Alienvault Usm Appliance Plugins List

Total Page:16

File Type:pdf, Size:1020Kb

Alienvault Usm Appliance Plugins List ALIENVAULT USM APPLIANCE PLUGINS LIST This is the current plugin library that ships with AlienVault USM Appliance as of May 21, 2019. The AlienVault Labs Security Research Team regularly updates the plugin library to increase the extensibility of USM Appliance. These plugins enable your USM Appliance to process and analyze logs produced by your existing devices and applications quickly. Plugin Name Vendor Model a10-thunder-waf A10 Thunder WAF abas abas ERP abas accellion-kiteworks Accellion Kiteworks actiontec Actiontec Verizon FIOS router adaudit-plus ManageEngine ADAudit Plus aerohive-wap Aerohive Networks Wireless Access Point airlock Envault Airlock airport-extreme Apple AirPort Extreme aix-audit IBM Aix Audit aladdin SafeNet eSafe alcatel Alcatel Arista Switch allot Allot Communications NetEnforcer alteonos Nortel Networks Alteon amun-honeypot Amun Amun Honeypot Apache Software apache Apache HTTP Server Foundation Apache Software apache-ldap OpenLDAP Foundation Apache Software apache-syslog Apache HTTP Server Foundation Apache Software apache-tomcat Tomcat Foundation aqtronix-webknight AQTRONiX WebKnight arista-switch Arista Switches arpalert-idm Arpalert Arpalert arpalert-syslog Arpalert Arpalert array-networks-sag Array Networks Secure Access Gateway artemisa Artemisa Artemisa Honeypot artica Artica Proxy artillery Binary Defense Artillery Honeypot ALIENVAULT USM APPLIANCE PLUGINS LIST aruba Aruba Networks Mobility Access Switches aruba-6 Aruba Networks Wireless aruba-airwave Aruba Networks Airwave aruba-clearpass Aruba Networks ClearPass as400 IBM AS400 ascenlink Xtera AscenLink assp Anti-Spam SMTP Proxy Anti-Spam SMTP Proxy asterisk-voip Asterisk VoIP asus-router AsusTek Wireless Router avast Avast Free Antivirus avaya Avaya VSP switches avaya-gateway Avaya Media Gateway avaya-wireless Avaya Wireless LAN axigen-mail GeCAD Axigen Mail Server azure-atp Microsoft Advanced Threat Protection barracuda-link- Barracuda Link Balancer balancer barracuda-ng Barracuda Next Gen Firewall barracuda-spam Barracuda Spam Firewall barracuda-sslvpn Barracuda SSL VPN barracuda-waf Barracuda Web Application Firewall barracuda-webfilter Barracuda Web Filter bind ISC BIND bit9 Carbon Black Enterprise Protection bit9_v7 Carbon Black Enterprise Protection bitdefender- Bitdefender GravityZone gravityzone blackboard-learn Blackboard Learn bluecoat Blue Coat ProxySG bluecoat-packetshaper Blue Coat PacketShaper bomgar Bomgar Remote Support and Privileged Access bro-ids Bro Bro NSM brocade Brocade Brocade Devices bromium-vsentry Bromium vSentry buffalo Buffalo Americas TeraStation canary-tools Canary Tools carbonblack Carbon Black Enterprise Response carbonblack-idm Carbon Black Enterprise Response cb-defense Carbon Black Defense ALIENVAULT USM APPLIANCE PLUGINS LIST cerberus-ftp Cerberus FTP Server checkpoint-mepp Check Point Media Encryption and Port Protection cisco-3030 Cisco VPN 3000 Series cisco-ace Cisco ACE Application Control Engine cisco-acs Cisco ACS Secure Access Control Server cisco-acs-idm Cisco ACS Secure Access Control Server cisco-asa Cisco ASA Adaptive Security Appliance cisco-asr Cisco ASR Aggregation Services Router cisco-call Cisco Call Manager cisco-cube Cisco Cisco Unified Border Element cisco-cucm Cisco Unified Communications Manager cisco-esa Cisco AsyncOS Email Security Appliances cisco-expressway Cisco Expressway cisco-firepower Cisco FirePower cisco-fw Cisco Firewall Services Module cisco-ids Cisco IDS Intrusion Detection System cisco-ips Cisco IPS Intrusion Prevention System cisco-ips-syslog Cisco IPS Intrusion Prevention System cisco-isa Cisco ISA cisco-ise Cisco ISE cisco-meraki Cisco Meraki cisco-nexus-nx-os Cisco NX-OS