and save them outside the appliance. The appliance performs log rotation, which means older log files will be deleted if needed by the appliance. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 39: System Software Updates

    16. System Software Updates Solida Systems will occasionally release updated system software for the appliances. These releases might contain bug fixes as well as new features. New releases are published to the cloud for distribution. The appliances will automatically check with the cloud server to see if any new updates are available. The user can decide if the appliance should be updated or not. It is not required to perform any updates, unless it is specifically advised to do so in the features text for the release. To check for a new software release or to perform an update, start the configuration application and navigate to “Software Updates” in the menu side bar. This will present the following window: Figure 16.1 Software update GUI window. The upper System Control Center box contains the following: Firmware version - Displays the currently active internal firmware version number. JSOSD version - Displays the version of the current security OS daemon. The button named “Generate Support Bundle” starts a support feature that collects useful information from the appliance. See the “Support Bundle Generation” chapter for further information regarding this. The lower box titled “Solida Software Versions Available For Updates” contains a list of available software updates. The list will only include versions that are later than the version currently running in the appliance. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 40 To perform an update, simply double click on the row with the desired new version. Please note it will take as long as 5 minutes for a software update to complete. During this time no network traffic will be able to flow through the appliance. After the update has completed, please reset the browser history to guarantee the browser will display the latest version of the web utilities. The button labeled “Upload License File” starts a file upload popup window. This is where a new threat intelligence license file should be uploaded to the appliance. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 41: Support Bundle Generation

    17. Support Bundle Generation A support bundle is a compressed file that contains critical system files and data. A support bundle should only be generated after a request from Solida Systems, or the local distributor. A support bundle is typically only generated if the appliance is having difficulties performing as expected. The files in the support bundle will help a support engineer to determine the cause of a problem. 17.1 Generating a support bundle To generate a support bundle, start the configuration application on the appliance experiencing a problem. Navigate to “Software Updates”. This will display a window that contains a blue button with the text “Generate Support Bundle”. Pressing this button and answering Yes in the confirmation box will start generating a support bundle. Note that it might take up to 5 minutes or more for the bundle generation to complete. 17.2 Downloading a support bundle Once a support bundle has been generated, it will be placed in a directory called “support” in the log file storage area. Figure 17.1 Log File Management window with support directory opened. To download a support bundle file, start the configuration application and navigate to “Log File management”. Then click on the “support” directory icon in the file viewer. This will display all SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 42 Please note it will take up to 5 minutes for a new support bundle to appear in this directory. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 43: Report Generation

    18. Report Generation The Solida Monitor utility includes a tool for generating security reports. A security report is a Microsoft Excel compatible (xlsx) file containing information about the events that has occurred in the appliance over the past 30 days. To generate a report, navigate to Analysis -> Reporting. The following page will be displayed: Figure 18.1 Report generation A report file will be generated when the “Generate Report” button is pressed. Generating a report can take up to several minutes. When done, the report can be downloaded from the “report” directory in the “Log File Management” window. Note! It is recommended the report file is opened and further processed in an original Microsoft Excel application. Use of similar non-Microsoft products such as Libre Office Calc might not render the report correctly. The report is formatted so that it will print in a pleasant and easily readable way SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 44: Appendix A. Voip Caller Blocking

    It is also important that the list does not contain any formatting characters like those used by advanced word processors such as MS Word. Each line in the text file must contain only one phone number, or range of phone numbers. For example: SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 45: System Voip Rules

    Figure A.2 File upload button. Press this button and upload the sip.txt text file. The list will immediately become active, and replace the previous list if present, as soon as the upload completes. A.3 System VoIP Rules The VoIP number blocking feature also requires two packet inspection rules to be enabled. These rules contain instructions for what the packet inspection engine is to search for. The rule IDs for these two rules are: 100 001 001 100 001 002 SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 46: Event Generation

    To activate these two rules it will be required to create a new rule set. This rule set should include these two VoIP related rules as well as any other rule required for the appliance. Other rules will not have any impact on the VoIP functionality. A.4 Event Generation Each time an incoming call has been blocked, a security event will be generated. These events are readable from the monitoring utility together will all other events in the appliance. All VoIP events will be written to the event log file and the corresponding dropped packets will be written to the drop log file.
  • Page 47: Appendix B. Direct Access Of Log Files

    Appendix B. Direct Access of Log Files The appliance allows for accessing its log files directly over the management Ethernet port without going through the GUI applications. This is done by using the rsync command in Linux to a special user account in the appliance. B.1 Logging In To The Log File Directories It is possible to log in to the special user account and inspect the contents of the log file directories. Perform an SSH login to the special log file user account on the management port: solida-logs@192.168.1.250 password: The serial number of the appliance (case sensitive) The IP address is the same address as used in general for logging into the management port. This default IP address can be changed. If so, please use the IP current active IP address for this login. B.2 Copying Out Log Files Log files should be copied out from the appliance using the rsync command from a Linux computer. A typical command sequence for copying over the event files will be: rsync –av solida-logs@192.168.1.250:/home/solida-logs/events_log . Valid log file directories are the same directories as seen from the GUI applications. B.3 Log File Formats Log files are written in two formats, PCAP and JSON. All event log files are written in JSON format and all packet log files are written in PCAP format. Any text editor can open event log files and packet log files can be opened with for example Wireshark. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 48: Appendix C. Solida Multi Remote Monitoring

    Appendix C. Solida Multi Remote Monitoring Solida Multi is a remote monitoring software tool that allows for monitoring multiple appliances remotely over the Internet. C.1 Setting Up The Solida Multi Sever Before the Solida Multi software can be installed the user must decide if the server should be hosted in the cloud or be installed as a physical server. In both cases it is required that the server is assigned a fixed IP address. This IP address is then passed to the security appliance during configuration. The server needs to run the Linux operating system. If the server uses Windows then Solida Multi must be installed as a virtual instance under Windows. C.2 Configuring The Appliance for Solida Multi It is straightforward to configure the appliance so that it starts communication with the remote computer hosting Solida Multi. The IP address of the server hosting Solida Multi must be provided together with a user name and password for a remote login connection. C.3 Required Network Ports. The security appliance will communicate with Solida Multi over port 22 (ssh). If port 22 is blocked by a firewall then the appliance require port 443 (https) to be opened for this communication. Port 53 must also be open for DNS lookups. C.4 Communication Once the security appliance has been set up to communicate with a Solida Multi server it will start sharing security data. SOLIDA SYSTEMS INTERNATIONAL 2017 ©...
  • Page 49: Solida Systems International

    SOLIDA SYSTEMS INTERNATIONAL CO., LTD. 1000/19-20 Liberty Plaza Building, Floor 12A, Thonglor, Sukhumvit Soi 55, Klongtan Nua, Wattana, Bangkok, Thailand, 10110 Tel +66 2-714-8900 Email info@solidasystems.com Website www.solidasystems.com SOLIDA SYSTEMS INTERNATIONAL 2017 ©...

This manual is also suitable for:

Sl-6000Sl-4000

Table of Contents