|
Table Of Contents
Release Notes for Cisco Security MARS Appliance 6.0.4
Miscellaneous Changes and Enhancements
Downloading the Upgrade Package from CCO
Open Caveats for Supporting Devices
Resolved Caveats —Release 6.0.4
Resolved Caveats —Releases Prior to 6.0.4
Obtaining Documentation, Obtaining Support, and Security Guidelines
Release Notes for Cisco Security MARS Appliance 6.0.4
Published: August 3, 2009
Revised: August 4, 2009
Note We sometimes update the printed and electronic documentation after original publication. Therefore, you should review the documentation on Cisco.com for any updates.
These release notes are for use with the Cisco Security Monitoring, Analysis, and Response System (MARS), Release 6.0.4 running on any supported MARS Appliance model listed in Supported Hardware.
This chapter contains the following topics:
•Obtaining Documentation, Obtaining Support, and Security Guidelines
Introduction
Release 6.0.4 is now available as an upgrade of 6.0.3 of your software release in support of the MARS Appliance models as identified in Supported Hardware. Registered SMARTnet users can obtain release 6.0.4 from the Cisco support website at:
http://www.cisco.com/go/mars/
And then click the Download Software link in the Support box on the right side of the MARS product home page.Supported Hardware
Release 6.0.4 supports the following Cisco Security MARS Appliance models:
Local Controller Appliances: 2nd Generation
•Cisco Security MARS 25R (CS-MARS-25R-K9)
•Cisco Security MARS 25 (CS-MARS-25-K9)
•Cisco Security MARS 55 (CS-MARS-55-K9)
•Cisco Security MARS 110R (CS-MARS-110R-K9)
•Cisco Security MARS 110 (CS-MARS-110-K9)
•Cisco Security MARS 210 (CS-MARS-210-K9)
Local Controller Appliances: 1st Generation
•Cisco Security MARS 20R (CS-MARS-20R-K9) as a MARS 201
•Cisco Security MARS 20 (CS-MARS-20-K9)
•Cisco Security MARS 50 (CS-MARS-50-K9)
•Cisco Security MARS 100e (CS-MARS-100E-K9) as a MARS 100
•Cisco Security MARS 100 (CS-MARS-100-K9)
•Cisco Security MARS 200 (CS-MARS-200-K9)
Global Controller Appliances: 2nd Generation
•Cisco Security MARS GC2R (CS-MARS-GC2R-K9)
•Cisco Security MARS GC2 (CS-MARS-GC2-K9)
Global Controller Appliances: 1st Generation
•Cisco Security MARS GCm (CS-MARS-GCM-K9) as a MARS GC
•Cisco Security MARS GC (CS-MARS-GC-K9)
New Features
In addition to resolved caveats, this release includes the following new features:
This section contains the following topics:
•Miscellaneous Changes and Enhancements
Miscellaneous Changes and Enhancements
The following changes and enhancements exist in:
•Botnet Traffic Filter (ASA 8.2) Feature Support—Detect malware that attempts malicious network activity, such as sending private data (passwords, credit card numbers, key strokes, or proprietary data) with ASA Botnet Traffic Filter (BTF). BTF checks incoming and outgoing connections against a dynamic database of known bad domain names and IP addresses, and then logs any suspicious activity. For details, consult Chapter 12, Botnet Traffic Filtering in User Guide for Cisco Security MARS Local and Global Controllers, Release 6.x.
MARS support for ASA 8.2 introduces the following BTF features:
–ASA Botnet Summary Tab—When monitoring a properly configured Cisco ASA 8.2 device, customers can quickly view Botnet activity on their network using the new summary tab that provides at-a-glance dashboard with the following new reports:
–Activity: ASA Botnet Traffic Filter - Top Botnet Ports
–Activity: ASA Botnet Traffic Filter - Top Botnet Sites
–Activity: ASA Botnet Traffic Filter - Top Infected Hosts
–BTF: System reports—When monitoring a properly configured Cisco ASA 8.2 device, customers can drill down into malicious activity with the following new reports:
–Hosts which have generated phone home activity (top infected hosts)
–Adequate host details (port/protocol, user agent, etc.) required to remediation.