Next Generation Intrusion Prevention System cisco-ngips Cisco NGIPS cisco-pix Cisco PIX Private Internet eXchange cisco-prime Cisco Prime cisco-router Cisco Router cisco-rv Cisco RV Series VPN Router cisco-ucs Cisco Unified Computing System cisco-viptela Cisco Viptela cisco-vpn Cisco VPN cisco-wlc Cisco Wireless LAN Controller citrix-netscaler Citrix Systems NetScaler clamav ClamAV ClamAV clamwin-nxlog ClamWin ClamWin Free Antivirus claroty-platform Claroty Platform clearswift Clearswift Secure Email Gateway cloudpassage CloudPassage Halo ALIENVAULT USM APPLIANCE PLUGINS LIST Resource Group (Cluster Service) Manager clurgmgr Red Hat Daemon comodo-antivirus Comodo Antivirus contentkeeper-sig ContentKeeper Secure Internet Gateway corero-ips Corero IPS correlog CorreLog CorreLog Windows Agent and Toolkit coslat-hotspot Coslat Security Systems Hotspot courier Courier-MTA Courier Mail Server crowdstrike CrowdStrike Falcon Host crushftp CrushFTP CrushFTP cryptospot CRYPTTECH cryptoSPOT cyberark CyberArk Enterprise Password Vault cyberguard CyberGuard SG565 cyberoam Sophos Cyberoam-Firewall cyberx-xsense CyberX XSense cylance Cylance CylancePROTECT cyphort Cyphort Cyphort APT Defense Platform darktrace Darktrace DCIP datto-siris Datto Siris Platform Digital Defense ddi-frontline Frontline Vulnerability Manager Incorporated deepsec-agent Trend Micro Deep Security Agent deepsec-manager Trend Micro Deep Security Manager defender-tokengo Quest Software Defender GO-6 Token dell-chassis DELL M1000 Chassis dell-equallogic Dell EqualLogic dell-force DELL Force10 Switches dell-idrac Dell iDRAC dell-secureworks DELL SecureWorks dell-switch Dell Switches denyall-waf DenyAll DenyAll WAF dhcp Microsoft DHCP Client Service dhcp-nxlog Microsoft DHCP Client Service dlink-des D-Link DES Series dlink-firewall D-Link UTM Firewall dlink-wireless D-Link Unified Wireless Controller dovecot Dovecot Secure IMAP Server dragon Enterasys Dragon IDS draytek-vigor DrayTek Vigor ALIENVAULT USM APPLIANCE PLUGINS LIST drupal-wiki Drupal Drupal CMS dtex Dtex Systems (Pty) Ltd Dtex duo-2fa Duo Two-Factor Authentication eljefe Immunity El Jefe emc-datadomain Dell EMC DataDomain emc-isilon Dell EMC Isilon emc-recoverpoint Dell EMC RecoverPoint emc-vnxe Dell EMC VNXe emet Microsoft Enhanced Mitigation Experience Toolkit enterasys-rmatrix Enterasys Matrix N-Series eset Eset Eset exchange Microsoft Exchange Server exchange-nxlog Microsoft Exchange Server extrahop-reveal ExtraHop Reveal extreme-nac-manager Extreme Networks NetSight NAC Manager extreme-switch Extreme Networks Switch extreme-wireless Extreme Networks Summit Series f5 F5 BIG-IP f5-firepass F5 FirePass SSL VPN fail2ban Fail2ban Fail2ban failsafe Damballa FailSafe falconstor FalconStor Software IPStor fatpipe-mpvpn FatPipe Networks MPVPN fidelis IBM Fidelis Network Data Loss Protection fireeye FireEye MPS fireeye-cm FireEye CM fireeye-hx FireEye HX Series forcepoint-dlp Forcepoint DLP forescout-nac ForeScout CounterACT fortiauthenticator Fortinet FortiAuthenticator fortigate Fortinet FortiGate fortiguard Fortinet FortiGuard fortimail Fortinet FortiMail fortiweb Fortinet Fortiweb fortiWLC Fortinet fortiWLC freeipa FreeIPA FreeIPA freeradius FreeRADIUS freeradius fw1-alt Check Point FireWall ALIENVAULT USM APPLIANCE PLUGINS LIST fw1-cef Check Point FireWall gajproactive gajshield gajproactive geist-watchdog Geist Watchdog gfi GFI Vipre Antivirus glastopng Honeynet Project GlastopfNG Honeypot Global Technology gta-firewall Firewall Associates h3c-ap H3C AP h3c-switch H3C Ethernet Switch ha-proxy HAProxy HAProxy harpp-ddos HARPP HARPP DDoS Mitigator heartbeat Linux-HA Heartbeat hitachi-hnas Hitachi NAS Platform honeybot Atomic Software Solutions HoneyBOT honeyd Honeyd Honeyd Virtual Honeypot hp-chassis HP BladeSystem Chassis hp-eva HP EVA