Vous êtes sur la page 1sur 82

Manager Server Configuration Guide

revision 2.0

McAfee Network Security Platform


Network Security Manager version 6.0

McAfee Network Protection


Industry-leading network security solutions

COPYRIGHT
Copyright 2001 - 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.

TRADEMARKS
ACTIVE FIREWALL, ACTIVE SECURITY, ACTIVESECURITY (AND IN KATAKANA), ACTIVESHIELD, CLEAN-UP, DESIGN (STYLIZED E), DESIGN (STYLIZED N), ENTERCEPT, EPOLICY ORCHESTRATOR, FIRST AID, FOUNDSTONE, GROUPSHIELD, GROUPSHIELD (AND IN KATAKANA), INTRUSHIELD, INTRUSION PREVENTION THROUGH INNOVATION, McAfee, McAfee (AND IN KATAKANA), McAfee AND DESIGN, McAfee.COM, McAfee VIRUSSCAN, NET TOOLS, NET TOOLS (AND IN KATAKANA), NETSCAN, NETSHIELD, NUTS & BOLTS, OIL CHANGE, PRIMESUPPORT, SPAMKILLER, THREATSCAN, TOTAL VIRUS DEFENSE, VIREX, VIRUS FORUM, VIRUSCAN, VIRUSSCAN, VIRUSSCAN (AND IN KATAKANA), WEBSCAN, WEBSHIELD, WEBSHIELD (AND IN KATAKANA) are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. The color red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners.

LICENSE AND PATENT INFORMATION License Agreement


NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO McAfee OR THE PLACE OF PURCHASE FOR A FULL REFUND.

License Attributions
This product includes or may include: * Software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). * Cryptographic software written by Eric A. Young and software written by Tim J. Hudson. * Some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar Free Software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code. The GPL requires that for any software covered under the GPL, which is distributed to someone in an executable binary format, that the source code also be made available to those users. For any such software covered under the GPL, the source code is made available on this CD. If any Free Software licenses require that McAfee provide rights to use, copy or modify a software program that are broader than the rights granted in this agreement, then such rights shall take precedence over the rights and restrictions herein. * Software originally written by Henry Spencer, Copyright 1992, 1993, 1994, 1997 Henry Spencer. * Software originally written by Robert Nordier, Copyright (C) 1996-7 Robert Nordier. * Software written by Douglas W. Sauder. * Software developed by the Apache Software Foundation (http://www.apache.org/). A copy of the license agreement for this software can be found at www.apache.org/licenses/LICENSE-2.0.txt. * International Components for Unicode ("ICU") Copyright (C) 1995-2002 International Business Machines Corporation and others. * Software developed by CrystalClear Software, Inc., Copyright (C) 2000 CrystalClear Software, Inc. * FEAD(R) Optimizer(R) technology, Copyright Netopsystems AG, Berlin, Germany. * Outside In(R) Viewer Technology (C) 1992-2001 Stellent Chicago, Inc. and/or Outside In(R) HTML Export, (C) 2001 Stellent Chicago, Inc. * Software copyrighted by Thai Open Source Software Center Ltd. and Clark Cooper, (C) 1998, 1999, 2000. * Software copyrighted by Expat maintainers. * Software copyrighted by The Regents of the University of California, (C) 1996, 1989, 1998-2000. * Software copyrighted by Gunnar Ritter. * Software copyrighted by Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A., (C) 2003. * Software copyrighted by Gisle Aas. (C) 1995-2003. * Software copyrighted by Michael A. Chase, (C) 1999-2000. * Software copyrighted by Neil Winton, (C) 1995-1996. * Software copyrighted by RSA Data Security, Inc., (C) 1990-1992. * Software copyrighted by Sean M. Burke, (C) 1999, 2000. * Software copyrighted by Martijn Koster, (C) 1995. * Software copyrighted by Brad Appleton, (C) 1996-1999. * Software copyrighted by Michael G. Schwern, (C) 2001. * Software copyrighted by Graham Barr, (C) 1998. * Software copyrighted by Larry Wall and Clark Cooper, (C) 1998-2000. * Software copyrighted by Frodo Looijaard, (C) 1997. * Software copyrighted by the Python Software Foundation, Copyright (C) 2001, 2002, 2003. A copy of the license agreement for this software can be found at www.python.org. * Software copyrighted by Beman Dawes, (C) 1994-1999, 2002. * Software written by Andrew Lumsdaine, Lie-Quan Lee, Jeremy G. Siek (C) 1997-2000 University of Notre Dame. * Software copyrighted by Simone Bordet & Marco Cravero, (C) 2002. * Software copyrighted by Stephen Purcell, (C) 2001. * Software developed by the Indiana University Extreme! Lab (http://www.extreme.indiana.edu/). * Software copyrighted by International Business Machines Corporation and others, (C) 1995-2003. * Software developed by the University of California, Berkeley and its contributors. * Software developed by Ralf S. Engelschall <rse@engelschall.com> for use in the mod_ssl project (http:// www.modssl.org/). * Software copyrighted by Kevlin Henney, (C) 2000-2002. * Software copyrighted by Peter Dimov and Multi Media Ltd. (C) 2001, 2002. * Software copyrighted by David Abrahams, (C) 2001, 2002. See http://www.boost.org/libs/bind/bind.html for documentation. * Software copyrighted by Steve Cleary, Beman Dawes, Howard Hinnant & John Maddock, (C) 2000. * Software copyrighted by Boost.org, (C) 1999-2002. * Software copyrighted by Nicolai M. Josuttis, (C) 1999. * Software copyrighted by Jeremy Siek, (C) 1999-2001. * Software copyrighted by Daryle Walker, (C) 2001. * Software copyrighted by Chuck Allison and Jeremy Siek, (C) 2001, 2002. * Software copyrighted by Samuel Krempp, (C) 2001. See http://www.boost.org for updates, documentation, and revision history. * Software copyrighted by Doug Gregor (gregod@cs.rpi.edu), (C) 2001, 2002. * Software copyrighted by Cadenza New Zealand Ltd., (C) 2000. * Software copyrighted by Jens Maurer, (C) 2000, 2001. * Software copyrighted by Jaakko Jrvi (jaakko.jarvi@cs.utu.fi), (C) 1999, 2000. * Software copyrighted by Ronald Garcia, (C) 2002. * Software copyrighted by David Abrahams, Jeremy Siek, and Daryle Walker, (C) 1999-2001. * Software copyrighted by Stephen Cleary (shammah@voyager.net), (C) 2000. * Software copyrighted by Housemarque Oy <http://www.housemarque.com>, (C) 2001. * Software copyrighted by Paul Moore, (C) 1999. * Software copyrighted by Dr. John Maddock, (C) 1998-2002. * Software copyrighted by Greg Colvin and Beman Dawes, (C) 1998, 1999. * Software copyrighted by Peter Dimov, (C) 2001, 2002. * Software copyrighted by Jeremy Siek and John R. Bandela, (C) 2001. * Software copyrighted by Joerg Walter and Mathias Koch, (C) 2000-2002. * Software copyrighted by Carnegie Mellon University (C) 1989, 1991, 1992. * Software copyrighted by Cambridge Broadband Ltd., (C) 2001-2003. * Software copyrighted by Sparta, Inc., (C) 2003-2004. * Software copyrighted by Cisco, Inc and Information Network Center of Beijing University of Posts and Telecommunications, (C) 2004. * Software copyrighted by Simon Josefsson, (C) 2003. * Software copyrighted by Thomas Jacob, (C) 2003-2004. * Software copyrighted by Advanced Software Engineering Limited, (C) 2004. * Software copyrighted by Todd C. Miller, (C) 1998. * Software copyrighted by The Regents of the University of California, (C) 1990, 1993, with code derived from software contributed to Berkeley by Chris Torek.

Issued JANUARY 2010 / Manager Server Configuration Guide


700-2369-00/ 2.0 - English

Contents
Preface ........................................................................................................... v
Introducing McAfee Network Security Platform............................................................................. v About this guide............................................................................................................................. v Audience ....................................................................................................................................... v Conventions used in this guide .....................................................................................................vi Related documentation .................................................................................................................vi Contacting Technical Support ..................................................................................................... viii

Chapter 1 About the Manager resource node ............................................ 1 Chapter 2 Specifying server functions for Manager.................................. 2
Viewing Manager Summary .......................................................................................................... 2 Specifying an E-mail server for notifications ................................................................................. 3 Configuring Global Auto Acknowledgement.................................................................................. 4 Setting Audit Log parameters........................................................................................................ 4 Adding a Manager Logon Banner ................................................................................................. 5

Chapter 3 Managing Licenses ..................................................................... 7


Network Security Manager license types ...................................................................................... 7 Installing the Manager license................................................................................................7 Changing the Manager license ..............................................................................................8 Device license types.................................................................................................................... 10 Importing a Device License..................................................................................................11 Manually assigning a device license ....................................................................................12 Device licenses validity period .............................................................................................13 Viewing licenses in your deployment .......................................................................................... 14

Chapter 4 Obtaining updates from the Update Server ............................ 16


Downloading software updates ................................................................................................... 17 Downloading signature set updates ............................................................................................ 17 Automating updates .................................................................................................................... 19 Automating signature set downloads from the Update Server.............................................20 Automatically deploy new signature sets to your devices ....................................................20 Manually importing a software image or signature set................................................................ 21 Specifying the Update Server authentication .............................................................................. 22 Specifying a proxy server for Internet connectivity...................................................................... 23

Chapter 5 Preparing for Manager Disaster Recovery (MDR).................. 24


MDR communication ................................................................................................................... 25 Sensor to Manager communication .....................................................................................25 Manager to Manager communication...................................................................................26 Viewing the current details of MDR ............................................................................................. 26 Configuring MDR......................................................................................................................... 27 Scenarios for MDR configuration .........................................................................................29 Using NAT (Network Address Translation) ..........................................................................30 Configuring MDR with NAT ..................................................................................................31 MDR Actions ............................................................................................................................... 31 MDR verification via CLI.............................................................................................................. 32 Viewing MDR switchover history ................................................................................................. 33

Chapter 6 Establishing communication with Central Manager.............. 34

iii

Viewing Central Manager details................................................................................................. 35 Managing Central Manager details ............................................................................................. 35

Chapter 7 Managing your Network Security Manager database............ 38


Capacity planning for Manager database.................................................................................... 38 Database maintenance and tuning.............................................................................................. 39 Database tuning ...................................................................................................................40 Tuning the Manager database .............................................................................................40 Database backup and recovery................................................................................................... 43 Database archival ................................................................................................................44 Protecting your backups.......................................................................................................44 Backing up data and settings ...............................................................................................44 Maintenance of system data and files ......................................................................................... 49 Setting a schedule for file pruning........................................................................................49 Using the database admin tool.................................................................................................... 52 Backing up using dbadmin.bat .............................................................................................53 Restoring data using dbadmin.bat .......................................................................................54 Archiving alerts using dbadmin.bat ......................................................................................56 Restoring alerts using dbadmin.bat......................................................................................57 Tuning the database using dbadmin.bat ..............................................................................59 Deleting alerts and packet logs from the database using purge.bat ....................................59 Deleting unwanted data using dbadmin.bat .........................................................................61 Packet log database table indexing for MySQL databases..................................................62 Changing your database password......................................................................................63

Chapter 8 Configuring external authentication........................................ 64


Viewing authentication details ..................................................................................................... 64 Configuring RADIUS server in the Manager ............................................................................... 65 Adding a RADIUS server .....................................................................................................65 Editing a RADIUS server......................................................................................................66 Deleting a RADIUS server ...................................................................................................67 Testing connection status ....................................................................................................67 Configuring LDAP servers / Active Directory............................................................................... 67 Adding an LDAP server........................................................................................................68 Editing an LDAP server........................................................................................................69 Deleting an LDAP server......................................................................................................69 Testing connection status ....................................................................................................69

Chapter 9 Limiting Manager access.......................................................... 70


Enabling GUI Access .................................................................................................................. 70 Adding a network from Access Control ....................................................................................... 71 Editing a CIDR network ............................................................................................................... 71 Deleting a CIDR network............................................................................................................. 72 User activity log error messages ................................................................................................. 72

Index ............................................................................................................. 73

iv

Preface
This preface provides a brief introduction to the product, discusses the information in this document, and explains how this document is organized. It also provides information such as, the supporting documents for this guide and how to contact McAfee Technical Support.

Introducing McAfee Network Security Platform


McAfee Network Security Platform [formerly McAfee IntruShield] delivers the most comprehensive, accurate, and scalable Network Access Control (NAC), network Intrusion Prevention System (IPS) and Network Threat Behavior Analysis (NTBA) for mission-critical enterprise, carrier, and service provider networks, while providing unmatched protection against spyware and known, zero-day, and encrypted attacks. McAfee Network Threat Behavior Analysis Appliance provides the capability of monitoring network traffic by analyzing NetFlow information flowing through the network in real time, thus complementing the NAC and IPS capabilities in a scenario in which McAfee Network Security Sensor, NAC Sensor, and NTBA Appliance are installed and managed through a single Manager.

About this guide


This guide explains how to complete the following tasks for configuring McAfee Network Security Manager: Specifying server functions for Manager Summary details, Internet connectivity, and mail notification. Installing the required licenses. Connecting to the McAfee Network Security Update Server to obtain software updates and company notices. Preparing for disaster recovery. Backing up, restoring, and archiving data. Tuning and maintaining the database. For information about configuring McAfee Network Security Sensors, see the Device Configuration Guide and/or CLI Guide.

Audience
This guide is intended for use by network technicians and maintenance personnel responsible for installing, configuring, and maintaining McAfee Network Security Manager(Manager) and McAfee Network Security Sensors (Sensors), but is not necessarily familiar with NAC or IPS-related tasks, the relationship between tasks, or the commands necessary to perform particular tasks.

McAfee Network Security Platform 6.0

Preface

Conventions used in this guide


This document uses the following typographical conventions:
Convention Example

Terms that identify fields, buttons, tabs, options, selections, and commands on the User Interface (UI) are shown in Arial Narrow bold font.

The Service field on the Properties tab specifies the name of the requested service.

Menu or action group selections are indicated using a right angle bracket. Procedures are presented as a series of numbered steps. Names of keys on the keyboard are denoted using UPPER CASE. Text such as syntax, key words, and values that you must type exactly are denoted using Courier New font.

Select My Company > Admin Domain > Summary. 1. On the Configuration tab, click Backup.

Press ENTER. Type: setup and then press ENTER.