–Top Botnet sites by domain and IP address
–Top Botnet ports detected
–BTF: System rule—When monitoring a properly configured Cisco ASA 8.2 device, a new system rule is available that detects failed phone-home db downloads.
•Cisco IPS 7.0 Feature Support—IPS 7.0(1) contains a new security capability, Cisco Global Correlation, which uses the immense security intelligence that Cisco has amassed over the years. At regular intervals, Cisco IPS receives threat updates from the Cisco SensorBase Network, which contains detailed information about known threats on the Internet, including serial attackers, Botnet harvesters, Malware outbreaks, and dark nets. The IPS uses this information to filter out the worst attackers before they have a chance to attack critical assets. It then incorporates the global threat data in to its system to detect and prevent malicious activity even earlier.
MARS support for 7.0(1) introduces the following Global Correlation features:
–A new system report that identifies the attacks blocked by Cisco IPS 7.0 (1) over a specified interval.
–Global Correlation scores embedded in query and reporting interfaces allow customers to view reputation data and create customized Global Correlation reports.
•Tunable Query Performance Support—Customers can reduce query wait times by creating custom indexes for commonly run queries. Under certain data sets and use cases, you can define a tuned query database. A new option for tuning query performance appears under ADMIN > System Maintenance > Database Configuration > Database Tuning / Query Optimization. For details, consult the "Database Tuning and Query Optimization" section of Chapter 13, System Maintenance in User Guide for Cisco Security MARS Local and Global Controllers, Release 6.x.
•E-Mail Notification Update—E-mail based notifications now include top 3 source IPs, top 3 destination IPs, and top 3 botnet sites. For more information on these notification, consult the "Notification Methods" section of Chapter 5, Alerts and Incident Notifications in User Guide for Cisco Security MARS Local and Global Controllers, Release 6.x.
•Future Cisco.com Software Update Support—MARS 6.0.4 includes changes to support a seamless migration from the current Cisco.com software and signature download sites to a new location hosted on Cisco.com. Customers are required to upgrade to 6.0.4 to enable future automated system upgrades, patches, and dynamic signature update support, features introduced in MARS 6.0.1 . By the end of October 2009, customers running releases prior to 6.0.4 will no longer be able to use these automated update features. The feature affected by this update are accessible from ADMIN > System Setup > IPS Signature Dynamic Update Settings and ADMIN > System Maintenance > Upgrade.
Alternatively, you can perform the following appropriate workaround:
–Upgrade—Manually download the updates and upgrade from a local server. For details, select the Internal Upgrade Server option in Step 4 of the "Checklist for Upgrades of Appliance Software" section in Chapter 5, Upgrade ManagementCisco Security MARS Initial Configuration and Upgrade Guide, 6.X
–IPS Signatures—Modify the old URL (https://www.cisco.com/cgi-bin/ida/locator/locator.pl) with the new value: https://www.cisco.com/cgi-bin/front.x/ida/locator/locator.pl. For details on how to modify this URL, see the "IPS Signature Dynamic Update Settings" section in Chapter 4, Cisco IPS 6.x Devices and Virtual Sensors in of Device Configuration Guide for Cisco Security MARS, Release 6.x.
New Device Support
The 6.0.4 release of MARS supports the following new device versions:
•Cisco ASA 8.2
•Cisco IPS 7.0
•Cisco IPS 6.2
•Cisco IOS/Switch IOS 12.4 (backward compatibility support)
•Cisco FWSM 4.0.1 and 4.0.4 (backward compatibility support)
•Cisco Security Agent 6.0.1 (backward compatibility support)
New Vendor Signatures
The following table describes the most recent signatures supported for each product or technology:
Tip For full details on supported devices and versions, see Supported and Interoperable Devices and Software for Cisco Security MARS Local Controller 6.0.x.