Storage hp-msm-controller HP MSM Integrated Controller hp-san-switch HP SAN Switch hp-switch HP Switch hp-wireless HP E-Series Mobility hpe-3par HPE 3PAR hpe-ilo HPE Integrated Lights Out huawei Huawei NG-Firewall huawei-ips Huawei IPS huawei-router Huawei Enterprise Router hytrust-keycontrol HyTrust Key Control ibm-imm IBM Integrated Management Module ibm-infosphere- IBM InfoSphere Guardium guardium ibm-tam IBM Tivoli Access Manager WebSEAL ibm-websphere IBM Websphere iboss IBoss iboss iis Microsoft IIS Internet Information Services iis-nxlog Microsoft IIS Internet Information Services imperva-securesphere Imperva SecureSphere impravata-onesign Imprivata Onesign incapsula Imperva Incapsula WAF infoblox Infoblox DNS Server ALIENVAULT USM APPLIANCE PLUGINS LIST intrushield McAfee IntruShield IPS ipfw FreeBSD IPFW Firewall iprism Edgewave iPrism iptables Suse IPTables ironport Cisco IronPort isa Microsoft ISA Internet Security and Acceleration Server jboss Red Hat JBoss Middleware juniper-ex Juniper Networks EX Series juniper-idp Juniper Networks IDP Series juniper-mx Juniper Networks MX Routers juniper-nsm Juniper Networks NSM Network and Security Manager juniper-srx Juniper Networks SRX Series juniper-vpn Juniper Networks SA Secure Access Series kaspersky Kaspersky Antivirus kaspersky-sc Kaspersky Security Center kaspersky-sc-db Kaspersky Security Center kemp Kemp Technologies VLM-2000-W kerio-connect Kerio Technologies Kerio Connect kismet Kismet Kismet Wireless Linq2FA Innovative Solutions LinQ2FA linux-usergroupadd Linux Useradd/Groupadd linuxdhcp Linux DHCP linuxdhcp-idm Linux DHCP Server logbinder-sp LOGbinder LOGbinder for SharePoint lucent-brick Lucent VPN Firewall Brick m0n0wall M0n0wall M0n0wall Embedded Firewall malwarebytes Malwarebytes Malwarebytes malwarebytes-br Malwarebytes Breach Remediation malwarebytes-es Malwarebytes Endpoint Security mcafee McAfee Antivirus Engine mcafee-antispam McAfee Anti-Spam mcafee-db McAfee Database Security mcafee-epo McAfee ePolicy Orchestrator mcafee-mvision McAfee MVISION Cloud mcafee-mwg McAfee McAfee-MWG
Recommended publications
  • Implementation of Centralized Logging and Log Analysis in Cloud Transition
    Implementation of Centralized Logging and Log Analysis in Cloud Transition Antti Vainio School of Science Thesis submitted for examination for the degree of Master of Science in Technology. Espoo 3.7.2018 Supervisor Prof. Jukka Suomela Advisor MSc Cyril de Vaumas Copyright ⃝c 2018 Antti Vainio Aalto University, P.O. BOX 11000, 00076 AALTO www.aalto.fi Abstract of the master’s thesis Author Antti Vainio Title Implementation of Centralized Logging and Log Analysis in Cloud Transition Degree programme Computer, Communication and Information Sciences Major Computer Science Code of major SCI3042 Supervisor Prof. Jukka Suomela Advisor MSc Cyril de Vaumas Date 3.7.2018 Number of pages 84 Language English Abstract Centralized logging can be used to collect log data from multiple log files on multiple separate server machines and transmit the data to a single centralized location. Log analysis on top of that can automatically process large amounts of logs for various different purposes including problem detection, troubleshooting, monitoring system performance, identifying security incidents, and understanding user behavior. As the volume of log data is growing when software systems, networks, and services grow in size, the log data located on multiple separate server machines can be difficult to manage. The traditional way of manually inspecting logs hasalso become too labor-intensive and error-prone when large amounts of log data need to be analyzed. Setting up centralized logging and automatic log analysis systems can be used to solve this problem. This thesis explains the concepts of log data, centralized logging, and log analysis, and also takes a look at existing software solutions to implement such a system.