Variable information that you must type based Type: Sensor-IP-address and then press on your specific situation or environment is ENTER. shown in italics. Parameters that you must supply are shown enclosed in angle brackets. Information that you must read before beginning a procedure or that alerts you to negative consequences of certain actions, such as loss of data is denoted using this notation. Information that you must read to prevent injury, accidents from contact with electricity, or other serious consequences is denoted using this notation. Notes that provide related, but non-critical, information are denoted using this notation. set Sensor ip <A.B.C.D> Caution:

Warning:

Note:

Related documentation
"The following documents and on-line help are companions to this guide. Refer to Quick Tour for more information on these guides."

vi

McAfee Network Security Platform 6.0

Preface

Quick Tour Installation Guide Upgrade Guide Getting Started Guide IPS Deployment Guide Manager Configuration Basics Guide I-1200 Sensor Product Guide I-1400 Sensor Product Guide I-2700 Sensor Product Guide I-3000 Sensor Product Guide I-4000 Sensor Product Guide I-4010 Sensor Product Guide M-1250/M-1450 Sensor Product Guide M-1250/M-1450 Quick Start Guide M-2750 Sensor Product Guide M-2750 Quick Start Guide M-3050/M-4050 Sensor Product Guide M-3050/M-4050 Quick Start Guide M-6050 Sensor Product Guide M-6050 Quick Start Guide M-8000 Sensor Product Guide M-8000 Quick Start Guide Gigabit Optical Fail-Open Bypass Kit Guide Gigabit Copper Fail-Open Bypass Kit Guide 10 Gigabit Fail-Open Bypass Kit Guide M-8000/M-6050/M-4050/M-3050 Slide Rail Assembly Procedure M-2750 Slide Rail Assembly Procedure M-series DC Power Supply Installation Procedure Administrative Domain Configuration Guide CLI Guide Device Configuration Guide IPS Configuration Guide NAC Configuration Guide Integration Guide System Status Monitoring Guide Reports Guide Custom Attack Definitions Guide Central Manager Administrator's Guide Best Practices Guide Troubleshooting Guide Special Topics GuideIn-line Sensor Deployment Special Topics GuideSensor High Availability Special Topics GuideVirtualization Special Topics GuideDenial-of-Service NTBA Appliance Administrator's Guide

vii

McAfee Network Security Platform 6.0

Preface

NTBA Monitoring Guide NTBA Appliance T-200 Quick Start Guide NTBA Appliance T-500 Quick Start Guide

Contacting Technical Support


If you have any questions, contact McAfee for assistance:

Online
Contact McAfee Technical Support http://mysupport.mcafee.com. Registered customers can obtain up-to-date documentation, technical bulletins, and quick tips on McAfee's 24x7 comprehensive KnowledgeBase. In addition, customers can also resolve technical issues with the online case submit, software downloads, and signature updates.

Phone
Technical Support is available 7:00 A.M. to 5:00 P.M. PST Monday-Friday. Extended 24x7 Technical Support is available for customers with Gold or Platinum service contracts. Global phone contact numbers can be found at McAfee Contact Information http://www.mcafee.com/us/about/contact/index.html page. Note: McAfee requires that you provide your GRANT ID and the serial number of your system when opening a ticket with Technical Support. You will be provided with a user name and password for the online case submission.

viii

CHAPTER 1

About the Manager resource node


This section describes how to configure system-level settings, including system backups, signature and software updates, and user-defined signatures. These settings are located under the node representing the McAfee Network Security Manager server. The Manager node is located under the root admin domain node and cannot be moved or renamed. For navigation purposes, the Manager node is denoted in configuration steps as Manager >.

Figure 1: Manager node

The Manager node tabs are: Specifying server functions for Manager (on page 2): provides the McAfee Network Security Manager (Manager) functions like viewing the Manager details, mail server notification details, automatically acknowledge alerts, setting audit log parameters, and uploading banner image. Obtaining updates from the Update Server (on page 16): enables you to configure communication between the Manager and the McAfee Network Security Update Server. Some of the actions include establishing the communication channel, scheduling downloads of the latest software and signature updates, and downloading updates. Installing Network Security Platform license files (on page 7): provides information on the licenses in your deployment and how to change your license file. Preparing for Manager Disaster Recovery (MDR) (on page 24): enables you to have a standby Manager available in cases where the primary Manager fails. Establishing communication with Central Manager (on page 34): enables you to configure Manager with the McAfee Network Security Central Manager, view and manage McAfee Network Security Central Manager (Central Manager) details by establishing a trust between the Manager and Central Manager. Backing up and restoring data (on page 44): enables you to back up your McAfee Network Security Platform [formerly McAfee IntruShield Network Intrusion Prevention System] data on-demand or by a set schedule. Archiving data: enable you to save alerts and packet logs from the database ondemand or by a set schedule. Tuning your Manager database (on page 40): enables you to schedule or initiate tuning of your MySQL database. Maintaining your database (on page 49): enables you to set a schedule for file maintenance, view disk metrics, manage database disk space, and clear the Manager cache. Configuring authentication: (on page 64) enables you to view details of authentication of Manager with multiple LDAP and RADIUS servers. Configuring Access Control for specific hosts/networks (on page 70): allows you configure access to specific hosts by defining lists of authorized hosts/networks.

CHAPTER 2

Specifying server functions for Manager


The Manager tab provides the following server configuration functions:

Figure 2: Manager Summary Path

Viewing Manager Summary: (on page 2) View session information, up time, and current the Manager software version. Specifying an e-mail server for notifications: (on page 3) Configure the Manager to point to a mail server for sending out e-mail or pager security notifications. Auto Acknowledge alerts : Configure the Manager to acknowledge new alerts automatically. Setting Audit Log parameters: (on page 4) Determine what information to display in relation to a user activity audit. Logon Banner: (on page 5) Upload your company logo and customized text on the Manager login page.

Viewing Manager Summary


The Summary action (My company / Manager or Central Manager > Manager or Central Manager > Summary enables you to view the following details: (Note that the Summary page from the Manager or Central Manager displays similar functions, as given below).
Manager Software Version: current Manager software version Active Signature Set: current signature version available in Manager Last Start Time: the most recent time Manager service was started Host Name ( IP Address ): host name and network identification of the Manager server (if

host name is not available, only the IP is displayed)


License Expiration: date and time when the license will expire Logged In Users: all currently open user session information by:

User Name Host Name (IP Address) Login Time

McAfee Network Security Platform 6.0

Specifying server functions for Manager

Figure 3: Manager Information Page

Specifying an E-mail server for notifications


Using the E-mail Server action, you can configure Manager (or Central Manager) to point to an e-mail server for sending out system e-mails. For example, these e-mails can be security notifications that have been prioritized by selecting E-mail or Pager. Using this action, you can also specify the from address for the system e-mails. To configure a mail server for notifications, do the following: 1 Select Manager (or Central Manager) > Manager (or Central Manager) > Mail Server.

Figure 4: Mail Server Configuration

Provide the following information:


Enable E-mail Forwarding?: Select Yes to allow notifications to be sent to an e-mail server, or select No to disable notifications to the e-mail server. SMTP Server Name or IP Address: IP address or name of the e-mail server. Note that either IPv4 or IPv6 address can be entered in SMTP Server Name or IP Address. Sender E-mail Address: e-mail address from where messages are sent. Mail Authentication Enabled: Select Yes to allow authentication of login credentials, or No for no authentication of login credentials. Login Name: of the From: account Password: of the From: account

McAfee Network Security Platform 6.0

Specifying server functions for Manager

Click Save to save the changes made.

Configuring Global Auto Acknowledgement


To configure auto-acknowledgement using the Global Auto Acknowledgment feature: 1 Navigate to Manager > Manager > Global Auto Acknowledgement.

Figure 5: Global Auto Acknowledgement Setting

2 3

Select the option Yes to enable Global Auto Acknowledgement. This is enabled by default for a fresh install of Network Security Platform. Specify the Highest Severity Alert of the attacks that you want to be auto acknowledged. For example, if you specify 2 (Low) then Manager will consider all attacks with a severity level of 2 or less. The default value is 3 (Low). Specify whether you want to auto acknowledge attacks that are recommended by McAfee for blocking (RFB). The default selection is 'No'. Click Save to save the changes you made.

4 5

Setting Audit Log parameters


Setting audit log parameters enables you to determine what information to display in relation to a users activities. You can choose whether or not to view actions performed on admin domains and users (creation, editing, role assignment), the Manager (backups, Update Server settings), McAfee Network Security Sensor (addition, port configuration), and so forth. By disabling any of the categories, you will not see user actions in regard to those resources. Note: For more information on viewing a user activity audit, see Generating a User Activities Audit, Administrative Domain Configuration Guide. To choose user audit parameters, do the following:

McAfee Network Security Platform 6.0

Specifying server functions for Manager

Select Manager (or Central Manager) > Manager (or Central Manager) > Audit Log Setting.

Figure 6: Audit Log Settings

Following Audit Log categories are displayed as per the Manager modes.
IPS Mode NAC mode IPS with NAC mode

Admin Domain User Manager Sensor IPS Policy Report Update Server Operational Status Threat Analyzer

Admin Domain User Manager Sensor Report Update Server Operational Status Threat Analyzer NAC

Admin Domain User Manager Sensor IPS Policy Report Update Server Operational Status Threat Analyzer NAC

2 3

NTBA NTBA Select the categories you want to enable. Click Save to save the changes you made.

NTBA

Adding a Manager Logon Banner


The logon banner option enables you to upload your company logo (or any other relevant image) and customized text on the Manager logon page. The size of the banner image must be 100x35 pixels and only .jpeg and .png files are supported. Banner image of different sizes will be resized to 100x35. To upload a logon banner , do the following:

McAfee Network Security Platform 6.0

Specifying server functions for Manager

Select Manager (or Central Manager) > Manager (or Central Manager) > Logon Banner.

Figure 7: Manager Logon Banner

Provide the following information:


Enable: Select Yes to allow the logon banner to be displayed and select No not to

display the logon banner.


Banner Text : Type the required text to be displayed. Image File: Browse to select the banner image that you want to upload.

Click Save to save the changes you made.

CHAPTER 3

Managing Licenses
Network Security Platform requires installation of license files for McAfee Network Security Manager (Manager) and Network Security Sensors and/or Network Threat Behavior Analysis Appliances to work in your deployment.

Network Security Manager license types


The Manager consists of hardware and software resources that are used to configure and manage your Network Security Platform deployment. There are three software versions of the Manager:
Network Security Global Managerbest suited for global IPS deployments of more than six

Sensors.
Network Security Managercan support large or distributed deployments of up to six

Sensors. Network Security Manager Startercan support two Sensors. Functionally, the products are otherwise identical. The license file provided to you by McAfee determines which version of the Manager you install.

Installing the Manager license


The Manager software license file identifies which version of Network Security Platform you purchased, and is required for the Manager software to function.

Figure 8: The Licenses tab

When you purchased the product, youthe customer contact identified on the Ship To: of the purchase orderwere sent the software license file in an e-mail. The license file must be installed in the config folder of your Network Security Manager \ App folder.

License file installation for the Manager and Central Manager


1 Retrieve the file from your e-mail. There are separate license files for the Manager and Central Manager: "MNSMLicense.jar." for the Manager installation "MNSCMLicense.jar." for the Central Manager installation

McAfee Network Security Platform 6.0

Managing Licenses

Place the license file in the config folder within your Network Security Manager installation folder (for example, C:\ Program Files\ McAfee \ Network Security Manager\ App \ config). Note: Having trouble finding the file? Clear the Windows Explorer option Tools > Folder Options > View > Hide File Extensions for Known File Types and look for the file name described above.

Changing the Manager license


If you upgrade from a temporary license to a specific Manager license type, or if you upgrade from Network Security Manager to Network Security Global Manager, you must perform the license installation procedure. You can change the license file during a Manager session. If you have a Manager session open, you do not need to log out to install the new license. To change the license file during a Manager session, do the following: 1 Go to Manager > Licenses > Network Security Manager.

Figure 9: Import License Action

Click Import to bring up the Import Network Security Manager License File dialog.

Figure 10: Import Manager License Dialog

Click Browse to browse and select the appropriate license for the Manager server. Click Import to import the license file. The new license overwrites the existing license and takes effect immediately.

Error raised if incorrect license file is selected for import


The following error is raised if incorrect license file is selected for import.

McAfee Network Security Platform 6.0

Managing Licenses

Error

Description/Cause

Action failed

Imported file was not of a valid extension.

An existing license file can be exported and saved in a desired location in an eventuality where the license file needs to be imported again. To export the license file during a Manager session, do the following: 1 2 Go to Manager > Licenses > Network Security Manager. Click Export to bring up the File Download dialog.

Figure 11: Manager License File Download Dialog

Click Save to open the Save As dialog.

Figure 12: Save As Dialog For Saving License File

Save the license file in the selected location.

McAfee Network Security Platform 6.0

Managing Licenses

Device license types


Your Sensor or NTBA Appliance license file identifies which Network Security Platform device you purchased as well as the serial number. Network Security Platform device license types can be broadly categorized as: Default IPS license Grace license Native license Add-on license

Default IPS license


When you add an I-series Sensor to the Manager, upon discovery, the Manager provides a default IPS license to the Sensor. This license is based on the serial number and automatically binds to the Manager. This license is not applicable to M-series and N-series Sensors, and NTBA Appliances.

Grace license
When you add a new M-series or N-series Sensor, or an NTBA Appliance to the Manager, upon discovery, the Manager provides a grace license to enable the native functionality on the device for a period of 30 days. Native functionality refers to the default functionality that is activated on the device. Refer the table below for the native functionality supported based on the device family:
Device Family Native Functionality

M-series Sensors N-series Sensors NTBA Appliances

IPS NAC NTBA

This license is not applicable for I-series Sensors. The grace license is based on the serial number and automatically binds to the device.

Native License
When you purchase a new M-series or N-series Sensor or an NTBA Appliance, McAfee sends you a license file by email. You can import this license file into the Manager to enable the native functionality on the device. The native license is based on the serial number, and automatically binds to the device.

Add-on license
To enable the NAC functionality on your M-series Sensor, you need to purchase an Addon license. Contact McAfee Sales for the same. Once your order is processed, McAfee will send you a license file by email.

10

McAfee Network Security Platform 6.0

Managing Licenses

Note: The Add-on license is not applicable to I-series and N-series Sensors, and NTBA Appliances. Add-on licenses have a unique license key. You need to manually import and bind the add-on license to the Sensor. For more information, see Importing a Device License (on page 11).

License usage when creating a Sensor failover pair


If you plan to configure a Sensor failover pair, both the Primary and the Secondary Sensor should have a license file each of the same functionality. For example, if you have both IPS and NAC functionality enabled in your deployment, the Manager allows failover pair creation between Sensors where the license type for both the Sensors are either IPS only license, NAC only license, or IPS and NAC license.

Importing a Device License


After adding a physical device (Sensor or NTBA Appliance) to the Manager, you need to associate a license with the device. For this, you can import a license to the Manager, and then the Manager automatically binds the license to the device. You can also manually assign a license to the device. The Manager mode functionalities (IPS, NAC and NAC with IPS) are dependent on the type of device license imported to the Manager.