Revised in 6.0.4 Product Signature Version Supported Intrusion Prevention and Detection SignaturesYes
Cisco IDS 4.0,
Cisco IPS 5.x,
Cisco IPS 6.x
Cisco IPS 7.xCurrent through S406 signature release.
Yes
Cisco ASA
Current as of May 2009
Yes
Cisco IOS 12.2/12.4
Current as of June 2009
Yes
Snort NIDS 2.8
Current through the May 29, 2009 signature release.
Latest signature mapped: 15471.Yes
ISS RealSecure Network Sensor 6.5 and 7.0, and
ISS RealSecure Server Sensor 6.5 and 7.0XPU 29.060
Release date: May 12, 2009Yes
McAfee IntruShield 4.1
v4.1.51.19
Release date: May 28, 2009No
McAfee Entercept HIDS 2.5, 4.0, 6.x
Current through the January 23, 2009 signature release.
Yes
CheckPoint Application Intelligence
(VPN-1 NG with Application Intelligence R65)Current through the June 1, 2009 signature release.
Yes
Netscreen IDP 2.1, 3.0, 3.1, 4.0, 4.1
Signature version: 4.0.
Release date: June 5, 2009No. EOS.
Symantec NIDS, v 4.0
Signature package: 95
Release date: June 12, 2008Yes
Enterasys Dragon 6.x, 7.x
Current through the June 1, 2009 signature release.
No. EOS.
Symantec Manhunt 3.x
(See Symantec NIDS, v 4.0.) 3.4.3 Update 593.4.3 Update 59
Current through the May 24, 2007 signature release. Vulnerability Scanner SignaturesYes
Qualys Guard ANY
Current through the June 5, 2009 signature release.
Yes
E-Eye, Retina Scanner Vulnerability Software, version 5.61
Current through the June 4, 2009 signature release.
Yes
Foundstone, version ANY
Current through the June 5, 2009 signature release.
Yes
Common Vulnerabilities and Exposures (CVE) Database
Current with the June 12, 2009 definition update.
Miscellaneous SupportNo
Oracle 11g
Support for new AUDIT_ACTIONS.
1 eEye REM 1.0 is supported in 4.2.x.
Upgrade Instructions
The MARS upgrade packages are the primary vehicle for major, minor, and patch software releases. As administrator of the MARS Appliance, you should check the upgrade site regularly for upgrades. In addition to addressing high-priority caveats, upgrade packages update system inspection rules, event types, and provide the most recent signature support.
For detailed instructions on planning and performing an upgrade or install, refer to "Checklist for Upgrading the Appliance Software" in the Cisco Security MARS Initial Configuration and Upgrade Guide.
Important Upgrade Notes
To ensure that the upgrade from earlier releases is trouble free, this section contains the notes provided in previous releases according the release number. Please refer to the notes that pertain to the release you are upgrading from and any releases following that one.
General Notes
The MARS Appliance performs a file system consistency check (fsck) on all disks when either of the following conditions is met:
•If the system has not been rebooted during the past 180 days.
•If the system has been rebooted 30 times.
The fsck operation takes a long time to complete, which can result in significant unplanned downtime when rebooting the system after meeting a condition above. For example, a MARS 50 appliance can take up to 90 minutes to perform the operation.
Upgrade to 6.0.4
No important notes exist for the 6.0.4 upgrade.
Upgrade to 6.0.3
No important notes exist for the 6.0.3 upgrade.
Upgrade to 6.0.2
No important notes exist for the 6.0.2 upgrade.
