Cisco OL-6109-01 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Cisco OL-6109-01, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Cisco OL-6109-01 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Cisco OL-6109-01. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Cisco OL-6109-01 should contain:
- informations concerning technical data of Cisco OL-6109-01
- name of the manufacturer and a year of construction of the Cisco OL-6109-01 item
- rules of operation, control and maintenance of the Cisco OL-6109-01 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Cisco OL-6109-01 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Cisco OL-6109-01, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Cisco service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Cisco OL-6109-01.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Cisco OL-6109-01 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    CH A P T E R 4-1 Cisco Traffic Anomaly De tector User Guide OL-6109-01 4 Zone Configuration This chapter d escribes zone conf iguration. It includes the follo wi ng major sections: • Basic Zone Conf igu ration • Zone Remote Guard List • Zone T raf f ic Learning • Zone Detection Basic Zone Configuration This section describes t he initial Zo[...]

  • Page 2

    Chapter 4 Z one Configuration Basic Zone Config uration 4-2 Cisco Traffic Anomaly Detector User Guide OL-6109-01 • Remov ing a Zone IP Addr ess • Remov ing all Zone IP Addresses Defining a New Zone The Detector enables the us er to define a ne w zone based on a v ariety of templates. T o defi ne a new zone perform the following: 1. From the Con[...]

  • Page 3

    4-3 Cisco Traffic Anomaly De tector User Guide OL-6109-01 Chapter 4 Zone Configuration Basic Zone Configuration Note If no zone template is specif ied, the zone will be def ined using the Detector DEF A UL T zone template. – base-zone-name —(Optional) The name of a desired zon e used as a template for the ne w zone. – interactive —(Optional[...]

  • Page 4

    Chapter 4 Z one Configuration Basic Zone Config uration 4-4 Cisco Traffic Anomaly Detector User Guide OL-6109-01 2. Choose ENTER . The following prompt appears: admin@DETECTOR–conf-zone-<new-zone-name># T o duplicate a zone from the zon e command group le vel perform the fol lowing: 1. From the Zone command g roup lev el of the desired zone[...]

  • Page 5

    4-5 Cisco Traffic Anomaly De tector User Guide OL-6109-01 Chapter 4 Zone Configuration Basic Zone Configuration Removing All Zones The user may remov e all the Detector’ s zones. Caution Remov ing all zones eliminat es their DDoS detection. T o remov e all zones perform the follo wing: 1. From the Conf iguration command grou p lev el type the fol[...]

  • Page 6

    Chapter 4 Z one Configuration Basic Zone Config uration 4-6 Cisco Traffic Anomaly Detector User Guide OL-6109-01 Where: – template-name —A zone template. Opti ons include: Default —The Guard default zone template LINK_128K —A template design ed for bandwidth-limi ted Links LINK_1M —A template designed for bandwidth-limit ed Links LINK_4M [...]

  • Page 7

    4-7 Cisco Traffic Anomaly De tector User Guide OL-6109-01 Chapter 4 Zone Configuration Basic Zone Configuration Where zone-name specif ies the desired zone name. 2. Choose ENTER . Belo w is an example of the zone command implementation: admin@DETECTOR-conf# zone scannet admin@DETECTOR-conf-zone-scannet# Describing a Zone The user may add a descript[...]

  • Page 8

    Chapter 4 Z one Configuration Basic Zone Config uration 4-8 Cisco Traffic Anomaly Detector User Guide OL-6109-01 – ip-mask —(Optional) The zone IP subnet mask. Note If no mask is specified, the D etector assum es the default su bnet mask 255.255.255.255 . 2. Choose ENTER . Below is an e xample of the ip address command implemen tatio n: admin@D[...]

  • Page 9

    4-9 Cisco Traffic Anomaly De tector User Guide OL-6109-01 Chapter 4 Zone Configuration Zone Remote Guard List Note If no mask is specified, the D etector assum es the default su bnet mask 255.255.255.255 . 2. Choose ENTER . Below is an e x ample of the no ip address command implemen tatio n: admin@DETECTOR-conf-zone-scannet# no ip address 192.168.1[...]

  • Page 10

    Chapter 4 Z one Configuration Zone Remote Gu ard List 4-10 Cisco Traffic Anomaly Detector User Guide OL-6109-01 This section contains the follo w ing procedures: • Adding a Guard to the Zo ne Remote Guard List • Removing a Guard from the Zone Remote Guard List • Interacti ve Recommendations Mo de Adding a Guard to the Zone Remote Guard List T[...]

