M03 PDF
M03 PDF
Planning
McAfee® Network Security
Platform Deployment
McAfee Confidential
The McAfee® Network Security Manager (Manager or NSM) is the central management component for the
McAfee® Network Security Platform (NSP).
What You Will Learn
In this module, you will learn about deployment planning considerations, such as the deployment options and
solution requirements.
Module Goals
The module goals are:
Define deployment options.
Identify solution requirements.
Describe Sensor deployment.
Describe the key deployment considerations.
The Manager Appliance is a 1-U rack dense chassis with an Intel Processor.
Refer to the McAfee.com for more information about the appliance.
NSP supports two deployment Manager (NSM) paths. The customer-supplied server deployment path is the focus of this
module and course.
Network Security Manager Appliance
The appliance is ordered from McAfee. This unit is preloaded with the NSM software for rapid deployment. This appliance
is part of the McAfee Network Security Platform Intrusion Prevention System. The appliance is a 1-U rack dense chassis
with an Intel Processor.
Appliances
McAfee recommended that you use Intel-based appliance models instead.
Customer-Supplied Server Deployment
With a customer-supplied server deployment, the NSM software is manually installed on a supported 64-bit Windows
Server or a supported virtual platform. There is more setup required; however, there is more flexibility with the platform
choice, and the platform is open (non-proprietary). Customer-supplied hardware and software must meet the
specifications for the NSM release planned for installation.
Required: Recommended:
Server: Anti-virus and firewall software for
Manager (NSM) server with embedded windows based Manager
NSP-supplied MariaDB database. Optional: Virtual infrastructure.
Supported web browser.
Static IP addresses for NSM server.
Client:
Packet log viewing program (protocol
analyzer), such as Wireshark.
Client Machine.
Supported web browser.
Sensors
One or more Sensors.
Static IP addresses for Sensors.
This slide highlights base platform requirements and recommendations for a customer-supplied server deployment.
You must have Administrator/root privileges on your Windows server to properly install the Manager software, as well as
the installation of an embedded MariaDB database for Windows Managers during Manager installation.
Disk
300 GB (minimum); 500 GB or more (recommended)
space
The NSM software runs on a dedicated Windows server. The larger your deployment, the more high-end your NSM server
should be. Many NSP issues result from an under-powered NSM server. It is recommended that you exceed the minimum
recommendations, wherever possible.
The recommended operating system is Windows Server 2016 Standard Edition operating system.
At minimum these operating systems are supported:
Windows Server 2012 Standard Edition English operating system
Windows Server 2012 Standard Edition Japanese operating system
Windows Server 2012 Datacenter Edition English operating system
Windows Server 2012 Datacenter Edition Japanese operating system
Windows Server 2012 R2 Standard Edition English operating system
Windows Server 2012 R2 Standard Edition Japanese operating system
Windows Server 2012 R2 Datacenter Edition English operating system
Windows Server 2012 R2 Datacenter Edition Japanese operating system
Windows Server 2016 Standard Edition English operating system
Windows Server 2016 Standard Edition Japanese operating system
Windows Server 2016 Datacenter Edition English operating system
Windows Server 2016 Datacenter Edition Japanese operating system
Windows Server 2019 Standard Edition English operating system
Windows Server 2019 Standard Edition Japanese operating system
Windows Server 2019 Datacenter Edition English operating system
Windows Server 2019 Datacenter Edition Japanese operating system
Note: Only X64 architecture is supported.
MLOS: McAfee Linux Operating System (MLOS) is a McAfee proprietary, standardized Linux-based platform on
which various McAfee security appliances are built.
Database requirements
The Manager requires communication with database for the archiving and retrieving of data.
The Manager installation set includes a database for installation (that is, embedded on the target Manager server). You
must use the supported operating system listed under Server requirements and must use the Network Security Platform-
supplied version of MariaDB (currently 10.3.13) and J-connector version 2.4.0. The MariaDB must be a dedicated one that
is installed on the Manager.