Importing a Device License


1 Retrieve the file from e-mail. To enable the NAC mode on M-series Sensors, you need an Add-on license. Contact McAfee support (with your device serial numbers) to obtain the Add-on license file. Note: The IPS mode is enabled by default in the Manager. 2 Go to Manager > Licenses > Devices. The Device Licenses page is displayed.

Figure 13: DeviceLicense Import

11

McAfee Network Security Platform 6.0

Managing Licenses

To import a Device license, click Import to view the Import License File dialog.

Figure 14: Import Sensor License File Dialog

Click Browse to browse and select the appropriate license for the device file (.jar format) received from McAfee. Click Import to import the license file. After a successful import, these licenses are stored in <Network Security Manager install directory>\App\LICENSES\SensorLicense. If the license has a serial number, the Manager automatically binds the license with the matching device model added to the Manager.

Error raised if incorrect license file is selected for import


The following error is raised if an incorrect license file is selected for import.
Error Description/Cause

Action failed

<File Name> could not be processed by the Manager.

Change in License due to purchase of additional functionality


If you upgrade from a temporary license or if you opt to upgrade your device to use additional functionality for example, from IPS to IPS and NAC, you need to change the device license by importing a new device license that can overwrite the existing one. This can be done through the Manager during a Manager session. You do not have to log out of an open Manager session to install the new license.

Manually assigning a device license


Manual assignment of a device license is applicable to add-on license files alone. Add-on licenses have a unique license key. Once imported in the Manager, the license file can be manually assigned to the matching M-series Sensor model. Add-on licenses are applicable only to activating the NAC feature on M-series Sensors along with IPS. You can also revoke the manual binding of add-on licenses. To manually assign an add-on license: 1 In the Device Licenses page, select Manual Assignment.

Figure 15: Manual assignment of Sensor license

12

McAfee Network Security Platform 6.0

Managing Licenses

2 3

Select a license from the drop down. Devices matching the selected Sensor license model are displayed. Select the required device, and click Assign. The license is assigned to the selected device, and displayed in the Device Licenses page.

Figure 16: DeviceLicense Import

Here, you can unbind the manual assignment of device license. For this, select the device from Current License Assignments and click Revoke.

Note: Only device licenses that are manually assigned can be revoked.

Device licenses validity period


Refer the table below to identify the validity period for the various license types.

License Type

Applicable to:

License Validity Period

Default IPS License Grace License Native License

I-series Sensors M-series and N-450 Sensors, NTBA Appliances M-series and N-450 Sensors, NTBA Appliances M-series Sensors for enabling the NAC functionality

up to year 2035. 30 days. As indicated in the associated Grant and must be renewed periodically. As indicated in the associated Grant and must be renewed periodically.

Add-on License

13

McAfee Network Security Platform 6.0

Managing Licenses

Support Expiration date for Device License


The support expiration dates for Sensor licenses are displayed under the Support Expiration Date column of the Device Licenses page.

Figure 17: Support Expiration Date Information

Manager faults for license expiry


The Manager raises separate faults for license support expiry and license expiry: Faults indicates that the license (or license support) will expire soon are raised 90 days, 60 days, and 30 days before the respective expiry date. Faults which indicate that the license (or license support) has expired are raised daily after the respective expiry date. If you have both IPS and NAC functionality enabled on your Sensor, then the Manager raises separate faults for the IPS and NAC license support expiry and license expiry.

Error raised during signature set push in case device license has expired
You are allowed to push signature files to the device. After the expiry of the device licenses, the Manager still allows you to push the signature files to the device. A fault will be raised for your license renewal. The following error is raised during signature set push in case device license has expired.
Error Description/Cause

License expired

Indicates that your device license has expired; No license available for the device.

Device license renewal process


Contact licensing@mcafee.com for any license file related queries. Provide your active Grant-ID along with contact details for a faster response.

Viewing licenses in your deployment


The Manager provides a read-only view of the Manager and device licenses in your deployment, including unused licenses under Manager > Licenses > Summary.

14

McAfee Network Security Platform 6.0

Managing Licenses

Figure 18: Sensor Summary Page Field Description

License Type (Maximum Supported Devices) Total Devices in Use Expired Licenses

The type of Network Security Manager license. The IPS module is enabled by default. Devices that do not have a current license are listed. The Manager allows downloading new signature sets to these devices. Faults are raised to notify for your license renewal. Unassigned licenses will be automatically assigned once the device with the corresponding serial number is added to the Manager.

Unassigned Licenses

15

CHAPTER 4

Obtaining updates from the Update Server


The Update Server tab contains several actions for configuring communication between the McAfee Network Security Manager (Manager), McAfee Network Security Sensor (Sensor), McAfee Network Threat Behavior Analysis Appliance (NTBA Appliance) and the McAfee Network Security Update Server (Update Server). These actions include establishing the communication channel, scheduling downloads of the latest software and signature updates, and downloading updates when they become available.

Figure 19: The Update Server Tab

Note 1: You can only perform one download/upload at a time from any Network Security Platform component, including the Update Server. Note 2: Before you can perform on-demand and automated downloading actions, you must authenticate your credentials with the Update Server. You are not required to enter an IP address or hostname for contacting the Update Server; contact information is hardcoded into the Manager. You only need to supply your credentials using the Authentication action. McAfee provides your authentication credentials by email. Downloading software updates (on page 17): Download the latest McAfee Network Security Sensor (Sensor) or McAfee Network Threat Behavior Analysis Appliance (NTBA Appliance) software image file from the Update Server to the Manager. Downloading signature set updates (on page 17): Download the latest attack and signature information from the Update Server to the Manager. Automating updates (on page 19): Configure the frequency by which the Manager checks the Update Server for updates, and the frequency by which Sensors and NTBA Appliances receive signature updates from the Manager. Manually importing a Sensor and NTBA Appliance image or signature set (on page 21): Manually import downloaded Sensor or NTBA Appliance software image and signature files to the Manager. Specifying the Update Server authentication (on page 22): Establish communication between the Manager and the Update Server. Specifying a proxy server for Internet connectivity: (on page 23) Configure the McAfee Network Security Manager (Manager) to use a proxy server to connect to the McAfee Network Security Update Server (Update Server).

16

McAfee Network Security Platform 6.0

Obtaining updates from the Update Server

Downloading software updates


You can download available Sensor software (including NTBA Appliance) updates ondemand from the Update Server. If more than one version is available, select the most recent version (that with the highest version number). Automation enables the Manager to check the Update Server for software updates on a periodic basis. For more information on Automation configuration, see Automating updates (on page 19). To download available software updates to the Manager, do the following: 1 Select Manager > Update Server > Software. There are two tables on this screen:
Software available for download: current software versions available on the Update

Server.
Software on the Manager: the software versions that have been downloaded to the

Manager.

Figure 20: Sensor Software Details Page

Select the required software update from the Software Available for Download column of the Software table. Note: Click a version listed in the Software Available for Download column to view details of the software update.

Click Download to download the software updates.

Note: The following options are available for Sensor: Update all Sensors under the Sensors node; for more information, see Updating the Configuration of all Sensors, Device Configuration Guide. Update a single Sensor; for more information, see Updating the software on a Sensor, Device Configuration Guide.

Downloading signature set updates


The Signature Sets action enables you to download available attack signature updates ondemand from the Update Server to the Manager server. You can then push the signature download onto your Sensors or NTBA Appliance.

17

McAfee Network Security Platform 6.0

Obtaining updates from the Update Server

Note that Signature Sets feature is available in Network Security Central Manager (Central Manager) in the path / My Company / Central Manager > Update Server > Signature Sets. Tip: Because incremental emergency signature sets can be downloaded along with regular signature sets, you no longer need to use custom attack definitions feature to import late-breaking attacks. The Signature Sets action not only allows you to import regular signature sets, but also incremental emergency signature sets that include attack signatures not yet available in regular signature sets. Incremental emergency signature sets are meant to address latebreaking attacks that may need to be addressed immediately. Emergency signature sets are non-cumulative and can only add new signatures, so they do not contain a full set of signatures. To ensure that you have a complete set of signatures, Network Security Platform checks to see if a required regular signature set is missing and downloads it prior to downloading the related emergency signature set. Note: You must use the Signature Sets or Automation action in order for Network Security Platform to automatically download a required regular signature set prior to downloading an emergency signature set. You will receive an error if you try to import an emergency signature set via the Import action. When a signature file, or version, is downloaded, the version is listed in the Signature Sets action configuration table as the Active Manager Signature Set. Signatures files are not applied to the Manager, rather, the current version is the version that is pushed to the Sensor(s) or NTBA Appliance when you are ready to update your Sensors or NTBA Appliance's signature set. Setting a schedule enables the Manager to check the Update Server for signature updates on a periodic basis, download the available updates, and push these updates to your Sensors or NTBA Appliances without your intervention. For more information on Scheduler configuration, see Automating updates (on page 19). To download the latest signatures to the Manager, do the following: 1 Select Manager > Update Server > Signature Sets.

Figure 21: Download Signatures Configuration

View the Active Manager Signature Set: Version n. This is the version that is currently available for your Sensors or NTBA Appliances to download. This signature set is kept in a queue for download to your Sensors or NTBA Appliances. You can only have one version in the queue for download. Select the signature update you want from Signature Sets Available For Download. You can click a version number to view update details. Note 1: If you have downloaded the latest version, a default message reads, No new signature sets available. The Manager has the most recent signature set.

18

McAfee Network Security Platform 6.0

Obtaining updates from the Update Server

Note 2: Click view all to display all the signature updates available on the Update Server. These are signatures you have already downloaded or upgraded to a new version. 4 Click Download. A status window opens to verify signature download progress. The Download button only appears when there is a new version to download.

Note: When the download is complete, you can update the Sensor signature set by performing one of the following actions: To download the signature set to all Sensors; for more information, see Updating the Configuration of all Sensors, Device Configuration Guide To download the signature set to a single Sensor; for more information, see Updating the software on a Sensor, Device Configuration Guide

Automating updates
McAfee is constantly researching security issues and developing new signatures to provide the best protection available. New signatures are constantly being modified/developed to respond to the most current attacks, and software updates are developed to continually improve Sensor and NTBA Appliance performance. These enhancements are made available on a regular basis via the Update Server. Update availability is not confined to a set day and time; rather, updates are provided when they are developed, enabling you to have the latest improvements as soon as they are ready. The Automation feature enables you to configure the frequency by which the Manager (or Central Manager) checks the Update Server for updates. At your automated time, the Manager polls the Update Server; if an update is available that is newer than the signature set or Sensor and NTBA Appliance software versions on your Manager, that update is downloaded to the Manager. You can check what has been downloaded at the Software and Signature Sets option. Note: The Automation feature is available in the Network Security Central Manager (Central Manager) in the path / My Company / Central Manager > Update Server > Automation. After downloading a signature set update, you can configure your Manager to push the update to all of your Sensors or NTBA Appliances either immediately or by automation. Since signature sets can be updated to Sensors and NTBA Appliances in real time without shutdown, this scheduling feature enables you to quickly propagate the latest signature set across your Sensors and NTBA Appliances. The Automation action combines two actions for update scheduling: Automating signature set downloads from the Update Server (on page 20): Configure a schedule by which Manager polls the Update Server for available signature set updates. Automatically deploy new signature sets to your devices (on page 20): Enable either automatic or scheduled downloading of the most recently downloaded signature set to your Sensors. Note: You must perform each action separately.

19

McAfee Network Security Platform 6.0

Obtaining updates from the Update Server

Automating signature set downloads from the Update Server


In the Update Server Automation, you schedule the Manager to poll the Update Server for signature downloads on a periodic basis. Once your polling schedule is set, you can use the Signatures action to check what signature updates have been downloaded to your Manager and thus available for download to your Sensors and NTBA Appliances. Note: If your Manager does not have a connection to the Internet, then you do not need to set the automation. Rather, you would use your Network Security Platform Support account to download the latest updates from the Update Server. For more information, see Updating your Signatures and Software, Network Security Platform Quick Tour. To configure an Update Server signature set downloads, do the following: 1 Select Manager > Update Server > Automation.

Figure 22: Signature Set Download Scheduler

Select Yes to enable automation. No is selected by default. Note: Select No and click Apply at any time to disable the polling automation.

Select the Schedule frequency by which you want the Manager to poll the Update Server. The polling choices are:
Frequently: Several times a day during a specified time period Daily: once a day Weekly: once a week

4 5

Fill in the Start Time:, End Time:, and Recur every fields to your desired interval. Your selected Automatic Downloading frequency choice affects these fields. Click Save when done. Once enabled, the Manager will download signature sets from the Update Server against your set automation.

Automatically deploy new signature sets to your devices


From the Update Server Automation, you can automate signature file updating for all of your Sensors and NTBA Appliances. This means you can have all of your Sensors and NTBA Appliances updated: 1) As soon as signature updates are downloaded to the Manager from the Update Server (real-time) 2) By a set schedule, or

20

McAfee Network Security Platform 6.0

Obtaining updates from the Update Server

3) By both a real-time setting and a scheduled time in an effort to reinforce immediate updating with a scheduled check to make sure the latest update is loaded to your Sensors. Note1: Setting both options enables the system to check update availability for cases where the real-time updating may have missed an update. Note2: If you are going to use automated updating, McAfee recommends a scheduled time rather than real time for signature updating in case of slower performance experienced during signature file download. You can schedule a time when you know your network sees a lesser amount of traffic. To automatically deploy new signature sets to your Sensors, do the following: 1 Select Manager > Update Server > Automation.

Figure 23: Sensor Update Scheduler

In the Automatic Deployment, click Yes at Deploy in Real-time to have the Manager push signature sets update to all Sensors and NTBA Appliances immediately after it is downloaded to the Manager. No is the default. To turn off the Deploy in Real-time at any time after enabling it, return to this page, select No, and click Save. AND/OR Click Yes at Deploy at Scheduled Interval to apply a schedule for downloading signature updates from the Manager to the Sensors. No is the default. To turn off the Deploy at Scheduled Interval at any time after enabling it, return to this page, select No, and click Save. Select the Schedule: frequency by which you want the Manager to check for a newly downloaded signature set. The polling choices are:
Frequently: Several times a day during a specified time period at interval indicated in the Recur every option. Daily: once a day Weekly: once a week

4 5

Fill in the Start Time, End Time, and Recur every fields to desired interval specifications. Your selected Automation frequency choice affects these fields. Click Save to save your changes.