    [Show full text]
  • Arxiv:1907.07120V1 [Cs.CY] 16 Jul 2019 1 Introduction That China Hindered Access to I2P by Poisoning DNS Resolu- Tions of the I2P Homepage and Three Reseed Servers
    Measuring I2P Censorship at a Global Scale Nguyen Phong Hoang Sadie Doreen Michalis Polychronakis Stony Brook University The Invisible Internet Project Stony Brook University Abstract required flexibility for conducting fine-grained measurements on demand. We demonstrate these benefits by conducting an The prevalence of Internet censorship has prompted the in-depth investigation of the extent to which the I2P (invis- creation of several measurement platforms for monitoring ible Internet project) anonymity network is blocked across filtering activities. An important challenge faced by these different countries. platforms revolves around the trade-off between depth of mea- Due to the prevalence of Internet censorship and online surement and breadth of coverage. In this paper, we present surveillance in recent years [7, 34, 62], many pro-privacy and an opportunistic censorship measurement infrastructure built censorship circumvention tools, such as proxy servers, virtual on top of a network of distributed VPN servers run by vol- private networks (VPN), and anonymity networks have been unteers, which we used to measure the extent to which the developed. Among these tools, Tor [23] (based on onion rout- I2P anonymity network is blocked around the world. This ing [39,71]) and I2P [85] (based on garlic routing [24,25,33]) infrastructure provides us with not only numerous and ge- are widely used by privacy-conscious and censored users, as ographically diverse vantage points, but also the ability to they provide a higher level of privacy and anonymity [42]. conduct in-depth measurements across all levels of the net- In response, censors often hinder access to these services work stack.
    [Show full text]
  • Implementation Single Account Pdc Vpn Based on Ldap
    IMPLEMENTATION SINGLE ACCOUNT PDC VPN BASED ON LDAP Gregorius Hendita Artha Kusuma Teknik Informatika, Fakultas Teknik Universitas Pancasila [email protected] Abstrak Data is an important for the company. Centralized data storage to facilitate users for accessing data in the company. Data will be stored centrally with PDC (Primary Domain Controller). Build communicate between head office and branch office requires high cost for each connection is not enough to ensure safety and security of data. Exchange data between head office and branch office should be kept confidential. VPN (Virtual Private Network) makes communication more efficient, not only the cost affordable that connection, security and safety will be the primary facility of VPN (Virtual Private Network). Service were established in the system will be integrated using LDAP (Lightweight Directory Access Protocol) to create a single account in each services such as PDC (Primary Domain Controller) and VPN (Virtual Private Network). The purposes of this final project to design and implementation a system centralized data storage and build communicate between head office and branch office are integrated with LDAP (Lighweight Active Directory Protocol). Hopefully this system can give more advantage to each network users. Keyword: PDC, VPN, LDAP, Single Account. I. Introduction previous workstations. To support the performance of the employees of the company of course has a Centralized data storage makes it easy for users variety of network services are formed in it such as to access data. many companies need a ftp, mail server, file sharing etc. These services of centralized storage system, because the data is course have their respective accounts.