If you have MariaDB previously installed on the Manager server, uninstall the previous version and install the Network
Security Platform version.
For more information on MariaDB refer to https://mariadb.com/.
Windows:
Mozilla Firefox 70.0 or above
Browser Google Chrome 76.0 or above
Mac:
Safari 8 or 9
Windows:
Windows 10 - English or Japanese
Any operating systems mentioned for the Manager Server
OS Display language must be the same as the Manager Server
Mac:
Yosemite
El Capitan
The requirements for the NSM Client are listed below. The NSM Client connects to the server using a supported web
browser.
The following lists the 10.1 Manager/Central Manager client requirements when using Windows 10:
Operating system – Windows 10, English or Japanese (minimum)
Windows 10, version 1903 English or Japanese (recommended)
The display language of the Manager client must be same as that of the Manager server operating system.
RAM – 8 GB (minimum), 16 GB (recommended)
CPU – 1.5 GHz processor (minimum), 2.4 GHz or faster (recommended)
Monitor – 32-bit color, 1440 x 900 display setting 1920 x 1080 (or above)
Browser – minimum
Mozilla Firefox
Google Chrome
To avoid the certificate mismatch error and security warning, add the Manager web certificate to the trusted certificate list.
Browser – recommended
Mozilla Firefox 70.0 or later
Google Chrome 76.0 or later
For the Manager/Central Manager client, in addition to Windows 10, you can also use the operating systems
mentioned for the Manager server.
The following are Central Manager and Manager client requirements when using Mac:
Mac operating system
Yosemite
El Capitan
Browser – Safari 8 or 9
To avoid the certificate mismatch error and security warning, add the Manager web certificate to
the trusted certificate list.
You experience better performance in your configuration and data-forensic tasks by connecting to the
NSM from a browser on the client machine.
Monitor Display
Right-click on the Desktop and select Screen Resolution and go to Advanced Settings > Monitor, and configure Colors to
True Color (32bit).
Monitor Screen Area
Right-click on the Desktop and selection Screen Resolution. Set Resolution to 1440 x 900.
Memory 16 GB – 32 GB recommended
Internal
300 GB minimum; 500 GB or more recommended
disks
We have looked at the requirements for deployment on a physical server. The table shows system requirements for
hosting the NSP Central NSM/NSM server on a VMware platform.
The virtual machine requirements are shown in the table. Remember, it is recommended to exceed the minimum
requirements, if possible.
NS-series Sensors
For more information, refer to the KB87925 – Current Network Security Platform software version information (last
modified December 9, 2019). Also refer to the KB91760 – End of Life for Network Security Platform NS9100, NS9200,
NS9300, and NS9500 Sensor Appliances (last modified October 14, 2019).
With this release of 10.1, NS3500 Sensors supports 200 Mbps throughput.
For this release of 10.1, heterogeneous environment with Virtual IPS Sensors for NSX, AWS, Azure, and OCI are not
supported.
NS3500 Sensor:
End of Life for Network Security Platform NS9100, NS9200, and NS9300 Sensor Appliances – KB91760
McAfee announces the End of Sale for Network Security Platform NS9100, NS9200, and NS9300 Sensor appliances
effective October 14,2019. As of this date, the appliances will no longer be available for purchase.
Network Security Platform NS9100, NS9200, and NS9300 Sensor appliances will reach End of Life (EOL) and End of Support
on September 30, 2024. Existing Sensor appliance customers will receive support until that date, in accordance with the
Enterprise Products End of Life Policy.
NOTE: This notice is not applicable to federal customers and the product will be available on the federal price book while
supplies last.
These appliances have been replaced with Network Security Platform NS9500 series Sensor appliances as follows:
For the NS9500, we decoupled the hardware and software licenses to help future proof hardware upgrades by supporting
throughput-based entitlements. The above mapping is platform to platform, rather than SKU to SKU.
For more information about all SKUs that are reaching End of Sale, refer to the McAfee Product & Technology Support
Lifecycle page.