Upgrade to 6.0.1
The upgrade process to 6.0.1 differs based on the release you are upgrading from. If you are upgrading a 5.x release, then you can upgrade to 6.0.1 if you are running 5.3.6. The upgrade from 5.3.6 to 6.0.1 takes several hours, as it also upgrades the Oracle database running on the appliance. If you are running an earlier 5.x release, you must first upgrade to 5.3.6 (see Upgrade to 5.3.6 for details).
However, if you are upgrading a 4.x release, you must migrate the system instead of upgrading. To migrate from a 4.x, you must follow the step-by-step instructions specified in the Migrating Data from Cisco Security MARS 4.x to 6.0.1.
Note When upgrading a "restricted" model of MARS appliance (20R, 100e, or GCm) to MARS Software release 6.0.1, all limits enforced by the restricted model will be ignored. The "restricted" models will perform as unrestricted models (20, 100, or GC) once upgraded to release 6.0.1.
Upgrade to 5.3.6
For notes that are specific to the upgrade to the 5.3.6 release, as well as all previous 5.x releases, see the Release Notes for Cisco Security MARS Appliance 5.3.6.
Upgrade to 4.3.6
For notes that are specific to the upgrade to the 4.3.6 release, as well as all previous 4.x releases, see the Release Notes for Cisco Security MARS Appliance 4.3.6.
Upgrade Path Matrix
When upgrading from one software release to another, a prerequisite release is always required. This prerequisite release is the minimum level required to be running on the appliance before you can upgrade to the most recent release. Table 1 identifies the upgrade path that you must follow to reach the minimum level required to upgrade to current release.
Table 1 Upgrade Path Matrix
From Release Upgrade To Upgrade Package4.3.6
6.0.1
Migration required. See Migrating Data from Cisco Security MARS 4.x to 6.0.1
5.3.6
6.0.1
csmars-6.0.1.3066.pkg
6.0.1 (3066) or 6.0.1 (3070)
6.0.2
csmars-6.0.2.3102.zip
6.0.2
6.0.3
csmars-6.0.3.3186.zip
6.0.3
6.0.4
csmars-6.0.4.3229.zip
Downloading the Upgrade Package from CCO
Upgrade images and supporting software are found on the CCO software download pages dedicated to MARS. You can access these pages at the following URLs, assuming you have a valid CCO account and that you have registered your SMARTnet contract number for your MARS Appliance
Top-level page:
•http://www.cisco.com/go/mars/
And then click the Download Software link in the Support box on the right side of the MARS product home page.
Result: The Download Software page loads.From the Download Software page, select one of the following options:
•CS-MARS IPS Signature Updates Archives
•CS-MARS IPS Signature Updates
•CS-MARS Patches and Utilities (supplementary files)
•CS-MARS Recovery Software
•CS-MARS Upgrade Packages
Note If you are upgrading from a release earlier than those posted on CCO, please contact Cisco support for information on obtaining the required images. Do not attempt to skip releases along the upgrade path.
For information on obtaining a CCO account, see the following URL:
•http://www.cisco.com/en/US/applicat/cdcrgstr/applications_overview.html
Documentation Errata
•CSCsl14244. User guide does not discuss role of Nessus in the MARS system.
To determine whether specific incidents are false positives, MARS uses Nessus 2.x GPL plug-ins and custom scripts mapped to specific MARS event types. MARS does not use Nessus to perform vulnerability assessments or related reporting.
MARS uses Nessus as one component in determining false positives. When a host resides on a network listed under "Networks for Dynamic Vulnerability Scanning", then MARS uses Nessus to help ascertain whether an attack targeting that host was likely to be successful. When an event does not have corresponding Nessus Attack Scripting Language (NASL) script, MARS uses nmap OS fingerprinting to determine the destination operating system type, and uses nmap-found-OS to match known operating systems affected by the attack.
•CSCsk77546. Discovery Device with SSH 512 module not supported.
The OpenSSH client used by MARS does not support modulus sizes smaller than 768. For example, you cannot discover a device using a SSH login that has 512-byte key.