Manually importing a software image or signature set


The Manual Import action enables manual loading of the latest Sensor and NTBA Appliance software and signature files to the Manager (or Central Manager) from another workstation. This method is particularly useful if the Manager server is in a lab or secure environment and you do not want to compromise that environment by an Internet

21

McAfee Network Security Platform 6.0

Obtaining updates from the Update Server

connection. This is crucial for administrators who do not want to connect their Manager to the Update Server via the Internet. McAfee provides an alternate FTP server that contains the latest updates. You can download the update you need from the FTP location to a client machine. Once the image file is downloaded to the alternate machine, you configure Manager to pull the file from the client to the Manager server using the Import action. To import software/signature files to your Manager (or Central Manager), do the following: 1 Select Manager (or Central Manager) > Update Server > Manual Import.

Figure 24: Import Signature Set From File

2 3

Click Browse to locate the Sensor or NTBA Appliance software or Signature set file, or type the files absolute path name on your network. Click Import.

Note: The Sensor needs to be rebooted after manual import. For more information on rebooting the Sensor, see Device Configuration Guide. The guide also mentions about alert and packet log interruptions.

Specifying the Update Server authentication


The Authentication action authenticates communication between your Manager (or Central Manager) and the Update Server. This connection establishes all future communication for downloading new signature sets and Sensor or NTBA Appliance software files from the Update Server onto the Manager. Once you enter your credentials (ID and password given to you by McAfee), the Manager attempts to contact the Update Server via hardcoded communication settings. Note: You are not required to enter an IP address or hostname to reach the Update Server. You only need to submit your credentials, the Manager then attempts the connection with the hardcoded settings. You cannot change these settings. To establish the Manager (or Central Manager) communication with the Update Server, do the following: 1 Select Manager (or Central Manager) > Update Server > Authentication.

Figure 25: Update Server Credentials Page

2 3

Enter the Grant Number and Password. Click Save.

22

McAfee Network Security Platform 6.0

Obtaining updates from the Update Server

Click Delete to delete the credentials. Note: If no congratulatory note is returned, re-enter your credentials. If you feel you have entered the values correctly, check the User Activity Audit Log (For more information, see Generating a User Activities Audit, Administrative Domain Configuration Guide) action to confirm success or failure. If the Password is incorrect or if you did not receive them via e-mail from McAfee, please contact McAfee Customer Support. Once communication is successful, you can use the Software, Signature Sets, Automation, Manual Imports, and Proxy Server actions.

Specifying a proxy server for Internet connectivity


If you employ a proxy server for Internet connectivity, you can configure the Manager to connect to that server for proxy service. This is especially necessary if you want to download updates directly to Manager from the Update Server. The Manager supports application-level HTTP/HTTPS proxies, such as Squid, iPlanet, Microsoft Proxy Server, and Microsoft ISA. Note 1: To use Microsoft ISA, you must configure this proxy server with basic authentication. Network Security Platform does not support Microsoft ISA during NTLM (Microsoft LAN Manager) authentication. Note 2: SOCKS, a network-level proxy, is not currently supported by Network Security Platform. To specify your proxy server, do the following: 1 Select Manager (or Central Manager) > Update Server > Proxy Server. The Proxy Server window displays.

Figure 26: Proxy Server Settings

2 3 4 5

Type the Proxy Server Name or IP Address. This can be either IPv4 or IPv6 address. Type the Proxy Port of your proxy server. Type User Name and Password. Provide the appropriate URL. You may test to ensure that the connection works by entering a Test URL and clicking Test Connection.

6 Click Save to save your settings. When the Manager makes a successful connection, it displays a message indicating that the proxy server settings are valid.

23

CHAPTER 5

Preparing for Manager Disaster Recovery (MDR)


The MDR tab actions enable you to have a standby McAfee Network Security Manager (Manager) available in cases where the primary Manager fails.

Figure 27: The MDR Tab

Manager Disaster Recovery (MDR) feature is available for deployments where the following conditions are met: Two Managers (called Primary and Secondary) are available. The Primary is in active mode and the secondary in standby mode. The Primary and Secondary use the same Manager software release version. Manager version of both primary and secondary manager needs to be similar for the creation of MDR pair. The Primary and Secondary Managers share the same database structure. The Primary and Secondary Managers can be located in the same Network Operations Center (NOC) or in geographically diverse locations, as long as they can communicate via SSL through TCP port 443. Managers can also be on different hardware. If the Primary and Secondary Managers are located in different geographical regions, then there needs to be time synchronization between the two Managers keeping the Coordinated Universal Time (UTC) as the standard time. Let's say, one Manager is in California (UTC - 8 hours), and the other Manager is in New York (UTC - 5 hours). The MDR setup will work in this scenario as long as the time set in both the Managers are in sync with each other. That is, at 09:00 UTC hours, if the Manager in California shows 01:00 hours local time, and the Manager in New York shows 04:00 hours local time, MDR will work. Note that McAfee Network Security Sensor (Sensor) does not have a built-in clock. It gets UTC time from the Manager. Note: When upgrading the Primary and Secondary Managers, first suspend MDR. Otherwise, MDR may malfunction. Once MDR is suspended, upgrade the Secondary Manager, and then upgrade the Primary Manager. Once both Managers are upgraded, resume MDR. Sensors communicate directly only with the Primary Manager. The Secondary Manager becomes active only when a majority of Sensors fail to reach the primary or when a manual switchover to the Secondary is performed. The Secondary Manager receives configuration information from the Primary on a regular basis.

24

McAfee Network Security Platform 6.0

Preparing for Manager Disaster Recovery (MDR)

Note 1: Alert and packet log information is not sent to the Secondary Manager on a regular basis. Note 2: Custom roles created on the primary Manager are not copied onto the Secondary Manager. The roles have to be manually created on the Secondary Manager. MDR failover is not stateful. All in-flight transactions are lost during the failover process. For example, if the Primary Manager crashes after receiving an alert from a Sensor, but before writing it to the database, the alert is lost. However, if the Primary crashes before fully receiving the alert, the Sensor Manager buffers the alert and eventually forwards it to the Secondary Manager. When the standby becomes the active Manager, it will have a clean Threat Analyzer. Manager will still have mechanisms for automating all tables back-ups. There is a manual switch-back mechanism. After switch-back, alert and packet log data is copied from Secondary Manager to Primary Manager. This data can be viewed in the Historical Threat Analyzer. For more information, see Historical Threat Analyzer, System Status Monitoring Guide.

MDR communication
The MDR architecture incorporates Sensor to Manager communication and Manager to Manager communication. A Sensor connected to an MDR pair maintains communication with both Managers at all times. The primary Manager synchronizes data with the secondary Manager every 15 minutes. However, the primary and secondary Managers receive system events from a Sensor independently, and store the events also independently. If the Sensor has trouble communicating with the primary Manager, it will send a system event to the secondary Manager about the communication error between it and the primary Manager.

Sensor to Manager communication


Sensors in Network Security Platform are MDR aware. When Sensors first establish trust with Manager, they query Manager to find out if the Manager is part of an MDR pair. The Manager responds and, if it is part of an MDR pair, includes its current status (active or standby) and the IP of its peer Manager. The Sensor then establishes trust with the peer as well. The Sensor sends alerts, packet logs to both the Managers. Real-time synchronization between the MDR pair ensures that the data present in the active mode is exactly mirrored in the standby. This ensures minimal loss of data if the active Manager goes down. Alerts and packet logs sent by the Sensor to the Manager can be viewed in the Threat Analyzer. In addition to alerts, faults and McAfee NAC host events are also synchronized between the Managers. You can view all hosts, alerts, and packet log data in the Threat Analyzer. In case one of the Managers goes down, then after it comes up, the other Manager will update the alerts and packet log data to the first Manager during synchronization.

25

McAfee Network Security Platform 6.0

Preparing for Manager Disaster Recovery (MDR)

Manager to Manager communication


Once each minute, the primary and secondary Managers exchange a heartbeat communication. This communication includes a byte of data specific to the health of Manager in question. Manager receiving the heartbeat concludes that its peer has failed under two scenarios: One of the Network Security Platform subsystems reports a failure. A heartbeat has not been received within the Downtime Before Switchover interval (configured using the Manage Pair Configuration action). For example, if the default interval is 5 minutes and the heartbeat is sent once a minute, the secondary takes control after five minutes of missed heartbeats. If the secondary Manager becomes unavailable, the primary remains active and logs the failure. If the primary Manager becomes unavailable, the secondary logs the event and becomes active. If both Managers are online but are unable to communicate with each other, the secondary Manager queries each Sensor and becomes active only if more than half the Sensors cannot communicate with the primary Manager. Data synchronization between the primary and secondary Manager occurs every 15 minutes. The MDR tab provides the following functions: Viewing the current details of MDR (on page 26) Configuring MDR (on page 27) MDR Actions (on page 31) Viewing MDR switchover history (on page 33)

Viewing the current details of MDR


The Manage Pair action enables you to view the current state of MDR functions including Primary Manager status, Secondary Manager status, and a summary of current MDR settings.

Figure 28: MDR Details Page

26

McAfee Network Security Platform 6.0

Preparing for Manager Disaster Recovery (MDR)

Configuring MDR
The Manage Pair action enables you to configure both the Primary and Secondary Managers used for MDR.

Initial MDR Configuration


First, you must configure MDR separately on both the Primary and Secondary Managers: 1 Select Manager > MDR > Manager Pair. Note 1: Network Security Platform supports a maximum of three IP addresses during MDR configuration. Note 2: Network Security Platform assumes that all the IP addresses are bound to the same host name. Note 3: Manager supports one public IPv6 address per NIC. This means that there should be only one IPv6 address for the IPv6 stack supported by your operating system.

Figure 29: MDR Pair Creation Page

Fill in the following fields:


Role of this Manager: Select Primary to use this Manager as the active Manager, or Secondary to use this Manager as the standby. Use Out-of-Band (OOB) Manager-to-Manager Communication?: Select

Yes to use separate interfaces for Manager-Manager and Manager-Sensor communication. No to use the same interface for Manager-Manager and Manager-Sensor communication. If you have selected Yes, then set the following: Peer IP for Manager-to-Manager Communication: Enter the IP address of the Peer Manager that you wish to use for Manager-Manager communication. Note 1: These IP addresses are not reachable from the Sensors. Note 2: If you set Out Of Band (OOB) Manager to Manager Communication to Yes in the Primary Manager, then set this option as Yes in your Secondary Manager as well. A mismatch in this option setting between the Primary and Secondary Manager pair will result in an MDR configuration failure.

27

McAfee Network Security Platform 6.0

Preparing for Manager Disaster Recovery (MDR)

Peer IP for Manager-to-Sensor Communication: Enter the IP address of the peer Manager

(that is, use the address of the secondary Manager if you have designated this Manager as Primary.) You can configure either IPv4 address or IPv6 address or both, as given in the following scenarios: If a Sensor is connected to Manager over an IPv4 network, or you want to add a Sensor from the IPv4 network to the Manager, then you need to enter the IPv4 address of the peer Manager. If a Sensor is connected to Manager over an IPv6 network, or you want to add a Sensor in the IPv6 network to the Manager, then you need to enter the IPv6 address of the peer Manager. If there are Sensors configured in Manager over both IPv4 and IPv6 networks, then you need to configure both IPv4 address and IPv6 address of the peer Manager. Note 1: While configuring the Peer IP for Manager-to-Sensor Communication, make sure that the operating system support both IPv4 and IPv6 stacks. When Use Out-of-Band (OOB) Manager-to-Manager Communication is set to No, Peer IP for Manager-to-Sensor Communication is used for both Manager-Manager and ManagerSensor communication. When Use Out-of-Band (OOB) Manager-to-Manager Communication is set to Yes, Peer IP for Manager-to-Sensor Communication is used only for Manager-Sensor communication. Important: You need to use the Peer IP for Manager-to-Sensor Communication while establishing trust between the Sensor and Manager. Ensure that your peer Manager is configured to use the same IP address as selected from the Dedicated Interface list during the Peer Manager installation. If mis-configured, Network Security Platform generates an error message to prompt you to enter the correct IP address. For more information on Sensor communication Interface, see Installation Guide.
MDR Pair Shared Secret: The same shared secret key must be entered on both Managers for MDR creation to be successful. Enter a minimum of eight characters and use no special characters. Confirm MDR Pair Shared Secret: Re-enter the same shared secret key. Downtime Before Switchover: Enter the downtime in minutes before the switch to the

secondary Manager occurs. Downtime before switchover should be between 1-10 minutes. This field is disabled if the Administrative Status of Manager is set to Secondary. 3 Click Finish to confirm your changes. Note: When you click Finish and your peer Manager's MDR settings are not yet configured, then Network Security Platform displays a warning to remind you to configure the peer Manager MDR settings. For more information, see MDR Actions (on page 31).

28

McAfee Network Security Platform 6.0

Preparing for Manager Disaster Recovery (MDR)

Scenarios for MDR configuration


Scenario 1
Two Managers are in an MDR pair, and you are adding the Sensor configuration information in Manager.

Figure 30: MDR Scenario 1

If connection A between Manager1 and Manager2 is over IPv4 network, and you are adding a Sensor configuration in Manager1, then the communication between Manager1 and Sensor (that is, connection B) should also be over IPv4 network. Similarly, if connection A between Manager1 and Manager2 is over IPv6 network, and you are adding a Sensor configuration in Manager1, then the communication between Manager1 and Sensor (that is, connection B) should also be over IPv6 network. If connection A between Manager1 and Manager2 is over both IPv4 and IPv6 networks, and you are adding a Sensor configuration in Manager1, then the communication between Manager1 and Sensor (that is, connection B) can be configured for either IPv4 or IPv6 network.

Scenario 2
Suppose one Manager1 is standalone (not part of an MDR pair), and you want to add a peer Manager (that is, Manager2) with Manager1 to form an MDR pair.

29

McAfee Network Security Platform 6.0

Preparing for Manager Disaster Recovery (MDR)

Figure 31: MDR Scenario 2

If the communication between Sensors and Manager1 (that is, connection B and C) is over IPv4 network, then the communication between Manager1 and Manager2 (that is, connection A) should also be configured for IPv4 network. Similarly, if the communication between Sensors and Manager1 (that is, connection B and C) is over IPv6 network, then the communication between Manager1 and Manager2 (that is, connection A) should also be configured for IPv6 network. If B and C support both IPv4 and IPv6 networks, then A can be configured to support either IPv4 or IPv6 network.

Using NAT (Network Address Translation)


Network Address Translation (NAT) is a technique in which the source and/or destination addresses of IP packets are rewritten as they pass through a router or firewall. It is commonly used to enable multiple hosts on a private network to access the Internet using a single public IP address. Only static NAT entries are supported in Manager. Consider the following scenarios to explain the use of NAT in Manager:

Scenario 1: Manager using a private IP address


To establish the Manager-Sensor communication, configure the Manager's public IP address (external reachable) on the Sensor by using the following CLI command: set Manager IP Note: To support multiple NIC cards, you need to select the respective local IP address in Sensor Communication Interface during Manager installation. For more information on Sensor Communication Interface, see Installation Guide.