    [Show full text]
  • Anyconnect および Host Scan のアンチウイルス/アンチスパイウェア
    AnyConnect および Host Scan のアンチウイルス/アンチスパイウェア/ファイアウォール サポート表 AnyConnect ポスチャ モジュールにより、AnyConnect Secure Mobility クライアントはホストにインス トールされているオペレーティング システム、およびアンチウイルス、アンチスパイウェア、ファイアウォールの 各ソフトウェアを識別できます。 Host Scan アプリケーションはポスチャ モジュールのコンポーネントに含まれ る、こうした情報を収集するアプリケーションです。 AnyConnect 3.0 より、Host Scan パッケージは AnyConnect Secure Mobility クライアントおよび Cisco Secure Desktop(CSD)の共有コンポーネントになっています。 それ以前は、Host Scan パッケージは CSD を インストールすることによってのみ利用可能になるコンポーネントの 1 つでした。 Host Scan パッケージを CSD から分離したのは、CSD の一部として提供されていたときよりも、ユー ザが頻繁に Host Scan サポート表を更新できるようにするためです。 このサポート表には、ユーザが動的なア クセス ポリシーで使用しているアンチウイルス/アンチスパイウェア/ファイアウォール アプリケーションの製品 名とバージョン情報が記載されています。 シスコでは、Host Scan パッケージに Host Scan アプリケーション、 Host Scan サポート表、および他のコンポーネントを含めて提供しています。 Host Scan サポート表のリスト アンチウイルス アプリケーション総合リスト アンチスパイウェア アプリケーション総合リスト ファイアウォール アプリケーション総合リスト Windows 用アンチウイルス Windows 用アンチスパイウェア Windows 用ファイアウォール Linux 用アンチウイルス Linux 用ファイアウォール Mac OS 用アンチウイルス Mac OS 用アンチスパイウェア Mac OS 用ファイアウォール A B C D E F G H I J K L M N O P Q R S T U V W X Y Z AA AB AC AD AE ファイル データ ファ バージョ データ ファイ データ ファイル データ ファイ エンジンのバー RTP の RTP の 前回のスキャン スキャン/クリー システムのフル アンイン GUI のアク トレイ アイコンの トレイ アイコン 有効期 脅威ログの取 スキャン プログラ フル スキャンの進捗 インストール ディ 一括スキャ メモリ スキャ アンチウイルス製品名 ライブ更新 サービス GUI の表示 のスキャ 有効日の取得 更新の進捗表示 プログラム言語の取得 イル dir の取 市場での別名 ン ルの時刻 のバージョン ルの署名 ジョン チェック 設定 時刻 ニング スキャン ストール ティブ化 表示 の非表示 限 得 ムの実行 表示 レクトリの取得 ン ン 1 ン 得 2 3 360Safe.com 4 360 Antivirus 1.x 9989999898888898 8888 8 9 8 9 9 9 88 5 360杀毒 1.x 9999988898888898 8889 8 8 8 9 9 9 88 6 AEC, spol. s r.o. 7 TrustPort Antivirus 2.x 8888998899888999 9888 8 9 8 9 8 988 8 Agnitum Ltd.