McAfee announces the End of Sale for McAfee Network Security Sensor Appliances. The End of Sale date was December
31, 2016. As of this date, the M-Series family of products and associated accessories was no longer available for purchase.
M-Series will reach End of Life and End of Support on December 31, 2021. Existing M-Series Sensor Appliance customers
will receive support until that date, in accordance with the Enterprise Products End of Life Policy.
For End of Life (EOL) policy details, refer to the Corporate Products EOL policy at: https://www.mcafee.com/enterprise/en-
us/assets/misc/support-policy-product-support-eol.pdf.
This section details the requirements to upgrade the Sensor software to 10.1. In this section, the term Sensor
refers to NS-series Sensors unless otherwise specified.
Note: If you are using a hot-fix release, contact McAfee Support for the recommended upgrade path.
You must first purchase a license to enable outbound SSL decryption feature. To obtain a demo license for outbound SSL
decryption, contact MB Licensing. An email containing the license will be sent from MB Licensing. If
you are a first time user, you must register with your email ID and Grant number to log in to the portal. In the Service
Portal, click Patches and Downloads to register and log in to the portal.
Be sure to notify IT of port requirements, especially if you plan to use non-standard ports.
The table shows the ports that are used on the NSP server. It is recommended that you use the Sensor and NSM
management port on the same internal network for security and management reasons.
Alert: The NSP product documentation states the need to disable other web services prior to installing the NSM. This is
because the NSM server has to integrate with the Apache server, which is shipped along with the NSM installation package.
Because other web services use port 80 and 443, the NSM installation fails if the other Web Services are not disabled,
because it cannot run the Apache server.
Continued on the next page.
Close all open programs, including email, the Administrative Tools > Services window, and instant
messaging before installation to avoid port conflicts. A port conflict may prevent the application from
binding to the port in question because it will already be in use.
Note: The Manager is a standalone system and should not have other applications installed.
Refer to the KB Ports and traffic destinations used by Network Security Platform – KB59342.
3306 TCP Internal to NSM to connect to the MariaDB database. You can use externally to
connect to the database
4166 UDP Command Channel. UDP source port to bind IPv4 and IPv6 (Java 1.7u45 and
higher) NSM <-> Sensor (bidirectional)
4167 UDP Command Channel. UDP source port number for the SNMPv3 command
channel (Cannot be used to bind IPv4 and IPv6)
8007 TCP Tomcat A JP 12 – Internal to NSM
8500 UDP Command Channel. NSM to Sensor Communication (Default SNMPv3 port)
(bidirectional)
8501 TCP Install Port. Sensor to NSM Communication (bidirectional)
8502 TCP Alert Channel (Control Channel). Sensor to NSM Communication (bidirectional)
2048-bit Encryption
The NSM and Sensor have so far established trust using 1024-bit certificates. With the growing need for enhanced security,
this connection is being upgraded to be encrypted using 2048-bit certificates. NSP 8.1 and later support heterogeneous
environments, which accommodate both 1024-bit and 2048-bit encryption. The NSM is both 1024 and 2048-bit capable and
can manage Sensors running on 2048-bit capable and/or 1024-bit capable software versions.
The upgrade from 1024-bit to 2048-bit encryption is done automatically with no user intervention necessary. Once done,
use the status command to view the encryption type, and show command to view the ports used for 2048-bit encryption.
1024-bit Encryption
When a Sensor with software that does not support 2048-bit encryption is loaded and the NSM is upgraded to a version
that supports 2048-bit encryption, the Sensor can establish trust with the NSM using 1024-bit certificates.
If you use non-standard ports, ensure that those ports are also open on the firewall.
A desktop firewall on the NSM server is recommended. Certain ports are used by the components of McAfee Network
Security Platform. Some of these are required for Manager -- Sensor and Manager client-server communication. All
remaining unnecessary ports should be closed.
