cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
459
Views
5
Helpful
5
Replies

NetFlow Placement with MARS50

GrumpyBear
Level 1
Level 1

Hello,

I'm deploying a MARS50. We have a WAN aggregation router followed by a team of PIX535s then a Campus Aggregation Router. Both routers are 6500s with IDSM-2's.

I know the MARS50 is underpowered for our deployment so we're trying to get the most bang for the buck. I'm getting Syslogs from the PIX & routers and currently NetFlow from the Inside router. I'm thinking of moving the NetFlow to the outside router as I've read we should get better sessionization with the denies from the PIX. Enabling the IDSMs is for later in the process. Any comments or suggestions on whether the NetFlow data is better obtained before or after our border firewall?

1 Accepted Solution

Accepted Solutions

I see. Well, I personally still don't see a lot of value in collecting netflow out in front of your firewall. You've got all the denies in the Pix...so the numbers are still there for making up numbers about ROI;-)

The campus router has more value IMHO because you'd see internal<-->internal traffic which you otherwise might not have any insight into.

View solution in original post

5 Replies 5

mhellman
Level 7
Level 7

I suppose it would depend a lot on where your assets are. Frankly, I'm not sure either is very valuable but it depends on how your routing works. Is traffic between WAN's routed through the WAN aggregation router and is all campus traffic routed through the campus aggregation router?

The WAN aggregation router aggregates all our Internet & other external connections as well as connections to all our other sites. Our Assets are behind the firewall. The Campus aggregation router would see all the egress & ingress traffic to our external sites and the Internet as well as half of the Campus traffic transiting it.

The MARS documentation and some of the books are a little vague about which devices to enable NetFlow on but they imply in a couple of places that NetFlow from in front of the is useful in reporting on inbound attacks while the pix deny logs filter out a lot of the false positives. Management would like to see reporting on what threats have been mitigated to gauge the ROI.

my 2 cents:

The campus traffic may have value because the netflows will represent events not represented by the firewall xlate, accept and deny logs. My impression is that firewall xlate/accept/denies are pretty much equivalent to netflow data in MARS and will trigger the same rules. It seems to me that netflows from the WAN router would already be represented by the Pix logs and netflows would not provide any additional value. this assumes that all netflow data would be represented by a PIX accept or deny log message.

OK - further information - we only log denies on the pix and those are 300MB daily so logging the accepts would result in a huge increase in the log files.

I see. Well, I personally still don't see a lot of value in collecting netflow out in front of your firewall. You've got all the denies in the Pix...so the numbers are still there for making up numbers about ROI;-)

The campus router has more value IMHO because you'd see internal<-->internal traffic which you otherwise might not have any insight into.

Review Cisco Networking products for a $25 gift card