30

McAfee Network Security Platform 6.0

Preparing for Manager Disaster Recovery (MDR)

Scenario 2: Sensor using a private IP address


The Manager-Sensor communication works as usual. You need not make any changes to the setup to achieve this.

Configuring MDR with NAT


To set up MDR with NAT, consider the following scenarios:

Scenario 1: Manager-Sensor communication with NAT and Manager-Manager communication without NAT
Configure the public IP address (external reachable) in the Peer Host IP address field to establish Manager-Sensor communication. Note: To support multiple NIC cards, select the respective IP address in the Sensor communication Interface field during installation. For more information, see Sensor Communication Interface, Installation Guide. Configure the OOB Peer Manager IP field with the local IP address of the peer Manager to reach the Manager without using NAT. If Manager is in a private network, enter the public IP address in the Peer Host IP address field of the secondary Manager.

Scenario 2: Manager-Sensor Communication with NAT and ManagerManager communication with NAT
Configure the public IP address (external reachable) in the Peer Host IP address field to establish Manager-Sensor communication. You need not configure OOB Peer Manager IP field as communication takes place using the Peer Host IP Address field. Note: In case the peer Manager uses different translated IP addresses, you can configure the public (external reachable) IP address in the OOB Peer Manager IP field.

MDR Actions
After configuring MDR, the following actions are available:
Command Description Availability

Reset to Standalone End MDR and have sole control of Sensors using one of the Managers. Switch Over Request that the secondary Manager be active.

Available on both the primary and secondary Managers. Available only when the primary Manager is active.

31

McAfee Network Security Platform 6.0

Preparing for Manager Disaster Recovery (MDR)

Command

Description

Availability

Switchback

Switch back from the secondary Manager and make the primary Manager active. Instruct the secondary Manager not to monitor via MDR Status check and to resume MDR only when indicated. Resume MDR mode when the MDR is suspended. Force the secondary Manager to become active. Transfer configuration data from the primary Manager to the secondary Manager. This is provided to allow manual synchronization between Managers in addition to the automatic transfer of configuration data at regular time intervals.

Available when the primary Manager status is in standby mode. Available only on the primary Manager when in the active state.

Suspend MDR

Resume MDR

Available only when the primary Manager is in the suspended state. Available only when the secondary Manager is in standby mode. Available in the secondary Manager only when it is in standby mode.

Force Switch

Retrieve Configuration

MDR verification via CLI


The show and status commands include information specific to MDR. For more information on using CLI commands, see CLI Guide.

Figure 32: MDR Verification via CLI

32

McAfee Network Security Platform 6.0

Preparing for Manager Disaster Recovery (MDR)

Viewing MDR switchover history


The Switchover History action enables you to view previous MDR activity, including the date on which the activity occurred, the users performing the activity, and the nature of the activity. 1 Select Manager > MDR > Switchover History. Note: To view the MDR Switchover history in Central Manager, select Central
Manager > MDR > Switchover History.

Choose one of the following reports:


Select MDR history for this day: View MDR history for a single day. Select MDR history between these dates: View MDR history between particular dates. Select MDR history in the past: View MDR history for the selected number of days.

Click View to view the selected MDR history.

Figure 33: Switchover History

33

CHAPTER 6

Establishing communication with Central Manager


McAfee Network Security Platform [formerly McAfee IntruShield] provides a centralized, manager of managers capability, named McAfee Network Security Central Manager. McAfee Network Security Central Manager (Central Manager) allows users to create a management hierarchy that centralizes policy creation, management, and distribution across multiple McAfee Network Security Managers. For example, a policy can be created in the Central Manager and synchronized across all McAfee Network Security Managers (Managers) added to that Central Manager. This avoids manual customization of policy at every Manager. The Central Manager provides you with a single sign-on mechanism to manage the authentication of global users across all Managers. McAfee Network Security Sensor configuration and threat analysis tasks are performed at the Manager level. A Manager can be added to Central Manager using a method similar to that of adding a Sensor to a Manager, or configure Managers to work in MDR mode by establishing trust between a secondary and primary pair. For more information, see Synchronization between Central Manager and Network Security Platform Manager, Central Manager Administrator's Guide. Note: When trust establishment is initiated from Manager to Central Manager, the system may take approximately two minutes to display the configured Manager on the Central Manager Resource Tree. The Central Manager tab enables the viewing and managing details for synchronizing with Central Manager: Viewing Central Manager details (on page 35) Managing Central Manager details (on page 35)

Figure 34: The Central Manager Tab

34

McAfee Network Security Platform 6.0

Establishing communication with Central Manager

Viewing Central Manager details


The Trust Establishment page shows Central Manager configuration details such as Manager Name, Central Manager IP Address, contact information, location, and Synchronization Enabled (Y/N). If Central Manager is configured in an MDR pair, then details of the MDR pair are available in Manager.

Figure 35: Central Manager Details Page Field Description

Manager Name Status IP Address Version Contact Information Location Synchronization Status

Logical name given to Manager to connect to the Central Manager. Status of trust establishment between the Manager and Central Manager. Central Manager server's IP address Central Manager's version number Name of contact person Geographical location (area, city) Enable synchronization between the Central Manager and Manager (default is Enabled) The last synchronized time between the Central Manager and Manager

Last Synchronization Time

Managing Central Manager details


To enable trusted communication between your Manager and Central Manager, you need to specify the details of Central Manager in Manager. Once communication has been established, Central Manager can synchronize with Manager and can access its configuration.

35

McAfee Network Security Platform 6.0

Establishing communication with Central Manager

To add a Manager to Central Manager, do the following: 1 Select Manager > Central Manager > Trust Establishment.

Figure 36: Central Manager Trust Establishment Page

Type the Manager Name. The Name must begin with a letter. The maximum length of the Name is 40 characters. Note: Special characters except hyphens and underscores are not allowed.

3 4

Enter Central Manager IP Address. This can be either IPv4 or IPv6 address. The Shared Secret must be a minimum of 8 characters and maximum of 64 characters in length. The Shared Secret cannot start with an exclamation mark nor have any spaces. Secret parameters that can be used in Manager are: 26 alpha: upper and lower case (a,b,c,...z and A, B, C,...Z) 10 digits: 0 1 2 3 4 5 6 7 8 9 32 symbols: ~ ` ! @ # $ % ^ & * ( ) _ + - = [ ] { } \ | ; : " ' , . < > ? / Caution: The exact, case-sensitive Manager Name and Shared Secret must also be entered into the Central Manager setup. If not, the Manager will not be able to register itself with the Central Manager. Retype the Shared Secret to confirm.

5 6 7

Type the Contact Information and Location (Optional).


Synchronization Enabled is enabled by default. Select No to disable synchronization with

Central Manager. Click Finish to begin the Central Manager-Manager trust establishment process. Note: Trust establishment to Central Manager may take a while. You will need to Refresh the page to see the latest settings.

36

McAfee Network Security Platform 6.0

Establishing communication with Central Manager

Figure 37: Central Manager Details

Central Manager Actions


After connecting to the Central Manager, the following actions are available:
Command Description

Save Reset to Standalone Synchronize Now Reset & Synchronize Refresh

Saves the changes made. Disconnects from the Central Manager and has the sole control of Sensors using the Manager. Initiates a synchronization immediately, instead of waiting for a scheduled interval Reset the last saved values and initiates a synchronization Clears current changes and view the last saved configuration.

37

CHAPTER 7

Managing your Network Security Manager database


Network security is an ongoing process that requires a long-term plan for archiving and maintaining your database for the alerts and packet logs generated by your deployed Network Security Sensors. Archiving this information is necessary for historical analysis of alerts that may help you better protect your network in the future. All sizing estimates are based on tests of various alert/log generation frequencies. Multiple frequency and file size parameters are offered to help you better prepare your database for long-term maintenance. As alerts and packet logs gradually accumulate in your database, the disk space allotted to your McAfee Network Security Platform processes will require thoughtful planning and maintenance to keep up with the frequency and size of incoming data. Depending on your archiving needs, it is essential that you understand the database space required to maintain an efficient system. One question to ask yourself is: If my Sensors generate one alert every ten seconds for a year, how much database space will I need to maintain all of these alerts? With that question in mind, the following topics are presented to help you get the most out of McAfee Network Security Manager (Manager) and database: Capacity planning: (on page 38) Ensure that resource requirements are met for optimal performance. Database maintenance and tuning (on page 39): Perform regular database tuning to ensure optimal performance. Database backup and recovery (on page 43): Backup and archive to protect against hardware/software failure. Maintenance tab in Manager (on page 49): File pruning of the generated log data and files. Using the Database Admin Tool (on page 52) : a standalone tool for maintaining your Manager database.

Capacity planning for Manager database


One of the first tasks to complete when you are deploying McAfee Network Security Platform is the installation and setup of your database. The database houses the alert and packet log data generated by the Network Security Sensors. The integrity and availability of this data is essential to a complete McAfee Network Security Platform experience. Note: For more information, see Capacity Planning, IPS Configuration Guide.

38

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

Database maintenance and tuning


Once you have determined the necessary database capacity for archiving your alerts and packet logsas well as other McAfee Network Security Platform generated logs and filesyou should consider a maintenance plan that keeps your database performing at an optimal level. Deleting old, unwanted alerts, packet log entries, and other files (for example, backups, saved reports) ensures adequate capacity for future data. For database maintenance, Network Security Platform offers two solutions: File pruning action (Manager > Maintenance > File Pruning). This action enables you to set a schedule by which Network Security Platform generated logs and files are deleted from McAfee Network Security Manager (Manager) and database. File pruning allows you to delete Network Security Platform data that has reached a set age (number of days old). Data is deleted according to a weekly schedule; this time, seen as Enable Automatic File Pruning? [Option], Recur every: [day], and Start Time [Hr:Min], must be enabled to operate. Note: For more information on configuration of file pruning, see Setting a schedule for file pruning (on page 49). If you plan to use Alert Data Pruning (IPS Settings > Maintenance > Alert Data Pruning) to delete alert and packet log data, McAfee recommends entering a value such as 90, as in 90 daysin the Maximum Alert Age field. This allows for long-term analysis of alerts and packet logs without over burdening your database with millions of records, which may affect long-term and overall database performance. By setting the value to 90 days, all alerts and packet logs older than 90 days are deleted at the scheduled time every day. Suppose you set a value of 90 days for the Maximum Alert Age field and a value of 10000 for the Max Alert Quantity field. Then at the scheduled time, Manager deletes all alerts that are older than 90 days and then checks if the number of alerts and packet logs is less than or equal to 10000. If it is more than 10000 then it deletes the oldest alerts and packet logs until the number is less than or equal to 10000. Note: For more information on configuration of alert data pruning, see Alert Data Pruning, IPS Configuration Guide. You can also delete alerts in the Threat Analyzer. This, however, only marks alerts for deletion in the database. To permanently delete these alerts from the database, you need to use the DB Purge feature in the dbadmin.bat utility or the purge.bat utility. Scheduled alert and packet log purge as part of Alert Data Pruning (IPS Settings > Maintenance > Alert Data Pruning) has no effect on the alerts marked for deletion. Deleting alerts marked for deletion is a time-consuming process. Therefore, to delete alerts marked for deletion that are less than the age specified in the Maximum Alert Age field, you need to use the dbadmin.bat or the purge.bat utility and manually delete these alerts. Also, note that the Manager has to be stopped to run the dbadmin.bat. Note: Entering a very large value (such as 500, as in 500 days) is not recommended due to the capacity required to archive 500 days worth of alerts. Your requirements will determine the number of days you need to maintain alerts. If you must keep alerts for several hundred days, ensure that you have the necessary hard drive space on your Manager server, or back up your alert tables regularly as outlined in Database backup and recovery (on page 43).

39

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

Tip: You can use the purge.bat utility or the dbadmin.bat utility for alert and packet log data maintenance. Thus, if possible, do not schedule disk space maintenance with respect to alert and packet logs. Purge.bat utility: Provided with your Manager installation is the alert and packet log data maintenance utility, purge.bat (<Manager installation directory>\App\bin\purge.bat). This utility enables on-demand deletion of alerts and packet log data from your database. Alerts and packet logs can be deleted that are older than a specified number of days, or if they have been marked for deletion via the Threat Analyzer tool. Using purge.bat, you can also automatically start the database tuning utility, dbtuning.bat, immediately after the purge is completed. This utility ensures your database is properly maintained for optimal continued use. For more information on running purge.bat, see Deleting alerts and packet Logs from the database using purge.bat (on page 59). For more information on database tuning, see Database tuning (on page 40).

Database tuning
Over time, a relational database can experience performance issues if the data is not retuned on a recurring basis. By regularly diagnosing, repairing, and tuning your database internals, you can ensure optimal database performance. McAfee provides a set of Manager interface actions (Manager > Database Tuning) and a standalone utility, called dbadmin.bat, to maintain database performance. Note: You can also use dbtuning.bat to tune your Network Security Platform database. However, McAfee strongly encourages you to use dbadmin.bat for all your database administration tasks. The database tuning feature does the following: Defragments tables where rows/columns are split or have been deleted Re-sorts indexes Updates index statistics Computes query optimizer statistics Checks and repairs tables On a regular basis (minimum recommendation: one month), perform database tuning on your Manager server. Completion time is dependent on the number of alerts/packet logs in the database and the performance of your Manager servers physical hardware platform. Note: When you perform off-line database tuning, you must shut down the Manager service for proper performance. McAfee recommends scheduling this downtime for whenever you plan to re-tune the database. Your McAfee Network Security Sensors (Sensors) can continue to operate and generate alerts because of built-in alert buffers.

Tuning the Manager database


The Database Tuning tab provides actions for enabling you to schedule or initiate tuning of the MySQL database.

40

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

McAfee recommends tuning your database once per month at a minimum. For optimal performance, tuning once a week provides best results.

Figure 38: Database Tuning Tab

The Database Tuning tab provides for the following actions: Viewing current database tuning status (on page 41) On-demand database tuning (on page 41) Automating database tuning (on page 42)

Viewing current database tuning status


The Tuning Status action (/My Company / Manager > Database Tuning > Tuning Status) provides the current database tuning operation status for the Manager or Network Security Central Manager(Central Manager). For the Central Manager, tuning status can be viewed from /My Company / Central Manager >
Database Tuning > Tuning Status.

This dialog box displays one or more of the following:


Start Time: The time in-progress tuning started. Status: Displays if tuning has yet been initiated, is in progress, or is idle. End Time of Latest Tuning: Time when database was last tuned. Clicking Refresh updates the dialog to provide you with the latest status (thus if another user initiated tuning since you opened the dialog, you could see the status after refreshing).