If a firewall resides between the Sensor, NSM, or administrative client, which includes a local firewall on the NSM, the
following ports must be opened:
UDP ports 4166, 4167, and 8500
TCP ports 22, 443, 80, 8501-8510, and 8555
It is strongly recommended that you configure a packet-filtering firewall to block connections to ports 8551, 8552, 3306,
8005, 8007, 8009, and 8552 of your NSM server. The firewall can either be a host-based or network-based. Configure the
firewall to deny connections to these ports if the connections are not initiated by the localhost. The only connections
allowed are those from the NSM server itself (localhost); for example, if another machine attempts to connect to port 8551,
8552, 3306, 8005, 8007 and 8009, the firewall must automatically block any packets sent. If you need assistance in blocking
ports, contact Technical Support.
Note: If you use non-default ports for the install port, alert port, and log port, ensure that these ports are also open on the
firewall.
McAfee recommended you not to change the firewall settings in the Linux based Manager.
Use a scanning tool such as Vulnerability Manager to ensure that there are no ports open other than what is required.
Exclude:
<NSM installation directory>\MariaDB\ and its sub-folders.
<NSM installation directory>\App\temp\tftpin\malware\ and its sub-folders.
Anti-virus software might scan every temporary file created in the NSM installation directory,
slowing performance.
Endpoint Security may delete essential MariaDB files, if \MariaDB\ and its sub-folders are not
excluded.
Make sure firewall is not blocking SMTP.
Some of the NSM's operations might conflict with the scanning processes of McAfee VirusScan Enterprise (VSE) or any
other anti-virus software running on the NSM.
Folder Exclusions
The anti-virus software might scan every temporary file created in the NSM installation directory, which might slow down
the NSM's performance. Be sure to exclude the NSM installation directory and its sub-directories from the anti-virus
scanning processes, specifically these folders:
<NSM installation directory>\MariaDB\ and its sub-folders. If these folders are not excluded, VirusScan may
delete essential MariaDB files.
<NSM installation directory>\App\temp\tftpin\malware\ and its sub-folders.
SMTP Connections
By default, VirusScan blocks all outbound connections over TCP port 25. This helps reduce the risk of a compromised host
propagating a worm over SMTP using a homemade mail client. VirusScan avoids blocking outbound SMTP connections
from legitimate mail clients, such as Outlook and Eudora, by including the processes used by these products in an
exclusion list.
The NSM takes advantage of the JavaMail API to send SMTP notifications. If you enable SMTP notification and run VirusScan
8X or above, you must add the java.exe to the list of excluded processes. If you do not explicitly create the exclusion within
VirusScan Enterprise (VSE), you see a Mailer Unreachable error in the NSM Operational Status to each time the NSM
attempts to connect to its configured mail server.
Install a packet log viewing program to be used in conjunction with the Attack Log interface. Your packet log
viewer, also known as a protocol analyzer, must support library packet capture (libpcap) format. This viewing
program must be installed on each client you intend to use to remotely log onto the Manager to view packet
logs.
Wireshark (formerly known as Ethereal) is recommended for packet log viewing. WireShark is a network
protocol analyzer for Windows servers that enables you to examine the data captured by your Sensors. For
information on downloading and using Ethereal, go to www.wireshark.com.
Note: Installation of third-party applications is not supported in the Linux based Manager.
Manager of
Managers
There are two NSM deployment options: Single NSM or a Central NSM.
Single NSM
With a Single NSM deployment, there is a single NSP server in the network that runs the NSM interface. NSP Clients access
the NSM interface from this single server.
Central NSM
The Central NSM is a centralized system managing multiple NSMs. The Central NSM architecture consists of a Central NSM,
which is interconnected to various NSMs. Central NSM manages configurations and pushes them globally to NSMs.
Configurations are pushed to the Sensors indirectly through NSMs.
If you have a large Sensor deployment (for example, 200 Sensors deployed across various geographic locations), consider
using a Central NSM at your organization's headquarters and deploy a dedicated NSM for each region. Each NSM handles
the daily device operations for all Sensors configured to it.