  • Page 11

    4-11 Cisco Traffic Anomaly De tector User Guide OL-6109-01 Chapter 4 Zone Configuration Zone Remote Guard List Where remote-guard-a ddress specifies the remote Guard IP address. Use ‘*’ to remo ve all remot e Guards from the remo te Guard list. Caution The user should verify that the Detector has at least one remote Guard on its defaul t remote[...]

  • Page 12

    Chapter 4 Z one Configuration Zone Traffic Learning 4-12 Cisco Traffic Anomaly Detector User Guide OL-6109-01 T o create a ne w zone with interacti ve recommendations mod e perform the follo wing: 1. From the Conf iguration command grou p lev el type the follo wing: admin@DETECTOR-conf# zone < new-zone-name > interactive 2. Choose ENTER . The[...]

  • Page 13

    4-13 Cisco Traffic Anomaly De tector User Guide OL-6109-01 Chapter 4 Zone Configuration Zone Traffic Le arning The Detector’ s too ls for constructing detection policies are the Polic y T empl a tes. These define the policies according to the Minimum Threshold and Maximum Services parameters the user pro vides (t his chapter will not cov er those[...]

  • Page 14

    Chapter 4 Z one Configuration Zone Traffic Learning 4-14 Cisco Traffic Anomaly Detector User Guide OL-6109-01 Where zone-name specifies a zone name. Note that the Guard enables the use of an asteri sk (*) as a wildcard denoting either of the follo wing option s: – All of the Guard’ s zones. Issuing learning pol icy-construction* means setting t[...]

  • Page 15

    4-15 Cisco Traffic Anomaly De tector User Guide OL-6109-01 Chapter 4 Zone Configuration Zone Traffic Le arning Accepting Learning Phase 1 – Policy Construction The user may accept the Detector’ s suggested pol icies. T o accept the results of the initial Po licy Construction phase perform the follo wing: 1. From the Global command group lev el [...]

  • Page 16

    Chapter 4 Z one Configuration Zone Traffic Learning 4-16 Cisco Traffic Anomaly Detector User Guide OL-6109-01 Note that the Detector enable s the us e of an asterisk (*) as a wildcard denoting either o f the follow ing options: – All of the Detector’ s zones. Issuing no lear ning* reject means aborting the learning phase fo r all of the Detecto[...]

  • Page 17

    4-17 Cisco Traffic Anomaly De tector User Guide OL-6109-01 Chapter 4 Zone Configuration Zone Traffic Le arning Terminating Learning Phase 2 – Threshold Tuning After a suf ficie nt period of time (see the abo ve note) the user ends the Threshold T uning phase. The u s er may accept th e Detect or’ s suggested policies or decide to abort the seco[...]

  • Page 18

    Chapter 4 Z one Configuration Zone Traffic Learning 4-18 Cisco Traffic Anomaly Detector User Guide OL-6109-01 Aborting Learning Phas e 2 – Tuning Threshold The user may wish to abort the second phase of learning procedure. In this case the Detector stops the process and erases the data learned on the se cond phase. The data gathered on the first [...]

  • Page 19

    4-19 Cisco Traffic Anomaly De tector User Guide OL-6109-01 Chapter 4 Zone Configuration Zone Detection 2. Choose ENTER . The follo wing (partial sample) scr een appears: admin@DETECTOR-conf-zone-scannet# show policies statistics Key Rate Policy 192.168.100.34 73.17 http/80/analysis/syns/dst_ip N/A 0.17 http/80/analysis/syns/global Key Ratio Policy [...]

  • Page 20

    Chapter 4 Z one Configuration Zone Detection 4-20 Cisco Traffic Anomaly Detector User Guide OL-6109-01 Note that the Detector enable s the us e of an asterisk (*) as a wildcard denoting either o f the follow ing options: – All of the Detector’ s zones. Issuing detect * means be ginning detection for all of the Detector’ s zones. – A wildcar[...]

  • Page 21

    4-21 Cisco Traffic Anomaly De tector User Guide OL-6109-01 Chapter 4 Zone Configuration Zone Detection Where: – all-zone —The Detector activ ates the Guard to assume protection ov er the ov erall z one whenev er a traff ic abnormality is detected (see this section’ s e xplanation for further details). – only-dest-ip —The Detector acti v a[...]

  • Page 22

    Chapter 4 Z one Configuration Zone Detection 4-22 Cisco Traffic Anomaly Detector User Guide OL-6109-01 The sample screen indicates that zone tr aff ic is mirrored (or split), the Detector recei ves the zone’ s traf f i c and the traf fi c sho ws normal flow fluctuatio ns. Zone detection is fun ctioning properl y . Ending the Zone Detection The us[...]