Figure 39: Database Tuning Status Dialog

On-demand database tuning


For on-demand database tuning of Manager database, do the following: 1 Select Manager > Database Tuning > Now. Note: For on-demand database tuning of Central Manager, select Central
Manager > Database Tuning > Now.

41

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

Select which tables to tune, either All Tables or only the Event Tables. Note: All Tables provide backup for the entire database, that is, all configurations, user activity, and alert information, whereas Event Tables backup alert, packetlog, host and Sensor performance events.

Click Start.

Figure 40: Database Tuning Now Dialog

Automating database tuning


When scheduling database tuning, set a time when no other scheduled functions (archivals, backups, file maintenance) are running. The time should be a minimum of an hour after/before other scheduled actions. To schedule database tuning, do the following: 1 Select Manager > Database Tuning > Automation. Note: To schedule database tuning in Central Manager, select Central Manager >
Database Tuning > Automation.

Figure 41: Database Tuning Scheduler

2 3 4 5

Select Yes at Enable Scheduled Tuning? Select the day of the week when database tuning will occur (Recur every). Use the Hr and Min drop-down menus to select the process start time. Select which tables to tune, either All Tables or only the Event Tables. Note the Last Tuning time. This indicates the last time the database tuning process occurred.

42

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

6 7 8

Click Save. The database tuning process is now enabled to start automatically on the configured day and time. (Optional) Click Refresh to clear current changes and view the last saved configuration. (Optional) Click View Scheduler Detail to be redirected to the Scheduled Tasks page. This page displays the overall scheduled tasks in the Manager

Figure 42: Scheduled Task page

Click Back to return to the Automation page.

Database backup and recovery


Protecting your database against hardware and software failures is essential for ensuring the availability and integrity of configuration and/or forensic data. McAfee Network Security Platform provides backup functionality under the Manager > Backing Up within the McAfee Network Security Manager (Manager) Configuration page, or through a standalone tool called the Database Backup and Restore Tool (<Manager installation directory>\App\bin\dbadmin.bat). Note: You can also use dbbackup.bat to back up and restore data. However, McAfee strongly encourages you to use dbadmin.bat for all your database administration tasks. For more information on the Database Backup and Restore Tool, see Using the Database Admin Tool (on page 52). In the Manager, backups can be performed by a set schedule (Automation) or on demand (Now). The standalone tool can also perform backups, and is the only area wherein restoration of a backup can be executed. When performing a backup, you can back up the following tables (Backup Types):
All Tables: back up all information, including configurations, alerts, and audits. This option is not enabled by default due to disk space consideration. When backing up All Tables, use the Now action.

Tip: Saving your All Tables settings monthly is strongly recommended.


Config Tables: back up only tabled information relating to configured tasks. This option is enabled by default to occur every Saturday night. This is set within the Schedule

action. Tip: Saving your configuration settings weekly is strongly recommended.

43

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

Audit Tables: back up only information on user activity and alert information. Backing up this data is useful for offline analysis. This option is not enabled by default. Use the Now

action. Note: For more information on all Backup tab actions, see Backing up tab in Manager (on page 44).

Database archival
Archiving your database is also recommended for protection against hardware and software failures. Once saved, the archival is available for future or third-party (such as Crystal Reports) retrieval. Note: An archived database can be sent to Technical Support in the event of database issues. McAfee recommends archiving your database to one of the following for added redundancy of system data, and to save Manager server disk space: A network-mapped drive CD-ROM/ DVD-ROM Multi-disc RAID storage on Manager server Database Replication Secure FTP

Protecting your backups


To ensure the availability of a backup, McAfee recommends the following testing backup restoration on a staging or non-production Manager server on a systematic basis. To ensure the integrity of backups, McAfee recommends creating a digital fingerprint of all backup files using one-way hash functions such as MD5/SHA 1 to detect tampering. The following are general rules for protecting your backups: Avoid creating additional database user accounts. Block remote access to the database. Restrict access to physical data files in the database install directory.

Backing up data and settings


The Backing Up tab actions enable you to back up your McAfee Network Security Platform data on-demand or by a set schedule. Regularly backing up your data (alerts, saved reports, logs) and configuration settings is strongly recommended to maintain the integrity of your system.

44

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

Figure 43: Backing Up Tab

Note: Restoration of stored data must be performed using the standalone Database Admin tool. This tool is explained in this section. The Backing Up tab and the standalone tool provide the following functions: Backing up your Manager data: (on page 46) Save your data to your Manager server, a network server, or a device such as a zip drive. Automating a backup for your Manager (on page 48): Set a frequency for backing up McAfee Network Security Manager (Manager) data. Using the Database Admin Tool (on page 52): Backup and restore via the standalone Database Admin tool. Backing Up Using the Database Admin Tool (on page 53) Restoring Data Using the Database Admin Tool (on page 54) Note 1: Before an All Tables or Audit Tables backup, it is recommended that you shut down the McAfee Network Security Manager (Manager). Therefore, McAfee recommends using the standalone Database Admin tool rather than your Manager for such backups. Note 2: Data restore can only be performed using the standalone tool. For more information on database backup, see Managing your Network Security Manager Database (on page 38).

Backup and restore best practices


Note the following suggestions for successful backup and restore of Network Security Platform data: Protect your backups from tampering by creating a digital fingerprint of the file using a hash function such as MD5 or SHA-1. Back up your configuration data after major changes, such as created admin domains, McAfee Network Security Sensor (Sensor) addition, port configuration, and policy additions/modifications. The All Tables and Audit Tables options can be rather large in size, depending upon the amount of alert data in your database. McAfee recommends saving these types of backups to an alternate location, preferably an alternate system. When scheduling backups, set a unique time when no other scheduled functions (archivals, database tuning) are running. The time should be a minimum of an hour after/before other scheduled actions. When restoring your data, note that all related table information in the database is overwritten. For example, restoring a Config Tables backup overwrites all current information in the configuration table of the database. Thus, any changes not backed up are erased in favor of the restored backup.

45

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

While a MySQL backup is performed, the tables being backed up are placed in a READ LOCAL LOCK state. New records can be inserted in these tables while the backup is in progress, although these new records will not show up in the backup. However updates/modifications of existing records are not allowed during the backup. While a backup is in progress, you will not be able to perform the following activities: Modify the configuration Acknowledge and delete alerts Acknowledge and delete faults Add audit log entries Purge the alert and packet logs Perform database tuning. New alerts and packet logs will continue to be added to the database during the backup. In case of problems during database backup or restore, try after you complete the following tasks: Exclude the following MySQL directories from anti-virus scanning: data innodbdata Create a new directory like c:\mysqltmp, which will act as temporary directory for MySQL database. If the system has multiple physical disks, then McAfee recommends that you create this directory on a drive different than where Network Security Platform and MySQL are installed to spread the load effectively. Include the following entry in the \\<Network Security Platform install directory> \mysql\my.ini file under [mysqld] section: tmpdir=c:/mysqltmp Restart both Network Security Platform and MySQL services.

Back up of your Manager (or Central Manager) data


You can back up your Manager data to your Manager server, or another media connected to your Manager, such as a tape drive. The backup file is saved by default within Manager program installation folder at <Network Security Manager install directory>\App\Backups. The above is applicable to Network Security Central Manager (Central Manager) as well. To back up your Manager data using Manager server:

46

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

Select Manager > Backing Up > Now.

Figure 44: Backing Up Now Page

Note: To backup your Central Manager data, select Central Manager > Backing Up > Now. The fields displayed are similar to that in Manager described below. 2 Select one of the following Type choices. These choices will backup information as described below:

Figure 45: Backup Type Choices

All Tables: provides backup for the entire database, that is, all configurations, user

activity, and alert information.


Audit Tables: provides backup information related to user activity and Manager Health

Status.
Config Tables: provides backup for the Manager configuration. Event Tables: will backup alert, packetlog, host and Sensor performance events. Trend Tables: will backup the trend patterns (daily/weekly/monthly) of alerts and Sensor performance events. The backup also includes the first-seen attack statistics.

Caution: Do not make modifications to existing database records while doing an All Tables or Audit Tables backup, since such modifications are not allowed while a backup is occurring.

47

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

3 4 5 6

Type a Target File Name. You can use alphanumeric characters including hyphens and underscores (for example, backup_01-10-03). (Optional) Type a location different from the default to be your Alternate Target Backup Directory. (Optional) Type a description of your backup in Description. Click Backup. After a few moments, the following message appears: Successfully backed-up data. The backup information appears in the List of Previous Backups. At the backup location, an XML file with the backup file name contains the description entered in the Description field.

Note: Previous backups can be exported to a desired location by selecting the radio button against the backup in the Previous Backups list and clicking the Export button. The selected Backup in the Previous Backup list be deleted using the Delete button.

Automating a backup for your Manager (or Central Manager)


The Schedule action enables you to schedule the backup of your system configuration. Setting a schedule also allows you to work on other configurations without having to worry constantly about manually saving your work. Scheduled backups are saved by default to your installation folder: <Network Security Manager install directory>\App\Backups\ScheduledBackups. Note: By default, your Config Tables are scheduled for back up every Sunday at 0 Hrs 5 Min. Each scheduled backups is saved to the default scheduled back up folder. To schedule a backup, do the following: 1 Select Manager > Backing Up > Automation. Note: To run the database backup automation for your Central Manager data, select Central Manager > Backing Up > Automation. The fields displayed are similar to that in Manager described below.
Default Target Backup Directory: displays the location of the backup directory.

2 3

Note Yes is selected by default at Schedule a Backup?. Select No at any time to turn off the scheduled backup. Select a backup Frequency:
Daily: select the daily time to backup. Weekly: select the day and time to backup.

Note 1: If you want an immediate backup of Manager data, perform the Now action. For more information, see Backing up your Manager (or Central Manager) data (on page 46). Note 2: You can click View Scheduler Detail to see the when processes are scheduled. These processes can include data backups, database maintenance, and file maintenance actions. Based on this information, you can choose an appropriate time for the backup you are currently scheduling. 4 Select the backup Type from the following: Note: You can only set a schedule for one backup Type at any given time.
All Tables: all configuration, audit and alert information. Audit Tables: backup information related to user activity and Manager Health Status.

48

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

Config Tables: only tabled information for the Manager configuration. Event Tables: information on alert, packetlog, host and Sensor performance events. Trend Tables: trend patterns (daily/weekly/monthly) of alerts and Sensor performance events. The backup also includes the first-seen attack statistics.

Caution: Do not make modifications to existing database records while doing an All Tables or Audit Tables backup since such modifications are not allowed. 5 6 (Optional) Type the location of the Backup Directory if different from the default directory. Click Save.

Figure 46: Back Up Scheduler

Maintenance of system data and files


The Maintenance tab under the Manager node enables the following: Setting a schedule for File pruning (on page 49): Schedule deletion of the system data and files (logs, diagnostics, and so on) generated by System Configuration actions.

Figure 47: The Maintenance Tab

Setting a schedule for file pruning


The File Pruning action enables you to set a schedule by which generated log data and files are deleted from your Manager/database. These data/files are admin created through various System Configuration actions, and each details a different aspect of system functionality. These system files get larger as more data is added over time. File pruning allows you to delete the data in a log or an entire static file either at the next scheduled time or in a set number of days. Regular deletion saves disk space on Manager server, thus improving overall performance. The deletion scheduler works as follows: First, you set a daily time when you want File pruning that is, deletionto take place; this is under the Maintenance Scheduler setting. Next, for each file type, you set a number of days/file size ( Scheduled Deletion ) after which you want a file that has reached the set age/size to be deleted. On the day a file is to be deleted, deletion takes place at the set daily time.

49

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

Note: When scheduling File pruning, set a time when no other scheduled functions (archivals, backups, database tuning) are running. The time should be a minimum of an hour after/before other scheduled actions. To schedule deletion for Manager and database files, do the following: 1 Select Manager > Maintenance > File Pruning. Note: To schedule file pruning action in the Central Manager, select Central
Manager > Maintenance > File Pruning.

2 3 4 5

Select Yes to enable automatic file pruning. This overrides the enabled status of individual file types from the table. Select the day (Recur every) on which automatic file pruning will occur. Saturday is the default. Set the time (Start time: At Hr and Min) for the selected day when you want scheduled maintenance to occur. The default is 23:30 hours. View the list of files/logs for which you can set maintenance: Note: The default enabled status for each file/log is listed in parentheses after each description that follows. Manager Files Diagnostics: files created by performing the steps in Uploading a diagnostics trace from a Sensor to your Manager, Device Configuration Guide. (Yes) Sig Files (*.bin): files created during signature files update from the Manager to McAfee Network Security Sensor (Sensor) by performing the steps in Updating the configuration of all Sensors. (No) DoS Files: denial of service (DoS) profiles uploaded from your Sensors. These files are downloaded by performing the steps in Managing DoS Learning Mode profiles on a Sensor, Device Configuration Guide. (Yes) Backup Files: saved Manager configuration, audit, and/or alert data as created by performing the steps in Backing up and restoring data (on page 44). (Yes) Saved Reports: all saved scheduled reports created by performing the steps in Scheduling a report, Reports Guide. (Yes) Hourly Data Mining: deletes trend data collected for trend analysis resources on an hourly basis. (No) Daily Data Mining: deletes trend data collected for trend analysis on daily basis.(No) Daily Archival: those archivals scheduled as Daily when Scheduling automatic archival. Weekly Archival: those archivals scheduled as Weekly when Scheduling automatic archival. Monthly Archival: those archivals scheduled as Monthly when Scheduling automatic archival. Database Data Audit Log: log detailing user activity. Data is deleted by timestamp; the file itself is never deleted. This file can be viewed by performing the steps in Generating a User Activities Audit, Administrative Domain Configuration Guide. (Yes) Fault Log Data: log detailing system faults. Data is deleted by timestamp; the file itself is never deleted. (Yes) Performance Monitor Raw Data: Raw data relating to performance monitoring (data polled from the Sensor every 3 minutes). Performance Monitor Hourly Data: Hourly data relating to performance monitoring. Performance Monitor Daily Data: Daily data relating to performance monitoring.

50

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

Performance Monitor Weekly Data: Weekly data relating to performance

monitoring.
Performance Monitor Monthly Data: Monthly data relating to performance

6 7 8 9

monitoring. Incident Data: all generated incidents in the system marked for deletion. For more information, see Using Threat Analyzer Incident Viewer, System Status Monitoring Guide. (No) Guest User Data: logs containing the guest user information and can be viewed only when NAC is enabled. This will be purged as per the number of days set in the After field. For more information on guest users, see Guest users, Identity-based NAC, NAC Configuration Guide. Select Yes for those file types that you want to be deleted at the scheduled time. For those file types for which you have enabled deletion, type the time duration after which you want the files to be deleted. Click Save when you are done with your changes. (Optional) Click Refresh to update the information displayed in the page. Click View Scheduler Details to go to the Scheduled Tasks page.