When you use a Central NSM, your regional/local NSMs can add their own region-specific rules, but cannot modify any
configuration established by the Central NSM. Configuration updates to the Sensors must be applied through the local
NSMs.
The Central NSM provides a single sign-on mechanism to manage the authentication of global users across all NSMs.
In addition, a Central NSM allows users to create a management hierarchy that centralizes policy creation, management,
and distribution across multiple NSMs. For example, you can create a policy in the Central Manager and synchronize across
all NSMs added to that Central Manager. This avoids manual customization of policy at every Manager.
Reminder: A Central NSM installation is not the same as Manager Disaster Recovery (MDR) configuration. An MDR
configuration enables you to have a standby NSM available in cases where the Primary NSM fails. The MDR feature is
available for deployments where the following conditions are met:
Two NSMs (called Primary and Secondary) are available. The Primary is in active mode and the secondary in
standby mode.
The Primary and Secondary use the same NSM software release version.
The Primary and Secondary NSMs share the same database structure.
This feature is discussed in more detail later in the course.
Maintaining data for a long period of time (for example, one year) requires additional storage capacity to accommodate
both old and new data.
The database houses the alert and packet log data that your Sensors generate, as well as system files, logs, and so forth.
The integrity and availability of this data is essential to ensure proper system operation.
The amount of space required for your database is governed by many factors, mostly unique to the deployment scenario.
These factors determine the amount of data you want to retain in the database and the time for which the data has to be
retained.
Things to consider while determining your database size requirements are:
Aggregate alert and packet log volume from all Sensors: Many Sensors amount to higher alert volume and
require additional storage capacity. Note that an alert is roughly 2048 bytes on average, while a packet log is
approximately 1300 bytes.
Lifetime of alert and packet log data: You need to consider the time before you archive or delete an alert.
Maintaining your data for a long period of time (for example, one year) requires additional storage capacity to
accommodate both old and new data.
As a best practice, McAfee recommended archiving and deleting old alert data regularly, and attempting to keep your active
database size to about 60 GB.
For more information, refer to the the Capacity Planning section in McAfee Network Security Platform Manager Administration
Guide.
10,000 0.3
50,000 1.7
100,000 3.3
200,000 6.7
500,000 16.7
1,000,000 33.4
For comparison, generation of 10,000 alerts per week is low, while 1,000,000 alert per week is high. If you are generating
1,000,000 alerts per week, it is recommended that you check your applied NSP policies to determine if you are applying a
policy that is an exact match for your protected network environment.
Pre-installation: Installation:
Stagger your Sensor deployment in Have a computer available for direct console
phases. connection to the Sensor for initial
Know traffic capacities at the points configuration.
where Sensor is located. Configure name, network, secret key,
Choose Sensor location and establish trust.
deployment modes. Ensure you have HyperTerminal or PuTTY.
Identify capacity limitations.
Ensure network connectivity between the
Determine location (domain) in the NSM and the Sensor.
NSM.
Know what adjacent devices to connect to
For physical Sensors, ensure there is for network monitoring.
appropriate rack space and power.
Build a test plan.
To install a new Sensor, you should have the appropriate rack space and power in place. Once you unpack the Sensor, you
install the slide rail, add ears to the Sensor and mount the Sensor. More than one person should assist since some Sensors
are very heavy. For those Sensors with removable power supplies, remove the power supplies before mounting. There is a
quick start guide that covers all the steps in getting the Sensor initially up and running.
After a Sensor is in place, additional information is needed to complete the install, including:
Ports used
Port-to-Sensor connections
Basic network configuration information such as name, IP address,
Secret key for establishing trust
Large network with many access points, file servers, and machines in use may require a larger
level of deployment than small office with single access point and few machines.
The NSP is built with growth in mind. The NSP can manage multiple Sensors, and your Sensor infrastructure can scale in
performance from 100 Mbps to multi gigabits per second for monitoring network segments. McAfee gives you alternatives
in connectivity from branch offices to internal network segments to the very core of your data center.