    [Show full text]
  • Allow Split Tunneling for VPN Clients on the ASA Configuration Example
    ASA/PIX: Allow Split Tunneling for VPN Clients on the ASA Configuration Example Contents Introduction Prerequisites Requirements Components Used Network Diagram Related Products Conventions Background Information Configure Split Tunneling on the ASA Configure the ASA 7.x with Adaptive Security Device Manager (ASDM) 5.x Configure the ASA 8.x with Adaptive Security Device Manager (ASDM) 6.x Configure the ASA 7.x and later via CLI Configure PIX 6.x through the CLI Verify Connect with the VPN Client View the VPN Client Log Test Local LAN Access with Ping Troubleshoot Limitation with Number of Entries in a Split Tunnel ACL Related Information Introduction This document provides step-by-step instructions on how to allow VPN Clients access to the Internet while they are tunneled into a Cisco Adaptive Security Appliance (ASA) 5500 Series Security Appliance. This configuration allows VPN Clients secure access to corporate resources via IPsec while giving unsecured access to the Internet. Note: Full tunneling is considered the most secure configuration because it does not enable simultaneous device access to both the Internet and the corporate LAN. A compromise between full tunneling and split tunneling allows VPN Clients local LAN access only. Refer to PIX/ASA 7.x: Allow Local LAN Access for VPN Clients Configuration Example for more information. Prerequisites Requirements This document assumes that a working remote access VPN configuration already exists on the ASA. Refer to PIX/ASA 7.x as a Remote VPN Server using ASDM Configuration Example if one is not already configured. Components Used The information in this document is based on these software and hardware versions: ● Cisco ASA 5500 Series Security Appliance Software version 7.x and later ● Cisco Systems VPN Client version 4.0.5 Note: This document also contains the PIX 6.x CLI configuration that is compatible for the Cisco VPN client 3.x.
    [Show full text]
  • Channel 5'S “Jailbreak” Encourages Breakouts, As Cisco Secure PIX
    \ e Channel 5’s “Jailbreak” encourages breakouts, as Cisco Secure PIX Firewall l i f defends against break-ins o r P r e m o t s u VOTE OFF “SURVIVOR,” RESIST “TEMPTATION ISLAND,” AND BURY “THE MOLE.” IN C THE U.K., THE BIG REALITY TV HIT WAS A SHOW CALLED “JAILBREAK.” THE SHOW AIRED ON CHANNEL 5 WHERE, FOR THREE WEEKS LAST SEPTEMBER, ORDINARY PEOPLE WE RE P LA CED IN A N ESPE CIALL Y BU IL T JAIL AN D ENT IC ED W IT H LAR GE SUM S OF MONEY-100,000 POUNDS, OR $150,000-TO BE THE FIRST TO BREAK OUT. A KEY FACTOR IN THE SHOW’S SUCCESS WAS THE JAILBREAK WEB SITE. The Jailbreak Web site broadcast streaming video of the GE Capital IT Solutions specializes in augmenting Internet “prisoners” 24 hours a day and also gave viewers a chance to and IT infrastructures with a wide range of solutions play games and e-mail breakout advice to the contestants. including planning, acquisition, implementation, management, and refreshment. Although the Channel 5 producers of “Jailbreak” were confident that the show would be successful, they were GE Capital IT Solutions chooses Cisco Secure PIX Firewalls totally surprised at the popularity of its Web site. It received From the start, security was an issue with the Channel 5 Web about one million hits a day-10 million hits in the first week! site. “Our primary purpose was to generate a lot of publicity for the show throughout the U.K.,” says Davis.
    [Show full text]
  • Secureworks Corp. (Exact Name of Registrant As Specified in Its Charter)
    UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-Q (Mark One) QUARTERLY REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the quarterly period ended November 1, 2019 or TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission File Number: 001-37748 SecureWorks Corp. (Exact name of registrant as specified in its charter) Delaware 27-0463349 (State or other jurisdiction of incorporation or organization) (I.R.S. Employer Identification No.) One Concourse Parkway NE Suite 500 Atlanta, Georgia 30328 (Address of Principal Executive Offices) (Zip Code) (Registrant’s telephone number, including area code): (404) 327-6339 Not Applicable (Former name, former address and former fiscal year, if changed since last report) Securities registered pursuant to Section 12(b) of the Act: Title of each class Trading Symbol(s) Name of each exchange on which registered Class A Common Stock, SCWX The NASDAQ Stock Market LLC par value $0.01 per share (NASDAQ Global Select Market) Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. Yes ☑ No ☐ Indicate by check mark whether the registrant has submitted electronically every Interactive Data File required to be submitted pursuant to Rule 405 of Regulation S-T during the preceding 12 months (or for such shorter period that the registrant was required to submit such files).