Figure 48: File Maintenance Scheduler Settings

51

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

Note: Data on performance monitoring is displayed only when it is enabled from


<Admin Domain> /Device List > Sensor Performance > Enable.

Using the database admin tool


The database admin tool (dbadmin.bat) is a standalone tool that can: Backup and restore Network Security Platform data from the database. Archive and restore alerts and packet logs. Tune your Network Security Platform database and purge unwanted data from it. Change the password of your Network Security Platform database (this is not the database root password). You need to shut down the Manager before performing the following tasks: Data backup restore Data purge Database tuning Database password change McAfee recommends that you stop the Manager before performing a database backup using the Database Admin tool. You can perform the following activities in the database admin tool regardless of Manager status: Alert archival Alert restore The DB Admin tool is available on the Manager server at <Network Security Manager install directory>\App\bin\dbadmin.bat. Note that you need to execute the tool from the same location as well. You can also use the Manager to perform some of the tasks mentioned above. Some of these tasks can be time consuming and resource intensive. Because of the standalone nature of this tool, there will be no additional workload on the Manager when you use the tool to perform these tasks. Note 1: If you are using the tool, then you will need your database user name and password to complete the tasks that would result in changes to the database. Note 2: You will need database root password if you are changing the database user password using the Database Admin tool. Note 3: The Database Admin tool displays all activity console messages as well as error messages for tracking purposes. Related Sections: Backing up your Network Security Platform data using the database admin tool (on page 53) Restoring your Network Security Platform data using the database admin tool (on page 54) Archiving alerts and packet logs using the database admin tool (on page 56)

52

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

Restoring the archived alerts and packet logs using the database admin tool (on page 57) Tuning your Network Security Platform database (on page 59) Deleting unwanted data from your Network Security Platform database (on page 61) Changing your Network Security Platform database password (on page 63).

Note: The database backup tool (dbbackup.bat) is directed to the database admin tool (dbadmin.bat) for backing up and restoring the database.

Backing up using dbadmin.bat


You can back up Network Security Platform data using either the Manager server or the standalone Database Admin tool. However, you can avoid the additional workload on the Manager server by using the tool. To backup using the standalone Database Admin tool: 1 2 Navigate to <Network Security Manager install directory>\App\bin. Execute the dbadmin.bat file. The standalone tool opens. Note: You can also use dbbackup.bat to back up and restore data. However, you will be directed to use dbadmin.bat for all your database administration tasks.

Figure 49: Database Admin Tools - DB Backup Tab

53

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

Select one of the following backup Type choices from the drop down:
All Tables: the entire Manager database consisting of configuration, user activity,

event and trend tables.


Config Tables: information regarding Manager configuration. Audit Tables: information regarding user activity. Event Tables: information regarding events such as, alerts, packetlogs, hosts and

Sensor performance.
Trend Tables: trend patterns (daily/weekly/monthly) of alerts and Sensor performance

events. Caution 1: Backup of Event table option can be large in size depending upon the amount of event data (i.e. alert/ host/ Sensor performance metrics data) in your database. Caution 2: You cannot modify existing database records during an All Tables or Audit and Alert Tables backup. 4 5 Type a backup Filename. You can use alphanumeric characters including hyphens and underscores (for example, backup_01-10-03). Optionally type the backup Directory where you want the backup to be stored. If you do not specify a backup directory, then the backup is stored in the default backup directory at <Network Security Manager install directory>\Backups. It creates a new directory under <Network Security Manager install directory> if the Backups directory does not already exist. Optionally type a description of your backup in Comments. Click Backup. After a few moments, the following message appears: Database backup successful. You can see the backup information by clicking the DB Restore tab. In the backup directory, you will find an XML file (JAR format) with the backup file name that you specified. This file contains backup comments if you had specified any.

6 7

Restoring data using dbadmin.bat


Restoring your backed up data means you want to return to a previous configuration of your Network Security Platform, or to a previous collection of alert data, or both; which may include different Sensor port configurations, policy applications, and so forth. Note that the Manager server must be shut down during a restore; thus, all Manager activities must be stopped to complete a restore. Important : When restoring configuration tables (All Tables or Config Tables), you must de-install your Sensors using the Sensor CLI command deinstall, then reinstall your Network Security Sensors using the set Sensor sharedsecretkey command. If your Sensor or interface configurations have changed since the last backup, you may need to re-wire your segments to match the backed up configurations monitoring settings. Test restoration of backups periodically to ensure that a backup was successful and valid. The best way to do this is to perform a test restore of the backup on a secondary, non-production Manager. Note the following before attempting to restore a backup:

54

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

Database Type and Version: MySQL database users can only import a backup from a MySQL database. Also, a restore of a database backup is only permitted if the major release version of the database and the database backup match. For example, a backup from a MySQL version 5.x.x can only be restored on a Manager using a MySQL version 5.x.x database. Manager Software Version: A restore is permitted only if the major and minor release versions of the current Manager and the backed up Manager from which the backup was created match, that is, a backup from a Manager Release 6.0 can only be restored on a Manager version 6.0. To restore using the standalone Database Admin tool, do the following: 1 2 3 Stop the Manager server service. Navigate to <Network Security Manager install directory>\App\bin. Execute the dbadmin.bat file. The standalone tool opens. Note: You can also use dbbackup.bat to back up and restore data. However, you will be directed to use dbadmin.bat for all your database administration tasks. 4 Click the DB Restore tab.

Figure 50: Database Admin Tools - DB Restore Tab

55

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

Select a backup from the table. All the backups taken through the DB Admin tool are displayed (that is, the backup file copied from another directory is not displayed). Place the mouse cursor over a backup to view file information in a pop-up. Note: If the backup file is stored at a location different from the default one, use the Browse button to locate it.

Click Restore. Note: During a restore, Manager needs to be shutdown. Since Manager is closed to all communication, no alert data sent from the Sensors is received. Manager system log, ems.log, will note "Restore in Progress" faults during this process. A pop-up prompts you for the database user name and password.

Type the database User Name and Password. This information was entered during Manager installation. Note: For MySQL, this is not the MySQL root administrator password.

After the restore process is complete, the following message is displayed: Database restore successful, Restart Manager Service. Ensure that all Java processes are terminated and then restart Manager service (on Manager server). Wait a few seconds for Manager service to restart before attempting to log in. Caution: Ensure that no Java processes are running when restarting Manager service. Otherwise, Manager may experience errors.

Archiving alerts using dbadmin.bat


You can archive alerts and packet logs from either the McAfee Network Security Platform user interface or from the standalone database admin tool. However, you can avoid the additional workload on Manager server by using the database admin tool. The archived data is stored in a zip file at <Network Security Manager install directory>\App\alertarchival. Note that data from the following tables are alone archived: iv_alert iv_alert_data iv_packetlog

56

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

To archive alerts and packet logs using the standalone Database admin tool:
1 2 3 Navigate to <Network Security Manager install directory>\App\bin. Execute the dbadmin.bat file. The standalone tool opens. Select Archival > Alert Archival.

Figure 51: Database Admin Tools - Alert Archival Settings

4 5

Specify the time period of the data to be archived either by using the Day Picker or by specifying the start date and time and the end date and time. Click Archive. Archive Confirmation dialog pop-up appears. Click Yes. When the process is complete, the archived file is saved to <Network Security Manager install directory>\App\alertarchival. This file will also be listed in a table when you restore files using this tool or Manager.

Restoring alerts using dbadmin.bat


You can restore archived alerts and packet logs from either the Network Security Platform user interface or from the standalone Database Admin tool. However, you can avoid the additional workload on Manager by using the Database Admin tool. To restore data, the archived data should either be in Manager server or in a computer that is accessible from Manager server. You can also filter data from an archived file and restore just the filtered data. Suppose that there is an archived file containing data generated between Jan 1 and Jan 10. Then you can filter the data generated between Jan 1 and Jan 5 from the archived file and restore just this data. To restore alerts and packet logs using the standalone Database Admin tool:

57

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

1 2 3

Navigate to <Network Security Manager install directory>\App\bin. Execute the dbadmin.bat file. The standalone tool opens. Select Archival > Alert Restore.

Figure 52: Database Admin Tools - Archival Alert Restore Tab

Do the following:
a. b.

Click Browse to locate the archival or type the file's absolute path name. Select the archived file from the List of Archived Files and then click Restore.

Note: Archived data in the <Network Security Manager install directory>\alertarchival are listed under List of Archived Files. 5 Filter the data in the archived file by specifying the start date and time and the end date and time. Only those alerts and packet logs generated during this time frame are restored from the archived file. Note: The start date and time and the end date and time displayed by default in this window indicate the time frame of the archived data that you have selected to restore. Therefore, if you choose the default dates and times, all the data in the archived file will be restored. 6 7 Click Restore. Enter your database user name and password to complete the restoration process.

Note: Manager server only permits 300,000 alerts to be restored at a time if filtering is applied. If your archive contains more than 300,000 alerts and you set filtering parameters, you will need to perform the restoration process multiple times. For example, if your archival still contains 750,000 alerts after filtering parameters have been met, you will have to restore three times: 1) 300,000 2) 300,000 3) 150,000.

58

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

Tuning the database using dbadmin.bat


You can tune your McAfee Network Security Platform database using either McAfee Network Security Manager (Manager) or the standalone Database Admin tool. However, you can avoid the additional workload on Manager by using the tool. However, note that when you use Manager, you have the option of tuning all the tables or just the data tables. Note: You can also use dbtuning.bat to tune your Network Security Platform database. However, you will be directed to use dbadmin.bat for all your database administration tasks. To tune your Network Security Platform database using the standalone Database Admin tool: 1 2 3 Navigate to <Network Security Manager install directory>\App\bin. Execute the dbadmin.bat file. The standalone tool opens. Select Maintenance. The Database Tuning Operations window is displayed.

Figure 53: Database Admin Tools - DB Tuning

Click Tune Database. The message "Database Tuning Completed" is displayed to indicate successful tuning.

Deleting alerts and packet logs from the database using purge.bat
An alternative to using the Alert Pruning action for alert and packet log deletion is to delete these files using purge.bat. To do this, do the following: 1 2 Stop the Manager service. Do one of the following: Open your Network Security Platform installation folder and run purge.bat:<Network
Security Manager installation directory>\App\bin\purge.bat

59

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

Open a DOS prompt and type the following: <Network Security Manager installation
directory>\App\bin\purge.bat

Answer the following questions:


c.

Is the Manager Down or Off-Line (Y/N)?

Note: The Manager service must be disabled prior to using purge.bat. If the service is not disabled, the purge will not continue.
d.

Do You Wish To Perform DB Tuning After The Purge Operation (Y/N)?

Tip: You can perform DB tuning separately from the purge operation. For more on DB tuning, see Database tuning (on page 40).

Alert and Packet Log data Alert


a. b. c. d.

Enter the Number of days of Alerts and Packet Log data to be preserved. For example, to delete alerts/packet logs older than 90 days, type 90. Enter the Number of Alerts to be preserved. You Are About To Delete Alerts And PacketLog Data Older Than X Days. Type Y to continue. Do You Wish To Purge Alerts / Packet Logs That Have Been 'Marked For Delete' Through The Attack Manager? Type Y to continue

Host Event Data


a. b. c. d. e.

Number of days of Host Event data to be preserved. Number of Hosts to be preserved. Describes the number of NAC host entries that can be preserved. You Are About To Delete Host Event Data Older Than X Days. Type Y to continue. If The Number of Remaining Hosts Is Still More Than XXX, Deletion Will Be Continued Until It Reaches XXX. Type Y to continue. Do You Wish To Purge Performance Monitoring Data [Y/N]. Type Y to continue.

Sensor Performance Data


a. b. c. d. e. f.

Number of days of Raw performance data to be preserved. Number of days of Hourly performance data to be preserved. Number of days of Daily performance data to be preserved. Number of weeks of weekly performance data to be preserved. Number of months of monthly performance data to be preserved. You Are About To Delete Raw Performance Data Older Than X Days, Hourly Data Older than X Days, Daily Data Older than X Days, Weekly Data Older Than X Weeks, Monthly Data Older Than X Months. Are you sure you want to proceed (y/n): Type Y to delete.

Re-start the Manager service after completion.

60

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

Deleting unwanted data using dbadmin.bat


You can delete any redundant data including alerts and packet logs from your McAfee Network Security Platform database using the standalone database admin tool. You can also delete data using Manager. For details, see the Maintenance Tab section. To purge unwanted data from your Network Security Platform database using the standalone Database Admin tool: 1 2 3 Make sure the Manager is shutdown. Navigate to <Network Security Manager install directory>\App\bin. Execute the dbadmin.bat file. The standalone Database Admin tool opens. Note: You can also use dbpurge.bat to delete unwanted data from your Network Security Platform database. However, McAfee strongly encourages you to use dbadmin.bat for all your database administration tasks. 4 Select Maintenance > DB Purge. The Alert and Packet Log/Host Event Deletion Tool window is displayed.

Figure 54: Database Admin Tools - DB Purge Tab

Specify if you want to Perform DB Tuning after the Purge Operation. You can perform database tuning separately from the purge operation. For more details on database tuning, see Tuning the Database Using the Database Admin Tool (on page 59).

Alert and Packet Log data

61

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

Type the Number of days of Alerts and Packet Log data to be preserved. For example, to delete alerts and packet logs older than 90 days, enter 90. You can specify a value between 0 and 9999. Type the Number of Alerts to be preserved in the database. You can specify a value between 0 and 1,000,000. For example, if you enter Number of days of Alerts and Packet Log data to be preserved as 30 and Number of Alerts to be preserved as 2000, then only the latest 2000 alerts and packet logs generated over the last 30 days are retained in the database.

Host Event data


1 2 Type the Number of days of Host Event data to be preserved: You can specify a value between 0 and 9999. Type the Number of Host Entries to be preserved: Describes the number of NAC host entries that can be preserved. You can specify a value between 0 and 9999. For example, enter Number of days of Host Event data to be preserved as 60 and Number of Host Entries to be preserved as 6000. Assume that the Manager database contains NAC host event data for 100 days. When you click Purge, host events of the oldest 40 days will be removed first. Out of the remaining host events for the most recent 60 days, if there are 8000 host entries, 2000 host entries will be removed. If there are only 5000 entries, all the entries will be preserved. Important: The tool considers the value entered in Number of days of Host Event data to be preserved first irrespective of the value entered in Number of Host Entries to
be preserved.

Sensor Performance data


Specify the Sensor performance data that you want to preserve using the following fields:
a. b. c. d. e.