The size of your network and performance/bandwidth requirements determine the number and type of Sensors required
to successfully and efficiently protect your network. A large network with many access points, file servers, and machines in
use may require a greater number of Sensors with performance/bandwidth capabilities than a small branch office with a
single access point and few network machines.
When deploying Sensors, it is recommended to plan for 50 percent over the current
speed.
Sensor placement is an individual company decision. Some things to consider are what assets you want to protect, the
configuration of your network, the location of your aggregation points, the type of traffic, traffic routing, and so on.
Existing Network Infrastructure and Corporate Security Policy
Understanding your network and corporate environment is the most difficult part, and probably the bulk of the work in
effective IPS deployment. It encompasses the following.
Network topology
Network address space being monitored
Statically assigned server addresses
VLAN
Dynamic Host Configuration Protocol (DHCP)-assigned addresses
Operating systems running on your servers
Applications running on your servers
Corporate security policy
Network Size
The size of your network determines the number of Sensors required to successfully and efficiently protect your network. A
large network with many access points, file servers, and machines in use may require a larger level of IPS deployment than
a small office with just a single access point and few machines. You must also factor in the redundancy requirements for
your network.
Access Points
You are only as strong as your weakest link. Intrusions coming in from the Internet are important to combat, but misuse
and intrusions attempted through the extranets or inside the corporate network are equally as critical to defend against. In
fact, research statistics show that insiders are the most common source of attacks.
Critical Servers
File servers containing financial, personnel, and other confidential information need protection from those people wishing
to exploit your critical information. These machines are extremely appealing targets. And, as discussed in the previous
section, insiders pose a threat that must be addressed.
Consider whether you need different levels of security for different parts of the organization. Assess how much of your
sensitive material is on-line, where it is located, and who has access to that material. In addition, estimate the typical
volume of network traffic generated by these systems. If you have already designed the sensor placement, show this on the
network diagram.
Traffic Flow
Bandwidth and traffic flow are crucial to running a successful enterprise network. Bandwidth requirements vary in an
enterprise network, as different applications and business functions have different needs. Bandwidth utilization on the
network segments that you need to monitor determine what type of Sensor will work best for you. NSP offers multiple
sensors providing different bandwidths.
Monitoring of Security Operations
To successfully defend against intrusions, McAfee recommended dedicated monitoring of the security system. Network
intrusions can happen at any given moment, so having a dedicated 24-hour-a-day prevention system make the security
solution complete and effective.
Monitoring at the Perimeter
Deployment at the perimeter does not protect you from internal attacks, which are some of the most common source of
attacks. Perimeter monitoring is also useless if a network has multiple ISP connections at multiple locations (such as one
Internet connection in New York and one in San Jose) and if you expect to see asymmetric traffic routing (that is, incoming
traffic comes through New York and outgoing traffic goes out through San Jose). The IPS simply will not see all the traffic to
maintain state and detect attacks. Deployment in front of the servers that you want to protect both detects attacks from
internal users and deals effectively with the geographically diverse asymmetric routing issue.
Internet
Manufacturing
VoIP
ERP CRM
Sensor
Sensor
DMZ Sensor
Sales Core/Backbone
Engineering
Internal
Perimeter
NSP can protect your entire enterprise by locating Sensors in the appropriate places in the network. The figure is a high
level example of a possible topology.
Perimeter: Block external attacks from getting into your network. You can place it in front of or behind the firewall,
as well as protect your Demilitarized Zone (DMZ) servers from malicious attacks.
Internal: Define different policies of protection depending upon the group’s needs with one device. If Engineering
encounters an attack, the Sensor can quarantine the problem to just that segment.
Core/Backbone: Protect critical core servers in the data center and protect your high-speed backbone.
McAfee states that the Windows-based NSM and the Global Edition can support up to 100 Sensors, so can 100 Sensors
actually be supported? It depends.
The Sensor and NSM exchange information generally every two minutes to verify the Sensor
status is Up (operating).
When the manager detects the first poll failure, it reduces the polling interval to every 30
seconds to verify the status of the communication channel and eliminate the possibility of a
failed poll due to packet loss.