    [Show full text]
  • Extreme Networks EXOS V12.3.6.2 EAL3+ ST
    Extreme Networks, Inc. ExtremeXOS Network Operating System v12.3.6.2 Security Target Evaluation Assurance Level: EAL3+ Document Version: 0.9 Prepared for: Prepared by: Extreme Networks, Inc. Corsec Security, Inc. 3585 Monroe Street 13135 Lee Jackson Memorial Hwy., Suite 220 Santa Clara, CA 95051 Fairfax, VA 22033 Phone: +1 408 579 2800 Phone: +1 703 267 6050 http://www.extremenetworks.com http://www.corsec.c om Security Target , Version 0.9 March 12, 2012 Table of Contents 1 INTRODUCTION ................................................................................................................... 4 1.1 PURPOSE ................................................................................................................................................................ 4 1.2 SECURITY TARGET AND TOE REFERENCES ...................................................................................................... 4 1.3 TOE OVERVIEW ................................................................................................................................................... 5 1.3.1 TOE Environment ................................................................................................................................................... 5 1.4 TOE DESCRIPTION .............................................................................................................................................. 6 1.4.1 Architecture .............................................................................................................................................................
    [Show full text]
  • Campus Networking Best Practices Session 5: Wireless
    Campus Networking Best Practices Session 5: Wireless LAN Hervey Allen Dale Smith NSRC & University of Oregon University of Oregon & NSRC [email protected] [email protected] Wireless LAN • Provide wireless network across your campus that has the following characteristics: – Authentication – only allow your users – Roaming – allow users to start up in one section of your network, then move to another location – Runs on your campus network Firewall/ Border Traffic Shaper Router Wireless REN switch Authentication Core Gateway Router Core Servers Network Access Control (NAC) Enterprise Identity Management • Processes and Documentation of users. – Now you must deal with this. – What to use as the back-end user store? • LDAP • Active Directory • Kerberos • Other? – Will this play nice with future use? • email, student/staff information, resource access, ... Identity Management Cont. • An example of such a project can be seen here: – http://ccadmin.uoregon.edu/idm/ • This is a retrofit on to an already retrofitted system. • Learn from others and try to avoid this situation if possible. A Wireless Captive Portal The Wireless Captive Portal • Previous example was very simple. • A Captive Portal is your chance to: – Explain your Acceptable Use Policies – Decide if you must authenticate, or – Allow users on your network and monitor for problems instead (alternate solution). – Anything else? Branding? What's Happening? • remember our initial network diagrams...? • Do you think our hotel built their own solution? • Probably not... Commercial Solutions • Aruba http://www.arubanetworks.com/ • Bradford Networks – http://www.bradfordnetworks.com/ • Cisco NAC Appliance (Clean Access) – http://www.cisco.com/en/US/products/ps6128/ • Cisco Wireless LAN Controllers – http://www.cisco.com/en/US/products/hw/wireless/ • Enterasys http://www.enterasys.com/ • Vernier http://www.verniernetworks.com Open Source Solutions • CoovaChilli (morphed from Chillispot) – http://coova.org/wiki/index.php/CoovaChilli – Uses RADIUS for access and accounting.