Important Notes
The following notes apply to the MARS 6.0.x releases:
•CSCsu50839—Report Result Page saves the previous "Other views" selection
If you change the "Other Views" options in the report result page, the changes persist for that report and for that browser. When the report results are viewed later, the browser shows the saved options but the results displayed are always the default options results.
To avoid this issue, always click Display Report to view a scheduled report's results.
•If the client system used to access the MARS GUI is not on the same side of the NAT boundary as the a MARS appliance and the Security Manager server, you can perform policy lookup in read-only mode. However, you cannot start the Security Manager client from the read-only policy lookup table to modify matching policies. The Security Manager client must be on the same side of the NAT as the MARS appliance and the Security Manager server if you want to modify the matching policy from MARS. This restriction is also true if you want to query MARS events from policies.
•The performance of the Summary Page degrades when too many reports are added under My Reports. The smaller the number of reports under My Reports, the faster the Summary page loads. To ensure adequate performance, limit the number of reports to 6. This issue is partially described in CSCse18865.
•Do not to use DISTINCT or SAME in queries, and do not run multi-line queries in Release x.3.4 through 6.0.1. If you run such a query, the system time outs after 20 minutes without returning any results. The message "Timeout Occurred" appears instead. You can use DISTINCT and SAME in a Query to create a rule with the Query interface.
•For Symantec AntiVirus, the Symantec agent hostname (AV client computer name) appears in the "Reported User" column of the event data. Therefore, you can define a query, report or rule related to this agent based on the "Reported User" value.interface. For
•The False Positive and Query pages (multi-column result format) have changed. You can now query on firing events that triggered false positives within a time interval. Such queries will render events that did not appear on the False Positive page. To ensure performance, the False Positive page only displays false positives from the most recent 10,000 firing events. To view additional false positives, you must perform a query.
The following notes describe new behavior based on the resolution of specific caveats. Be sure to check the upgrade notes for each release for important notes on data migration.
Caveats
This section describes the open and resolved caveats with respect to this release.
For your convenience in locating caveats in Cisco's Bug Toolkit, the caveat titles listed in this section are drawn directly from the Bug Toolkit database. These caveat titles are not intended to be read as complete sentences because the title field length is limited. In the caveat titles, some truncation of wording or punctuation may be necessary to provide the most complete and concise description. The only modifications made to these titles are as follows:
•Commands are in boldface type.
•Product names and acronyms may be standardized.
•Spelling errors and typos may be corrected.
Note If you are a registered cisco.com user, view Bug Toolkit on cisco.com at the following website:
http://www.cisco.com/support/bugtools
To become a registered cisco.com user, go to the following website:
http://tools.cisco.com/RPF/register/register.doThis section contains the following topics:
•Open Caveats for Supporting Devices
•Resolved Caveats —Release 6.0.4
•Resolved Caveats —Releases Prior to 6.0.4
Open Caveats for Supporting Devices
The following caveats affect this release and are part of supported devices or compatible products:
Open Caveats— Release 6.0.4
The following caveats affect this release and are part of MARS.
Resolved Caveats —Release 6.0.4
The following customer found or previously release noted caveats have been resolved in this release.
Resolved Caveats —Releases Prior to 6.0.4
For the list of caveats resolved in releases prior to this one, see the following documents:
•http://www.cisco.com/en/US/products/ps6241/prod_release_notes_list.html
Product Documentation
For the complete list of documents supporting this release, see the release-specific document roadmap:
•Cisco Secure MARS Documentation Guide and Warranty
http://www.cisco.com/en/US/products/ps6241/products_documentation_roadmaps_list.html
Lists document set that supports the MARS release and summarizes contents of each document.
•For general product information, see:
Obtaining Documentation, Obtaining Support, and Security Guidelines
For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.
1 'as a' note means the license no longer restricts the number of managed devices; the appliance now operates as a unrestricted model under the original license.