If the Sensor is still un-reachable after 10 minutes, the polling frequency reverts to its normal
value of two minutes.
The number of Sensors you can effectively deploy with a single NSM is highly dependent on interrelated factors, so no
single solution works for all environments. Some factors depend on the Sensor’s implementation and how much alert
traffic the network generates. Others factors involve the size of the installation.
Consider:
Number of updates per Sensor. Signature set and policy update times take progressively longer with each new
Sensor.
Number of alerts and packet logs. The number of alert and packet logs sent to the NSM is the true bottleneck for the
number of Sensors that a NSM can support. Under normal circumstances, the NSM should not receive more than
150 events per second. If this rate continues for a long period of time, the NSM becomes backlogged and is not be
able to keep up with event processing.
Non-tuned policies. Non-tuned policies have the potential to overload NSM resources with inbound alerts.
System limitations, such as the number of Virtual IDS (VIDS) supported.
Rule: This answer is highly dependent upon existing network factors and deployment options. There is no specific X=N
response. A general rule of thumb is not to exceed 50 Sensors for any given NSM.
Note: The Sensor and NSM exchange information generally every two minutes to verify the Sensor status is Up (operating).
This is done to avoid issues such as a lost packet causing a failure alert. If the Sensor is still un-reachable after 10 minutes,
the polling frequency reverts to its normal value of two minutes.
Primary Secondary
(Active) (Standby)
NSM NSM
Sensors
Sometimes the worst happens. In this age, where outages to IT systems can cost millions of dollars in lost
revenue, lost productivity, and legal issues, every organization must face the near certainty of a system failure
occurring at a future date. Anticipating these events and planning corrective courses of action is now a
prerequisite to business success. Most organizations now employ some manner of business continuity
planning (BCP), a subset of which is disaster recovery planning (DRP). To this end, Network Security Platform
has long provided a Sensor high-availability configuration; but what if the worst should happen to your
Manager server?
Most companies are not willing to rely on the manual method of Manager data archival, restoration of
backups, and importing of exported policies to recover their Manager as part of their IPS DRP.
With the MDR configuration, two NSM servers are deployed as part of NSP. One host is configured as the Primary system;
the other as the Secondary. If the Primary Manager is found to be unavailable during health check, the Secondary Manager
switches over after defined time interval expires.
Enter the MDR feature. With MDR, two Manager servers are deployed as part of Network Security Platform.
One host is configured as the Primary system; the other as the Secondary. Each uses the same major release
Manager software with mirrored databases; however, the two hosts’ hardware configuration does not need to
be identical. The Secondary Manager can be deployed anywhere—for example, at a disaster recovery site, far
from the Primary Manager.
The Primary Manager is the active Manager by default; this Manager communicates with the Update Server,
pushes configuration data to the Sensors, and receives alerts from the Sensors.
The Secondary Manager remains in a standby state by default. While in standby mode it monitors the health
status of the Primary Manager and retrieves Sensor configuration information from the Primary Manager at
configured intervals of time.
Note:
The Secondary Manager is a warm standby system; it will not guarantee state synchronization with the Primary Manager. It
does update configuration information at regular intervals (every 15 minutes), but it does not maintain state. (You can also
manually update Secondary Manager configuration rather than waiting for the automatic update.)
An MDR pair can manage both hardware Sensors as well as Virtual Sensors deployed in an AWS environment.
A Sensor connected to an MDR pair maintains communication with both Managers at all times. The Sensor sends alerts,
packet logs to both the Managers. Real-time synchronization between the MDR pair ensures that the data present in the
active mode is exactly mirrored in the standby.
In case one of the Managers goes down, then after it comes up, it will be updated with the missed alerts and packet log
data during the next synchronization from the peer Manager. This synchronization restores the missed alerts and packet
log data only from previous 24 hours. The maximum number of alerts and packet logs restored with synchronization is
10,000.