    [Show full text]
  • Capacitors Exclusions 2017-06-06.Xlsx
    Case 3:14-cv-03264-JD Document 1705-4 Filed 06/26/17 Page 1 of 13 EXHIBIT D Case 3:14-cv-03264-JD Document 1705-4 Filed 06/26/17 Page 2 of 13 In re Capacitors Antitrust Litigation Exclusion Report Name Exclusion ID # Postmark Date 1 Acer, Inc. 41778552-1 2/10/2017 2 Acer America Corporation 41778552-2 2/10/2017 3 Gateway, Inc. 41778552-3 2/10/2017 4 Gateway U.S. Retail, Inc (f/k/a eMachines, Inc) 41778552-4 2/10/2017 5 Packard Bell B.V. 41778552-5 2/10/2017 6 BlackBerry Limited (f/k/a Research in Motion Limited) 41778553-1 2/15/2017 7 BlackBerry Corporation (f/k/a Research in Motion Corporation) 41778553-2 2/15/2017 8 BlackBerry Singapore Pte. Limited (f/k/a Research in Motion Singapore Pte. Limited) 41778553-3 2/15/2017 9 BlackBerry UK Limited (f/k/a Research in Motion UK Limited 41778553-4 2/15/2017 10 Plexus Corp. 41778554-1 2/14/2017 11 Plexus Asia, Ltd. 41778554-2 2/14/2017 12 Plexus Corp. Limited 41778554-3 2/14/2017 13 Plexus Corporation (UK) Limited 41778554-4 2/14/2017 14 Plexus Deutschland GmbH 41778554-5 2/14/2017 15 Plexus Electronica S. de R.L. de C.V. 41778554-6 2/14/2017 16 Plexus (Hangzhou) Co., Ltd. 41778554-7 2/14/2017 17 Plexus International Services, Inc. 41778554-8 2/14/2017 18 Plexus Intl. Sales & Logistics, LLC 41778554-9 2/14/2017 19 Plexus Manufacturing Sdn.
    [Show full text]
  • Server Administration Manual Release Latest
    Nextcloud Server Administration Manual Release latest The Nextcloud developers Oct 01, 2021 CONTENTS 1 Introduction 1 1.1 Videos and blogs.............................................1 1.2 Target audience..............................................1 2 Release notes 3 3 Maintenance and release schedule5 3.1 Major releases..............................................5 3.2 Maintenance releases...........................................5 3.3 Older versions..............................................6 4 Installation and server configuration7 4.1 System requirements...........................................7 4.2 Deployment recommendations......................................9 4.3 Installation on Linux...........................................9 4.4 Installation wizard............................................ 17 4.5 Installing from command line...................................... 21 4.6 Supported apps.............................................. 22 4.7 SELinux configuration.......................................... 24 4.8 NGINX configuration.......................................... 27 4.9 Hardening and security guidance.................................... 36 4.10 Server tuning............................................... 40 4.11 Example installation on Ubuntu 20.04 LTS............................... 42 4.12 Example installation on CentOS 8.................................... 44 4.13 Example installation on OpenBSD.................................... 48 5 Nextcloud configuration 53 5.1 Warnings on admin page........................................
    [Show full text]
  • Iptables with Shorewall!
    Iptables with shorewall! Table of Contents 1. Install swarmlab-sec (Home PC) . 1 2. shorewall . 1 2.1. Installation . 2 3. Basic Two-Interface Firewall. 2 4. Shorewall Concepts . 3 4.1. zones — Shorewall zone declaration file . 3 4.2. interfaces — Shorewall interfaces file. 4 4.3. policy — Shorewall policy file . 4 4.4. rules — Shorewall rules file . 4 4.5. Compile then Execute . 4 5. Three-Interface Firewall. 5 5.1. zones . 6 5.2. interfaces . 6 5.3. policy . 7 5.4. rules . 7 5.5. masq - Shorewall Masquerade/SNAT definition file . 7 5.6. snat — Shorewall SNAT/Masquerade definition file . 8 5.7. Compile and Execute . 8 1. Install swarmlab-sec (Home PC) HowTo: See http://docs.swarmlab.io/lab/sec/sec.adoc.html NOTE Assuming you’re already logged in 2. shorewall Shorewall is an open source firewall tool for Linux that builds upon the Netfilter (iptables/ipchains) system built into the Linux kernel, making it easier to manage more complex configuration schemes by providing a higher level of abstraction for describing rules using text files. More: wikipedia 1 NOTE Our docker instances have only one nic to add more nic’s: create netowrk frist docker network create --driver=bridge --subnet=192.168.0.0/16 net1 docker network create --driver=bridge --subnet=192.168.0.0/16 net2 docker network create --driver=bridge --subnet=192.168.0.0/16 net3 then connect network to container connect network created to container docker network connect net1 master docker network connect net1 worker1 docker network connect net2 master docker network connect net2 worker2 now let’s look at the following image 2.1.
    [Show full text]