Number of days of Raw performance data to be preserved Number of days of Hourly performance data to be preserved Number of days of Daily performance data to be preserved Number of weeks of weekly performance data to be preserved Number of months of monthly performance data to be preserved

You can specify a value between 0 and 9999. Once you have completed specifying the amount of data to be preserved, click Purge. Note: In cases where purging is aborted for some reason, data that has already been purged is not recovered. If you have chosen to tune after purge, then the database is tuned after the purge is complete.

Packet log database table indexing for MySQL databases


For maximum efficiency with a MySQL database, we suggest that you use the SQL command shown below to index the iv_packetlog table in the database. This improves performance during alert and packet log deletion, reducing the amount of time your system is offline when you perform database cleanup tasks. Note that the index process is time-

62

McAfee Network Security Platform 6.0

Managing your Network Security Manager database

consuming, and your system will be non-operational for the duration of the indexing process. Issue the following SQL command from the MySQL command line: alter table iv_packetlog add index (creationTime);

Changing your database password


You can change your Network Security Platform database password using the standalone Database Admin tool. Note that this is not the MySQL Root password. Note: McAfee Network Security Manager (Manager) has to be stopped when the password is being changed. To change your Network Security Platform database password 1 2 3 Navigate to <Network Security Manager install directory>\App\bin. Execute the dbadmin.bat file. The standalone tool opens. Select Maintenance > Password Change.

Figure 55: Database Admin Tools - Password Change Tab

Enter the current and new passwords in their respective fields. Ensure that you do not leave the password fields blank or reenter the current password as the new password again. Confirm the new password by entering it in the Confirm password field. Click OK. Enter the MySQL Root Password (that you specified during Manager installation). Click OK.

5 6 7 8

63

CHAPTER 8

Configuring external authentication


The External Authentication tab enables the following actions:

Figure 56: The External Authentication Tab

Viewing details of authentication of Manager (on page 64) Configuring authentication to Manager using RADIUS (on page 65) Configuring authentication to Manager using LDAP / Active Directory (on page 67)

Viewing authentication details


The Summary action displays the currently configured authentication services for McAfee Network Security Manager (Manager), including RADIUS and LDAP authentication. Details listed include the following: whether LDAP or RADIUS authentication is enabled the server host name or IP address the LDAP or RADIUS server port whether SSL is enabled To view authentication details in the Manager, select Manager > External Authentication >

Summary.

Note: To view the authentication details in Central Manager, select Central Manager > External Authentication > Summary. The details displayed are similar to that in Manager mentioned above.

Figure 57: Authentication Details

64

McAfee Network Security Platform 6.0

Configuring external authentication

Configuring RADIUS server in the Manager


Remote Authentication Dial In User Service (RADIUS) is an AAA (authentication, authorization and accounting) protocol for applications such as network access. While connecting to the internet using a modem, you are required to enter a username and password. The information is passed through a Network Access Device (NAD) device, and then to a RADIUS server over the RADIUS protocol. The RADIUS server checks if the information is correct using authentication schemes like PAP, CHAP, and EAP-MD5. If accepted, the server will authorize the access. Using Manager, you can configure a RADIUS server at the Manager level. You can configure a maximum of 4 RADIUS servers onto Manager. If the first RADIUS server is not available for communication, due to a network failure, Manager will try to communicate with the second or the third server. If authentication fails at any available servers, then Manager will not communicate with the other available servers. The RADIUS action enables you to use RADIUS to authenticate existing users on their RADIUS server. McAfee Network Security Platform supports the PAP, CHAP, and EAPMD5 schemes of RADIUS authentication.

Figure 58: RADIUS Server Configuration

You can configure the RADIUS authentication in the Manager from Manager > External Authentication > RADIUS Servers. Note: For the Central Manager, you can configure RADIUS authentication from
Central Manager > External Authentication > RADIUS Servers.

You can do the following actions: Adding a RADIUS server (on page 65) Editing a RADIUS server (on page 66) Deleting a RADIUS server (on page 67) Testing connection status of RADIUS server (on page 67)

Adding a RADIUS server


To add the RADIUS server configuration in Manager, do the following: 1 Select Manager > External Authentication > RADIUS Servers Note: To add a RADIUS server in the Central Manager, select Central Manager >
External Authentication > RADIUS Servers.

65

McAfee Network Security Platform 6.0

Configuring external authentication

Click New. The Add a RADIUS Server page is displayed.

Figure 59: Add Radius Server Page

3 4

Select Yes next to Enable RADIUS. Type the RADIUS Server Name or IP Address (IPv4 or IPv6 address). Caution: Only use a valid server name, since Network Security Platform does not check to see if the names are valid. A valid server name is the name of the host on which RADIUS server is configured. Type the RADIUS Server Port. The port number should be between 0 and 65535. (default =1812).

5 6

Type a Shared Secret Key that is required on both the Manager and the RADIUS server. The Shared Secret key is same as entered in the RADIUS server during configuration. Select the Connection Time Out (in milliseconds). This time determines how long the Manager should wait for authentication. Three attempts are made to connect before timeout occurs, so the value you enter is how long Network Security Platform waits between attempts before timeout (default =6000 milliseconds). (Optional) Click Test Connection to verify that the Manager can connect to the RADIUS server. Note: If Manager Disaster Recovery (MDR) is enabled, both the primary and secondary Manager IP addresses must be registered in the RADIUS server. For more information, see Preparing for Manager Disaster Recovery (MDR) (on page 24).

Click Save to save your changes. Note: If RADIUS servers are configured with Central Manager, and RADIUS servers exist in private networks and Managers exist in public network, then the RADIUS configuration needs to be customized at Manager such that it reaches the RADIUS Server through translated public IP address.

Editing a RADIUS server


1 Select Manager > External Authentication > RADIUS Servers. Note: To edit RADIUS server settings in the Central Manager, select Central
Manager > External Authentication > RADIUS Servers.

66

McAfee Network Security Platform 6.0

Configuring external authentication

Select a server and click Edit. You can either enable or disable the RADIUS server. You can also change the Server Port or the Connection Time Out value. Follow the steps as in Adding a RADIUS server (on page 65). Click Save.

3 4

Deleting a RADIUS server


1 Select Manager > External Authentication > RADIUS Servers. Note: To delete RADIUS server settings in the Central Manager, select Central
Manager > External Authentication > RADIUS Servers.

2 3

Select a server and click Delete. Click OK in the confirmation page to delete the RADIUS server. The RADIUS server is deleted.

Testing connection status


1 Select Manager > External Authentication > RADIUS Servers. Note: To test the connection status of RADIUS server settings in the Central Manager, select Central Manager > External Authentication > RADIUS Servers. 2 Select a server and click Test Connection. Verify that the Manager can connect to the RADIUS server.

Configuring LDAP servers / Active Directory


Lightweight Directory Access Protocol (LDAP) is a set of protocols for accessing information directories. LDAP runs on top of TCP/IP, which is necessary for any type of Internet access. LDAP is used to look up encryption certificates, pointers to printers and other services on a network, and provide a single sign-on across many services. LDAP is appropriate for any kind of directory-like information, where fast lookups and lessfrequent updates are the standard. Using Manager, you can configure a LDAP server at the Manager level. You can configure a maximum of 4 LDAP- servers onto Manager. If the first LDAP server is not available for communication, due to a network failure, Manager will try to communicate with the second or the third server. If authentication fails at any available servers, then Manager will not communicate with the other available servers The LDAP action enables you to use LDAP to authenticate existing users on their LDAP or Active Directory (AD) server.

67

McAfee Network Security Platform 6.0

Configuring external authentication

Figure 60: LDAP Server Configuration

You can configure the RADIUS authentication in the Manager from Manager > External Authentication > LDAP Servers. Note: For the Central Manager, you can configure RADIUS authentication from
Central Manager > External Authentication > LDAP.

You can do the following actions: Adding an LDAP server (on page 68) Editing an LDAP server (on page 69) Deleting an LDAP server (on page 69) Testing connection status of an LDAP server (on page 69)

Adding an LDAP server


To add the LDAP server configuration in Manager, do the following: 1 Select Manager > External Authentication > LDAP Servers. Note: To add an LDAP server in the Central Manager, select Central Manager >
External Authentication > LDAP Servers.

Click New. The Add an LDAP Server page is displayed.

Figure 61: Adding an LDAP server

3 4

Select Yes next to enable LDAP. To use SSL encryption, select the SSL Enabled checkbox. Note 1: If you enable SSL and use a third-party SSL certificate (for example, Verisign, Thawte, etc.), you must provide the same Fully Qualified Domain Name (FQDN) or IP address that is provided in the SSL certificate. Note 2: When SSL is enabled the default LDAP server port is 636. When it is disabled the default LDAP server port is 389.

68

McAfee Network Security Platform 6.0

Configuring external authentication

Type the LDAP Server Name or IP Address (IPv4 or IPv6 address). Caution: Only use a valid server name, since Network Security Platform does not check to see if the names are valid. A valid server name is the name of the host on which LDAP server is configured.

6 7 8

Type the LDAP Server Port. The port number can be between 0 and 65535. (Optional) Click Test Connection to verify that the Manager can connect to the LDAP server. Click Save to save your changes. Note: If LDAP servers are configured with McAfee Network Security Central Manager (Central Manager), and LDAP servers exist in private networks and Managers exist in public network, then the LDAP configuration needs to be customized at Manager such that it reaches the LDAP Server through translated public IP address.

Editing an LDAP server


1 Select Manager > External Authentication > LDAP Servers. Note: To edit an LDAP server in the Central Manager, select Central Manager >
External Authentication > LDAP Servers.

Select a server and click Edit. You can either enable or disable the LDAP server. You can also change the Server Port value and enable or disable SSL. Follow the steps as in Adding an LDAP server (on page 68). Click Save.

3 4

Deleting an LDAP server


1 Select Manager > External Authentication > LDAP Servers. Note: To delete an LDAP server in the Central Manager, select Central Manager >
External Authentication > LDAP Servers.

2 3

Select a server and click Delete. Click OK in the confirmation page to delete the LDAP server. The LDAP server is deleted.

Testing connection status


1 Select Manager > External Authentication > LDAP Servers. Note: To test the connection status with the LDAP server and Central Manager, select Central Manager > External Authentication > LDAP Servers. 2 Select a server and click Test Connection. Verify that Manager can connect to the LDAP server.

69

CHAPTER 9

Limiting Manager access


By default, any host can access McAfee Network Security Manager (Manager) / McAfee Network Security Central Manager (Central Manager) from any IP address. You can allow access to specific hosts by enabling GUI Access and defining the list of authorized hosts/networks.

Figure 62: GUI Access Tab

For more information on defining the lists of authorized hosts, see Enabling GUI Access (on page 70). Note: You need to have at least one authorized host to enable GUI Access. All attempts by authorized and unauthorized hosts to access your Manager are logged in the user activity log, which you can access from the View User Activity Audit Log link in the page.

Enabling GUI Access


In the Manager, to configure authorized hosts: 1 Select Manager > GUI Access > Access Control. Note: In the Central Manager, select Central Manager > GUI Access > Access Control. The fields displayed are similar to that in Manager, explained below.

Figure 63: GUI Access Control Configuration

70

McAfee Network Security Platform 6.0

Limiting Manager access

Select Any host at Allow Access to this Web-Based User Interface from. (default is Any Host) The Enable Audit Logging for Access Attempts by option is highlighted. Select Authorized hosts or Unauthorized hosts and click on View User Activity Audit Log link to see audit log messages. Click Apply. You can now define the list of hosts to access your Manager. You can do this by adding, editing and deleting CIDR networks. Authorizing hosts/networks using CIDR networks (on page 71) Editing a CIDR network (on page 71) Deleting a CIDR network (on page 72)

Adding a network from Access Control


You can enter IPv4 or IPv6 address in the Access Control tab in Manager. To add a network in the Access Control tab, do the following: 1 Select Manager > GUI Access > Access Control. Note: In the Central Manager, select Central Manager > GUI Access > Access Control. The fields displayed are similar to that in Manager, explained below. 2 Click New. The Add a Network page is displayed.

Figure 64: Add a Network Dialog

3 4

In Network, enter the IP address (IPv4 or IPv6) and the prefix length. Enter a Description (optional). Click Submit.

Editing a CIDR network


1 Select Manager > GUI Access > Access Control. Note: In the Central Manager, select Central Manager > GUI Access > Access Control. The fields displayed are similar to that in Manager, explained below. 2 3 Select a CIDR network and click Edit. The Edit the Network page is displayed. Edit the changes and click Save.

71

McAfee Network Security Platform 6.0

Limiting Manager access

Deleting a CIDR network


1 Select Manager > GUI Access > Access Control. Note: In the Central Manager, select Central Manager > GUI Access > Access Control. The fields displayed are similar to that in Manager, explained below. 2 3 Select a CIDR network and click Delete. Click OK in the confirmation page to delete CIDR network. The CIDR network is deleted.

User activity log error messages


Fault Name Fault Description Fault Type

Authorized hosts

<timestamp>" Authorized host "<IP Address>" has been allowed access to user interface (Attempts: "<num of attempts>") <timestamp>" Unauthorized host "<IP Address>" has been denied access to user interface (Attempts: "<num of attempts>")

User

Unauthorized hosts

User

72

F
File Maintenance action ......................................... 45

Index
1
10/100 ports Active directory.................................................. 79

H
hash functions........................................................ 50

I
import command .................................................... 12 iv_packetlog table .................................................. 73

A
Access control........................................................ 82 Access List defining lists....................................................... 83 enabling access control..................................... 82 Active Directory ...................................................... 79 Age Of Alerts .......................................................... 68 Authenticated Proxy server .................................... 25 authentication schemes ......................................... 76

L
log-on banner........................................................... 6

M
MDR configuration ........................................... 30, 33 M-series license file ............................................... 12 Multi-disc RAID storage ......................................... 50 multiple LDAP servers ........................................... 79 SSL encryption.................................................. 79 multiple RADIUS servers ....................................... 76 authentication schemes .................................... 76 MySQL Root password .......................................... 73

B
Backup Now ........................................................... 49 built-in alert buffers................................................. 46

C
config folder.............................................................. 8 conventions ............................................................. vi crystal reports......................................................... 50

N
NAT(Network Access Translation)................... 34, 35 Network Security Platform license file.......... 9, 12, 17 Network Security Platform Update Server ............. 18

D
database archival ................................................... 50 database backup restoration.................................. 50 database password ................................................ 73 database performance ........................................... 46 database replication ............................................... 50 database tuning...................................................... 46 dbadmin.bat ..................................................... 46, 49 dbbackup.bat.......................................................... 49 dbtuning.bat ........................................................... 46 digital fingerprint..................................................... 50

O
off-line database tuning.......................................... 46

P
purge.bat utility................................................. 45, 68

Q
query optimizer statistics........................................ 46

S
scheduler operation time........................................ 45

Sensor licenses...................................................... 12 signature updates................................................... 23 SSL encryption....................................................... 79

T
technical support ..................................................... ix