Sensors can only be added to an active Manager. (A new Sensor added to the active Manager in an MDR pair establishes
trust first with the Primary Sensor, and then attempts on its own to establish trust with the Secondary).
Switchover, or failover from the Primary to the Secondary, can be manual/voluntary or involuntary.
Note: In a situation where you have planned manual downtime and the downtime is expected to be brief,
McAfee recommended that you manually suspend MDR, preventing the Secondary Manager from taking over
and becoming active. You can then resume MDR when the downtime period is over.
The Secondary Manager performs regular “health checks” on the Primary Manager. If the Primary Manager is
found to be unavailable during a health check by the Secondary Manager, the Secondary Manager waits for a
configurable time interval. If the Primary Manager is still unavailable after that time period elapses, control
then switches over to the Secondary Manager.
Note: You can switch over to the Secondary manually, as well.
Once the Secondary Manager is active, the Primary moves to standby. The Sensors are made aware of the
switchover, communicate with the Secondary Manager, and the system continues to function without
interruption.
All “in-flight transactions” are lost upon failover from Primary to Secondary Manager. For instance, if the
Primary Manager failed while a user was in the middle of a policy edit, the Secondary Manager will not be able
to resume the policy edit.
Note: The MDR feature, in fact, assumes that the Secondary Manager is a standby system, and that it will NOT
assume control indefinitely. The Primary Manager should be diagnosed and repaired, and be brought back
online.
While the Secondary Manager is active, McAfee recommended against making any configuration modifications
on the Secondary Manager, as these modifications could cause potential data synchronization problems when
the Primary Manager is resurrected.
Once the Primary Manager has recovered, you can switch control back to the Primary system. During this
switch back, if you have made configuration changes on the Secondary, you have a choice whether to retain
the configuration on the Primary or overwrite with changes made on the Secondary. After switch-back, alert
and packet log data is copied from Secondary to Primary Manager, and can be viewed in the Attack Log page.
Data is re-synchronized, the Sensors return to communicating with the Primary, and the system is restored
with the Primary Manager active and the Secondary Manager in standby mode.
Note: You can easily dissolve the MDR relationship between the two Managers and return either Manager to
stand-alone mode.
Change Control
You are evaluating an existing Windows server to identify if it meets the hardware and software
requirements for NSM. The local administrator wants to use an instant messaging system to
communicate with remote administrators. Is this a supported configuration? Explain your answer.
_____________________________
and Recommendations.
programs such as instant messaging or other non-secure Internet functions. Refer to the Deployment Requirements
Answer: The configuration is not supported. Use a dedicated server. Do not use the NSM server for non-secure
A. True
B. False
You have 200 Sensors deployed across various geographic locations and want
local and regional NSP administrators to be able to add their own region-
specific rules. Which deployment type best meets your needs?
A. Central NSM
B. Manager Disaster Recovery (MDR)
C. Update Server
Answer: A. Central NSM. Refer to the Single and Central NSM Deployments.
You want to connect to the NSM server from a MAC with a Safari 6 or above
browser. Is this supported?
________________________________________________________________
The NSM software can be manually installed on a supported 64-bit Windows Server or a supported
virtual platform or purchased from McAfee as pre-loaded software on a fully-configured Manager
Appliance.
The NSM requires communication with MariaDB database for the archiving and retrieval of data.
There are two NSM deployment options: Single NSM or Central NSM.
The NSP can manage multiple Sensors, and your Sensor infrastructure can scale in performance
from 100 Mbps to multi gigabits per second for monitoring network segments.
The slide highlights key points for this module. There is no lab for this module.
Goals:
Install the NSP Manager Console / Lab
Environment.
Log onto the Manager using Desktop NSM
Short-cut.
Log onto the Manager using Mozilla Firefox.
Setup Demo-Run.bat to Simulate Lab
Attacks.
Launch the Demo-Run.bat and Confirm
Alerts.
Troubleshoot the Demo Installation.
Estimated Duration:
45 minutes
McAfee Confidential. McAfee restricts the distribution of this training material to unauthorized audiences.